What is mobile phone billing? How does mobile phone billing work? Mobile Billing – Common Cellular Billing Schemes.

Determining the actual location of a person is the main and most important part of the job. Previously, people tried to solve this problem with the help of clairvoyants or mediums. However, in our age, there are more realistic ways to find people, with which detective agencies do an excellent job of this task.

Technological progress greatly simplifies the procedure for determining a person’s location. Almost every person now has such a device as a mobile phone, regardless of his age and financial situation. At the same time, for searching mobile phone(and, therefore, its owner) is not difficult. At the same time, it is possible to determine the actual location of a mobile phone both legally and illegally.

Location as a service from a mobile operator

Establishing a location using a mobile phone, in accordance with the law, can be carried out only if the owner of this phone has given his consent to this procedure. Yes, you can send a request mobile operator to obtain information about the location of one of its subscribers. If the subscriber agrees to regularly provide information about his location to a third party, the mobile operator will provide such a service (usually for a fee).

With this service you can always find out where in this moment the person you are interested in is located. As soon as the subscriber makes a call or sends an SMS, the signal will be sent to the nearest tower cellular communications,A From there, the information will be transmitted to the operator center. This method has two main advantages - location accuracy (up to 50m) and the ability to receive data even if the mobile phone of the desired subscriber is not equipped with a GPS system.

Finding your location using phone software

You can obtain information about a person’s location using a special software, installed on his phone. After installing this software using GPS systems can receive information from satellites and track the actual location of the phone. When a request is received, the software sends you data about the location where the desired subscriber is located. In addition, you can register on the website of the company that supplies this software, thanks to which you will get access to a map, which will subsequently display the location of the person you are interested in.

Illegal methods of determining a person's location

The range of illegal ways to find a person’s location is quite wide. For example, spyware can be used for this purpose, which can also record telephone conversations. And hidden listening devices installed in a room, car or built into clothing/personal items can not only show a person’s location, but also provide complete information about everything that happens to him. However, the legislation provides for criminal liability for the installation of all the devices described above.

Since all legal methods imply the person’s consent to the transfer of location data (and it is unlikely that anyone except your children will agree to this), if you need to search for the person you are interested in, it is more advisable to contact. Specialists will sufficiently determine the location of the person you are interested in, while you will be guaranteed complete confidentiality and legality.

Each phone has a unique code (IMEI), which is registered on the network mobile operator after activating the SIM card and making the first call. This code allows you to track the location of the device and block it if necessary, for example, if it is stolen. Data about the location of the device is transmitted to the billing server and stored here for a long time. However, there is information here about tariff plan, call and SMS history, account replenishment.

When it comes to phone billing, the most relevant information is the history of calls and SMS messages, as well as its location. It is determined by the operator quite accurately. When making calls, sending messages, or using Internet services, the device transmits a signal to the nearest antenna (BS), thanks to which it is possible to calculate the address. The accuracy of the data is quite high, but there is an error. Its performance depends on the topographical features of the area and the presence of interference. And yet, mobile phone billing is actively used for the purpose of finding them, regardless of what you have to look for - the device or its owner. The procedure is managed by the operator himself; he provides data only in exceptional cases, because it is confidential. Who can use this service?

Who can find a phone number using billing?

Officially, the cellular operator does not have the right to disclose information regarding the location of the device and, accordingly, its owner. Data is provided only at the request of law enforcement or judicial authorities. To obtain the material of interest, you need to write a statement to the police, on the basis of which the service officers will take actions aimed at solving the problem. The statement will be justified when searching for a stolen device. If you need to find a subscriber for personal purposes, you should postpone this option. In this case, use other methods of solving the problem, simpler and more accessible.

Where to order phone billing

For anyone who needs to search for a phone and information about its owner, our site offers effective and inexpensive services. We will provide complete information on the topic, spending a minimum amount of time collecting it. Fill out an application for services, provide your mobile phone number and operator, and indicate which of the following data is needed:

  • Full name of the phone owner;
  • Date of Birth;
  • passport details;
  • residential or registered address;
  • device location;
  • information about the tariff plan, calls, SMS.

Depending on the amount of information requested and the operator mobile communications servicing the number, the cost of services and the timing of data provision will differ. But a successful result is guaranteed in any case. You will receive the material as a text file, screenshot or graphic image. Data accuracy is guaranteed. We work with the following mobile operators:

  • Beeline;
  • Rostelecom;
  • Tele 2;
  • Yota;
  • Motive;
  • Megaphone.

Regarding how to order billing for an MTS phone or another operator, you should also take into account: the sequence of actions and features of completing the application will not change. Only the price and operating time will differ.

