Why you can’t read someone else’s correspondence, psychologist. Is it possible to read other people's thoughts? Instructions for use

Even despite the constant evolution in the field of telecommunications, the widespread use of the Internet and the transition of companies providing communication services to the use of ever new protocols and programs, the short message service, or simply SMS, continues to enjoy well-deserved popularity among users. In this case, very often there is a need to read another person’s SMS. Most often, this may be caused by a desire to control one’s minor child or in cases of suspected cheating on one’s husband/wife. In this case, the question arises: How can you read other people's SMS?

Is it possible to read other people's SMS or three ways to invade privacy

Currently, there are three most popular and accessible ways to obtain details of the SMS correspondence of any person who has connected the appropriate service for sending short messages.

  1. Implementation of redirection;
  2. Use of special programs;
  3. With the help of a telecom operator.

Forwarding as a way to read someone else's correspondence

Most of the Big Three operators offer their customers a call or SMS forwarding service. The purpose of this service was good. By connecting the appropriate service, the user can set up an additional phone number, which will be used as a storage for duplicate short messages.

Sometimes redirection occurs to the services of a mobile operator, access to which can, if desired, be obtained through special services for remote monitoring of telephone communications.

A special feature of this service is the complete absence of notifications about the copying process and sending SMS to a third-party number. If you have access to the “victim’s” phone, it is possible to set up the appropriate service to receive all correspondence. The downside is having physical access to the monitored phone.

Spy, spy, get out

Another way is to use special spyware. Is it possible to read someone else's SMS correspondence using software? It is possible, but it is very difficult, since most of the programs offered on the network are ordinary, sometimes primitive Java applications that only clog up the phone, but do not fulfill their main task.

The disadvantage of this method is also the presence of physical access to the potential victim’s phone, since actually working spyware will require installation on the device from which messages should be monitored.

Reading SMS using an operator

Another way to guarantee receipt of all correspondence is possible if you have a friend at the service center of the cellular operator. On the company's servers, correspondence is stored for a long time in the form of an archive, even if the message itself is deleted from the phone. The presence of such a “friend” will allow you to gain access to the archive and receive details of negotiations and correspondence via SMS.

Also, the development of social networks and all kinds of instant messengers, which are increasingly used for correspondence, raises a completely logical question - how can you read other people’s SMS on WhatsApp. Such messengers not only have a mobile version, but can also be installed on a personal computer. After installation and entering the victim's data, a QR code will appear on the computer screen, which is used as an authentication method. In this case, you will need to take possession of the phone for a few seconds and scan the displayed code using the phone’s camera or smartphone.

That's it, now there will be a synchronized copy of all correspondence on your computer.

There are times when we quarrel with a loved one or friend.
And they, in turn, begin to correspond with us on social media to spite us. networks.
All sorts of thoughts creep into my head to strangle!)
I want to figure it out, talk to the person, but he sulks angrily).
At this time, I want to climb into his computer and see what he is doing there.

If this is a loved one, who knows, maybe he has found someone for himself.
If, a friend or girlfriend, perhaps the bastard is texting with someone and laughing at me!)

Here there is a desire to find out about his messages.
How to read someone else's correspondence in contact?
More on this below.

How to read someone else's correspondence in contact without programs for free, or use a paid program

Before hacking into someone’s VKontakte page yourself, or using programs, I advise you to watch this video, which fully describes this problem.

Let me now answer all your possible questions and give you life advice.

How to read someone else's correspondence in a contact by id?
It sounds tempting), but VKontakte is very scrupulous about protecting against various DOS attacks by hackers, as well as protecting the personal data of users.
The audience on this network reaches billions per month, approximately the same as the profit of this social network.
Do you really believe that VK will allow everyone to read anyone’s messages? Guys, you need treatment

Is it possible, and in general how to read someone else’s correspondence in contact without programs?
Yes, you can, but to do this you must be a programmer, and a good one at that, or have friends who are hackers.
Just keep in mind that even if you manage to hack into VKontakte, and this is the only way you can read other people’s messages, it already smells like crap. For those who don’t understand, this is criminally punishable.

