In this attack scenario, the attacker passively monitors the signal strength of the target\u00e2\u0080\u0099s cellular RF signal or WiFi RF signal and uses the strength of the signal (with directional antennas and/or from multiple listening points at once) to identify the source location of the signal. Obtaining the signal of the target can be accomplished through multiple techniques such as through Cellular Broadcast Message Request or through the use of IMSI Tracking or WiFi MAC Address Tracking.
CAPEC 619 Signal Strength Tracking
Draft
Detailed
Unknown Risk