How to track a person: situations you need to know more about. Talklog is a program that allows you to follow your wife through your phone.

Many people know that MTS has a service with which you can track certain subscribers you connect, but few people understand how it can be used discreetly and, most importantly, for what.

  • I'll tell you with my example. I have a retired mother. I often get excited when she goes out into town alone. She is using a cell phone. In this regard, I had a question so that I was always aware of where she was.
  • Another example where the service will be useful is when you have children and you always want to know where they are, if they are skipping school, or if they went exactly where they said.
  • The third example is jealous people who always want to know where their other half is.

In this article I will tell you how easy it is to activate this service, and how to constantly use this service for a very small amount and at the same time, that subscriber will not be able to understand that he is being followed, unless you yourself tell him about it.

  1. You and the person you want to follow must be MTS subscribers
  2. You must have access to this person's mobile phone (once for registration - about 10 minutes)
  3. The cost will be only 50 rubles per month for an unlimited number of requests for three people.
  4. You can follow the subscriber either by SMS requests, or on the website, where you can also see all the movements of a given person during the day.

So, let's get started, if you are not an MTS subscriber, then become one. In addition, you can buy two SIM cards, activate the service and present this number to this person in order to resolve the issue of access to this number.

The service is called "Child under supervision", but we understand that you can use it not only on children's phones.

To begin with, you register from your number in this service, for this you send MAMA or DAD to the room 7788 .

Example: MOM HOPE

After that, the system will register you automatically and send THE CODE , which will be used to register the rest of the subscribers, to combine them into a separate group.

Next, you register the number of the subscriber you need to follow. At this moment, you will need access to this number for 5-10 minutes to register it. To do this, send the following SMS command from this number: CHILD<ИМЯ> <КОД> to the room 7788 .

Example: CHILD PETYa f54g8 (f54g8 is the code that was sent to you when registering your number) Next, you wait for the return SMS about the connection to arrive and delete your traces so that the subscriber does not suspect anything (in case you connect a person secretly from him) ... You need to remove:

  • Outgoing SMS to number 7788
  • Incoming SMS about connection.

This subscriber will no longer receive any SMS indicating that he is connected to this service. He will be able to find out about it only if you tell him about it yourself, or he himself will make a special check by sending a specific SMS to a specific number.

In addition, money for a monthly fee, as well as requests (if more than 3 people) are debited from your account (the one who originally connected and received the CODE), so these subscribers will not have any signs by which they will understand that they are being followed.

How to follow a subscriber

You can via SMS. By sending the command WHERE ARE CHILDREN to the room 7788 in response, you will receive a message with the approximate location of all registered subscribers. If you need to find out a specific user, then send the command WHERE<ИМЯ> to the room 7788 .

Example: WHERE IS PETER

All requests to number 7788 are free (up to 3 people), if more, then for each request 5 rubles.

In addition, you can register on the WAP or WEB site of MTS search and watch the location or even the movement of the subscriber on the map. It is very convenient and intuitive.

There are many different functions for the convenience of using this service. You can read detailed information on the official page http://mtspoisk.ru/family/

I hope that my article was useful to you, if you still have questions, then ask them in the comments.

Spying on your wife through your phone is one of the easiest ways to spy on your own. It is quite effective and at the same time maximum conflict-free. You will save money, as the spyware is installed on your mobile, and you do not need to hire a private detective to spy on the wrong one. You can track your wife's telephone activity without leaving your home.

It should not be ruled out that those who wish not to be convicted of treason will masterfully hide their tracks. For example, if you just take and check your wife's phone number, it may not contain unknown contacts, SMS and other incriminating correspondence.

It is better to check the activity of the subscriber in secret from him. This operation is called mobile espionage and is becoming more popular every year. By installing a special spy application on your wife's smartphone, you can constantly track her calls, correspondence and location.

When should you use the service?

Men use the services of a mobile spy in the following cases:

  • there are good reasons to believe that the wife has a lover;
  • she put a password on her mobile;
  • does not answer calls in your presence, is careful in his statements;
  • she constantly has urgent matters that she does not talk about.

