- Is it also disposable?

Transform business strategies with advanced india database management solutions.
Post Reply
relemedf5w023
Posts: 407
Joined: Sun Dec 22, 2024 7:17 am

- Is it also disposable?

Post by relemedf5w023 »

— We have pulled up all the phone numbers that were called at the time of the explosion in this area. There weren't many of them, only 15. Of these, 13 were in other cars. These passengers were not injured. There were two phones in the car we are interested in. One belonged to Mr. Kraus. And the second phone was a disposable one. The number from which the call was made has already been established. Apparently, this was the number of the bomber.
Tales of Security: The Attentive Spy
Vladimir Bezmaly | 26.04.2017
Morning is always a challenge. You have to get up, get dressed, have a cup of coffee with a croissant and go to work. But Johann didn't have time to drink his coffee before the phone rang.

- Good morning, Johann. You are being called from the Foreign Intelligence Department. Our boss is asking you to come to his place. The car is at your house. Finish your coffee and let's go.

Johann was always surprised that his habits were so well known. And now he finished his coffee on the go and ran out of the house. What happened? Why did he need it? And one of the most closed officials of the empire, no less? Well, what's the point of guessing. In 10 minutes he'll find out everything.

— Good morning, Johann! We have urgent business. As you know, a very cruel shah has come to power in the neighboring kingdom. Unfortunately, we cannot send our people there yet, we have to rely on local personnel. And what personnel... Whoever gives more is the man there. And those who work not only for money are even more valuable to us. No, switzerland whatsapp data are no selfless people there. But still. They are there as human rights activists, heading various non-governmental foundations for the propaganda of democracy. Of course, all these foundations exist only as long as we pay them. But let's get down to business. One of our high-ranking agents of influence suspected that they were trying to spy on him using his own smartphone. He contacted one of the information security companies in his country. Naturally, he does not know that it is our company. The smartphone was given to us for analysis. Can you take a look, is there really something there? Just don't delete it. If it's ours, we need to fix it so it doesn't catch your eye, if it's not ours, we need to figure it out and then we can delete it. Okay?

- Of course. Where is the smartphone?

- Here. But you understand, no one should know about this.

- Ha. That's understandable. I'm going to go and have a look.

An hour passed.



— Yes. But that didn’t stop us from finding out who was calling. Next to this disposable number was a second phone, whose number we were able to recover and even track. It belongs to Mr. Ali B. Not only did we track whose number it was, but we were already able to check his social network profile and even infect his smartphone with a Trojan. We are currently tracking his location. He has a meeting today. Apparently, with a financier.

- We must take it!

- I'm calling counterintelligence now. It's their question from now on.

Every other day.

- Johann, please provide a list of the people who worked on this task. We have decided to present them with imperial awards. You and they are to be in the awards hall of the imperial palace tomorrow. Dress uniform.
Post Reply