Let's say I convinced you, another thought came to you... why should I do this, let others do it for me.
How to read another person’s VKontakte correspondence using programs, are there such programs?

Yes, I have.
A lot of?
Yes, that's enough!

I will not analyze any program separately.
At one time, your humble servant tried a bunch of freebies on the Internet).
Therefore, I know firsthand how all these programs work, believe me. Or try

How are programs designed to read other people's messages in contact?
Enter the victim's phone number, first name, last name, or id.
Next, the program scans, shows a photo of the person you want to read the correspondence and...
it gives the cost of the service as follows, there is a more interesting option, the same thing, they only offer to send a free SMS to the number that will be specified.
The number is of course not free.
In both the first and second cases, they will take money from you, and they will not show you any other people’s correspondence!
100% are scammers.

Let's look at another program.
On one site, you are also asked to enter your number, first name, last name...
In short, everything is the same.
And they don't ask for money.
They write, download the program and you can read other people’s messages.
What happens if you download? It's going to be bad, it's going to be bad
Yes, they usually also write that you need to turn off the antivirus program, they say it can swear at the program.
Next, you will have a banner hanging on the entire screen of your computer monitor and they will offer you to pay a certain amount of money in order for it to disappear. Naturally, we are no longer talking about any other people’s correspondence in contact, and at that moment you will forget about this correspondence, you There will simply be no time for it anymore).
Even if you pay, the banner will not disappear.

Finally, as promised, my advice.
I had a similar experience).
Not the best period of life).
My wife and I argued constantly).
I decided to get into her contact.
Yes, we have 2 computers, to make it clearer.
And what the hell do I find there?
My wife constantly corresponds with some woodpecker guy from morning until evening.
Let me explain to make it clearer. My wife likes to play online games, she’s in a clan somewhere... and blah, blah, blah.
In general, I told her everything good that I thought about her).

Divorced. Three months later we got together), now everything is great).
As it turned out, this is a friend from the clan, she still plays this game and she communicates with everyone, there are almost only men in the clan, well, women like to be the center of attention. And I’m 100% sure that she only needs me!
The moral of the Georgian fable is simple...the answer is the tail, you just need to trust and respect the person you live with.
Before reading someone else's correspondence in contact, think, do you need it?

Trust each other, bye!

I think each of the readers has encountered situations in life when one person violated the inviolability of the digital property of another.

For example, when a jealous husband secretly reads his wife’s mail, a fired employee takes out his anger on the website of his former employer, a teenager earns extra money by reselling stolen game items, a guy “hacks” the VK page of a girl he knows.

Such stories happen at every turn, but all of them are crimes for which criminal liability is provided under “Article 272 of the Criminal Code of the Russian Federation. Unauthorized access to computer information.”

In the vast majority of cases, the perpetrators of such stories remain unpunished, but there are exceptions. Let's talk about them.

Hero #1. Quit. Lost my mind...

A resident of Arkhangelsk resigned from his post as CEO of the company and was in a bad mood. After all, the reason for his dismissal was salary arrears. Emotionally, he went to the admin panel of the company’s website and:


changed the slider images, removing the original ones and adding new ones that discredited the business reputation of the Company, deleted the contact phone number and information about the Company’s existing certificates, changed information about production and quality of raw materials, deleted information about partners, environmental safety of products, environmental policy and social responsibility of the Company, adding instead information discrediting the business reputation of the Company

Soon, company employees discovered this, blocked his account and sued the man.

Punishment: fine of 40,000 rubles (cancelled in connection with the resolution “On declaring an amnesty in connection with the 70th anniversary of Victory in the Great Patriotic War of 1941-1945”).

