RF-Based Direction Finding of Uavs Using

Total Page:16

File Type:pdf, Size:1020Kb

Load more

RF-based Direction Finding of UAVs Using DNN Samith Abeywickrama∗†, Lahiru Jayasinghe†, Hua Fu†, Subashini Nissanka†, and Chau Yuen† †Singapore University of Technology and Design, Singapore ∗National University of Singapore, Singapore Email: [email protected], {aruna jayasinghe,hua fu,yuenchau}@sutd.edu.sg Abstract—This paper presents a sparse denoising autoencoder MUSIC [10] and ESPRIT [11] are considered to be the (SDAE)-based deep neural network (DNN) for the direction most popular algorithms. However, MUSIC and ESPRIT are finding (DF) of small unmanned aerial vehicles (UAVs). It is inherently multi-channel techniques because those algorithms motivated by the practical challenges associated with classical DF algorithms such as MUSIC and ESPRIT. The proposed DF require a snapshot observation. This means, the base-band scheme is practical and low-complex in the sense that a phase data from all antenna elements should be extracted simulta- synchronization mechanism, an antenna calibration mechanism, neously so that a data correlation matrix can be formulated. and the analytical model of the antenna radiation pattern are Therefore, multiple channels should be coherent. However, in not essential. Also, the proposed DF method can be implemented most receivers, the digital down converter (DDC) chain uses a using a single-channel RF receiver. The paper validates the proposed method experimentally as well. coordinate rotation digital computer (CORDIC), which has a random start-up position on power up. The CORDIC therefore creates a random phase each time when the channels of the Index Terms—Drone surveillance, direction finding, UAV receiver are initialized, but remains constant throughout the tracking operation [12]. Therefore, calibrating this start-up phase values of each RF channel becomes necessary to realize a coherent I. INTRODUCTION multi-channel receiver. Clearly, this increases the hardware The use of civilian drones has increased dramatically in complexity and the power consumption. recent years. Likewise, drones are fast gaining popularity Most of the civilian drones use WiFi-like OFDM for their around the world [1–5]. However, drone use in a problematic communication. They are usually unknown, wideband, and manner has stirred public concerns. For example, in January transmitted in burst-mode. Such signal characteristics pose 2015 a drone crashed at the White House [6], raising concerns challenges with classical DF techniques. However, if only the about security risks to the government building; in March 2016 signal power measurements are utilized, performing DF is a Lufthansa jet came within 200 feet of colliding with a drone practically feasible even with such signals [13–16]. In [16], near Los Angeles International Airport [7]; and drones have signal power measurements that are obtained from a switched been accused of being used to violate the privacy and even beam antenna array are utilized to estimate the direction of a carry criminal activities [8]. These events give ample self- WiFi transmitter. As the actual radiation pattern of the antenna evident examples that developing a surveillance system for is vital for these methods, still it bounds with some practical suspect drones is of paramount importance. challenges. Therefore, we propose a practical and a low- The authors of [9] sought to detect a drone using Radio complex drone DF method in this paper, and our contributions Frequency (RF) as it can work day and night and at all can be summarized as fallows. weather conditions. Most of the commercial drones commu- arXiv:1712.01154v4 [eess.SP] 28 Dec 2018 To the best of authors’ knowledge there has not been nicate frequently with their controllers, and the downlink, any other method that involves deep neural network in the i.e., video signal and telemetry signals (flight speed, position, context of drone DF. We focus on a system which com- altitude, and battery level), between the drone and its controller prises a directional antenna array having N antennas, and is always present. To this end, this paper presents a drone a single channel receiver. By processing the signals that surveillance system, by eavesdropping on the communication are transmitted from the drone to its ground controller, the between a drone and its ground controller. The system can single channel receiver measures the received signal power estimate drone’s direction (or bearing) by processing the data at the each antenna using a RF switching mechanism. Then, transmitted from the drone to its controller using a single the obtained power values are fed to the proposed sparse channel wireless receiver. Therefore, no dedicated transmitter denoising autoencoder (SDAE)-based deep neural network is required at the surveillance system. (DNN). More