Due to the currently deployed security features, e.g. end-to-end encryption, this is impossible without penetrating the involved communication devices.