Similar situation: A resident of Kazan was dismissed from the position of general director as a result of a conflict with the owner. Soon after the event, he entered the mailbox of his former boss, through it he gained access to the admin panel of the company’s website and deleted all files from there. The court fined him 100,000 rubles (cancelled under the amnesty in honor of Victory Day) and ordered him to pay 380,000 rubles in compensation for the deleted website (the owner of the company spent the same amount on creating a new one).

The saddest thing in the latter case is that before the conflict the men trusted each other very much. The owner himself told the general director the password for his mailbox and asked to send letters on his behalf. And the general gave the owner the keys to his apartment so that he could water the flowers in his absence.

And such cases occur among cases under Article 272 more often than all other typical situations. Hundreds of people worked for the company for years, earned trust, and had access to important IT resources. But then they quit and, under the pressure of emotions, they began to take revenge...

Hero #2. Got into my wife's mail

A resident of the city of Astrakhan picked up a password and went into his wife’s mailbox (mail.ru), read the letters, changed the password and personal data. He did all this at home and using a mobile phone registered to himself.

Punishment: fine of 15,000 rubles (cancelled in connection with the resolution “On declaring an amnesty in connection with the 70th anniversary of Victory in the Great Patriotic War of 1941-1945”).

Such cases are less common in the database than stories on the topic “I quit, I freaked out...”, but they are more common than other typical situations. And one detail is often repeated in business: the defendant and the victim have the same surnames, but at the time the decision was made the defendant was already divorced (((

Perhaps women do not apply for those with whom they plan to continue living. Or husbands do not admit to breaking into boxes unless they find “compromising evidence” there, which is grounds for divorce.

Hero #3. “Hacked” a colleague’s VK page

A technical support specialist from Ryazan downloaded the DroidSheep program to his phone ( this happened in 2015) to intercept sessions of users who use open Wi-Fi.

When he was in the office with a colleague, he was able to log into her VK page using this program, read personal messages and copy the girl’s personal photographs from there (what was depicted on them was not indicated in the case). A colleague would never know about this, but the guy HIMSELF showed the girl that he could read her correspondence.

Punishment: restriction of freedom for a period of five months.

I wanted to find an example of a case in which a woman would be tried for reading her husband’s/friend’s email or social networks. But there were no such people...

This is strange, because we are very curious and every third person does this. But, apparently, men do not consider this situation a reason to report a loved one to the police.

Hero #4. Secretly set up forwarding of a woman's calls to his number

A man from Tyumen secretly entered the subscriber’s personal account on the operator’s website, which belonged to a woman, and set up call forwarding to his number.

How exactly he gained access to his personal account (he could reset the password via SMS while she was gone or ask to distribute Wi-Fi from a smartphone) and who the victim was related to the defendant is not specified in the case.

Punishment: restriction of freedom for a period of ten months.

Hero #5. Added a little personal opinion to the district administration website

Resident of the working-class village of Chany, Novosibirsk region:

through analysis, based on existing knowledge in the field of information technology, defendant A.V. Popkov modeled the account name and password for the administration system of the official website of the administration

After logging into the site admin area he:

added text with obscene and profanity to the headings “Spring field work continues, but [obscene language] is of no use, nothing will grow anyway” and “Let’s sing the song “Victory Day””, because there is nothing else to do...

He did all this directly on his work computer, absolutely not caring about his anonymity.

Punishment: a year of correctional labor. Here is a quote from the case:

assign him a sentence of 1 (one) year of correctional labor with the deduction of 5% of wages to the state income with the serving of the sentence in places determined by the local government in agreement with the penal inspection, but in the area of ​​residence of the convicted person.

Hero #6. “Hacked” the website of a government organization

Resident of the city of Kamyshin, Volgograd region visited a “hacker” site, where I found and copied the login and password of the specified web server with an IP address.

It was a service web server that belonged to the Ministry of Information and Communications. The man connected to the server and
installed and launched special software designed to obtain passwords for all users of a given operating system, and designed to promote websites in search engines.

Punishment: fine of 100,000 rubles (cancelled in connection with the resolution “On declaring an amnesty in connection with the 70th anniversary of Victory in the Great Patriotic War of 1941-1945”)

Hero #7. Stole items in an online game

A resident of the Ramensky district of the Moscow region infected the victim’s computer with the Trojan.PWS.Gamania trojan and, as a result, gained access to his account in the game Lineage 2. After that, he logged into it nine times and sold items in the game store.

Punishment: 4 months of restriction of freedom.

Hero #8. I stole my mailbox login and password using a phishing email

A system administrator from Orsk sent a link to a phishing page to the mailbox of the company he previously worked for under the guise of a lucrative offer from a non-existent client. The letter fell into the “right hands”:

From *** hour. *** By ***. *** year, an unidentified person from among the employees of LLC “***”, unaware of the criminal intentions of Zaruba I.A., while administering the email account ***, discovered and opened the above email, which resulted in a redirect to the email address http :// www.***, containing a fake electronic page simulating access to the electronic mail service *** with a proposal to re-enter the network access details of the login and password of the electronic mailbox ***.

An unidentified person from among the employees of LLC “***”, not realizing the falsity of the specified electronic page, entered the network access details to the email account ***.

After this, the defendant successfully entered the mailbox and copied letters from there to his hard drive, which was discovered as a result of the search. He told the police that he did not use this data and did everything described above simply for the purpose check yourself.

Punishment: imprisonment for a period of three months.

How are criminals identified?

The American corporation Ambient recently introduced an unusual technical innovation - essentially an electronic telepath. This device, called Audeo, turns thoughts into computer-synthesized speech.

The device looks like a collar. It reads nerve impulses traveling to the vocal cords and voices them almost in real time. The owner of the device only needs short special training. And then he will begin to show miracles: to speak silently.

For now, it takes more than just thoughts, explains one of the founders of Ambient Corporation, Michael Callahan. - Audeo begins to work only with a certain degree of human concentration. And he must first

Learn to focus very, very clearly on a specific thought, that is, be able to make it obsessive. Only then is this thought recorded by technology. And he speaks.

Now the device recognizes and reproduces about 150 words and phrases. A little... But this is just the beginning. And one more step towards reading human thoughts. That is, telepathy.

CATCHING THOUGHTS ON THE FLY

Colleagues have once again demonstrated that thought is actually material, says scientific co-author

Sergei Semikov, a worker at the Institute of Applied Physics of the Russian Academy of Sciences, a specialist in the physics of wave processes. - The French chemist, foreign corresponding member of the St. Petersburg Academy of Sciences Michel Chevrel tried to prove something similar 200 years ago.

Chevreul described his experiment as follows: “The subject is asked to hold with his hand a cord, to the end of which some light weight is attached. It turns out to be a kind of pendulum. The subject is then asked to think hard about rotating the pendulum clockwise. Soon the load, to the surprise of the subject himself, begins to move in the same direction, describing a circle. What's the matter? The fact is that the process of cortical excitation in the brain associated with the idea of ​​some movement causes us to automatically produce the corresponding movement. This is called an ideomotor act. In this case, the subject unconsciously makes rotational movements with his hand that are barely noticeable to the eye, which causes the weight suspended from his hand to move in the same way. The intensity of the ideomotor act, as one would expect, is different for each person, but the ability to do it is inherent in everyone without exception.”

Admit it, many of you performed such tricks in school lessons as children. And they didn’t even think that they were exploring the processes of the unconscious manifestation of our thoughts in involuntary movements. In other words - the materiality of thought.

At the moment when you imagine some kind of movement, nerve impulses start to the muscles, explains Semikov. - However, the manifestation of mental movements is inhibited by the cerebral cortex. This principle was briefly formulated by Ivan Sechenov: “Thought is a reflex, more or less inhibited in its last, motor part.”