Note! Every client who decides to check their phone billing using our website can count on:

  • complete confidentiality;
  • quality service;
  • efficiency of information retrieval;
  • acceptable prices;
  • several ways to pay for services;
  • discounts on subsequent orders;
  • free consultation.

We work for you, monitor the quality and availability of services.

It's no secret that different offers and landing pages convert differently. Indeed, their results largely depend on the billing of the offer, the country, the operator’s requests, the market niche and even the Internet connection.

This means that even for the same country, the CR can be different. In this article, you will see examples of what affects offer conversions and get acquainted with the most popular billing schemes.

Users find strategically placed banner on the site, click on it, and go through various billing paths.

Table of Contents

Direct billing

Some operators automatically identify the MSISDN (mobile phone number), thus, money is automatically debited from the user's mobile phone balance after he agrees to purchase the offer.

This scheme is used only with a 3G connection, but still depends on the specific operator.

Another important factor that affects the profitability of a direct billing offer is the nature of the user's consent to purchase the offer that the operator requires.

Single Opt-in (single consent)

The user must confirm that he is subscribing to the service only once by clicking on the subscribe button on the offer landing page.

Double Opt-in (double consent)

The user confirms that he agrees to subscribe to the service, but then he must agree again. In this case, after the first affirmative answer, he is asked to confirm his subscription a second time on the landing page or by clicking on a link sent via SMS.

Only after the user’s double consent is the subscription completed. With this type of billing, the conversion rate decreases, since the user must take one more step to subscribe.

SMS billing

The user must provide or submit their mobile phone number for the operator to identify the MSISDN, as it is not automatically detected.

This scheme is often used for billing Wifi traffic. In this case, operators require the user to either send a message to specific number(MO) or receive a pin code via SMS, which the user must indicate on the offer landing page (MO).

Outgoing SMS (MO):

Some countries and/or operators only subscribe to the service those users who send an SMS from their mobile phone to complete the subscription.

In this case, on the offer landing page, the user sees a window with short number and with a password (keyword).

Only after the user sends an SMS to this number is it subscribed.

With this billing, money is debited from the user’s balance only at the time of sending an SMS.

Some advertisers and/or devices, in addition to this landing page, open an SMS message window with a password and phone number already filled in - that is, the user only needs to click on the “send” button.

In this case, the conversion rate increases significantly compared to standard SMS billing.

Incoming SMS (MT)

With this billing, the user sees an empty line on the offer landing page, where he must indicate a mobile phone number. If the number is correct (confirmed by the offer provider), the user will receive an SMS with a PIN code to this number to subscribe to the service.

When entering the correct PIN code on the offer landing page, the user becomes a subscriber to the service.

When billing with an incoming message (MT), the CR is higher than with outgoing (MO), since with MO the user additionally pays for sending a message to a short number.

Of course, with these two billing systems, offers will have different results.

With direct billing, the user only needs to agree to purchase the offer, while with SMS billing, the user must indicate personal information and send an SMS, this way it becomes clearer to the user that he is being charged for a subscription to the service and therefore the CR is reduced.

Payment per conversion may also depend on whether the offer is CPA or CPI.

CPA is used for subscription services and means pay per action, while CPI means pay per download.

Billing by credit card

For some mobile offers, especially for dating services, billing is carried out according to credit card, thus, to open an account on the dating service, the user must provide his credit card information.

Some dating services work with subscriptions, and payment is made for access to private chats.

In this case, the payout of the offer depends mainly on whether it is a CPL or CPS offer.

CPL or PPl – payment per lead – is made when the user creates a profile (account) on the offer.

1. Technical capabilities of identifying the location of a mobile cellular subscriber.

The presence of a mobile cell phone, which can be considered a radio beacon, often allows one to determine both the current location of its owner and trace his previous movements in space.

If a subscriber uses cellular communication services (makes or receives calls, sends SMS messages, uses WAP, GPRS), information about his actions is saved as a file in the memory of the billing server. This file contains the following information: subscriber's SIM card number, time and duration of the call, base station (BS) number, base station sector number (if there are sectors).

If the subscriber moved during the connection and his service was transferred from one BS to another, the file may contain a list of several BS numbers. The accuracy of determining the subscriber's location in this case depends on a number of factors: topography of the area (forest, hills, buildings, etc.), the presence of interference and reflections from buildings, position base stations, the number of phones currently working in a given cell. The size of the cell in which the subscriber is located is also of great importance, so the accuracy of determining his position in the city is much higher than in rural areas.