Is it possible "bloodlessly" to check what it is changing? Will this help to reveal all suspicions about her? Is it possible to prevent treason in this way? Our answer is yes. It's not shameful to follow your wife through the phone, because it's calmer, and besides, you are always on the alert. In which case, you will be ready for an unpleasant turn of events in your life together.

Which program to use?

If you follow the link below, you will have access to a dedicated online tracking service. The spy application must be activated on the wife's smartphone without her notification. The software is designed for Android devices.

Fast and easy installation does not require special knowledge and effort. A separate profile with limited access is created on a special site. Only you will have a password to the account, where information about all the subscriber's activity is stored:

  • details of calls: number, duration, incoming or outgoing, audio recording;
  • correspondence: SMS, MMS, mobile chat, data exchange;
  • saving and deleting files, including selfies taken by his wife.

What is the result?

You get 24/7 remote access to your wife's mobile. Anytime and anywhere through your own smartphone, you can conduct constant monitoring in real time.

Before you follow your wife's phone, you must understand exactly that you have stopped trusting your beloved. The service described above provides each user with free monitoring for 12 hours.

Mobile spyware is an effective way to quickly collect the necessary evidence of a spouse's betrayal. Data collection is carried out in a hidden mode without the knowledge of the owner. You will always be aware of where your spouse is spending time and with whom.

■ Decided to follow your friend, suspecting that she is cheating on you with her husband? First, take care of the ability to quickly change the look.

■ You don't need to rent a tuxedo, just a reversible jacket in neutral colors, sweatpants under jeans, a compact windbreaker in your pocket, and a pair of sneakers in your bag. It will also be convenient to hide jeans in it when you take them off.

■ If you are wearing yellow and blue striped socks, bring a spare pair in a different color. Yellow-blue, for example. Match one of your looks with characteristic glasses and a discreet hat.

■ Clothes, by the way, should be completely new so that in the midst of the operation you will not be recognized by the brother of your friend's wife walking around the city.

■ So that the object of observation certainly does not suspect anything, ask for help from friends and put together a reconnaissance group of 4-6 people. You can walk not only alone, but also in twos, pretending to be spouses or Siamese twins.

■ Whenever you need a car, take the most inconspicuous one: not too large or small, gray or white. If your own fleet is small, borrow a car from friends or take it for a test drive in the showroom. If you are unable to pass the baton to another driver, put it in the trunk of your partner so that you can change during the pursuit. Do not try to deliberately slow down, jump at a red light and make the same stops as the object of tracking. What if he has eyes and a rearview mirror? He may be wary.

■ Do not avoid eye contact. If it happened that the victim turned sharply and went in the opposite direction, your jump under the trolleybus may seem suspicious. Better tell your partner to take over the baton. Buy a bluetooth headset. This is the case when the resemblance to the hero of Bezrukov from The Irony of Fate should not scare you.

■ Yes, and disperse assistants along the entire proposed route in advance so that they can, at your signal, "accidentally" leave the lanes and continue to follow the object, taking over the baton. Having passed the required section, they can hide, change clothes, overtake the persecuted person and go out to him from the next public toilet.

■ Is the game in the cafe? Work for a “couple in love” (does your reconnaissance group have such a job?). Have the detectives order a few meals and pay in advance so that they can leave the cafe in case of an emergency. Just do not let the "couple in love" continue to be followed: they have already been exposed enough. Let them pass the baton to you who crumple at the entrance.

■ In a shopping center one cannot cope with it either. Let your companions disperse to different sections. It is unacceptable for a person being followed to notice the same person in different departments, unless he is looking from a campaign poster.

By the way, in case of overlaps, we will deny that we know you, and we will try to get you out of the police next month.

Secret instructions of the CIA and the KGB for gathering facts, conspiracy and disinformation Popenko Viktor Nikolaevich

Methods for detecting self-surveillance and avoiding surveillance

Identification of a search

The agent must constantly monitor for possible surveillance of himself.

