
TABLE OF CONTENTS
REI
OSC-5000E
ii
L
OCATING
A T
HREATENING
T
RANSMITTER
.................................................................58
Locating Low Frequency RF (10 kHz - 500 kHz) Transmitters..........................58
Locating RF (500KHz to 3GHz) Transmitters.................................................59
Locating RF (3GHz to 21GHz) Transmitters..................................................59
Locating Infrared Transmitters.....................................................................60
OSCOR Triangulate and Locate Option ......................................................61
D
ETECTING
V
IDEO
T
HREATS
..................................................................................65
Identifying a Video Signal...........................................................................65
Using a Separate Video Monitor .................................................................65
Analyzing Video Formats and Demodulation ................................................66
OSCOR 2.4GHz Video Search...................................................................66
SECTION 4: OSCOR AUTOMATIC OPERATION ............................................... 69
S
TEP
1 M
EMORY
A
ND
D
ATA
M
ANAGE
.....................................................................71
S
TEP
2 S
ET
U
P
A
UTO
O
PTIONS
.............................................................................72
Input Spans for Automatic Operation ..........................................................74
Output Options ........................................................................................76
Correlate Options - Acoustic Correlator System (Automatic) ..........................78
S
TEP
3 L
OAD
F
RIENDLY
D
ATABASE
..........................................................................80
S
TEP
4 S
TART
A
UTO
M
ODE
...................................................................................81
SECTION 5: DETECTING SOPHISTICATED TRANSMITTERS ............................... 83
S
OME
S
OPHISTICATED
T
RANSMITTER
T
YPES
................................................................84
Spread Spectrum.......................................................................................84
Burst Transmitters ......................................................................................84
Frequency-hopping ...................................................................................84
S
OPHISTICATED
T
RANSMITTER
D
ETECTION
M
ETHOD
....................................................85
P
EAK
D
ISPLAY
E
XAMPLES
.......................................................................................86
Pager Example ..........................................................................................86
Spread Spectrum Example..........................................................................87
Burst Transmitter Example ..........................................................................88
Frequency-Hopping Example......................................................................89
SECTION 6: CONDUCTING A SWEEP ............................................................. 91
P
REPARING
F
OR
A S
WEEP
.....................................................................................91
Planning for a Sweep.................................................................................91
Scheduling a Sweep ..................................................................................92
Time of Sweep ..........................................................................................92
Environment Setup.....................................................................................92
Understanding Threat Type.........................................................................92
B
ASIC
P
ROCEDURE FOR A
S
WEEP
............................................................................93
Loading a Friendly Database ......................................................................94
Secure The Area........................................................................................95
Activating a Known Sound Source...............................................................95
Considerations for Infrared and Laser Threats ..............................................96
Manually Sweeping Selected Inputs .............................................................97