In a city, a base station can have up to three sectors, in which case it is possible to determine in which direction the signal was. In the case of circular radiation from the base station, it is not possible to accurately determine the direction of the signal (typical for rural areas). The accuracy of this determination depends on the size of the base station coverage area: in the best case, the error can be up to 150 meters (picocell), in the worst - up to 30 kilometers (for example cellular network GSM standard, in other networks the parameters for determining the location of the subscriber may differ).

Analysis of data in the subscriber's communication sessions with various base stations (through which and to which base station the call was transmitted, date of the call, etc.) allows you to restore all the subscriber's movements in the past. Such data is automatically registered in the billing servers of companies providing cellular communication services, since payment for services is based on the duration of use of the system.

This method of restoring a picture of a subscriber’s movements is widely used by law enforcement agencies during investigations, since it makes it possible to restore, down to the minute, where the suspect was, who he met (if the second person also used cell phone), how long the encounter took place, or whether the suspect was near the scene of the crime when it occurred.

In practice, the signal parameters at the receiving location always depend on many factors. So, for example, in dense urban areas, multi-beam reception always takes place, in which both the handset and the base station can receive both a direct radio signal and one reflected from the walls of houses and other objects (a person can be close to one base station , but is served by the reflected signal of another, more distant one). In this regard, the amplitude of the signals, their angle of arrival and the value of the base-tube distance can continuously change within very large limits, and determining the actual coordinates becomes almost impossible. In rural areas, telephone signal reception is usually carried out by one station with a circular direction, which eliminates the possibility of determining the direction and makes data on the subscriber’s distance very inaccurate (with an error of up to 30 km).

Thus, the method of identifying a subscriber’s location based on data from a cellular communication system does not guarantee an accurate determination of the subscriber’s location, because the correctness of the data obtained depends on a significant number of factors. Nevertheless, this method can be a significant help in carrying out operational search activities and investigative actions, especially when investigating crimes committed by a group of persons.

Technical capabilities for using transcripts of telephone numbers, SIM cards, IP telephony, the Internet, etc. when investigating criminal cases.

In particular, there is a legal basis for the use of automated information system technical means to ensure operational investigative activities" (AIS SORM). This AIS is used when conducting operational-search activities carried out through electronic communication channels, and also provides control and recording of negotiations.

“Considering the possibilities of using SORM in the investigation of serious and especially serious crimes, it should be noted that this system automatic mode provides the ability to record and control information transmitted and received by any user (subscriber) in the process of providing any telecommunication services, including the Internet. In other words, with the help of SORM, any informative emissions, transmissions or receptions of signs, voice signals, written text, images, sounds or messages of any kind can be monitored and recorded via radio, wired, optical and other electromagnetic systems (Article 2 of the Federal Law " About communication"). At the same time, SORM allows you not only to record information about messages and subscribers who sent and received them, but also to control - to filter out the necessary conversations (messages) according to various technical and lexical parameters (phone number, IP address, IMEI identifier of a cellular radiotelephone, call sign , keywords, phrases, etc.) specified in the investigator’s resolution. For these purposes, various specifications of SORM hardware and software systems are used, adapted to the corresponding types of telecommunications (technological systems, channels and means of communication, message formats and standards).

From a technical point of view, SORM includes: a set of hardware and software located on the node(s) of the documentary telecommunications network, including the Internet; a complex of hardware and software located at a remote control point; data transmission channel(s), providing (e) communication between the first two complexes in a secure mode.

In other words, SORM consists of 2 sets of special software and hardware devices, one of which is installed at the operator (provider) of telecommunication services (Internet), and the other - on the central SORM control panel located at a remote facility - a single central control point.”

GSM

In 1982, the European Conference of Postal and Telecommunications Administrations organized a group called GSM to develop common technical specifications for the first digital mobile network. The implementation of the standard began in 1991. Voice transmission in this network is carried out in digital form. The transmitting and receiving frequencies in the mobile and base stations can change 217 times per second. The GSM standard achieves a high degree of security for message transmission by encrypting messages using a public key algorithm.

Functionally, the GSM network consists of a mobile switching center, which switches the mobile network with the fixed network or metropolitan network, as well as between mobile subscribers. In addition, the center generates data on conversations and sends them to the billing center, which manages the procedures for registering the subscriber's location and base stations. The movement register and position register store information about the location of the mobile subscriber. These registers contain the international IMEI number, which is used to identify the mobile station.

The authentication center houses equipment that verifies the identity of the subscriber. The Equipment Identification Register contains three lists: white (authorized mobile stations), black (phones stolen or subscribers denied service) and gray list (subscribers having equipment problems).