An integral part of the surveillance is usually the conduct of a search by the relevant authorities at the apartment of the suspect. To determine whether the door was opened in his absence, the agent sets before leaving (after closing the door) "controls" - various inconspicuous marks: glues the hair with one end to the door, and the other to the casing; inserts a match into the gap between the door and the door frame. And if later it turns out that the hair is peeled off (the match is on the floor), then it means that someone has visited the apartment. Another method of control is memorizing the relative position of objects in the room before each departure. To facilitate memorization, objects are installed each time in a certain (the same) order, and before leaving they look at them from the same point in the room. Let's say the room was left as in fig. 254, and upon arrival it looks like in Fig. 255. Some changes are visible: and - the floor lamp is shifted to the right; b - fruits on the table are located to the left; in - books on the top (second from left) shelf are not tilted, but vertically; r - the bottle on the table is shifted to the right. Thus, the fact of the search is obvious.

In the event of an upcoming long absence (departure), in order to avoid the possible forgetting of the detailed arrangement of objects in the room, they can be photographed, and upon arrival - compare the picture with the real picture.

Figure: 254.

Figure: 255.

Detection of outdoor surveillance

Enemy counterintelligence usually sets a so-called tail behind the suspect - constant surveillance. The agent's task is to timely detect the tail and avoid it (or take any other actions that were provided for in this case).

Eye contact with the same person more than twice can be a sign of surveillance. To check his suspicions, the agent can use various techniques, some of which are set out below and the results of which confirm surveillance.

... An agent who has left the house enters the store and from the inside looks through the window glass at the car that was previously parked not far from his house, and then turned out to be driving in the same direction the agent was following. The car stops opposite.

... The agent suddenly stops and pretends to look at the shop window. In the reflection of the display glass, he sees that a man walking on the opposite side stopped under the cover of a tree.

... In rainy weather, the agent, covered with an umbrella, stops and stands for a very long time, pretending to be examining a shop window. The person walking on the opposite side also stops and begins to examine the shop window on his side of the street, and, despite the pouring rain and the absence of an umbrella, he does not go further and does not enter the store.

... A female agent walks into a women's hat shop and pretends to try on a hat in front of a mirror. In the mirror, she sees that the man whom she had noticed earlier came after her, but he doesn't show much interest in the assortment of the women's store.

... Leaving the store, the woman returns to it; the person who followed her comes back too….The agent stops in front of a store closed for a break and pretends to wait for it to open. A couple of lovers who followed him nearby pass by, stop, hug, return and slowly starts to walk back and forth.

... The agent pulls out any insignificant piece of paper from his pocket, pretends to read it carefully, and then throws ("drops") onto the sidewalk. The man walking behind picks it up.

... The agent gets into a subway car (or other form of public transport) and then exits, pretending to sit in the wrong direction. A previously noticed person jumps out after him.

Surveillance is often carried out from the vehicle, both the driving and the walking agent. When spying from a car, special services use interchangeable numbers so that the same number is not striking. In some countries, this number can be inserted into a special frame for quick change. On closer inspection, this border is usually noticeable.

The special services use several vehicles of different brands and colors, some of which move along parallel streets and are connected to surveillance using radio communications. The presence of surveillance can be detected: suddenly changing the direction of movement or speed; sharply rearranging from row to row; stopping unexpectedly, slightly driving away from the parking lot; drive through a red light; showing a turn and waiting for the same signal from the intended tail; turn the other way, watching the pursuer in the mirror. If this is a "tail", then he will be forced to repeat all these dangerous maneuvers.

Avoiding observation

First, consider avoiding surveillance when moving an agent without a car. One of the rules that an agent should be guided by is: do not get into the first taxi that comes along, land at least in the second, or even better, skip the second, but sit in the third.

When an agent, while moving on foot, feels that he is being watched, he can try to break away from observation, using routine techniques based on changing the rhythm, direction and type of movement, creating certain barriers behind him, lulling the vigilance of the “tail”.

Depending on the situation, the agent may use some of the following tail avoidance techniques:

1. Long looping in crowded places (metro, train stations).

2. Use of walkways, apartments or courtyards and other "back" passages.

3. Frequent change of modes of transport.

4. Transitions in the metro from one line to another.

5. Application of "labyrinth" routes.

6. Unexpected acceleration after turning a corner with the intention of overshooting significantly further than would be expected at normal driving speed.

