Global Markets
SCOUT payloads for both UAS and leave behind systems (SCOUT Recce), SCOUT RF and LEAD SCOUT software are each designed to support specialized operations, which aid in the collection and dissemination of intelligence for WIFI/Bluetooth protocols. The intelligence collected enables the F3EA (FIND/FIX/FINISH/Exploit/Analyze) cycle commonly used.
FIND/FIX/FINISH/EXPLOIT/ANALYZE
FINISH
Facilitates refining the WIFI/Bluetooth target location and detailed collection summary.
(SCOUT Payload - SCOUT Recce - SCOUT RF)
EXPLOIT
Enables searching of WIFI/Bluetooth capabilities in a post-mission function, or using active tool sets against an identified target.
(SCOUT RF, LEAD SCOUT)
FIX
Supports the geo-location of WIFI/Bluetooth systems for enhanced collection and exploitation.
(SCOUT Payload - SCOUT Recce - SCOUT RF)
ANALYZE
FIND
Searching of WIFI/Bluetooth devices (survey and targeted)
(SCOUT Payload - SCOUT Recce - SCOUT RF)
Analysis tool for post mission data analysis. Collected information is displayed exported to external databases
(SCOUT RF, LEAD SCOUT)
Military Organizations
Security Apparatus
Government Agencies
Intelligence Security Agencies
International Agencies
Private Companies
Search and Rescue Operations
The FVEY community can use this capability to complete sensitive operations globally, without risking sensitive National equities. Beyond the FVEY, the collection and SCOUT systems also enable NATO and other groups access to UNCLASS open-source tool sets.
Private companies may employ SCOUT systems to secure corporate sites, or to survey company owned local networks. The monitoring and summary collection methods would enable private companies, such as the telecommunication sector, the ability to monitor and test in selective regions for service support or conduct penetration testing.
Intelligence collection operations are designed to conduct standard and non-standard collection missions supporting national and international intelligence priorities. Intelligence agencies will focus on real time and leave behind capabilities with non-attributable capabilities, a need fulfilled by SCOUT systems.
Throughout Canada the Five Eyes (FVEY), and NATO, it is highly likely that military organizations will utilize the SCOUT systems to support intelligence collection operations in a variety of environments
Search and Rescue operations can be supported by the SCOUT systems through the monitoring and searching functions related to targetable selectors. SCOUT can enable the finding of missing devices (if active) to preserve life.
Security organizations responsible for nation security both domestically and abroad will have a use for SCOUT systems for personnel security to identify selectors associated with suspected nefarious state and non-state actors.
Government agencies within the FVEY, or NATO can employ SCOUT systems for force protection and target development operations. For example, this could include border services, warranted technical operations, Close Protections (CPP) based tasks for VIPs and deployment of active tool sets against identified targets.