Authentication equipment is rarely used in Russia.

Base station

The area covered by the GSM network is divided into cells, each of which is served by a base transceiver station. A base station typically has from 2 to 6 transmitters, which have antennas with a radiation pattern (AP) of 120 degrees and uniformly cover the area. In sparsely populated areas, 900 MHz stations are used, with a coverage area of ​​400 to 35 km. In densely populated areas, 1800 MHz stations can be additionally installed, having a coverage area from 200 m to 1.5 km. This is due to the propagation of radio waves, the number of subscribers and other technical reasons.

Determining the location (positioning) of the subscriber

Positioning of moving objects is carried out by transmitting special sequences of signals to the network.

It is technically possible to determine the subscriber's current position and the subscriber's movement in the past. The current situation can be revealed in two ways. The first of these is the method of triangulation (direction finding) from three points. The second method is through the computer of the communications company, which constantly records where a particular subscriber is at a given time, even if he is not talking (using identifying service signals automatically transmitted by the phone to the base station). The accuracy of determining the subscriber's location in this case depends on a number of factors: rough terrain, the presence of interference and reflections from buildings, the position of base stations, the number of phones currently operating in a given cell. The size of the cell in which the subscriber is located is also of great importance, so the accuracy of determining his location in the city is much higher than in rural areas.

Analysis of data on a subscriber's communication sessions with various base stations makes it possible to restore all the subscriber's movements in the past. Such data is automatically registered in the companies' computers, since payment for their services is based on long-term use of the communication system. Depending on the type of telecom operator, such information is stored from 60 days to 7 years.

An example is the criminal case charging Chernov and Kuharkin, employees of the Internal Affairs Directorate for the Arkhangelsk Region, with extortion and receipt of a large-scale bribe. During the investigation, it was established that they received the first part of the bribe from the applicant six months before they were detained while receiving the second part of the required amount. During the investigation, Kuharkin put forward an alibi that he could not participate in receiving the first part of the money, since in the period from February 27 to March 10, 2007, he was on a business trip in the Arkhangelsk region, which was confirmed by travel documents. The investigation, by order of the court, obtained statistics of connections on Kuharkin’s phone during this period, indicating base stations. When analyzing statistics, it was established that Kuharkin was indeed in the Vinogradovsky district of the Arkhangelsk region until March 6, 2007, as evidenced by the base stations with which the phone contacted. On March 6, 2007, the movement of a subscriber along the M-8 highway from the village of Dvinskoy Bereznik to Arkhangelsk was established, as well as subsequent calls to the subscriber from the territory of Arkhangelsk from March 6 to March 11, 2007. In addition, by analyzing the statistics of Kukharkin’s connections during the specified period, witnesses were identified who confirmed the fact of Kukharkin’s passage to Arkhangelsk with a stop and repair of the car in the village of Brin-Navolok, and also a resident of Arkhangelsk was identified, with whom Kukharkin spent the night on the night of 6 as of March 7, 2007. The accused's alibi was refuted.

Let's consider technologies for determining the location of a subscriber in relation to the GSM standard.

Positioning by Cell Id

This is the simplest technology for determining the approximate position of a subscriber using a cell identifier (Cell Identifi), based on the fact that at the time of localization or conversation, the mobile station communicates with the network and exchanges service information.

Positioning by arrival time

This technology is based on analyzing the measurement of the time period during which a signal from a mobile station reaches at least three base stations equipped with location determination units. In this case, a special computer collects the received information and calculates the subscriber’s location using the triangulation (direction finding) method.

This method gives high performance, but due to the high cost and increased network load, it has not been widely used.

Positioning using GPS system

The technology is based on the use satellite system GPS positioning and provides accuracy in determining the location of the subscriber up to 10 meters in open areas and up to tens of meters in a room with windows. The accuracy of the determination decreases if the equipment “does not see” four satellites. To use this technology, a mobile receiver must be equipped with a GPS receiver.

Positioning using time difference

The technology is much like time-of-arrival positioning. The mobile station plays a more active role, measuring the signal travel time to it from one base station equipped with a special unit, and compares it with the corresponding signal travel time from at least two more stations. The distance between the base blocks is known and the travel time of signals from each of them is known. From the mobile phone, information is transferred to the network to a special computer, which performs the appropriate calculations.