7. Leaving a moving vehicle.

8. Entering and exiting public transport at the last moment when the doors are closed.

An important point in avoiding the "tail" is the agent's ability to quickly change his appearance: clothes, shoes, headwear, gait, face. As for the latter, then, in principle, it can be made up until completely unrecognizable, but for this

it takes too much time, which, of course, does not exist when avoiding pursuit. However, there are other, quick ways to change the face, some of which will be discussed later.

As for the rest, for this case, the agent (both man and woman) has a special wardrobe: clothes that change color when they are turned inside out, with detachable hem and sleeves (making the clothes shorter and changing their appearance) or (vice versa) releasing (turning away) genders and sleeves (making clothes longer); shoes from which the top is removed - a cover and it changes color and style; roll-out bags and packages; false glasses; umbrella that fits in your pocket. The pictures show a part of such a wardrobe: a hat that changes color and style when turned inside out; coat, when turning out and unfastening the sleeves and the floor, turning into a jacket with a different color; changing skirt; coat jacket; changing shoes; changing (transformable) jacket. A quick change in appearance can be done when entering, for example, into an entrance. You can go to a store selling clothes, where you can transform in a fitting room. A female agent to break away from the male “tail” can enter the ladies' toilet and leave unrecognizable, leaving the spy in complete bewilderment.

When the agent travels by car, the escape option can be, for example, creating the impression of the accompanying people moving in a direction well known to them from past trips and unexpectedly leaving the intended route. In general, the success of an agent's departure from counterintelligence vehicles depends on the agent's knowledge of local roads, on his ability to drive a car, and, finally, on the car itself (to what extent it will be adapted for such a situation). The first two points are achieved by driving on the ground. As for the agent's car itself, although outwardly they should not differ much from those used in a given country, internally it must be equipped (re-equipped) accordingly, that is, be powerful enough (high-speed) and ensure the agent's safety in different situations.

This text is an introductory fragment. From the book Self-loading rifle arr. 1940 [NSD-38] author USSR Ministry of Defense

RIFLE SAVING AND CARE General 89. Regardless of the conditions in which the shooter is, he must always keep his rifle clean, handle it carefully, inspect it daily to make sure it is in full serviceability and combat readiness.

From the book "Tigers" are burning! The defeat of Hitler's tank elite by Kaidin Martin

WHAT THE RUSSIAN SOLDIER PRESENTED Each war sounds different. The sounds were different on different battlefields. Russian shells have their own sound, perfectly distinguishable from the rest. When you are at the final destination of shells like the Germans on

From the book Technique and armament 2012 04 author Technics and Armament Magazine

I carry everything with me According to the materials of the Russian State Archive, A. Kirindas and M. Pavlov prepared for publication In the early 1930s. for the delivery of ammunition in conditions of enemy shelling, samples of tanks and supply tankettes were developed. The first project of a supply tank was carried out on the basis of a light

From the book Military memoirs. Salvation, 1944-1946 author Gaulle Charles de

From the book Nowhere to Hide. Edward Snowden and Uncle Sam's keen eye author Greenwald Glenn

Departure Speech by General de Gaulle at the Triumphal Arch in the Place de l'Etoile November 11, 1945 They gave their lives for France and are triumphant with France. They died on the battlefields, where our fate was decided in full view or far from human eyes. They returned to us today,

From the book How can Russia defeat America? author Markin Andrey Vladimirovich

Chapter 4. The Harm of Surveillance Around the world, governments are actively trying to educate citizens in their countries not to regard privacy as too important. With long, incomprehensible phrases, they convince people that tolerating an aggressive invasion of privacy is

From the book Secret Instructions of the CIA and the KGB on Fact Gathering, Conspiracy and Disinformation author Popenko Victor Nikolaevich

Other Observations A. About breastworks for tank trenches One observation is related to the breastworks of the Tavakalna division in 1991. Most of the armored vehicle positions were deployed towards the direction of the expected attack at an angle of 20 to 60 degrees.