precisely, the first hidden layer of the network RF based direction finding (DF) techniques have been well extracts a robust sparse representation of the received power studied, and the classical high-resolution techniques such as values. Then, the rest of the network utilizes this sparse The support of NSFC 61750110529 and SUTD-MIT International Design representation to classify the direction of the drone signal. Center is gratefully acknowledged. The first two authors contributed equally. It should be noted that a phase synchronization mechanism, where Gn(θ) is the real numbered antenna gain for the azimuth N-element angle θ, λ is the signal wavelength, and Directional Antenna Array 2π(n − 1) β (θ)= d cos − θ , (3) n N Single-pole-N-throw " # er Antenna Switch ¡ where d is the radius of the circular antenna array [18]. Since Single Channel we consider a practical DF method in this paper, s(k) and SDR . an(θ) are assumed to be unknown. Therefore, our objective . is to recover the azimuth angle θ, while the parameters s(k) . Softmax Classi Data Preprocessing . and an(θ) are unknown. We focus on a power measurements based approach. To this end, the ensemble averaged received signal power at the n−th Encoder antenna element can be given as SDAE-DNN 2 Pn =E |rn(k)| Fig. 1. The System Model. h i ∗ =E an(θ)s(k)+ nn(k) an(θ)s(k)+ nn(k) h 2 2 2 i an antenna gain calibration mechanism, and the analytical = |an(θ)| E |s(k)| +E |nn(k)| model of the antenna radiation pattern are not essential for 2 h 2 i h i = Gn(θ)Ps + σ , (4) this single channel implementation. The paper validates the proposed method experimentally through a software defined where 2 2 radio (SDR) implementation in conjunction with TensorFlow Gn(θ)= |an(θ)| , [17]. Furthermore, such an experimental validation for drone 2 DF is not common in the literature, and can be highlighted as Ps =E |s(k)| , another contribution of this paper. h i 2 2 The paper organization is as follows. The system model is σ =E |nn(k)| , presented in Section II. Section III discusses the proposed deep h i and E[·] denotes the expectation operator. Here, (4) follows architecture. Then, in Section IV, we validate the proposed from the fact that s(k) and n (k) are independent and method using experimental results. Section V concludes the n uncorrelated, i.e., paper. ∗ ∗ To promote reproducible research, the codes for generating E[s(k)nn(n)] = E[s (k)nn(n)]=0. most of the results in the paper are made available on the website: https://github.com/LahiruJayasinghe/DeepDOA. It can be observed that the received power values at the antenna elements ni and nj , where i, j ∈ {1, ··· ,N} and i 6= j, are 2 2 II. SYSTEM MODEL not identical, since Gi (θ) 6= Gj (θ). We have this property thanks to the gain variation of the directional antenna array We consider a system which consists of a single channel in [0 2π). Therefore, it is desirable to have an underlying receiver, and a circular antenna array equipped with N direc- N relationship (or a pattern) between {Pn}n=1 and θ. tion antennas, see Fig. 1. The antenna array is connected to the The proposed method is as follows. The receiver sequen- receiver using a non-reflective Single-Pole-N-Throw (SPNT) tially activates one antenna element at a time using the RF switch. The switching period is Ts. Suppose that a far- SPNT RF switch, and measures the corresponding received field drone signal impinges on the antenna array with azimuth power value. During the activation of n−th antenna, Pn is angle θ ∈ [0 2π). The received signal at the n−th antenna measured, where n ∈{1, ··· ,N}. A single switching cycle is element can be given as equivalent to N activations, starting from the first antenna to the N−th antenna. Let p = [P , ··· , P ]⊤ denote the power r (k)= a (θ)s(k)+ n (k), (1) 1 N n n n measurements corresponding to a single switching cycle. As ⊤ it is depicted in Fig. 1, x = [x , ··· , xN ] is obtained during where k is the sample index, an(θ) is the n−th antenna 1 response vector for the azimuth angle θ, s(k) is the drone the preprocessing stage, where transmitted signal as it arrives at the antenna array, nn(k) is P x n . (5) circularly symmetric, independent and identically distributed, n = N Pi complex additive white Gaussian noise (AWGN) with zero i=1 2 This means, x is the ratio between P and the summation mean and variance σ , and n ∈ {1, ··· ,N}. Here, an(θ) n P n follows the form of of all power values within the same switching cycle. In the next section, we discuss how the proposed network recovers 2π j βn(θ) an(θ)= Gn(θ)e λ , (2) θ from x. where T is the size of the training data set, β is a hyper parameter1, ρ is the sparsity parameter, T 1 ρ = h (xi) m T m er i=1 X is the average activation level of the m-th hidden unit where xi Corruption hm( ) denotes the activation of the m−th unit for the input .
Recommended publications
  • The Crossing of Heaven