SIM card

SIM is a standard subscriber authentication module. SIM is a chip in which an international identification number - IMSI, its own individual authentication key - K and an authentication algorithm are stitched. The SIM card has memory for notebook, designed for 100 or more subscribers. To ensure security functions, the SIM card is assigned certain codes. Using the information stored in the SIM card, as a result of mutual data exchange between the mobile station and the network, a full authentication cycle is carried out and the subscriber's access to the network is allowed. The verification procedure is implemented as follows: the network transmits the number to the mobile station, the response is calculated in the SIM card, which is transmitted to the network and compared with the correct solution generated in a special module of the switching subsystem - the authentication center.

2.1. Collection of information about the circumstances of the crime committed

a) witnesses and eyewitnesses of the crime are identified who could have seen persons using mobile communications on the eve of the commission of the crime, as well as before or after the commission of the crime. During the survey, attention is paid to the following details: what kind of negotiations were carried out (incoming or outgoing connections), the number of connections, as well as at what time these connections were made;

b) the scene of the incident is linked to objects and roads adjacent to the scene of the incident, and a detailed diagram, oriented by geographic coordinates;

c) in rural areas or in areas remote from large populated areas, it is determined which of the cellular operators has the most stable signal reception network in this territory.

When committing a crime involving the kidnapping of a person (with a subsequent demand for ransom), as well as in cases where it is impossible to establish the exact location of the crime, it is advisable to carry out such an operational-search activity as control technical channels communications (hereinafter referred to as CTCS) in relation to the subscriber who made telephone connections, indicating the time of interest. Moreover, if the mobile phone was used by an unidentified person, then the requested period of time is calculated from the moment of concluding the contract for the provision of GSM mobile communication services up to 180 days; if the mobile phone belongs to the victim, then the requested period of time is calculated from the moment the first ransom demand is presented to 180 days. Carrying out monitoring of technical communication channels as an operational investigative measure complies with the legislation in force in the Russian Federation on operational investigative activities (see paragraph 9 and paragraph 11 of Article 6 Federal Law“On operational investigative activities” dated August 12, 1995 No. 144-FZ).

When carrying out this activity, along with information about connections, it is also necessary to obtain information about the identification number of the mobile radiotelephone - IMEI and the numbers of base stations of cellular operators at which the subscribers of interest were registered. This need is due to questions that may arise in subsequent investigative actions and operational investigative activities:

1/ to IMEI number it is possible to establish the model of the radiotelephone used, which subsequently, when the defendants are detained and their existing radiotelephones are confiscated, can be used for proof purposes in the investigation of a criminal case:

In this case, the value 1 ( serial number) when registering a switched-on radiotelephone and replacing the SIM card remains unchanged, since it is strictly individual for each mobile radiotelephone, and values ​​2 and 3 are stored in the memory of the SIM card, they are also strictly individual for the subscriber and change with each replacement of the SIM card;

2/ often persons of operational interest, in order to prevent intelligence officers from listening to conversations, use several SIM cards. If the IMEI is known, the use of different SIM cards by the defendants will not be a significant obstacle when conducting wiretapping of telephone conversations of accomplices in the crime;

3/ information about the numbers of base stations at which the mobile radiotelephone was registered helps to establish the location of the person involved, the route of his movement, as well as the vehicle used.

2.2. Analysis of received information in order to establish the ownership of radiotelephones, the persons using them, as well as their connections

The information obtained during the operational-search activities of the KTKS is large in volume and requires painstaking work to isolate from the entire mass of records only those that are of operational interest.

When carrying out such activities, it is necessary to reduce the requested time of connections to a minimum.

To establish the ownership of radiotelephones, it is advisable to carry out measures to verify their owners according to all available operational records of the ATC, using the forces and means of operational services, to carry out operational measures at the place of residence of the persons involved, as well as operational and technical measures for the identified means of communication.

Several people often take part in the commission of such particularly serious crimes as murders, and they can actively use mobile communications.

To ensure that the information obtained about the defendants’ conversations on mobile phones is used in the investigation process, when conducting searches at their place of residence, one should strive to detect and seize the following items: contracts for the provision of cellular communication services, SIM cards, express payment cards, empty boxes from mobile radiotelephones , radiotelephones themselves (even if they are not working properly or their components). All this can be evidence in a criminal case.

Thus, it should be taken into account that the study of billing information relating to the connections of both criminal competitors and potential victims of crime, as well as negotiations of law enforcement officials, may also come to the attention of representatives of criminal groups.

Let's consider some possibilities of using billing in the detection and investigation of grave and especially grave crimes committed in complicity, but we should not forget that when collecting and analyzing information about the use of mobile cellular communications by persons involved, the main principles of work in the investigation process are: respect for rights and freedoms person and citizen, respect for the rule of law, secrecy, compliance with secrecy.

