Securing proving grounds and test ranges

Military proving grounds and test ranges are a key asset to a nation’s armed forces. It is this arena where scenarios, strategy, forces and equipment are put through their paces to ensure readiness for the battlefield. Efficient and effective testing on proving grounds is the precursor to efficient and effective performance when deployed in live operations. This testing includes verifying that weapons and communications [...]

Securing proving grounds and test ranges2018-10-09T14:10:24+00:00

Interference hunting during UAV flight & test

Detect and locate interference during UAV maneuvers For effective operation of military UAVs (Unmanned Aircraft Vehicles), in both live operations and test scenarios, over 10 separate frequency bands may be used at once. This is in order to operate the array of different navigation, communications, situational awareness and payload control systems on board. These frequency bands are generally shared by various other military communications [...]

Interference hunting during UAV flight & test2018-10-10T11:43:20+00:00

Naval EMCON (Emissions Control)

In both battle and test scenarios, naval ships need to be able to enter EMCON (Emissions Control) conditions. This can mean restricted emissions (no uniquely identifying transmissions) or no emissions at all (radio silence). EMCON is used to ensure that the enemy cannot triangulate the signal source and the ship using radio direction finding techniques. Since RF transmissions are less common in the middle [...]

Naval EMCON (Emissions Control)2018-10-09T14:07:22+00:00

Keeping data centers secure against RF threats

Detect unauthorized RF transmissions around data centers Both data center hosting providers and companies managing their own data centers require robust security procedures. In addition to some of the most sophisticated cybersecurity measures, many data centers now include biometric access controls and round-the-clock security guard patrols in an attempt to prevent cyber and physical intrusions. The consequences of a security breach in a data [...]

Keeping data centers secure against RF threats2018-10-10T11:46:14+00:00

InfoSec: Preventing Intellectual Property (IP) theft

Keeping sensitive data secret IP (Intellectual Property) is the most valuable asset of many high-tech and pharmaceutical companies. However, IP theft is estimated to cost the US economy alone over $180 billion a year. IP theft may be state-sponsored or carried out by a competitor and can be executed using a range of human, electronic and cyber data exfiltration techniques. It is therefore essential [...]

InfoSec: Preventing Intellectual Property (IP) theft2018-10-10T11:45:21+00:00

Drones and Critical Infrastructure Protection (CIP)

Securing national infrastructure against airborne intrusions Critical National Infrastructure including nuclear reactors, chemical facilities, water systems and airports need the highest level of security against all possible physical and electronic threats. Critical infrastructure, like many other sectors, has to deal with the new and emerging threat of commercial drones – or Unmanned Aerial Vehicles (UAVs). These represent a number of different risks. The most [...]

Drones and Critical Infrastructure Protection (CIP)2018-10-09T10:12:52+00:00

Protecting your borders

Many international borders can cover hundreds or even thousands of miles. With such large areas to cover, it is impossible to secure every square mile of a border with a physical manned presence. As a result, illegal border crossings become harder to track. Therefore, technology must play a part in detecting, classifying and locating suspicious or illegal activities. Alongside optical, acoustic and radar, RF [...]

Protecting your borders2018-10-04T16:04:44+00:00

Radar interference to mobile operators

Detecting and locating pulsed interference sources in real time Interference to mobile networks can result in dropped calls, impaired voice quality and reduced data speeds. As well as being disruptive to mobile users, repeated incidents can lead to financial losses for mobile operators as they lose reputation and customers. There can even be a risk to lives if interference to mobile services prevents emergency [...]

Radar interference to mobile operators2018-10-10T11:47:21+00:00

Hybrid AOA/TDOA

When it comes to geolocation performance, you don’t need to compromise AOA/DF and TDOA are two different methods for geolocating signals over wide areas. You can read more about the mechanics of each technique by clicking on the links, but the key takeaway is that each method performs better on different signal types and in different environments. For many users of RF [...]

Hybrid AOA/TDOA2018-10-04T16:06:10+00:00

Direction finding in urban environments

Allowing direction finding vehicles to navigate the urban obstacle course Even the most finely calibrated Direction Finding (DF) systems can often seem to fail  when used in the urban environment. This problem can be attributed to multipath propagation. In an urban environment there will be many buildings which will reflect, shadow, diffract or block RF signals entirely. This can lead to uncertainty in the [...]

Direction finding in urban environments2018-10-10T11:48:08+00:00
This website uses cookies and third party services to deliver a seamless user experience Settings Ok

Cookies

These help us understand our visitors to improve navigation and overall site quality.

Third Party Technologies

Used to help deliver the best user experience possible