the Internet Windows Android

You are watching "Zeus. "Modern terrorists are competent people with programming skills" law-abiding user network

The Ministry of Internal Affairs published documents on the surveillance of social networks, police officers are purchased softwarewhich allows them to follow users social networks, Including reading private messages, collect geolocation data and analyze the connection between different users.

Znak.com found out that it can use "gray" access to social network data. The Ministry of Internal Affairs declare that they are not going to read the correspondence of users without a court decision. The State Ministry of Internal Affairs of the Sverdlovsk Region announced the purchase of a software and analytical module for information system Zeus, which is already used in the Sverdlovsk police.

In terms of the technical task, the police without bills painted the entire functionality of the new software, which is intended for surveillance for users of social networks. Thanks to the new module, the police will be able to put on a permanent automatic monitoring of any user: to follow, whom he adds to friends, what the posts are written about whether search words are found in his publications; Which groups are entering, what photos and videos add and deletes, with whom and how often communicates.

One of the items of the maintenance directly reads that the Zeus system should provide a text search for the user's file archive.

At the request of analysts software module. Even draws a schedule of social environment of the user and will establish a possible connection between users, analyzing friends, relatives, mediated friends, accommodation places, general groups and reposites. Analysts of the State Ministry of Internal Affairs will have the ability to search for photos of geomethegers hosted in social networks, the time of loading the snapshot to the network, by keywordswhich was described by the photo. The module will also display on the map the place where one or another shot was made.

Some of the functions described in technical label, you can theoretically provide using the open data of social network users. At the same time, a significant part of the bulk can be performed only if the module will receive access to closed information, including personal user correspondence. Theoretically, this is possible if social networks themselves will give access to such data. For social networks, especially foreign, it would be a serious reputational risk.

Zeus already works in seven regions

During the survey of Znak.com experts managed to contact persons who have an idea of \u200b\u200bthe work of the program for surveillance. According to their data, in the seven regions of the Russian Federation, the specified program module has already passed successful tests and began to work. In particular, Zeus is used in the Novosibirsk, Samara and Tyumen region, KhMAO, Samara, in Altai and in the Lipetsk region. In the last region, during testing of the system, the police, for example, reported on identifying "latent" participants in informal extremist associations, which "presumably carried out protest shares."

In addition, Lipetsk police managed to identify users who place ads for high-paying work for girls (presumably - pimps). This is stated in the recall on the tests of the Zeus system conducted in July 2016 by Lipetsk police officers. We failed to find information about public procurement systems for the listed regions. It may have been carried out closed procedures of state procurement (FZ No. 44 admits such an opportunity). While the only region in which the auction documentation was published was the Sverdlovsk region.

Police: "law-abiding citizens are nothing to worry about"

Press Secretary of the State Ministry of Internal Affairs in the Sverdlovsk Region Valery Borenen confirmed that the Office purchases software for monitoring social networks, and noted that it is necessary for police officers "To fulfill the laws entrusted to them, including in the sphere of counter-terrorism and extremism."

"The law-abiding citizens have no reason to worry about correspondence in social networks, if, of course, it does not contain something criminal. You need to be afraid to someone who does not fit calm and peaceful life in our state, - noted the burners. - Works on such equipment will be carried out only by decision of courts, so that there is no violation of the legitimate rights of citizens. Work in this direction is needed both for the security of the state as a whole and for the residents of the Sverdlovsk region. "

"In contact": "We act within the law"

Press Secretary "VKontakte" Evgeny Krasnikov, having read the technical task of the purchase of an analytical module, noted that, most likely, we are talking about monitoring the public activity of users of social networks: their own entries on personal pages, friends records on the same walls, reposts and Publications in social network communities. "VKontakte" has a flexible system of privacy settings of users, allowing, in particular, to close public access to their posts on the wall and exclude a personal page from the issuance of search sites, "said the social network representative. The preservation of personal data of our users is a priority for the company.

"VKontakte" strictly adheres to the current legislation and fully complies constitutional rights Citizens, "said the press secretary of the social network.

Internet-Ombudsman: "Normal Purchase"

Counselor of the Russian President and Internet Ombudsman Dmitry Mariceov said Znak.com that the purchase of the Sverdlovsky State Ministry of Internal Affairs "is quite normal." "It's like buying a car to patrol the terrain. Do not forget that monitoring will be carried out in the "public" places. All people write, photograph and so on, they make public the property, "the Internet-Ombudsman said. - Look at it from such a part.

