Similar connection techniques may be used for cellular technologies. In the example diagram, end user device (700a) (a mobile phone) is in wireless communication with a wireless carrier transceiver/tower (710). Cellular telephony is not an IP-based network, so IP packet traffic on cellular telephony networks is tunneled over cellular telephony protocols such as GPRS. This tunneled traffic is routed to an IP server (720), where it is unencapsulated and transmitted to an edge router (120c) and then on to an IP-based network cloud and eventually its destination IP address (e.g. an IP-based network server such as server 900). Return IP packets flow back to the end user device (700), being encapsulated for tunneling over the cellular telephony network by the IP server (720). These packet flows may be measured in the same way as other IP packet flows, and in addition, the end user device 700 to wireless tower transmission/receipt time is embedded in the cellular telephony protocol and provide the time of flight. This time of flight, along with the database that tracks transmission times, can be used to detect “rogue” cellular towers.