OREANDA-NEWS. An expert in the field of information security, professor at the Department of Digital Forensics, Moscow State Technical University. N.E. Bauman Vitaly Vekhov on Thursday, January 13, in an interview with Izvestia, told how attackers spreading false reports about mining schools can be identified.

In recent days, a wave of evacuations of educational institutions has swept through the country due to reports of allegedly mining them. So, the day before in Yekaterinburg, 151 schools were evacuated, as well as a number of universities.

On Thursday, the press service of the mayor's office of Saratov reported that all schools in the city were evacuated due to similar reports. According to the source of Izvestia, classes in educational institutions were canceled, and students were sent home. As the interlocutor specified, the messages were not sent to schools, but to the administration and the police through e-mail and calls.

Vekhov admitted that such a mass mailing could have been carried out by ill-wishers "to annoy Russia", or by schoolchildren who decided to extend their holidays or do not want to write test papers.

The expert recalled that back in the Soviet Union, cases of reports of allegedly mining schools were recorded, but then the offenders only made phone calls, and now they use more modern and, according to the attackers themselves, more anonymous means of communication.

It is possible, Vekhov emphasized, to figure out exactly who reported the false mining, since sending messages, for example, by e-mail, only creates the illusion of anonymity for violators of the law, and law enforcement officers can easily figure them out, including by ip-address or address registration.

According to the expert, e-mail in Russia and in a number of other countries, including China, is registered either by passport or by phone number, and when buying a SIM card, you must provide passport data.

“If we are talking about a shared access point, you know, we have an Internet cafe and so on, when we have several computers working on the same MAC address. Video cameras are already in operation here, which must be installed in such public access points without fail,” he noted.