    The Crossing of Heaven

    The Crossing of Heaven Memoirs of a Mathematician Bearbeitet von Karl Gustafson, Ioannis Antoniou 1. Auflage 2012. Buch. xvi, 176 S. Hardcover ISBN 978 3 642 22557 4 Format (B x L): 15,5 x 23,5 cm Gewicht: 456 g Weitere Fachgebiete > Mathematik > Numerik und Wissenschaftliches Rechnen > Angewandte Mathematik, Mathematische Modelle Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 4. Computers and Espionage ...and the world’s first spy satellite... It was 1959 and the Cold War was escalating steadily, moving from a state of palpable sustained tension toward the overt threat to global peace to be posed by the 1962 Cuban Missile Crisis – the closest the world has ever come to nuclear war. Quite by chance, I found myself thrust into this vortex, involved in top-level espionage work. I would soon write the software for the world’s first spy satellite. It was a summer romance, in fact, that that led me unwittingly to this particular role in history. In 1958 I had fallen for a stunning young woman from the Washington, D.C., area, who had come out to Boulder for summer school. So while the world was consumed by the escalating political and ideological tensions, nuclear arms competition, and Space Race, I was increasingly consumed by thoughts of Phyllis.
  • 8200.1D United States Standard Flight Inspection Manual

    8200.1D United States Standard Flight Inspection Manual

    DEPARTMENT OF THE ARMY TECHNICAL MANUAL TM 95-225 DEPARTMENT OF THE NAVY MANUAL NAVAIR 16-1-520 DEPARTMENT OF THE AIR FORCE MANUAL AFMAN 11-225 FEDERAL AVIATION ADMINISTRATION ORDER 8200.1D UNITED STATES STANDARD FLIGHT INSPECTION MANUAL April 2015 DEPARTMENTS OF THE ARMY, THE NAVY, AND THE AIR FORCE AND THE FEDERAL AVIATION ADMINISTRATION DISTRIBUTION: Electronic Initiated By: AJW-331 RECORD OF CHANGES DIRECTIVE NO. 8200.1D CHANGE SUPPLEMENTS OPTIONAL CHANGE SUPPLEMENTS OPTIONAL TO TO BASIC BASIC The material contained herein was formerly issued as the United States Standard Flight Inspection Manual, dated December 1956. The second edition incorporated the technical material contained in the United States Standard Flight Inspection Manual and revisions thereto and was issued as the United States Standard Facilities Flight Check Manual, dated December 1960. The third edition superseded the second edition of the United States Standard Facilities Flight Check Manual; Department of Army Technical Manual TM-11-2557-25; Department of Navy Manual NAVWEP 16-1-520; Department of the Air Force Manual AFM 55-6; United States Coast Guard Manual CG-317. FAA Order 8200.1A was a revision of the third edition of the United States Standard Flight Inspection Manual, FAA OA P 8200.1; Department of the Army Technical Manual TM 95-225; Department of the Navy Manual NAVAIR 16-1-520; Department of the Air Force Manual AFMAN 11-225; United States Coast Guard Manual CG-317. FAA Order 8200.1B, dated January 2, 2003, was a revision of FAA Order 8200.1A. FAA Order 8200.1C, dated October 1, 2005, was a revision of FAA Order 8200.1B.
  • Methods of Radio Direction Finding As an Aid to Navigation

