You are on page 1of 5

SECTION 31

Operating Flow Structure

Prepared for the RTA – POU 03/3/2021


Current Operations Flow
Operations Flow
Phase One - Site Scan
Phase Two – Passive scans and Locking Target

Once a cell profile is selected, initiating a scan will create a


new cell tower profile (Not cloned).

The imitated cell tower will then passively scan suspect


devices on all bands connected to the system of the
selected imitated network carrier.

Once a suspect device is locked the active handling agent


can save and push the saved target to the Device
Management server making the suspect available to all
other active and inactive agents for seamless target
handover.

Laptop Management Devices provide the core data & cell


services imitating a full network provider via NSO’s own
virtual MNO, all targets are kept in this bubble.

Mobile Management Devices do not offer any type of


Network services and is purely for tracking purposes.

You might also like