Covert on device communications monitoring

作者: Christopher Ryan Bennett

DOI:

关键词:

摘要: Embodiments of the systems and methods described herein relate to covertly monitoring call audio obtaining other communications a source device with target device. For example, source, mobile phone configured as device, working in cooperation an agency agrees interception at A covert application provided manages configuration communications. The intercepting is performed protect instances where undercover informant agency.

参考文章(6)
Philip R L Taunton, Dale Robinson Hewitt, Simulation of telephone handset ,(1999)
Anup D. Karnalkar, David Dudley, William S. Robbins, R. Tyler Wallis, Apparatus and Method for Providing Messaging Services ,(2013)
James C. Bedingfield, Robert A. Koch, System and method for providing usage monitoring telephony services ,(2003)
Christopher Ryan Bennett, Controlled recorded 3-way calling ,(2012)