    Methods of Radio Direction Finding As an Aid to Navigation

    FWD : MWB Letter 1-6 DP PA RT*«ENT OF COMMERCE Circular BUREAU OF STANDARDS No. 56 WASHINGTON (March 27, 1923.)* 4 METHODS OF RADIO DIRECTION F$JDJipG AS AN AID TO NAVIGATION; THE RELATIVE ADVANTAGES OB£&fmTING THE DIRECTION FINDER ON SHORg$tgJFcN SHIPBOARD By F. W, Dunmo:^, Associate Physicist Now that the great value of the radio direction finder as an aid to navigation is being generally recognized, consider- able importance attaches to the question whether Its proper location is on shipboard, in the hands of the navigator, or on shore. The essential part of a radio direction finding equipment or '‘radio compass'' consists of a coil of wire usually wound on a frame from four to five feet square, so mounted as to be rotatable about a vertical axis. Suitable radio receiving apparatus is connected to this coil for the reception of the radio beacon signals. The construction and operation of the direction finder have been discussed in detail in Bureau of Standards Scientific Paper No. 438, by F.A.Kolster and F.W. Dunmore, to which the reader may refer for further . informa- tion.* The present paper is concerned primarily with a com- parison of the relative advantages of the location of the •direction finder on shore and on shipboard, The two methods may be briefly described as follows; 1. Direction Finder on Shore. --This method, usually con- sists in the use of two or more radio direction finder station installations on shore, each of these compass stations being connected by wire to a controlling transmitting station.
  • Evaluation VHF Intercept and Direction Finding Systems

    Evaluation VHF Intercept and Direction Finding Systems

    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1989 Evaluation VHF intercept and direction finding systems. Siddiqui, Muhammad Aleem. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/25913 UNCLASSIFIED S.'URiTY CLASS. FiCAT'Orj Qi^ THiS PAGt form Approved REPORT DOCUMENTATION PAGE 0MB No 0704 on REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARK NGS Unclassified SECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION 'AVAHABlLiTV OF PE.-OP" Approved for public release; DECLASSIFICATION ' DOWNGRADING SCHEDULE distribution is unlimited PERFORMING ORGANIZATION REPORT NUMBER{S) 5 MONITORING ORGANIZATION REPORT NUMBER(S) NAME OF PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a NAME OF MONITORING ORGANIZATION (If applicable) ^aval Postgraduate Schoo] 61 Naval Postgraduate School ADDRESS {City, State, and ZIP Code) 7t) ADDRESS (C/fy State and ZIP Code) Monterey, California 93943-5000 Monterey, California 93943-5000 NAME OF FUNDING SPONSORING Bb OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBEf ORGANIZATION (If applicable) ADDRESS(C/f> State and ZIP Code) in SOURCE OF FUNDING NjMBE»S P!^'OGRAM PROJECT TASr vvorn unit Element no NO NO -ccession no i TITLE (Include Security Classification) EVALUATION OF VHF INTERCEPT AND DIRECTION FINDING SYSTEMS ! PERSONAL AUTHOR'S; SIDDIQUI, Muhammad Aleem ia TYPE OF REPORT 3b TIME COVERED ^ DATE OF REPOR" (Year Month Day) 3 PAGE COUN' Master's Thesis FROM TO 1989, September 91 j SUPPLEMENTARY NOTATION COSATl CODES 18 SUBJECT TERMS (Continue on revefse if necessar-y and identify by block number) ELD GROUP SUB-GROUP Electronic Warfare, Interception, Direction Finding ) ABSTRACT {Continue on reverse if necessary and identify by block number) This thesis evaluates VHF Intercept and Direction Finding (DF) collection systems developed by ESL International, Watkins Johnson, and HRB Singer for induction into a divisional level signal battalion of the Pakistan ^rmy.
  • A Short History of Army Intelligence