From the book Military Special Forces of Russia [Polite People from the GRU] author Sever Alexander

What were the Chinese screens? It should be emphasized here that there were often no Chinese barriers on the road itself. Moreover, they did not always include the mining of the road, its damage by explosions or the organization of forest blockages. The road is mostly

From the book The Great War is not over. Results of the First World author Mlechin Leonid Mikhailovich

Surveillance In some cases, the residency requires surveillance of a specific person. Its organization, among other things, depends on the personality of a particular object, which mainly determines the degree of complexity of the operation. So, surveillance can be arranged,

From the book The Book of the Wind for Rifle Shooters by Cunningham Keith

Organization of interaction of special forces units and subunits with undercover intelligence, army and frontline aviation, local authorities and the Armed Forces of the Republic of Afghanistan in the interests of identifying and destroying caravans with weapons and ammunition, creating a network of well-wishers in

From the book Soviet Russia (USSR) and Poland. Russian anti-Soviet formations in Poland (1919-1925) author Simonova Tatiana Mikhailovna

Organization of observation Observation was the most accessible, widespread effective way of obtaining information about the movement of caravans and rebel groups. The observation was carried out visually using binoculars or night vision devices and technical means

From the book The Secret Canon of China author Malyavin Vladimir Vyacheslavovich

Part one Balkans. Bloody dispute of the Slavs among themselves Everything will go to waste because of some absurdity in the Balkans, predicted Otto von Bismarck, the iron chancellor and unifier of Germany. The Great War began with the assassination of the heir to the Austro-Hungarian throne in

From the book Basic Special Forces Training [Extreme Survival] author Ardashev Alexey Nikolaevich

OBSERVING SKILLS “The shooter should have an accurate mental picture of the wind indicators in his head and remember it from shot to shot.” \u200b\u200bThe goal of observing skills is simply to improve your ability to see the details of the wind indicators. Here you are not

From the author's book

§ 2. "These units can represent an anti-Bolshevik force ..." As noted in the first chapter, the French General Staff and the French military mission in Poland played a special role in the implementation of the project to create anti-Soviet formations in Poland. 20

From the author's book

99. It goes without saying that everything already exists in the nature of things. Engaging in any business, after a long time, it is possible to reach such a state when everything is carried out as if by itself. Therefore, the one who is skilled in matters of war sees only an army in front of him, speaks only of

From the author's book

Optical surveillance facilities Visual surveillance is carried out using optical daytime surveillance devices, and at night and in conditions of limited visibility - night vision devices. To enhance the capabilities of ground reconnaissance in visual observation and

Why do you need to follow a person? Each has its own goal. Someone wants to convict a soul mate of treason, and someone wants to bring a business partner to the "clean water". Regardless of your goals, the specialists of the "Detective Online" agency will conduct surveillance unnoticed by others, collecting the necessary evidence in a short period of time. We have modern technology in our arsenal that allows accurate observation with photo, audio or video reporting.

Human Tracking Services

The services of a private detective, in addition to conducting an investigation, may include surveillance. It will allow you to find evidence to expose a person, or give reliable information about his real life. We are ready to set spy on the wife, spy on the husband, business partner, child or any other person of interest to the client.

The confidentiality of the client's personality is guaranteed by the contract concluded when registering the service. We do not divulge the secrets of our customers, therefore, each customer can be calm about his reputation.

Tracking methods for a person:

  • outdoor surveillance;
  • phone calls;
  • social networks.

Outdoor surveillance is the most popular. Our specialists will follow the person until all the circumstances of interest to the customer are clarified. In the process of surveillance, irrefutable evidence of guilt or refutation of the client's speculation is collected.

The cost of spying on a person

The price for the services of spying on a person varies in a small price range. It depends on the number of people involved in the observation process, the chosen method of providing evidence, the complexity of the work, and other factors. So, spying on a wife or husband to identify the fact of infidelity will cost less than spying on a business partner. The difference is that a business person can visit a huge number of places in one day. Our specialists will follow him to collect information. While conviction of cheating is much easier, since the lovers meet in one place, which allows you to collect evidence quickly.

You can find out the exact cost of surveillance by calling our office at the phone number indicated on the website. We do not insist on the provision of our services, therefore, after discussing the cost, the client will have time to think or refuse the transaction.