Defense & Security

The increasing complexity around combat operations demands Real-Time RF situational awareness and threat mitigation

The challenge

  • Automated real-time frequency planning and co-ordination capabilities
  • Ability to distinguish key signals of interest with advanced geo-location of Red Force signals including jamming and EMP.
  • Ability to operate in “stealth mode” with on board processing of mission data without the need to backhaul large volumes of data for analysis.
  • Networking function between units with the ability to rapidly set up perimeter geo fencing around forward operation sites, static forward Operating Bases (FOB) or mobile (convoy) assets.
  • Integrated SigINT capability able to detect and mitigate drone attack or unwanted surveillance.
  • Wideband scanning system capable of detecting signals hidden within or behind other signals or close to the noise floor.
  • A “passive radar” system able to detect new signal sources and provide identification on the type, location, and vector of the potential threat, whether it is a drone, a sat-phone, a radio, or a cell phone.

The solution

SigBASE acts as a “passive radar”, detecting new signal sources and providing identification on the type, location, and vector of the potential threat. Whether it is a drone, a sat-phone, a radio, or a cellphone.  If it’s within range and switched on, or in use, then SigBASE will find it.

Real-Time situational awareness is key to a successful mission. SigBASE is available as a fixed node or portable operations solution. On board local processing means it does not require large back-haul bandwidth or huge amounts of on-board or attached storage so can operate in stealth mode for critical silent, local data collection.

Key Features

  • Configured and operated in either standalone mode or as a nodal network with encrypted, high-speed back-haul of all (or just relevant) mission data.
  • Each node has a sweep speed >24GHz/sec from 70MHz – 6GHz (configurable).
  • Ensures full coverage high-quality voice and data communications for all operations.
  • Monitors, analyzes, assigns and manages all frequencies to avoid interference or clashes.
  • Identifies suspicious signals or activity in areas not actively monitored by local forces.
  • Undertake further analysis to identify patterns that human analysts may miss.
  • Continuously and autonomously gathers and processes RF data across entire geographies.
  • Ensure optimum frequency allocation and utilization across all Blue/Green units
  • Ensure compliance with local laws by creating and enforcing frequency and channel plans
  • Identify suspicious activity and movements for further investigation/interception
  • Undertake event correlation to identify and locate new signals of interest
  • Prepare more detailed mission plans based on additional RF Intel gathered over time
  • Identify and locate burst, intermittent and hidden signals that human analysts often miss
  • Create “virtual ring-fences” around key installations to protect them and gather Intel
  • Autonomous, unattended gathering and processing of RF data with real-time alerts
  • Post-process field data gathered during missions
  • Ensure optimum frequency allocation and utilization across all Blue/Green units
  • Ensure compliance with local laws by creating and enforcing frequency and channel plans
  • Identify suspicious activity and movements for further investigation/interception
  • Undertake event correlation to identify and locate new signals of interest
  • Prepare more detailed mission plans based on additional RF Intel gathered over time
  • Identify and locate burst, intermittent and hidden signals that human analysts often miss
  • Create “virtual ring-fences” around key installations to protect them and gather Intel
  • Autonomous, unattended gathering and processing of RF data with real-time alerts
  • Post-process field data gathered during missions

“Real-Time Situational Awareness”

  • Creating an invisible RF ring-fence around the base.
  • Historical data collected enables behaviours, movements, patterns and trends to be identified and monitored.
  • Any signal within, or near, the perimeter is picked up and profiled
    – Blue/Green/Red/Unknown
    – New/seen before, Type, Location, Distance, Regularity/Duration
    – Triggers demodulate/store IQ and produce audio

  • Enhancing existing intelligence with DGS detected SIGINT/COMINT/MASINT
  • Utilizing historical information (DGS and intelligence) to establish threat triggers
    – Establish Channels for Electronic Counter Measures (ECM) for
    risk reduction
    – Assign channel allocations to DGS system to monitor for live threats
    – Complete frequency plans for optimal communication
  • Gear on-board for passive monitoring during the mission
    – Collect additional intelligence
    – Operational awareness of open channels (on-going situational
    awareness)

  • Gather intel on all RF activity in and around the target area (Over time)
    : What’s nearby? Observation post, associates, other SOI’s
  • Signal activity across the area of interest is picked and profiled
    – Type, Location, Regularity/Duration, Quiet/Busy times
    – Channels and frequencies utilized for communication
    – Communicating with whom – correlated event analysis
    – IQ & Voice record/ID
    – Collection and analysis is stealth – network connection required for
    location of SOI (short burst)

  • One device goes hot, quickly followed by another = Conversation
    (Correlated Event)
  • New activity present, such as periodic updates registrations of
    mobile devices
  • Convoy now has the intel to update command on situation change
  • Data stored to reduce future risk – on going situational awareness
  • Convoy has the intel in stealth mode w/command able to instruct
    with networked connection