EasyManua.ls Logo

OSCOR OSC 5000 - Page 4

OSCOR OSC 5000
121 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
TABLE OF CONTENTS
REI OSC-5000E ii
LOCATING A THREATENING TRANSMITTER.................................................................58
Locating Low Frequency RF (10 kHz - 500 kHz) Transmitters..........................58
Locating RF (500KHz to 3GHz) Transmitters.................................................59
Locating RF (3GHz to 21GHz) Transmitters..................................................59
Locating Infrared Transmitters.....................................................................60
OSCOR Triangulate and Locate Option ......................................................61
DETECTING VIDEO THREATS ..................................................................................65
Identifying a Video Signal...........................................................................65
Using a Separate Video Monitor .................................................................65
Analyzing Video Formats and Demodulation ................................................66
OSCOR 2.4GHz Video Search...................................................................66
SECTION 4: OSCOR AUTOMATIC OPERATION ............................................... 69
STEP 1 MEMORY AND DATA MANAGE .....................................................................71
STEP 2 SET UP AUTO OPTIONS .............................................................................72
Input Spans for Automatic Operation ..........................................................74
Output Options ........................................................................................76
Correlate Options - Acoustic Correlator System (Automatic) ..........................78
STEP 3 LOAD FRIENDLY DATABASE ..........................................................................80
STEP 4 START AUTO MODE...................................................................................81
SECTION 5: DETECTING SOPHISTICATED TRANSMITTERS ............................... 83
SOME SOPHISTICATED TRANSMITTER TYPES................................................................84
Spread Spectrum.......................................................................................84
Burst Transmitters ......................................................................................84
Frequency-hopping ...................................................................................84
SOPHISTICATED TRANSMITTER DETECTION METHOD ....................................................85
PEAK DISPLAY EXAMPLES .......................................................................................86
Pager Example ..........................................................................................86
Spread Spectrum Example..........................................................................87
Burst Transmitter Example ..........................................................................88
Frequency-Hopping Example......................................................................89
SECTION 6: CONDUCTING A SWEEP ............................................................. 91
PREPARING FOR A SWEEP .....................................................................................91
Planning for a Sweep.................................................................................91
Scheduling a Sweep ..................................................................................92
Time of Sweep ..........................................................................................92
Environment Setup.....................................................................................92
Understanding Threat Type.........................................................................92
BASIC PROCEDURE FOR A SWEEP ............................................................................93
Loading a Friendly Database ......................................................................94
Secure The Area........................................................................................95
Activating a Known Sound Source...............................................................95
Considerations for Infrared and Laser Threats ..............................................96
Manually Sweeping Selected Inputs .............................................................97

Table of Contents