The attackers use the landline to call the target's cellphone when it's located near the same LAC as the equipment and use the laptop output to monitor the broadcasts that immediately follow over the airwaves to page the target phone.
Want more Interesting Articles to your Inbox every Morning? We'll keep you up to date with Latest News and In-Depth coverage of Current and Future Trends in Information technology. Subscribe & WIN a Free Pass to NULLCON 2016
No Thanks, I Don't want to Learn anything New