Inhibition cannot completely neutralize excitation, so the movements imagined mentally still appear, albeit weakly. It is difficult even for a specially trained person to completely eliminate them. And therefore, when we imagine some kind of movement, everything happens exactly the same as when we actually move. This phenomenon can be the basis for the creation of devices that “scan” a person’s internal monologues.

“STIRLITS THOUGHT...”

Since it became known that thinking is a biochemical process of transmitting and processing nerve impulses that are electrical in nature, designs for devices for reading thoughts have become very fashionable,” says Sergei Alexandrovich. - The principle of their operation was to register, amplify and decipher the electrical currents of the cerebral cortex.

Is it possible to understand what thought each specific nerve impulse corresponds to? - I ask. - After all, a thought cannot be contained in one impulse, be associated with one neuron. It is scattered in billions of neurons. And to understand what a person is thinking about, you need to scan each neuron and sum up all the impulses. How is it technically possible to find out what exactly “Stirlitz thought...”?

The device, called Audeo, was demonstrated in action at the Texas Instruments conference.

Indeed, until recently, many researchers believed that at the current stage of development of science and technology, solving this problem seems impossible, admits Semikov. - But scientists soon realized: in fact, the method of reading verbal thoughts (we think in words) is not much different from reading motor-type thoughts (we think with muscles). If the mental representation of a movement involuntarily causes this movement in a significantly weakened form, they reasoned, then mental speech should be accompanied by corresponding involuntary, imperceptible movements of the sound-producing organs. This means that the muscles of the larynx, pharynx, tongue, lips, jaws, that is, all organs of articulation, must tense and relax. All these movements are the same actions that we would perform if we were saying our thoughts out loud, only significantly weakened, and therefore usually unnoticeable.

Each of us encountered these involuntary movements when, in childhood, we learned to read “to ourselves,” and the words burst out by themselves. Later, through an effort of will, we learned to suppress and restrain our speech. But at the same time, the same inhibitory processes that Sechenov discovered and which restrain our other mental movements developed.

As in the case of body movements, inhibition is not able to completely block the external manifestations of speech. It is these subtle movements that can be recorded by sensitive equipment! And with the help of computers they are translated into real speech.

ACCESSIBLE BRAIN

Developments to create instruments “for interpreting brain signals” are being carried out today in many scientific centers: at Carnegie Mellon University, Dartmouth College and Boston University (all in the USA), the University of Toronto (Canada), the Max Planck Institute for Brain and Consciousness (Germany), Budapest University of Technology and Economics, Saint Lucia Foundation Research Hospital in Rome (Italy) and others.

Experts predict that devices like the “talking collar” will be sold in the same quantities in five years as cell phones are today. And they will improve. After all, such devices are much more effective than currently used lie detectors. And then this will make it possible to use the devices in the tax police, in personnel departments, and most importantly, to simplify the procedure for interrogating criminals. And even anticipate crimes, as Steven Spielberg showed in his film “Minority Report,” where sentences were passed almost a minute before the murder, writes KP.

“The technique of mind reading is already emerging, and we need to think about its possible consequences now so that they do not take us by surprise,” some experts are already worried today.

QUESTION FROM THE EDGE

Software engineer, candidate of technical sciences Dmitry KHVOROSTOV: Would it be comfortable to live in a world where everyone knows what you’re thinking about?

You shouldn't worry! Such devices are unlikely to threaten individual freedom. The fact is that these devices will be quite complex; working with them will involve many purely technical difficulties and require the presence of qualified specialists, technicians, and surgeons. Setting up the device for each person will take a lot of time and money. Thoughts cannot be overheard unnoticed, from a distance - a person will always know when he is being probed. In general, the scope of application of the device will be very limited due to its complexity: it will be available only in certain scientific institutes, psychiatric hospitals and investigative institutions. There can be no talk of any use of such a complex device on a global scale, much less by private individuals. As for ethics, its principles can probably be compromised if we are talking about the health of the nation, a person, or the fairness of his sentence.