Face recognition technologies very powerfully evolved in recent years. Monitoring and automatic recognition can be stumble upon the photos you made in the resort. And in the background, the robot recognizes the criminal, hiding from the crime scene. Based on this assumption, a criminal will be checked and detained, which may be a threat to your life and your health. " Mariceov did not comment on the point about the possibility of "Zeus" read private messages.

The surveillance began to the "Summer Law"

It is worth noting that in November 2015 the State Ministry of Internal Affairs of the Sverdlovsk region has already tried to buy a similar module for surveillance for users of social networks. Then the department extended to acquire software for 1 million 420 thousand rubles. However, the auction did not take place, as not a single application was filed. It is impossible to open the file with the application for consideration of applications for participation in the auction at the same time, and the only member of the Competition Commission, according to the public procurement site, was a person named Ivan Ivanovich Ivanov. Who, how and why listen to your conversations and reads the correspondence. Znak.com study

A trustworthy source Znak.com, aware of the principles of work "Zeus" and related to its developers, said that when working, access to the closed interface of Russian social networks was used, "which social networks have long shared with security forces."

According to him, the FSB and the Ministry of Internal Affairs got the opportunity to study personal data of users in Russian social networks long before the adoption of the sensational "Sumari law". "The Sumari law only legalized existing practices, including allowed to use the data collected as evidence in court," the source says.

According to him, the use of "Zeus" cannot be considered legal operational and search activities, it is rather the primary collection of information, on the basis of which it will already be possible to determine the goals for the legal work and, among other things, using the norms of the Sumari law. If you believe the source, you can say that it is implied by illegal collection of information by employees of the Ministry of Internal Affairs.

At the same time, the source Znak.com believes that Zeus will be used for the benefit of society: to search for pedophiles, recruiters of extremist organizations or, for example, to prevent children's suicide propaganda.

"For a law-abiding user, this does not only change anything, the law-abiding user will only benefit from it," the Director of the Internet Security League Ligga Denis Davydov said, commenting on new measures to monitor users in social networks. In his opinion, the measures will help to prevent new terrorist attacks in Russia.

At the end of last week, the Ministry of Communications published to discuss the draft version of its order devoted to the regulation of equipment requirements, which is used in informsystems by organizers of information dissemination (Ori) on the Internet (messengers, social networks, and so on, the Roskomnadzor registry). While the text of the document is only put up for public discussion (until September 6), the federal portal of projects of regulations and anyone can express their wishes.

The order has already caused a wide public resonance, "it lists which data on users of Ori are obliged to transmit special services, in particular the FSB, on request. Among such user information, there are nicknames (pseudonym), passport details, address of residence, email, IP address, payment information, message texts transmitted and received files, information about owning foreign languages, as well as other users of social networks specified as relatives.

What goals are of new measures and why the Russians should not be worried about their introduction, as well as about similar practice in other countries, in an interview with the newspaper, the executive director of the Secure Internet League Denis Davydov said.

VIEW: Denis Nikolaevich, can the proposed set of measures help the prevention of new terrorist attacks in Russia?

Denis Davydov: Yes that's right. This is a real, true goal of these innovations. Finally, our law enforcement agencies and special services will receive normal, efficient tools in order to respond to terrorist threats in a timely manner. This is exactly what lacked. If such a system is created, it is clear that the main scope of its application is an antiterror.

Look: will this make it easier to conduct operational search activities?

Dd: Yes, essentially. Previously, Deltsi did their secret Dark Deliki - robbed, frauded - on the Internet, and to find them to find the feats to make police officers. Now it will make it much easier.

Look: In order to analyze such a large amount of information, you probably need it, and a large number of specialists? But people are always lacking, and, moreover, it can be very expensive.

Dd:The fact is that, thanks modern technologies Analysis of large data arrays, most of the algorithms will be performed and - in the future - programs artificial Intelligence. Interference of living people, specialists will need only in cases where information is truly present, importance - and necessary to fulfill obligations assigned to law enforcement officers.

Look: Thus, the system will, in fact, is sharpened to analyze all this information on Big Data technology?

Dd:In general, any similar systems that store hundreds of millions of records, metadata and other information, of course, are primarily oriented, first of all, storage and convenient search information. That is, such systems can offer some conclusions that need additional verification by law enforcement officers and special services. When conducting operational search activities or in order to investigate some crimes, this data will be very useful.

