Managed Access

Cellular Interdiction

Overview

As the wireless industry positions for the fifth generation of technology, society is more connected than ever. Over the past ten years the paradigm shift brought about by smartphones and ubiquitous connectivity has driven the build out of numerous nationwide networks with ever increasing bandwidth driving usage and applications. However, despite these dynamic changes, there remain isolated situations where wireless services must be controlled. In matters of national defense, public safety, as well as correctional intuitions, communications must be limited to authorized users in order to maintain the appropriate level of security.

The challenge posed by controlling communications is a delicate balance between managing coverage throughout the targeted area or facility without impacting the commercial networks that exists outside these identified boundaries, in many cases this could be as little as a foot away. Managed Access delivers the appropriate balance between communications control within the identified boundaries and a harmonized deployment with the surrounding commercial wireless networks. Thus, permitting authorized device communication, while preventing unauthorized device use all in a comprehensive wireless-based solution.

Use Cases

"Tecore Networks Managed Access Solution Blocked Over 10,600 Communication Attempts in First 24 Hours of Operation"

MarketWatch

Key Benefits

Avert

Prevent unauthorized communications before they occur

Cost-Effective

Avoidance of resource-intensive measures to manually locate and retrieve devices

Cost-Effective

Avoidance of resource-intensive measures to manually locate and retrieve devices

Comprehensive

Addresses not only cell phones, but subscriber identity module (SIM) cards

Interoperability

Secured Wi-Fi and Interoperability for Emergency Communications (P25 support)

Interoperability

Secured Wi-Fi and Interoperability for Emergency Communications (P25 support)

Our Solution

Balancing the overwhelming build out of commercial network capacity with a controlled communications environment is a complex challenge. Solving this problem is the cornerstone of Managed Access, a preferred Cellular Interdiction Technology.

The concept of Managed Access is actually quite simple. Wireless devices leverage protocols and technologies to exchange information with their commercial networks. Most devices today support a combination of technologies across 2G, 3G, 4G, 5G and WiFi. As a cell phone moves from one area to the next, the device selects the best technology and channel for communication. Information is then exchanged between the device and network to provide service to the user. Once a network accepts a device, the device is allowed access and “camps” on the local signal broadcast by the network. Subsequent access to place a call, send a text message, or access the internet is all initiated through communications over this channel.

The Managed Access System (MAS) works from the same principles. It attracts and provides the device service the same way the commercial network does. When a device enters into the coverage area of the Managed Access network, the device is compelled to communicate as if it were still on the commercial network. Once the device accesses the MAS network, it is determined if the device is a known authorized device or an unknown, contraband device. Depending on the identification of the device, treatment while on the MAS is as follows:

  • For unknown, contraband devices on the system, any subsequent action is met with denial. While the device still appears to be on the commercial network, access to the actual commercial network is denied.
  • For authorized devices, the MAS system redirects them to the actual commercial network allowing these approved devices to continue to maintain access to their commercial service.

Through this basic logic, MAS provides the appropriate balance between control of contraband while permitting approved users to continue to use their device in the same controlled space.

 

Disadvantages of Other Solutions

  • Disrupts communication by emitting noise in cellular frequency bands
  • Does not differentiate – legitimate and emergency communications also prevented
  • Illegal under the Federal Communications Act
  • Passively provides location of devices based on emitted radio signal
  • Requires personnel to retrieve devices in order to terminate communication
  • Transceivers often placed in plain view of inmates, creating a security risk

iNAC® | MANAGED ACCESS SYSTEM

Download Data Sheet
PRODUCT OVERVIEW

The Intelligent Network Access Controller (iNAC™) is a managed access system that forms a radio frequency umbrella around a precisely defined target area and, through a main cell tower, attracts cellular devices within the outlined range. The Cellular Interdiction Solution (CIS) provides the system operator with the capability to selectively permit or deny communications from these cellular devices based on a rich policy engine, including identifying which wireless devices are approved in addition to allowing 911 calls from even unauthorized devices.

Learn More

LTE Border Communications

MRAT | Multi Radio Access Technology

Download Data Sheet
PRODUCT OVERVIEW

The challenge posed by controlling communications is the delicate balance between managing coverage throughout the target area without impacting the commercial networks that exists on the other side of the border, in many cases just feet away. Balancing the overwhelming build out of commercial network capacity with a controlled communications environment is a complex challenge. Tecore’s ability to leverage the same technology as the commercial wireless networks to create a credible countermeasure across the spectrum of wireless technologies deployed provides a comprehensive and cost-eective solution to preventing unauthorized communications.

Learn More

Highlights and Innovations

Resources

Industry Studies

Application Intelligence for the WAN Edge

Learn More
White Paper

Application Intelligence for the WAN Edge

Learn More
Current News

Application Intelligence for the WAN Edge

Learn More
Case Studies

Application Intelligence for the WAN Edge

Learn More

Ready to take the next step?