An analysis of the crimes committed shows that during their preparation and commission, accomplices actively use mobile devices communications. To identify persons involved in crimes and using high-tech mobile communications, the following recommendations may be useful:

1) receiving billing data about subscriber connections through mobile operators, linked to the base station and indicating individual identification numbers;

2) analytically identifying cellular subscribers who may be involved in the commission of the crimes under investigation;

3) based on the results of the analysis, the orientation of operational units to carry out actions in order to detect and detain persons involved in committing crimes.

The frequency-territorial plan of the distribution network of communication facilities allows you to establish the geographical coordinates and installation location of the base station.

The process of obtaining billing information about connections of mobile cellular subscribers indicating the BS, their processing and analysis is as follows:

1/ Based on the available information about the location of the crime, the initiator requests the number of the base station serving this territory (to draw up the appropriate resolution and obtain a court decision).

2/ Cellular operators are sent a request to provide billing information about subscriber connections for a certain period of time, linked to the base station and indicating the IMEI of subscribers.

3/ We receive billing in the following form: account type, phone number of subscriber A, dialed sequence of subscriber B, date and time of the start of the connection, duration, IMEI, data from the base station of subscriber A (at the beginning of the conversation), data from the base station of subscriber A (at end of the conversation), data from the base station of subscriber B (at the beginning of the conversation), data from the base station of subscriber A (at the end of the conversation).

4/ Search for matches by place and time.

5/ Orienting operational units to take action against identified subscribers who may be involved in the commission of a crime.

If the statistics were obtained by the operational services within the framework of the Law “On Operational Investigation”, then there is a need to obtain these statistics within the framework of the Code of Criminal Procedure of the Russian Federation by applying to the court with petitions for permission to monitor and record telephone conversations. To do this, it is necessary to request from the employees providing operational support in the case a certificate of the results of the analysis of statistics of connections of the persons of interest. Having received a court order, you can instruct the investigative body to obtain statistics from the cellular operator. After receiving the statistics, analyze and examine them, drawing up a protocol in which it is necessary to reflect all the points of interest to the investigation.

A positive example of conducting an in-depth analysis of telephone connection statistics can be a criminal case of murder 3. with signs of an order. During the initial investigative actions, it was established that the victim had been followed for a long time, and therefore it was assumed that the criminals could use mobile phones to communicate with each other. CID officers analyzed all calls made in the coverage area of ​​the base station, in the coverage area of ​​which the crime scene was located. In addition, there was operational information that the crime could have been committed by residents of other regions of the country, in particular Vologda region. A huge amount of information was processed six months before the crime was committed. In parallel with this, the statistics of the connections of V., suspected of organizing the crime, were analyzed. When comparing telephone numbers it was established that V. several times connected with telephone numbers of subscribers who were several times in the area of ​​coverage of the base station sector covering the crime scene. These phones belonged to residents of Vologda. Having received statistics of connections of the specified phone numbers, they were established Phone IMEI, in which SIM card data was used, as well as numbers of other SIM cards used in these phones. When receiving and studying the statistics of connections of other numbers, it was found that subscribers using SIM card data were constantly in Vologda, but periodically came to Arkhangelsk, where they stayed for 10 days, moving around the city. It was established that the subscribers were in the coverage areas of base stations covering the crime scene, as well as establishments visited by the victim. After studying the statistics, the identities of the subscribers were established. They were subsequently detained and charged with murder for hire. Connection statistics served as one of the pieces of evidence exposing those responsible for organizing and committing a particularly serious crime.

Department of Criminalistics of the Investigation Department

Investigative Committee of the Russian Federationin the Arkhangelsk region

The use of these methodological recommendations, along with the investigation, will allow the defense to prove the innocence of its client, to convict a person of perjury, which law enforcement agencies do not hesitate to involve as the only opportunity to achieve a guilty verdict.

Contacts:

7 937 1111 777 (24 hours)

[email protected]

Mari El, Yoshkar-Ola, st. Chekhova, 70, office 311 (Beryozka)

Billing systems: basic concepts

Billing. What associations does this term evoke? Maybe there is some connection with Bill Gates? No, fortunately he has not yet “poked his nose” into the field of telecommunications. Well, that's just a joke. But to be serious, let's look at the origins of the word billing. The English word “bill” can be translated as “account” (other translations: bill, banknote). “Billing” is translated by the expression “writing an invoice.”

