The process is similar to when a user searches for Wi-Fi hot spots" on a mobile device or laptop, and the information collected is the same information that any user can view when trying to connect to available networks from a personal computer or other mobile device.