    A Short History of Army Intelligence

    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
  • FM 24-18. Tactical Single-Channel Radio Communications

    FM 24-18. Tactical Single-Channel Radio Communications

    FM 24-18 TABLE OF CONTENTS RDL Document Homepage Information HEADQUARTERS DEPARTMENT OF THE ARMY WASHINGTON, D.C. 30 SEPTEMBER 1987 FM 24-18 TACTICAL SINGLE- CHANNEL RADIO COMMUNICATIONS TECHNIQUES TABLE OF CONTENTS I. PREFACE II. CHAPTER 1 INTRODUCTION TO SINGLE-CHANNEL RADIO COMMUNICATIONS III. CHAPTER 2 RADIO PRINCIPLES Section I. Theory and Propagation Section II. Types of Modulation and Methods of Transmission IV. CHAPTER 3 ANTENNAS http://www.adtdl.army.mil/cgi-bin/atdl.dll/fm/24-18/fm24-18.htm (1 of 3) [1/11/2002 1:54:49 PM] FM 24-18 TABLE OF CONTENTS Section I. Requirement and Function Section II. Characteristics Section III. Types of Antennas Section IV. Field Repair and Expedients V. CHAPTER 4 PRACTICAL CONSIDERATIONS IN OPERATING SINGLE-CHANNEL RADIOS Section I. Siting Considerations Section II. Transmitter Characteristics and Operator's Skills Section III. Transmission Paths Section IV. Receiver Characteristics and Operator's Skills VI. CHAPTER 5 RADIO OPERATING TECHNIQUES Section I. General Operating Instructions and SOI Section II. Radiotelegraph Procedures Section III. Radiotelephone and Radio Teletypewriter Procedures VII. CHAPTER 6 ELECTRONIC WARFARE VIII. CHAPTER 7 RADIO OPERATIONS UNDER UNUSUAL CONDITIONS Section I. Operations in Arcticlike Areas Section II. Operations in Jungle Areas Section III. Operations in Desert Areas Section IV. Operations in Mountainous Areas Section V. Operations in Special Environments IX. CHAPTER 8 SPECIAL OPERATIONS AND INTEROPERABILITY TECHNIQUES Section I. Retransmission and Remote Control Operations Section II. Secure Operations Section III. Equipment Compatibility and Netting Procedures X. APPENDIX A POWER SOURCES http://www.adtdl.army.mil/cgi-bin/atdl.dll/fm/24-18/fm24-18.htm (2 of 3) [1/11/2002 1:54:49 PM] FM 24-18 TABLE OF CONTENTS XI.
  • Human Intelligence Collector Operations, FM 2-22.3

    Human Intelligence Collector Operations, FM 2-22.3

    *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION 1-1 Intelligence Battlefield Operating System 1-1 Intelligence Process 1-1 Human Intelligence 1-4 HUMINT Source 1-4 HUMINT Collection and Related Activities 1-7 Traits of a HUMINT Collector 1-1 0 Required Areas of Knowledge 1-12 Capabilities and Limitations 1-13 Chapter 2 HUMAN INTELLIGENCE STRUCTURE 2-1 Organization and Structure 2-1 HUMINT Control Organizations 2-2 HUMINT Analysis and Production Organizations 2-6 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and reyulations. 'This publication supersedeJyM 34-52, 28 September 1992, and ST 2-22.7, Tactical Human Intelligence and Counterintelligence Operations, April 2002. PENTAGON LmRARY \" "j MrtlTARY OOCUMENTI WASHINGTON, DC 20310 6 September 2006 FM 2-22.3 FM 2-22.3 ------------­ Chapter 3 HUMINT IN SUPPORT OF ARMY OPERATIONS 3-1 Offensive Operations ...............................•............................................................ 3-1 Defensive Operations 3-2 Stability and Reconstruction Operations 3-3 Civil Support Operations 3-7 Military Operations in Urban Environment.. 3-8 HUMINT Collection Environments 3-8 EAC HUMINT 3-9 Joint, Combined, and DOD HUMINT Organizations 3-10 Chapter 4 HUMINT OPERATIONS PLANNING AND MANAGEMENT .4-1 HUMINT and the Operations Process .4-1 HUMINT Command and Control .4-3 Technical Control.
  • For R&S®RAMON Radiomonitoring Software

