摘要 |
Methods and systems for interception that extract from the intercepted communications, application-layer identifiers that are indicative of the users of the terminals. For example, the identifiers may be, e.g., e-mail addresses or Facebook identities. By correlating the terminal identifiers with the application identifiers, it is possible to identify which terminals are operated by known users. Subsequent tracking of terminals is controlled based on this identification. In some embodiments, interception is carried out by a base station that is detached and separate from the network. The base station solicits the terminal to communicate by masquerading as a legitimate base station of the wireless communication network. Once the terminal is solicited, the data exchanged between the terminal and the network is relayed via the base station. In an embodiment, the relayed data comprises IP traffic that is exchanged between the terminal and the network. |