_
_
_umr2016-06-26 19:13:22
Social media
_umr, 2016-06-26 19:13:22

How do the police look for people on social media accounts?

It’s interesting, I know cases that even a person with fake data was found. How it works?

Answer the question

In order to leave comments, you need to log in

8 answer(s)
X
xmoonlight, 2016-06-26
@xmoonlight

With the help of this:
But mere mortals can do this: sitesputnik.ru

A
Alexey Nikolaev, 2016-06-26
@Heian

A request is made to the representative office of the social network, they give out all the information, including correspondence (in which the target probably blurted out his real name, or in which the target was called by his real name). Again, email. They make a request to mail.ru or some kind of microsoft / google, they provide access to the target's mail, and there, for sure, a letter with a real username was lying around from some service / store. IP, phone number - request to providers. Everything is very simple.

K
Konstantin Tsvetkov, 2016-06-26
@tsklab

The address is determined by IP and provider logs.

D
Dim Boy, 2016-06-26
@twix007

The police have access to ip, upon request. The magic is over.
Further simply good search in chains.

S
Sergey, 2016-06-29
@sergeyvidioreg

1. ip
2. now most registrations, even not in social networks, are tied to a mobile phone
3. personal correspondence, as mentioned above

A
Anatoly Ivanov, 2016-06-30
@apeks

I think they make a request to the target social network, they provide the user's IP address. If he did not use tor or anonymous proxies, then that's it, hello. If used, then they watch outgoing streams from the social network and the resources from which they came, they try to build a chain of views.
Today, social networks are tied to a mobile phone, which means they are investigating this issue, if the SIM card is registered to an attacker, then everything is OK and they quickly find it. If it is registered on horns and hooves, then they hang up a wiretap or ask the operator to provide data for the year on the location. Based on them, you can compile statistics of movements and an approximate place of permanent residence. Everything else is a matter of technique.

M
micronex, 2016-07-02
@micronex

Firstly, if the SIM card is issued for the left passenger, the user uses a modem, TOR and VPN in conjunction, then the first exit of the Node will give nothing to specialists from the "K" department.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question