    For R&S®RAMON Radiomonitoring Software

    R&S®RAMON Radiomonitoring Software For radiomonitoring and radiolocation systems Product Brochure | 04.00 | Brochure Product Radiomonitoring Radiolocation & RAMON_bro_en_5214-3152-12.indd 1 31.03.2015 14:30:49 Systems using the R&S®RAMON software are intended for R&S®RAMON specific spectrum monitoring tasks, government authori- ties entrusted with public safety and security missions and for the armed forces. They are delivered as complete, turn- Radiomonitoring key systems and support a wide range of tasks, including: ❙ Collection of information as a basis for political decisions ❙ Border protection (prevention of contraband trade and Software illegal border crossings) ❙ Personal and property protection ❙ Location finding of interference signals At a glance ❙ COMINT/CESM for military missions Systems based on R&S®RAMON include Rohde & Schwarz The R&S®RAMON software modules are used as radiomonitoring and radiolocation equipment as well as core components in advanced radiomonitoring and IT components, communications systems and the modu- radiolocation systems. The R&S®RAMON software lar R&S®RAMON software, which provides the interface to the user. covers a broad scope of functions: It can be used to control the equipment connected to a computer, Rohde & Schwarz also offers special software modules de- to store and analyze the data delivered by the veloped for military use, e.g. in communications electronic equipment, to control and monitor the information countermeasures (CECM) systems. These modules are flow in a networked system comprising multiple subject to export control regulations, and are described in a separate product brochure. They can be used in systems workstations or system sites, and to simplify routine in combination with the R&S®RAMON radiomonitoring tasks by translating them into fully automated software.
  • 2030 DF High-Resolution Direct Finding Equipment

    2030 DF High-Resolution Direct Finding Equipment

    AIRCRAFT | NAVIGATION AND SURVEILLANCE SYSTEMS 2030 DF HIGH-RESOLUTION DIRECTION FINDING EQUIPMENT Moog Inc. is a worldwide designer, manufacturer and integrator of mission critical products and systems. Over the past 60 years, we have developed a reputation for delivering innovative solutions for the most challenging civil, military and marine applications. Moog’s product heritage in navigation and surveillance systems is based on supplying innovative system solutions to civil aviation authorities and military commands worldwide. By the 1980’s, we were supplying complete fixed base, shipboard, mobile and man portable TACAN systems to customers globally. 2030 DF OVERVIEW Moog’s 2030 Direction Finder (DF) offers reliability, flexibility and superior performance backed by many years of worldwide installation experience. A typical system is comprised of an antenna, receiving and resolving equipment, touch screen numerical vector display (NVD), frequency control equipment, front-end processor (FEP) and a signal distribution facility option. The high resolution 2030 DF provides accurate navigation information using standard VHF or UHF radio systems. The modular, versatile system design of the 2030 can be easily expanded as requirements change. Technical advantages include extensive BITE facilities, remote control operation with remote indication of fault parameters, remote testing and fault diagnosis. REMOTE MAINTENANCE MONITORING (RMM) The 2030 DF has an integrated monitoring and maintenance system which can be displayed on a local PC, remote PC or both. Display screens show operating parameters, overall system status, LRU status, alarm limits, diagnostics and test, amplifier status and transmitter control status. The 2030 DF features a BITE system which continually monitors and provides alarm indications in the event of module failure, system transfer or shutdown.
  • Attack on a Sigint Collector, the USS Liberty (8 CCO)