Almost everyone has a desire to read someone’s VKontakte correspondence from time to time. The reasons for this desire can be different - love, business, the desire of parents to protect their child from bad company, etc. But usually people think that it is extremely difficult to carry out such an action - you will need special knowledge or some special expensive programs. In reality, everything is much simpler. Let's take a closer look at how to do this.

How to read someone else's VKontakte correspondence without programs

Let's start with the simplest advice. It is suitable for those who are going to read the correspondence of one of their family members - husband, wife, child. This person must live in the same apartment with you. First, just try to distract the person at the moment when he is chatting with someone on VKontakte. An urgent call to your home phone is best suited for this. It is quite possible that a person will not close the VKontakte page, but will simply minimize it. You quickly copy the dialogues that interest you, and then calmly study them in your free time.
If it doesn't work out, don't despair. Most likely, the person you are interested in has a phone with Internet access. On his own phone, a person usually does not leave his page. Therefore, when the owner of the phone goes, for example, to the shower, you open the VKontakte application and forward all the information from his page to yours. Then select the messages about sending and delete them, and put the phone back in its place.
It happens that there is no VKontakte application on the phone. Then you need to go to the VKontakte website, where the owner probably clicked “remember password”. Next, you proceed in the same way as already indicated.
This method can be useful not only for worried parents and spouses, but also for members of a small team where it is customary to trust each other. With its help, you can even determine which employees are leaking corporate secrets to competitors.

How to read someone else's VKontakte correspondence without programs, without access to the victim's phone

In order to use this method, you need to get to know the person whose page you want to penetrate very well. For this, a casual conversation somewhere at a picnic, in a cafe or at a corporate party is best suited. You must find out the answers to the questions: pet's name, mother's middle and maiden name, postal code at place of residence, pop idol, etc.
Armed with this information, you go to the VKontakte website on behalf of your victim and click the “change password” button, reporting that you have lost your phone. In this case, you will be asked to answer a secret question, the main ones of which we have just listed. If the technique worked and you answered the question correctly, then you get access to the correspondence of the user you are interested in.
However, if a person has already dealt with attempts to hack his page, then he can come up with a non-standard answer to the secret question, so this technique does not always work.

The safest way to read someone else's VKontakte correspondence is Brobot programs

People who, when planning to read someone else's VKontakte correspondence, are afraid of special programs, usually, among other things, think about the security of data on their computer. Indeed, by installing some programs, it is very easy to catch a computer virus.
Therefore, we recommend using a safe program - our Brobot. Its peculiarity is that your data remains on your computer, and the service developers do not gain access to it. Brobot is very easy to use, and even a person who is a completely inexperienced user can work with it.
First, you need to create a “left” page, indicating on it the data of a non-existent person. If you want to get access to the page of your husband, whom you suspect of cheating, most likely a young attractive girl will do, on whose page there will be quite explicit photographs. If you want to read the correspondence of your teenage daughter, then it is better to use the account of a young, well-built guy.
First, we launch Brobot so that it will visit the pages of other users, gather friends, and give a certain number of likes. This is necessary for the page to look natural.
Then we ask the person we are interested in to leave a comment on the page where the trap is installed. A person tries to leave a comment and ends up on a login page where they need to enter a password. This way we get full access to his page. And completely free.
If you want to read the correspondence of not one, but several hundred people, which is sometimes necessary in business to determine the situation, then you will need a paid license for Brobot, since the free Brobot can only serve ten VKontakte pages.
As we have now seen, in order to read someone else’s VKontakte correspondence, programs are not always required. But if you still contact them, our Brobot is the best and safest way to get access to the information you need on the page of the person you are interested in.

Continuing the topic:
Smartphone

Whatsapp is the most popular instant messenger in the world in 2017. After its release, a bunch of imitators appeared who are trying to repeat the success to this day, but to no avail. Now...