作者: Christopher Ryan Bennett
DOI:
关键词:
摘要: Embodiments of the systems and methods described herein relate to covertly monitoring call audio obtaining other communications a source device with target device. For example, source, mobile phone configured as device, working in cooperation an agency agrees interception at A covert application provided manages configuration communications. The intercepting is performed protect instances where undercover informant agency.