    Attack on a Sigint Collector, the USS Liberty (8 CCO)

    TOP SECRET UNITED STATES CRYPTOLOGIC HISTORY Attack on a Sigint Collector, the U.S.S. Liberty (8 CCO) ~O'f ftELEASABLE 'fO t'OftEI8!.- NA'flONAL3 'fHIS f){)Et:Jt.IEN'f E6N'fAINS eot>EW6Kf> MA'fEKIAL Classified by NSA/CSSM 123-2 Review in April 2011 Declassified and approved for release by NSA on 11-08-2006 pursuant to E.O. 12958, as amended. MDR 51712. TOP SECRET Contents of this publication should not be reproduced, or further disseminated outside the U.S. Intelligence Community without the permission of the Director, NSA/CSS. Inquiries about reproduction and dissemination should be directed to the Office of Cryptologic Archives and History, T54. i 'fOP SECRE'f UMBRA I UNITED STATES CRYPTOLOGIC HISTORY Special Series Crisis Collection Volume 1 Attack on a Sigint Collector, the U.S.S. Liberty (S-CCO) William D. Gerhard Henry W. Millington NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1981 NO'f KELEASABLE 'fO FOKEIGN NA'flONALS 'fOP SHCRE'f UMBRA -- -- --- -~--------...................,...~ UNCLASSIFIED Contents Page Foreword----------------------------------------------------------------------------------- vii Authors' Note------------------------------------------------------------------------------- ix Chapter I POLITICAL-MILITARY BACKGROUND <V>---------------------------------------­ Chapter II CONSIDERATIONS LEADING TO THE SHIP'S DEPLOYMENT (U) ----------------­ 5 The Requirements for Intelligence (U) ----------------------------------------------------­ 5 Technical Collection Factors (U) ----------------------------------------------------------
  • Fm 2-22.3 (Fm 34-52)

    Fm 2-22.3 (Fm 34-52)

    FM 2-22.3 (FM 34-52) HUMAN INTELLIGENCE COLLECTOR OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY September 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and regulations. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE ............................................................................................................... vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION...................................................................................................1-1 Intelligence Battlefield Operating System .............................................................1-1 Intelligence Process..............................................................................................1-1 Human Intelligence ...............................................................................................1-4 HUMINT Source....................................................................................................1-4 HUMINT Collection and
  • Select Committee on Intelligence United States

    Select Committee on Intelligence United States

    SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE Additional Prehearing Questions for James R. Clapper, Jr. Upon his nomination to be Director of National Intelligence Responsibilities of the Director of National Intelligence 1. What is your understanding of the following responsibilities of the Director of National Intelligence (DNI)? a. As the head of the Intelligence Community (IC). b. As the principal adviser to the President, the National Security Council, and the Homeland Security Council for intelligence matters related to the national security. c. In overseeing and directing the implementation of the National Intelligence Program. d. In managing the Office of the Director of National Intelligence (ODNI). As head of the intelligence community, the DNI not only develops policies and procedures to guide the work of U.S. intelligence agencies, but also oversees their performance to ensure compliance with these policies and procedures. The DNI’s ultimate objective, pursuant to the Intelligence Reform and Terrorism Prevention Act, is to create a unified intelligence effort at the national level that is both effective and efficient. A significant part of this responsibility also includes representing the interests and positions of the intelligence community to the rest of the Executive branch, the Congress, foreign governments, and the public. As principal intelligence adviser to the President, the DNI ensures that the President and senior government officials receive the substantive intelligence support they require to carry out their responsibilities. This entails keeping them apprised of current, ongoing developments around the world; having intelligence analysis prepared to meet short-term needs, preparing longer-term assessments to support longer-term policy decisions; and responding to questions they have about intelligence they have received.