Hacker
Professional
- Messages
- 1,043
- Reaction score
- 844
- Points
- 113
I think that many people would be interested to know how cybersecurity specialists work, how they identify scammers and drug dealers on the network. I'm sharing this interview especially for you.
How did you get there?
A good friend in the police helped and offered to get a job in their cybersecurity department. After university, I had no choice and agreed.
What did you do in the beginning?
I understand computers well, so they put me in charge of making requests to providers, hosters, and similar organizations. In fact, this is an empty formality, a piece of paper is required as proof. It was possible to break through the IP address without an official request, for example, Rostelecom issued information about the owner in one phone call, of course, there is no official such procedure, but there is an agreement.
How was evidence collected?
I collected proofs with a single prtscr button, sent them for signature with a seal and filed them in a folder. In most cases, I just took screenshots of sites with child pornography and extremist materials, but there were even more difficult tasks, such as reading correspondence and viewing videos or photos, but more on that later. As soon as I collected enough evidence, I sent a request to the provider, the provider responded very quickly and gave me a paper with data about the owner of the IP address, namely the full name, address, passport data and MAC address of the device.
How did you search for criminals?
There are different types of criminals: they look for extremists in one place, pedophiles in another, and fraudsters in a third. The stupidest ones are pedophiles who distributed a disc with child pornography in DC++ programs (which used to be very popular), and by doing this alone, they were responsible for Article 242 (distribution).
How did the detention of criminals take place?
Everything starts early in the morning, usually at 6 am. At the beginning, a cargo minibus (like an autoline or minibus) with a capture group is parked near the criminal's house. Then a car pulls up with operatives and everyone goes up to the floor very quietly. Meanwhile, the cars drive off to the next street. Residents of the apartment are asked to open the door under any pretext: fire, neighbors from the bottom, gas service.
What about collecting evidence?
Describe all the equipment, the most important thing: a device with a MAC address that was lit up by the provider, usually a router. They also seize a computer or laptop. If the owner withstood all attempts to find out the password, the computer is sent for examination.
How does the expert review process work?
Do you think experts will choose the right password? No. They pull out the hard drive, plug it into their computer, and stare blankly at the files. If a cryptographic container is found on the HDD , no one will decrypt it, they do not have supercomputers for this case.
With that, the interview came to an end. I hope you enjoyed it and found this information useful.
How did you get there?
A good friend in the police helped and offered to get a job in their cybersecurity department. After university, I had no choice and agreed.
What did you do in the beginning?
I understand computers well, so they put me in charge of making requests to providers, hosters, and similar organizations. In fact, this is an empty formality, a piece of paper is required as proof. It was possible to break through the IP address without an official request, for example, Rostelecom issued information about the owner in one phone call, of course, there is no official such procedure, but there is an agreement.
How was evidence collected?
I collected proofs with a single prtscr button, sent them for signature with a seal and filed them in a folder. In most cases, I just took screenshots of sites with child pornography and extremist materials, but there were even more difficult tasks, such as reading correspondence and viewing videos or photos, but more on that later. As soon as I collected enough evidence, I sent a request to the provider, the provider responded very quickly and gave me a paper with data about the owner of the IP address, namely the full name, address, passport data and MAC address of the device.
How did you search for criminals?
There are different types of criminals: they look for extremists in one place, pedophiles in another, and fraudsters in a third. The stupidest ones are pedophiles who distributed a disc with child pornography in DC++ programs (which used to be very popular), and by doing this alone, they were responsible for Article 242 (distribution).
How did the detention of criminals take place?
Everything starts early in the morning, usually at 6 am. At the beginning, a cargo minibus (like an autoline or minibus) with a capture group is parked near the criminal's house. Then a car pulls up with operatives and everyone goes up to the floor very quietly. Meanwhile, the cars drive off to the next street. Residents of the apartment are asked to open the door under any pretext: fire, neighbors from the bottom, gas service.
What about collecting evidence?
Describe all the equipment, the most important thing: a device with a MAC address that was lit up by the provider, usually a router. They also seize a computer or laptop. If the owner withstood all attempts to find out the password, the computer is sent for examination.
How does the expert review process work?
Do you think experts will choose the right password? No. They pull out the hard drive, plug it into their computer, and stare blankly at the files. If a cryptographic container is found on the HDD , no one will decrypt it, they do not have supercomputers for this case.
With that, the interview came to an end. I hope you enjoyed it and found this information useful.