T 5.137 Analysis of connection data relating to wireless communication

When using wireless communication, the signals transmitted over the transmission route cannot be shielded physically against unauthorised eavesdropping or recording. For this reason, an attacker could execute his/her attack without the access problems common to line-based communication. In wireless networks using several base stations to support communication in a large area, for example mobile communication networks, it is also common to determine the approximate location of the mobile end devices to ensure they can be accessed quickly. If the devices establish a connection themselves, then they also provide information on their location in the course of establishing the connection. This location information can be used by the network operator or service operator - but also by third parties - to form movement profiles.

Examples: