This Finding of No Significant Impact (FONSI) was prepared in accordance with the National Environmental Policy Act of 1969 (NEPA); the President's Council on Environmental Quality (CEQ) regulations for implementing the procedural provisions of NEPA, 40 Code of Federal Regulations (CFR) 1500-1508; and the Environmental Impact Analysis Process, 32 CFR 989. The decision in this FONSI is based on informationn contained in the Environmental Assessment to Construct a Perimeter Fence at Georgetown...
Topics: DTIC Archive, CH2M HILL SACRAMENTO CA, *ENVIRONMENTAL ASSESSMENT, *FENCES, *PERIMETERS(DEFENSE),...
The protection of perimeters in national, agricultural, airport, prison, and military sites, and residential areas against dangerous approaching human and vehicles when using human agents to provide security is expensive or unsafe. Because of this, acoustic/vibration signature identification of approaching human and vehicles threats has attracted increased attention. This paper addresses the development and deployment of three types of acoustic and vibration based smart sensors to identify and...
Topics: DTIC Archive, UNIVERSITY OF SOUTHERN CALIFORNIA LOS ANGELES, *VIBRATION, *ACOUSTIC DETECTORS,...
The UPSIDE Project addressed the threat against ships in ports and critical harbor infrastructure. A disciplined system engineering process was used to achieve three principle objectives. The objectives were to: (1) Develop an integrated interoperable test-bed supported by a plug and play infrastructure, (2) Develop a robust modeling and simulation (M&S) capability and (3) Develop an undersea perimeter defense system that can either be operated in a standalone mode or integrated into a...
Topics: DTIC Archive, RHODE ISLAND ECONOMIC DEVELOPMENT CORP PROVIDENCE RI, *HARBOR DEFENSE SYSTEMS,...
This study is an analysis of expeditionary air base defense in the post-World War II era, focusing on Western military examples, with the goal of informing current and future leaders within the USAF and larger joint military force. The study begins with a brief overview of the contemporary operational environment and likely future trends in the threats to US expeditionary air bases. A concise comparison of USAF air base defense forces from the 1960s and the 2010s follows, highlighting the...
Topics: DTIC Archive, Petren,Nicholas J, AIR UNIV MAXWELL AFB AL MAXWELL AFB, area defense, Perimeters...
This paper poses the cooperative perimeter surveillance problem and offers a decentralized solution that accounts for perimeter growth (expanding or contracting) and insertion/deletion of team members. By identifying and sharing the critical coordination information and by exploiting the known communication topology, only a small communication range is required for accurate performance. Simulation and hardware results are presented that demonstrate the applicability of the solution.
Topics: DTIC Archive, Kingston, Derek, AIR FORCE RESEARCH LAB WRIGHT-PATTERSON AFB OH AIR VEHICLES...
The Air Force has been engaged in a program to provide upgraded security at its weapon's storage and aircraft alert facilities. As a part of the program, it was necessary to upgrade the lighting systems in these areas to meet the newer, more stringent requirements contained in AFR 207-1 issued in July 1975 (revised version of AFM 207-1). Lighting surveys of SAC bases in the Continental U. S. and overseas had revealed extensive deficiencies. Because of the large number of facilities and...
Topics: DTIC Archive, ARMY ENGINEER DISTRICT OMAHA NE, *AIR FORCE FACILITIES, *FLOODLIGHTS, MILITARY...
Various techniques were investigated for fabricating single element and multiple element pyroelectric detectors from polyvinylidene (PVF2) films. Effort was applied towards the fabrication of vacuum deposited metal electrodes on the surface of the film. The best quality films were made with 100 to 1000 A deg aluminum electrodes. Various techniques were used for poling the films to make pyroelectric devices. During the poling process, high voltage breakdown sometimes occurred due to...
Topics: DTIC Archive, Peters,Wendell R, SOUTHWEST RESEARCH INST SAN ANTONIO TEX, *INFRARED DETECTORS,...
The author defines 'Forward deployment' as the regular assignment of US military forces to bases and facilities around the defense perimeter which, with our allies' consent and support, we have established overseas. 'Forward basing' refers to both the base and operating rights structure which supports these regularly deployed military forces as well as any other forces one may choose to project; in its broadest sense, 'forward basing' refers not simply to dedicated US or common defense basing...
Topics: DTIC Archive, Hagerty,Herbert G, NATIONAL DEFENSE UNIV WASHINGTON D C RESEARCH DIRECTORATE,...
This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices), funded by the Air Force Research Laboratory contract number F49620-01-1-0433. The scientific goal of this CIP/URI effort was to fundamentally advance the state-of-the-art in network security and digital intrusion tolerance by exploring a new paradigm in which...
Topics: DTIC Archive, Ganger, Gregory R, CARNEGIE-MELLON UNIV PITTSBURGH PA, *NETWORKS, *SECURITY, *SELF...
The objective of this project assessment was to provide real-time information on relief and reconstruction to interested parties to enable appropriate action to be taken, if warranted. Specifically, SIGIR determined whether the project was operating at the capacity stated in the original contract. To accomplish this, SIGIR determined whether the project was at full capability or capacity when accepted by the U.S. government, when it was transferred to Iraqi operators, and when SIGIR inspected...
Topics: DTIC Archive, SPECIAL INSPECTOR GENERAL FOR IRAQ RECONSTRUCTION ARLINGTON VA, *PERIMETERS(DEFENSE),...
The AN/PVS-5 Night Vision Goggles were evaluated as a potential viewing device to enable a military dog handler to work his dog, e.g., a scout dog, off-leash at night. Supplementary IR illuminating devices mounted on the dog were evaluated in conjunction with the AN/PVS-5, but were proved to be unnecessary at distances up to 50 meters. Since 50 meters is the maximum distance at which an off-leash dog would be allowed to operate, the AN/PVS-5 NV Goggles alone are adequate to enable the handler...
Topics: DTIC Archive, Tomlinson, E S, ARMY LAND WARFARE LAB ABERDEEN PROVING GROUND MD, *ARMY PERSONNEL,...
Changes in the mass distribution around some point on the Earth's surface induce corresponding changes to the magnitude and direction of the gravity vector at that location. The nine-tensor derivative of the gravity vector, or gravity gradient, is sensitive to very small changes in the gravity vector. With some assumptions, continuous measurement of the gravity gradient using a gravity gradiometer (GGI) can be used to determine the location of a mass change in the local area near the...
Topics: DTIC Archive, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND...
The Office of the Special Inspector General for Iraq Reconstruction initiated this project assessment as part of its continuing assessments of selected Economic Support Fund activities. This project assessment was conducted in accordance with the Quality Standards for Inspections issued by the President?s Council on Integrity and Efficiency. The assessment team included a professional engineer/inspector and two auditors/inspectors.
Topics: DTIC Archive, SPECIAL INSPECTOR GENERAL FOR IRAQ RECONSTRUCTION ARLINGTON VA, *ECONOMICS,...
Cross-border tunnels have been used by drug, people smugglers and terrorist organizations for clandestine entry or exit and transportation of contraband materials under the borders. The ability to detect these tunnels is paramount to successful border control. The Synchronized Electromagnetic Gradiometer uses the enhanced conductivity associated with tunnels, as compared to the surrounding medium, to detect the tunnels. A low-frequency electromagnetic (EM) signal is used to illuminate the area...
Topics: DTIC Archive, Stolarczyk, Larry G, AIR FORCE RESEARCH LAB HANSCOM AFB MA SPACE VEHICLES...
This monograph examines the challenges of defending vital Combat Service Support (CSS) assets at the brigade level. The self defense mission inherent for Forward Support Battalions is evaluated to determine if current doctrine is adequate. Self defense missions are difficult for support units in the dispersed brigade support area, especially given their low combat power. After defining the question and methodology used for the study, this monograph examines the evolution of German defense...
Topics: DTIC Archive, Bellini, Mark A, ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS SCHOOL OF...
This report documents the results of a survey aimed at the identification and evaluation of new materials or techniques which could potentially advance the state-of-the-art in intrusion detection and perimeter surveillance systems. The emphasis here is not on complete systems but is concerned for the most part with the transduction phenomena, that is, the conversion of some intrusion generated disturbances into an output signal. The targets of interest in considering sensors or transduction...
Topics: DTIC Archive, Peters, Wendell R, SOUTHWEST RESEARCH INST SAN ANTONIO TX, *TRANSDUCERS,...
This research examines the risk to schoolchildren posed by hostile intruders and the implementation of a national school security standard designed to mitigate this vulnerability and evaluates the utility of innovative perimeter security strategies modeled to reduce risk while preserving the requisite academic environment. This project originated after the mass murder of 20 defenseless first-graders and six heroic faculty members at the Sandy Hook Elementary School in Newtown, Connecticut. A...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *SCHOOLS, *SECURITY, CASE STUDIES, DECISION...
Buckley AFB occupies approximately 3,283 acres (1,328 hectares) adjacent to the City of Aurora, Colorado. The Buckley AFB perimeter road follows the boundary fence and the condition of the road varies with the location. The road is approximately 10 feet wide and 70,785 feet (13.4 miles) long. In some places, the road is just soil that is graded periodically and in other locations, an aggregate from recycled concrete and asphalt has been laid down and packed to provide a hardened surface (a...
Topics: DTIC Archive, Cruz-Gonzales, Carlos R, SPACE WING ( 460TH) BUCKLEY AFB CO, *ROADS,...
This thesis illuminates the nature of the United States security commitment to the Republic of Korea by analyzing its origin. It is concluded that the commitment is a function of the American approach to foreign policy, and especially US-Soviet relations, more than of any intrisically vital US interests in Korea. Korea policy from 1945 to 1953 is analyzed in terms of a debate between proponents of differing approaches to commitment. The seeming inconsistency between the 1949 troop withdrawal...
Topics: DTIC Archive, Porfert, Gary J, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *FOREIGN POLICY, *WESTERN...
Pursuant to provisions of the National Environmental Policy Act (NEPA), 42 U.S. Code 4321 et seq, implementing Council on Environmental Quality (CEQ) Regulations, 40 Code of Federal Regulations (CFR) 1500-1508, and 32 CFR Part 989, Environmental Impact Analysis Process (EIAP), the U.S. Air Force (Air Force) conducted an assessment of the potential environmental consequences of installing a new eight-foot high chain-link perimeter fence and demolishing two sheds and two water tanks. This...
Topics: DTIC Archive, PB AND A INC AUSTIN TX, *DEMOLITION, *FENCES, *SECURITY, *SPACE STATIONS, *WATER...
The primary objective of the OCU and Payload Committee (OPC) within the Joint Architecture for Unmanned Systems (JAUS) working group is to assess the JAUS Reference Architecture (RA) specification's ability to address interoperability. The OPC was tasked to evaluate new messages and protocols before accepting them into the RA. To accomplish these objectives, the OPC conducted several experiments for collection of information on current and recommended approaches. The latest experiment,...
Topics: DTIC Archive, Clark, M N, HARRIS CORP MELBOURNE FL, *TEST AND EVALUATION, *VERIFICATION,...
This report briefly covers the tactical situation in the Ben Het area during May and June 1969--the enemy threat and the Allied defense. It describes USAF operations in the defense of Ben Het in detail, largely as seen through the eyes of those involved, along with the problems encountered and lessons learned.
Topics: DTIC Archive, Montagliani, Ernie S, PACIFIC AIR FORCES HICKAM AFB HI CHECO DIV, *AIR POWER, *SOUTH...
The National Environmental Policy Act of 1969 (NEPA) requires preparation of an Environmental Assessment (EA) by the responsible federal agency for certain projects. Details of the preparation of this EA are mandated by the Council of Environmental Quality (CEQ) in the series of regulations 40 CPR 1500-1508 as mandated by NEP A. This project is sufficient to require an EA which will be available for inspection in Rm. 216 of Bldg 4300 at DMAFB, 355 CES/CEV A. Notice of this availability will be...
Topics: DTIC Archive, 355TH CIVIL ENGINEER SQUADRON DAVIS-MONTHAN AFB AZ, *AIR FORCE FACILITIES,...
The original KSOS verification goals were the following: The instantiation of the multilevel security model to SPECIAL; The design and development of a computer tool (the MLS formula generator) whose input would be SPECIAL specifications, and whose output would be conjectures, the proof of which would imply that the specifications do not contaim any violations of the multilevel security model; The proofs that the specifications for the KSOS security perimeter (Kernel and NKSR) conform to the...
Topics: DTIC Archive, FORD AEROSPACE AND COMMUNICATIONS CORP PALO ALTO CA WESTERN DEVELOPMENT LABS DIV,...
Successful senior leadership in the Army is strengthened based on the quality of professional relationships and role models provided between senior and junior officers. Senior leaders were developed by their experiences, and they must set the example for those who follow. This paper explores one example of the effects of modeled leadership on the professional development of an important U.S. strategic leader: General Walton H. Walker as demonstrated during his defense of the Pusan Perimeter in...
Topics: DTIC Archive, Nowowiejski, Dean A, ARMY WAR COLL CARLISLE BARRACKS PA, *PERIMETERS(DEFENSE), *ARMY...
As part of its work under Contract Number DAAK70-81-C-0024 with the U.S. Army Mobility Equipment Research and Development Command (MERADCOM), Mission Research Corporation (MRC) developed several concepts for lighting and ground cover configurations with potential for improving performance of guards at the perimeter of high security installations. The purpose of the tests was to demonstrate improvement, or lack of improvement, while using selected configurations. Candidate configurations and...
Topics: DTIC Archive, Scott, R. C., MISSION RESEARCH CORP SANTA BARBARA CA, *LIGHTING EQUIPMENT, *INTRUSION...
As the Naval Postgraduate School's (NPS) computer network continues to incorporate computers with a wide variety of security holes, it is vital that an Internet firewall be installed to provide perimeter security for NPS from the Internet. NPS has had systems compromised by unauthorized individuals who have gained access via the Internet. The approach taken by this thesis was to analyze the type of Internet firewalls available and chose a design that provides the protection required at NPS...
Topics: DTIC Archive, Schivley, Jody L., NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF COMPUTER SCIENCE,...
The US Air Force is the world's preeminent air, space, and cyberspace force. Its mission is to fly, fight, and win, and it does this better than any other air force in the world. Since the inception of airpower, airmen have struggled with the dilemma of how to protect their capability to fly, fight, and win when their aircraft are removed from their natural environment of the air and returned to the ground, where they become vulnerable like any bird of prey. Air Force basic doctrine states, Air...
Topics: DTIC Archive, AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST, *AREA DEFENSE, *GROUND BASED, AIR...
For military base perimeter protection, sensors are being developed and deployed to provide an alarm for intrusions. These alarm systems can also provide some level of target classification, but the need to display imagery for human assessment of most target threats following an alarm is a well recognized requirement. This assessment must be accomplished with minimum delay and under both day and night illumination conditions. At night, it is desirable to avoid the use of artificial...
Topics: DTIC Archive, Cantella,M J, RCA GOVERNMENT SYSTEMS DIV BURLINGTON MA, *INFRARED DETECTION, *VISUAL...
FIBLOC denotes a fiber optic intrusion location sensor system, it is based on a U.S. patent held by ANRO Engineering, Inc., and the FIBLOC trademark has been allowed. The physical basis of the sensor rests on the (phase) sensitive interference phenomena which govern propagation of an off-axis optical/infrared beam through a graded index fiber. A demonstration FIBLOC system, 100 meters in length and capable of localizing points of intrusion within 10 meters was constructed. The processor yields...
Topics: DTIC Archive, Ross, Gerald F, ANRO ENGINEERING INC LEXINGTON MA ELECTRONICS DIV, *INFRARED...
Pursuant to provisions of the National Environmental Policy Act (NEPA) , 42 U.S . Code 4321 et seq , implementing Council on Environmental Quality (CEQ) Regulations, 40 Code of Federal Regulations (CFR) 1500-1508, and 32 CFR Part 989, Environmental Impacr Analysis Process (EIAP), the U.S. Air Force (Air Force) conducted an assessment of the potential environmental consequences of constructing a storage facility, upgrading the perimeter security fence and demolishing the existing storage shed....
Topics: DTIC Archive, PB AND A INC AUSTIN TX, *ENVIRONMENTAL ASSESSMENT, *FACILITIES, *FENCES, *SECURITY,...
There is something about a defensive fight by an outnumbered small unit that stirs national pride and interest. The Russians have the Battle for Hill 3234, a small, bitterly contested mountain fight that was a near-run thing, yet part of one of the most successful operations of the Soviet-Afghan War -- Operation Magistral. Indeed, this combat by an under-strength 39-man paratrooper company has inspired the popular movie and computer game 9th Company. The 9th Company of the 3rd Battalion, 345th...
Topics: DTIC Archive, FOREIGN MILITARY STUDIES OFFICE (ARMY) FORT LEAVENWORTH KS, *AFGHANISTAN, *BATTLES,...
Traditional network architectures rely on boundary protection mechanisms to prevent malicious actors from gaining access to systems that host sensitive or mission critical data. Historical examples, however, demonstrate that a determined adversary with sufficient resources can establish footholds internal to the network. Leveraging these footholds, the adversary may maneuver within the network with impunity; largely due to the lack of network monitoring and alert correlation. To combat this...
Topics: DTIC Archive, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH, *AIR DEFENSE, *COMMAND AND...
A review of those methodologies and areas of Department of Defense, USAMERADCOM, PM REMBASS, Navy NESEA support activities for the physical security/counter intrusion requirements at the 1980 Winter Olympic Games, 'Olympic Village', Ray Brook, N.Y. Major support activities were furnished to the New York State Police (NYSP) as primary response/reaction force, with DoD elements serving in maintenance, logistic and technical suport role. (Author)
Topics: DTIC Archive, Curcie,Sanford C, ANALYTICS INC TINTON FALLS NJ, *SECURITY, LOGISTICS SUPPORT,...
This program is an investigation of the effect of various soil compositions and frost conditions on performance of buried line transducers. The program encompasses theoretical modeling of transfer function of a MILES-type line transducer, controlled experiments in loam, clay and sand soils for various frost conditions, and correlations between theory and experiment. Experiments were conducted in an indoor test facility where frost conditions could be produced. Response of transducers was...
Topics: DTIC Archive, Starr,J B, HONEYWELL INC HOPKINS MINN GOVERNMENT AND AERONAUTICAL PRODUCTS DIV,...
A study was performed to define candidate electro-optical and infrared (EO/IR) sensor configurations and assess their potential utility as small UAV-based sensors surveilling a perimeter around surface fleet assets. Requirements were identified, CONOPS defined, sensor spectral bands and attributes derived, sensor performance assessed over canonical Navy littoral environments, at-sea test data collected, processed and analyzed, and technology recommendations formulated. These topics are...
Topics: DTIC Archive, Buss, James R, OFFICE OF NAVAL RESEARCH ARLINGTON VA, *INFRARED DETECTION,...
A West German catchment the River Haune, has been established as a validation base for HYMO 2. On this catchment, an initial study has been completed of the relative effects of many storms on resultant catchment outflow hydrographs. This study is an essential element of the model/data development programme. We aim to specify the precipitation input needs (in time and space) for selected applications of HYMO 2 within the next twelve months. An initial study of an approach to land use...
Topics: DTIC Archive, Anderson,Malcolm G, BRISTOL UNIV (ENGLAND), *WATERSHEDS, *MATHEMATICAL MODELS, LAND...
The Boles Wells Field Perimeter Security Improvement Project is proposed to provide clear boundary demarcation, and to delay and deter trespass, for the Boles Wells Field of the Boles Wells Water System Annex (BWWSA) of Holloman Air Force Base. Located approximately 5 miles south of downtown Alamogordo, NM, adjacent to the western foothills of the Sacramento Mountains, the primary purpose of the BWWSA is to provide a safe source of potable water for HAFB. The Boles Wells property is the...
Topics: DTIC Archive, 49TH CIVIL ENGINEER SQUADRON HOLLOMAN AFB NM, *AIR FORCE FACILITIES,...
This paper describes Textron's remote unattended ground-based surveillance system called Terrain Commander and its major field sensing component called OASIS (Optical Acoustic Satcom Integrated Sensor). Terrain Commander is a powerful new concept in surveillance and remote situational awareness. It leverages a diverse suite of sophisticated unattended ground sensors, day/night electro-optics, satellite data communications, and an advanced Windows based graphic user interface. Terrain Commander...
Topics: DTIC Archive, Steadman, Bob, TEXTRON DEFENSE SYSTEMS WILMINGTON MA, *TRACKING, *TARGET DETECTION,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes tests of a portable VHF Intrusion Detection System that were carried out in conjunction with a C-5A aircraft. The system consisted of a leaky coaxial cable surrounding the aircraft that acted as a distributed antenna, monopole antennas located within the cable perimeter that received the radiated signal, and electronic signal, and electronic signal processing equipment. The tests demonstrated the feasibility of using this system to: (1) protect the C-5A aircraft in the up...
Topics: DTIC Archive, Karas, Nicholas V., ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *JET TRANSPORT...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
This report describes the results of the evaluation of an RF intruder detection technique developed to protect individual resources. Tests were conducted at Dover AFB, Delaware, in conjunction with parked C-5A aircraft, and were designed to determine some specific characteristics of performance. The system consisted of a leaky coaxial cable, surrounding the aircraft, that acted as a distributed antenna; monopole receiver antennas located within the cable perimeter; and appropriate electronic...
Topics: DTIC Archive, Poles, Livio D, ROME AIR DEVELOPMENT CENTER GRIFFISS AFB NY, *RADAR EQUIPMENT,...
The Surrogate Remote Sentry (SRS) system is an Advanced Technology Demonstration (ATD) for the Rapid Force Projection Initiative (RFPl). The device consists of a remotely controlled surveillance system used to monitor approaching enemy vehicles on the battlefield for perimeter defense applications. The surveillance system is made up of a compact integrated multisensor system capable of being implanted behind enemy lines to provide day or night unmanned surveillance and targeting information....
Topics: DTIC Archive, Fong, Manfai, ARMY RESEARCH LAB ADELPHI MD, *ACOUSTIC DETECTION, *ACOUSTIC...