“We really appreciated the results: the economy is bad, the quality of services is also bad.” Please note the following as you review these Terms of Service. At least thirty days before we make any changes, we will provide you with written notice via a message on your invoice, text message or email. The notice will include a copy of the new service or the new and old version of the modified service, the date the change will take effect, and an explanation of your right to Cancel Service.

What is a billing system?

Systems that calculate the cost of communication services for each client and store information about all tariffs and other cost characteristics that are used by telecommunications operators to issue invoices to subscribers and mutual settlements with other service providers are called billing systems; the cycle of operations they perform is called billing. A billing system (BS) is an accounting system, software, in other words, “software” developed specifically for operators. Which operators? Telecommunications. That is, we are not talking only about cellular operators. BSs are also used by regular (landline, wireline) communication operators. In small offices, for example, you can conduct telephony billing (analyze: who called, when, how long the conversation lasted). IP telephony is another area of ​​application of BS. What about Internet providers? They also use BS, for example, to generate invoices and record traffic. Any BS is created on the basis of a specific database management system (DBMS). Most BS in the world were created on the basis of the Oracle DBMS. Among other DBMSs, Sybase and Informix can be distinguished as designed for large volumes of information. Here are the names of some billing systems: BIS, Flagship, CBOSS, Arbor, Bill-2000-prepaid. It is worth mentioning that BS may also mean Hardware involved in organizing billing.

If a change we make increases your liability or reduces our liability, no cancellation fee will apply. If you do not accept changes to an optional feature, you can cancel it without penalty. If you continue to use the service after the 30-day period from the effective date specified in the notice, the new service method will be effective.

Could any of these Terms of Service be void?

You will be responsible for your use of the service until the transfer occurs. It is possible that one or more of the Terms of Service is or becomes invalid, prohibited or may not be enforceable. You also agree not to. Coverage areas and connectivity within them depend on the availability of network facilities.

Terminology

I will try to consider all the basic concepts and definitions related to BS. I will focus on the BS used by cellular operators. But most definitions also apply to BS used in other areas. I will try to explain it as simply as possible so that most readers can understand the material. If you have anything to add to the terms I have entered, please write to me by e-mail.

These coverage areas may change from time to time without notice. When you roam, your connection is established using the services of another wireless service provider, and you must pay all applicable fees and comply with the terms of service imposed by that other provider. Please note that dedicated numbers for emergency services and operator services may vary by country, so the numbers you use in Canada may not be available. You are responsible for finding and using numbers in other countries for these types of services when you are outside of Canada.

There are several names for the billing system: ACP- automated payment system; IHD- information billing system.

One of the important qualities of BS is its flexibility, that is, the ability to adapt to changed circumstances. The flexible system is adapted not only to the immediate needs of the operator; due to such qualities as customizability, modularity and openness, it allows you to solve promising problems. The more options the system has for customization, the better. What is it modularity? The modular principle of building a system is a principle in which the entire system is assembled from individual parts(modules), like a house being assembled brick by brick. The BS also consists of such modules - subsystems. The BS includes, for example, a data pre-processing subsystem, an operational billing management subsystem, and a customer notification subsystem (read below about the structure and functions of the BS). Under openness The system implies openness of the source code of the software product, which allows the operator not to depend on the developer in the future and independently maintain and upgrade the system. Closely related to the flexibility of the BS is the next quality of automated calculation systems - scalability.

Bandwidth allocation, which may limit the availability or speed of a data service; Filtering spam and malicious content, which can sometimes lead to unintentional blocking of harmless content; network access restrictions reserved for specific transmission protocols. Atmospheric conditions; Physical barriers to radio transmission; Limitations on the network's ability to route traffic to all surrounding users, technical limitations of other telecom operators' systems, or transmission facility interconnection limits, defects, or failures network equipment, Public safety or emergency requirements. You have the right to “transfer” your telephone number to another Canadian telecommunications service provider.

Load scalability. With the growth of the subscriber base and the appearance of additional services, there should not be a need to change or modify the software part of the BS. Increasing the capabilities of the BS should be achieved by upgrading the system hardware. What is important to consider when designing scalable systems? It is necessary to use DBMS designed for large volumes of data. The DBMS must be compatible with various computer platforms to provide support for multiprocessor operation.

However, please note that you do not have ownership rights to your number. With at least thirty days' prior notice, we may change these numbers without liability. Prepaid rates are subject to change without prior notice. You use the service by applying your prepaid credits to purchase the basic package. Basic packages expire after 30 days, but are automatically renewed if you have enough credits in your account. The service will be suspended if your account does not have a basic plan.