Look: Aven a year ago, there were reports that the authorities in Russia already use Big Data technologies ("big data" technology).

Dd: It is difficult to say how directly the Big Data technologies. Now, as far as I know, the state only discusses the architecture and those authorized bodies and organizations that will be trained and processing such data. However, it can be said that both the state and private business are partially engaged in this.

If we look at the operators, for example, cellular communication or credit and banking institutions, for example, on Sberbank, then what are these "big data" operators, which are processed and are made on the basis of this analysis some conclusions?

Look: Is it true that for this system all personal information will be a kind of "white noise", and certain designs and phrases, which may be related to the plans of the terrorist attacks, will be "highlighted"?

Dd: The fact is that the information that is going to affect the right of citizens to the inviolability of personal life and the secret of correspondence. These will, first of all, data that allows you to identify a user. In general, this is a system that will collect this data and store.

Processing such information will be only on request, only by court decision. So employees of law enforcement agencies and special services will not just have access to, for example, to letters that users send each other.

The state speaks of banning anonymity. Meaning that for the state, for law enforcement agencies and special services should not be anonymous users. But, nevertheless, each of these users has the right to the inviolability of personal life, on the mystery of communication. Therefore, the state demonstrates in every way and declares that it will defend this right. In the meantime, different transnational Internet giants are the right to violate.

Many people say: "That's all lost, now the FSB will know the user login and the IP address." So what? This will help us to avoid problems with terrorists. At the same time, for some reason, few people say that the same Google companies, Amazon, Facebook not only store personal messages, but also use them at their discretion. That is, they read private messages. Google directly says, they say "Yes, we read your correspondence."

It turns out that opposition activists indignant the FSB endowment with the powers of a request for personal data of users, although this ensures our security, and the fact that the American Internet company quietly reads the correspondence of all users of its services, for some reason they do not outraget. This is a very strange approach.

Look: for an ordinary law-abiding user, this does not change anything at all?

Dd: For a law-abiding user, this not only does not change anything, the law-abiding user will only benefit from it. I can confidently bring in the example of the PRC. Many begin to laugh and giggle when it comes to China, tell some terrible stories about censorship, as everything is bad. In fact, in China after banning anonymity, the Internet economy began to grow faster, the amount of fraud has decreased on the network. And ordinary citizens won from this, primarily in terms of security.

I am confident that the introduction of such a system will allow us to win not only in terms of security and tranquility regarding the terrorist threat, but also, thanks to new tools and opportunities that will receive law enforcement agencies, will increase the disclosure of many crimes that are performed using the Internet.

It seems to me here, by the way, it is logical if access to these tools will receive not only the FSB, but also the Ministry of Internal Affairs. And, for example, those cases on pedophiles on a network that children seduce will move from a dead point. Just because now it is thanks to the Internet that are encrypted, exchange on some closed, secret sites with advice on how to seduce children.

Look: here you have partially touched it. Many bloggers and other critics when discussing this project forget that our life, our safety often depends on those people who guard our calm - from special services, from internal organs. Why?

Dd:This is true. Our security is entirely dependent on the efficiency and effectiveness of the system of operational search activities, as well as the interaction of society with law enforcement structures and special services. Because it is not the task of exclusively the security authorities to solve these issues. Alone, without support for society, it is very difficult to do. It turns out a strange very story. Much is done so that the authorities have modern tools to ensure our security, and here are some people who are all unhappy and they say strange things about what you do not need to do. Although in general the whole world goes along the path of tightening control.

In general, activists who protrude for anonymity in the network somehow do not understand one thing. It lies in the fact that anonymity from the network went forever. It is no more - and never will never.

Look: did she ever be at all?

Dd: It was very conditional. And law enforcement agencies with a large probability of probability could establish a person in the network, even if it took some time. Now it will need to spend less, and the vacation time can be used to search for criminals, terrorists and extremists.

Look: you said that the whole world goes along the way of limiting anonymity on the Internet. The British Parliament last year approved the law, which obliges telecom operators to store during the year data on all sites visited by users, and communications services used, which subscribers used, and also determines under what power of the authorities have the right to hack computers of users. Why do our opposition bloggers ignore such a fact?

