Methods for identifying wireless devices connected to potentially threatening devices
Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an ar...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device. |
---|