Current Operations Flow Operations Flow Phase One - Site Scan Phase Two – Passive scans and Locking Target
Once a cell profile is selected, initiating a scan will create a
new cell tower profile (Not cloned).
The imitated cell tower will then passively scan suspect
devices on all bands connected to the system of the selected imitated network carrier.
Once a suspect device is locked the active handling agent
can save and push the saved target to the Device Management server making the suspect available to all other active and inactive agents for seamless target handover.
Laptop Management Devices provide the core data & cell
services imitating a full network provider via NSO’s own virtual MNO, all targets are kept in this bubble.
Mobile Management Devices do not offer any type of
Network services and is purely for tracking purposes.