Dd:Some bloggers have an idea that all over the world is different, and in Russia "bloody regime" in Russia suffers of human rights and freedoms and citizen. This is such an artificial world in which they live. They created him themselves. And they do not even disturb even follow the news from other countries. And the news from other countries is one of the order. The state in all these countries provides control over the network for data transfer.

In Germany, for example, the question of what can be written in social networks is already regulated at the legislative level, and what is impossible. And that forbidden information in social networks must be deleted independently by the Internet playgrounds. Of course, if our various bloggers, opposition and non-helping, were just more interested in this problem, they would understand that this is such a global trend. He is not connected with any vise, but is associated with banal security.

We live in the 21st century, and modern terrorists are not just a riding bearded on a donkey, modern terrorists are competent people with programming skills and cryptography. In addition, they attract programmers to lead cyber war against the "incorrect" in their understanding. These people have sufficient skills in order to arrange Blackout in any of the European cities, to turn off the power plants, water towers, transport. Therefore, of course, around the world, states are trying to somehow resist this. One of the solutions of this problem is exactly the collection of data and their short storage.

I would like to pay attention to here, we are talking about the short storage of this data, while Google, conditionally, or Facebook always keeps the data, forever! They do not erase them, they remain forever. It is for this that they build giant "data centers" in the USA.

Look: in the Netherlands, too, since the end of last year there is a public discussion of the draft law, which assumes the collection with the help of local communication information and user call information and its subsequent storage. The authorities plan to monitor the correspondence and conversations of the Dutch and calculate potential terrorists. What do you think, will this law take this law there?

Dd:Of course, he will be accepted. The fact is that the EU countries have become hostages of the flow of migrants, refugee flow. Many of those who are refugees are active participants of BDPDP and terrorist cells.

This, in turn, significantly increases terrorist threats. Traditional methods Operational investigative activity to cope with such a shaft of information is simply unreal. Therefore, this is a question of the future of our close enough, when both European and not only European countries will mostly accept similar laws. I am confident that these laws will be tougher than in Russia.

Look: that is, after some time, the whole world will switch to more careful control of the Internet space - in order to protect against terror and in general from crime?

Dd:Yes, and the following questions that will arise before states, including within the framework of bilateral and multilateral relations, is just regulating interaction in data transmission. Information about our citizens is inviolable and protected by the state. Therefore, states will have to regulate at the level of any convention by the international rule of using these data, their transboundary transmission.

If our state guarantees the right to inviolability of data, it should guarantee it and when processing them by other participants, including from abroad. The legislation is international in this area - European, Russian, American - will gradually be harmonized.

The Ministry of Internal Affairs published documents on the surveillance of social network users.

Evgeny Biyat / RIA Novosti

Police commander of Russia buy software that allows them to monitor users of social networks, including reading private messages, collect geolocation data and analyze the connection between different users. Znak.com found out that it can use "gray" access to social network data. The Ministry of Internal Affairs declare that they are not going to read the correspondence of users without a court decision.

The Ministry of Internal Affairs in the Sverdlovsk Region announced the purchase of a software and analytical module for the Zeus information system, which is already used in the Sverdlovsk police. Competition will be held on August 8, the initial price of the annual license is -1 million 850 thousand rubles.

In terms of the technical task, the police without bills painted the entire functionality of the new software, which is intended for surveillance for users of social networks. Thanks to the new module, the police will be able to put on a permanent automatic monitoring of any user: to follow, whom he adds to friends, what the posts are written about whether search words are found in his publications; Which groups are entering, what photos and videos add and deletes, with whom and how often communicates.

One of the items of the maintenance directly reads that the Zeus system should provide a text search for the user's file archive.

At the request of analysts, the program module will even draw a schedule of social environment of the user and will establish a possible connection between users, analyzing friends, relatives, mediated friends, accommodation, common groups and reposites.

Analysts of the State University of the Ministry of Internal Affairs will have the ability to search for photos of geomethegers placed in social networks, the time of downloading a snapshot to the network, by keywords that photography described. The module will also display on the map the place where one or another shot was made.

Some of the functions described in technical label, you can theoretically provide using the open data of social network users. At the same time, a significant part of the bulk can be performed only if the module will receive access to closed information, including personal user correspondence. Theoretically, this is possible if social networks themselves will give access to such data. For social networks, especially foreign, it would be a serious reputational risk.

