The mobile device may be targeted for exploitation through its interface to cellular networks or other radio interfaces.