TABLE OF CONTENTS
REI OSC-5000E ii
LOCATING A THREATENING TRANSMITTER.................................................................58
Locating Low Frequency RF (10 kHz - 500 kHz) Transmitters..........................58
Locating RF (500KHz to 3GHz) Transmitters.................................................59
Locating RF (3GHz to 21GHz) Transmitters..................................................59
Locating Infrared Transmitters.....................................................................60
OSCOR Triangulate and Locate Option ......................................................61
DETECTING VIDEO THREATS ..................................................................................65
Identifying a Video Signal...........................................................................65
Using a Separate Video Monitor .................................................................65
Analyzing Video Formats and Demodulation ................................................66
OSCOR 2.4GHz Video Search...................................................................66
SECTION 4: OSCOR AUTOMATIC OPERATION ............................................... 69
STEP 1 MEMORY AND DATA MANAGE .....................................................................71
STEP 2 SET UP AUTO OPTIONS .............................................................................72
Input Spans for Automatic Operation ..........................................................74
Output Options ........................................................................................76
Correlate Options - Acoustic Correlator System (Automatic) ..........................78
STEP 3 LOAD FRIENDLY DATABASE ..........................................................................80
STEP 4 START AUTO MODE...................................................................................81
SECTION 5: DETECTING SOPHISTICATED TRANSMITTERS ............................... 83
SOME SOPHISTICATED TRANSMITTER TYPES................................................................84
Spread Spectrum.......................................................................................84
Burst Transmitters ......................................................................................84
Frequency-hopping ...................................................................................84
SOPHISTICATED TRANSMITTER DETECTION METHOD ....................................................85
PEAK DISPLAY EXAMPLES .......................................................................................86
Pager Example ..........................................................................................86
Spread Spectrum Example..........................................................................87
Burst Transmitter Example ..........................................................................88
Frequency-Hopping Example......................................................................89
SECTION 6: CONDUCTING A SWEEP ............................................................. 91
PREPARING FOR A SWEEP .....................................................................................91
Planning for a Sweep.................................................................................91
Scheduling a Sweep ..................................................................................92
Time of Sweep ..........................................................................................92
Environment Setup.....................................................................................92
Understanding Threat Type.........................................................................92
BASIC PROCEDURE FOR A SWEEP ............................................................................93
Loading a Friendly Database ......................................................................94
Secure The Area........................................................................................95
Activating a Known Sound Source...............................................................95
Considerations for Infrared and Laser Threats ..............................................96
Manually Sweeping Selected Inputs .............................................................97