Zeus already works in seven regions

During the survey of Znak.com experts managed to contact persons who have an idea of \u200b\u200bthe work of the program for surveillance. According to their data, in the seven regions of the Russian Federation, the specified program module has already passed successful tests and began to work. In particular, Zeus is used in the Novosibirsk, Samara and Tyumen region, KhMAO, Samara, in Altai and in the Lipetsk region. In the last region, during testing of the system, the police, for example, reported on identifying "latent" participants in informal extremist associations, which "presumably carried out protest shares." In addition, Lipetsk police managed to identify users who place ads for high-paying work for girls (presumably - pimps). This is stated in the recall on the tests of the Zeus system conducted in July 2016 by Lipetsk police officers.

We failed to find information about public procurement systems for the listed regions. It may have been carried out closed procedures of state procurement (FZ No. 44 admits such an opportunity). While the only region in which the auction documentation was published was the Sverdlovsk region.

Police: "law-abiding citizens are nothing to worry about"

Press Secretary of the State Ministry of Internal Affairs in the Sverdlovsk Region Valery Borenen confirmed that the Office purchases software for monitoring social networks, and noted that it is necessary for police officers "To fulfill the laws entrusted to them, including in the sphere of counter-terrorism and extremism."

"The law-abiding citizens have no reason to worry about correspondence in social networks, if, of course, it does not contain something criminal. You need to be afraid to someone who does not fit calm and peaceful life in our state, - noted the burners. - Works on such equipment will be carried out only by decision of courts, so that there is no violation of the legitimate rights of citizens. Work in this direction is needed both for the security of the state as a whole and for the residents of the Sverdlovsk region. "

"In contact": "We act within the law"

Press Secretary "VKontakte" Evgeny Krasnikov, having read the technical task of the purchase of an analytical module, noted that, most likely, we are talking about monitoring the public activity of users of social networks: their own entries on personal pages, friends records on the same walls, reposts and Publications in social network communities.

"VKontakte" has a flexible system of privacy settings of users, allowing, in particular, to close public access to their posts on the wall and exclude a personal page from the issuance of search sites, "said the social network representative. The preservation of personal data of our users is a priority for the company. "Vkontakte" strictly adheres to current legislation and fully complies with the constitutional rights of citizens, "the press secretary of the social network reported.

Internet-Ombudsman: "Normal Purchase"

Counselor of the Russian President and Internet Ombudsman Dmitry Mariceov said Znak.com that the purchase of the Sverdlovsky State Ministry of Internal Affairs "is quite normal." "It's like buying a car to patrol the terrain. Do not forget that monitoring will be carried out in the "public" places. All people write, photograph and so on, they make public the property, "the Internet-Ombudsman said. - Look at it from such a part. Face recognition technologies very powerfully evolved in recent years. Monitoring and automatic recognition can be stumble upon the photos you made in the resort. And in the background, the robot recognizes the criminal, hiding from the crime scene. Based on this assumption, a criminal will be checked and detained, which may be a threat to your life and your health. " Mariceov did not comment on the point about the possibility of "Zeus" read private messages.

The surveillance began to the "Summer Law"

It is worth noting that in November 2015 the State Ministry of Internal Affairs of the Sverdlovsk region has already tried to buy a similar module for surveillance for users of social networks. Then the department extended to acquire software for 1 million 420 thousand rubles. However, the auction did not take place, as not a single application was filed. It is impossible to open the file with the application for consideration of applications for participation in the auction at the same time, and the only member of the Competition Commission, according to the public procurement site, was a person named Ivan Ivanovich Ivanov.

A trustworthy source Znak.com, aware of the principles of work "Zeus" and related to its developers, said that when working, access to the closed interface of Russian social networks was used, "which social networks have long shared with security forces." According to him, the FSB and the Ministry of Internal Affairs got the opportunity to study personal data of users in Russian social networks long before the adoption of the sensational "Sumari law". "The Sumari law only legalized existing practices, including allowed to use the data collected as evidence in court," the source says. According to him, the use of "Zeus" cannot be considered legal operational and search activities, it is rather the primary collection of information, on the basis of which it will already be possible to determine the goals for the legal work and, among other things, using the norms of the Sumari law. If you believe the source, you can say that it is implied by illegal collection of information by employees of the Ministry of Internal Affairs.

At the same time, the source Znak.com believes that Zeus will be used for the benefit of society: to search for pedophiles, recruiters of extremist organizations or, for example, to prevent children's suicide propaganda.