Reliability- one of the main requirements for any system. The reliability of the BS is determined by the reliability of the DBMS and the technologies used in system development. Not least important is the reliability of the supplier (developer) of application software: the time it has been on the market and, as an indirect indicator, the percentage of presence of the systems it has developed on the telecommunications market. Why is the indicator indirect? Is Microsoft Windows the best and most reliable operating system?... And at the same time, it occupies a significant market share. However, the reliability of the BS is also ensured by compliance with certain standards during their development (read about this below).

You can change your Basic Plan at any time, but you will not receive credits for unused days from your previous Basic Plan. Saddles are available to add minutes or data to an activated base plan, and these sides do not expire unless the service is cancelled. If your account is not activated for a Basic plan within ninety days, it will be automatically deactivated and you will lose your phone number. Once you cancel your service, you will not receive any Minutes or Data credits that may remain on your side.

Prepaid credits are non-refundable and no refunds will be issued if service is cancelled. We may require a security deposit or credit limit to your account due to a credit check or payment history. If your account remains open and current for twelve consecutive months, this deposit will be returned to you. A credit form against your account.

Multilingual- ability to set different languages ​​for presenting information.

Multicurrency- ability to work with any currencies

Deferred billing- billing, in which payments are made after calls have taken place.

Hot billing- the account balance changes during the conversation, and information about the balance on your account can be obtained immediately after the call.

Who is responsible if another person uses my account?

If your deposit is used to pay an overdue account, we will send you a notice informing you of the payment. You must then top up the deposit and we will give you ten days from the date stated in the notice. Day or make remote changes to your device's software and settings at any time without notice to maintain proper functionality with our service. You are responsible for your account and the actions listed therein by any person.

Billing optimization- improvement, improvement by the operator of his BS.

Big BS- systems used by large operators.

Posting billing- recording the results of billing calculations; after calculations the results become accessible to users(sent out, printed).

What can, what should, or what is the BS responsible for?

European (origin) standard TAR appeared in 1992. It is supported working group TADIG. Most European operators use TAR2, although there is a third version. Since 1995, modification TAP2, known as specification TD.27, or NAGTAP2, began to be used in the USA.

What's included in my monthly bill?

If we believe that any online feature or any data available through our service violates any terms of service stated in this Agreement, we have the right to remove or block it. Any packages and features you select are billed one month in advance, and any usage that exceeds your package or feature limits will be charged to your subsequent invoice, and you may also see other service fees including reprinting of invoices you issue. The following paragraphs explain the items included under the “voice” and “data” headings on your bill.

Instead of a conclusion

You take your cell phone out of your pocket, dial the number, press “call” and... the conversation takes place. Now you can't wait to find out your account balance. If the billing system is “hot”, you are immediately informed of this amount. “I calculated everything accurately, it’s a good billing system,” you think. Meanwhile, the other subscriber finds out that he has just reached his time limit and has been disconnected. “Why do I need this “hot” billing! Stupid billing system!” he complains... Yes, you can’t please everyone at the same time!

Voice fees are based on the amount of time used to make and receive calls on your mobile phone. Airtime for incoming and outgoing voice calls is calculated from the time the call begins until the time it is terminated, including the time used to route the call through the network and the duration of the call. Airtime for each voice call is rounded to the nearest minute unless your package or feature specifies otherwise.

Long distance charges apply when you make voice calls from one local calling area to another, and for all calls you receive outside of your local calling area. Long distance calls may use up your plan's local calling minutes and result in local calls that exceed the number in your package or features. If the radio signal from your device is picked up by a cell tower located outside of your local calling area, your call may be considered distance.

Special thanks for information support to Bolshovaya Galina, magazine columnist

Billing is an automated process that uses professional software. It analyzes how the signal passes through each cell, then it is sorted and calculated what the cost of services will be for a particular owner. It is telephone billing that generates payment for telephone communications. After the call, he debits as much money as indicated in your tariff plan.

To accurately calculate data usage, all usage in Canada and the United States is calculated and charged in kilobytes per session. When using roaming services outside of Canada and the United States, each data session is divided into 20 kilobyte units per session.

Data speeds and billing may vary depending on your plan and features. Recurring fees and maintenance fees are paid one month in advance, so your monthly bill includes the package and the monthly fee for the upcoming month. If you change your plan or features during your billing cycle, your next bill will include the charge for the portion of the month in which the package or feature was included on your bill. Your bill will also include the monthly subscription fee for the new package or feature.

Billing systems

Billing systems: basic concepts Billing. What associations does this term evoke? Maybe there is some connection with Bill Gates? No, fortunately he hasn’t “poked his nose” into the area yet...

Internet