Dmitry Krasev Lelya Mingaleva

Social networks have become the main invention of recent decades and their appearance has significantly changed the psychology of interpersonal communication. If earlier in the circle of friends included only those people with whom we directly contact, now each user has the number of virtual friends exceeds all imaginable boundaries. So, why add strangers as a friend and how much such friendship is productive? These questions are looking for answers sociologists around the world.

Why people are added as friend in VC, classmates and facebook

Any social network does not have specific geographic boundaries and you can "make friends" with a person who lives in another corner of the planet. If you open now a list of your friends in classmates, contact or any other socialist, then some of your acquaintances will be completely unfamiliar. Why do people add to your friends, not knowing anything about you and not even trying to communicate?

This phenomenon was investigated by many scientists, and the studies conducted revealed an interesting trend. Friendship in the social network is very different from real communication if with friends we see in reality, we love to spend time, communicate and share impressions, then virtual friends Do not require constant attention to your person. The fact of accepting friendship is not burdened with anything and you do not need to periodically ask from an unfamiliar person as his affairs. Rather, on the contrary, an attempt to get together can be perceived as an encroachment on a personal space and a person can add you blacklist.

The reasons for sending a request to friends can be diverse:

  • You have an interesting page. It was just interesting to man that you will post and he will be happy to read something from your messages again. However, such a form of friendship does not imply feedback And you don't even be able to answer his comment after the post.
  • A person knows you personally. Social networks are an excellent opportunity to find a neighboring boy with whom you climbed on the garages in distant childhood. VK You friends can do a former classmate, a forgotten friend or even a distant relative. In this case, the social network serves as an excellent tool for communicating with people, the connection with which has long been lost.
  • Fraud. How sad, but a part of those who want to tie a virtual acquaintance with you, count on this earn. Such friends begin to offer products that you are not interested in or are solved on the outstanding extortion of money.

Despite the danger, modern users are glad to add strangers to friends.

In one of the institutions of England, an interesting study was carried out. A focal group was collected, which included people of different sexes and with different hobbies, but actively using the social network. They were divided into two separate groups. The first showed a page with a profile of a certain person, and the other sent a request to friends. After that, asked what they think about this man. Those who "became friends" with a person responded more positive about him than those who simply studied his profile.

Psychology of interpersonal communication in social

Traditional conversations about friendship were modified under the influence of the Internet. For example, we feel affection for people who are in the list of friends. But, at the same time, we do not have the desire to communicate with them every day. Virtual friendship can be based on common hobbies, and maybe just an option in the Socialist itself. As a rule, many of us will brave a lot of friends, although we cannot even name their real names.

In the last paragraph, another psychological factor is hidden. Many people appreciate the new person in the number of friends on the social network. However, in this matter, different users make up completely opposite opinions. Some of us will be surprised and immediately want to add as friends to this person, while others will consider it or an unnecessarily infantile or a fraudster.

Those who actively use the social network must be remembered that the rules of friendship in this world can differ significantly from the usual ideas. In order to accept the offer of friendship from a completely unfamiliar person, there is nothing wrong. But the rules will have to be friends virtual Mira. Do not impose a new friend to communication or demand attention to your person.

Sociological studies of social network users showed interesting results. If you unsubscribe a person from among friends, it causes a negative reaction. Even if communication between you did not occur.

Scammers online

The most dangerous result of adding strangers to friends is fraud. It is often expressed in the supply of goods or extortion of money. For example, you make communication with an unfamiliar person and he tells about excellent investment or devotes you to the tragic events that have occurred with him. Most often after such a dialogue will be followed by a small amount of money, after which new friend Loses on the Internet. Of course, in a difficult situation there may be a completely law-abiding user, so such requests should not be immediately attributed to the criminal category.

There are several basic ways to identify a fraudster. Pay attention to its page. What avatar he uses, the number of his friends and the full profile. For small fraud rarely create full-fledged accounts and cost only basic information. So you yourself are largely responsible for your safety and to determine the fraudster you only need to find Sherlock Holmes.

The social network is a phenomenon that has changed the foundations of communication. You can find a lot of reason not to add unfamiliar people and the same amount of advantages to make anyone with open arms. If some methods are already well studied by a fraudster, new ones will always appear. However, old familiar who found you completely accidentally, the next time you simply scroll through your profile and you will not meet personally.

Subscribe to new articles to not miss!