https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


IWCE: Tektronix launches ‘signal hunter’ for surveillance, security sectors

IWCE: Tektronix launches ‘signal hunter’ for surveillance, security sectors

LAS VEGAS--Tektronix unveiled at IWCE 2008 its new RFHawk, a digital handheld device that hunts, locates and classifies both analog and digital rogue radio frequency transmissions. It is targeted to the surveillance and security sector, where speed is paramount, said Bob Hiebert, Tektronix’ general manager for wireless test solutions in an interview this week with MRT
  • Written by Urgent Communications Administrator
  • 27th February 2008

LAS VEGAS–Tektronix unveiled at IWCE 2008 its new RFHawk, a digital handheld device that hunts, locates and classifies both analog and digital rogue radio frequency transmissions. It is targeted to the surveillance and security sector, where speed is paramount, said Bob Hiebert, Tektronix’ general manager for wireless test solutions in an interview this week with MRT.

“The sooner they can find the bad guy, the sooner they can prevent a bad thing from happening,” Hiebert said.

The handheld nature of the RFHawk makes it a nimbler solution compared with other scanners and analyzers, according to Hiebert.

“A lot of this is about not having 20 or 30 people, each with a hundred-thousand-dollar piece of equipment in the back of a van, but how do you get two or three people in a particularly hostile area to quickly sort through what’s there and look for what shouldn’t be there.”

The RFHawk had been in development for three years. Tektronix got the idea for the device when it learned that the military had adapted spectrum scanners and analyzers the company had developed for the cellular market to use for surveillance applications, Hiebert said.

“So we spent some time talking to that marketplace and understanding what their needs were,” Hiebert said. “We had on our road map the desire to build a next-generation spectrum analyzer that went to higher frequencies, but we decided to … take what we knew about ruggedized, portable field tools—that can run for 6-8 hours and be dropped off a cell tower—and build an application base for the surveillance market.

“With the spending going on in security and [anti-]terrorism activities, that looked like a good place to go.”

The growth of digital wireless technology has caused a major headache for the surveillance and security sectors, because so much RF spectrum is being used that it has become increasingly difficult to distinguish between legitimate and illegitimate transmissions, Hiebert said.

“In the past, you could find a bad guy by the presence of an RF signal. The problem now is that there’s so much RF spectrum being used that distinguishing between what’s supposed to be there versus what’s not supposed to be there is really difficult,” Hiebert said. “Secondly, the nature of the digital signals themselves mask their true nature. CDMA is a derivative of military spread spectrum, which was developed as a way to avoid detection.”

A real-world example of a crowded RF landscape where it is challenging to determine which signals shouldn’t be there can be found in Iraq, where the U.S. Army now finds itself in a bit of a quandary. Insurgents have been using a wide variety of wireless devices—including cellular phones, cordless phones and garage-door openers—to detonate improvised explosive devices, or IEDs. To combat this, the Army has been engaged in the wholesale jamming of RF signals. But this has resulted in an unwanted byproduct: the jamming also has been affecting the Army’s own transmissions. (“Army’s jamming strategy blows up,” MRT March)

The RFHawk not only would hunt for such illegitimate transmissions and ferret them out, it would help users create a profile, so they would have a better idea of what they were looking for in the future, according to Hiebert.

“When [an IED] goes off, they can capture [the transmission] to see what it looks like, so they can characterize the signal that triggered the detonation,” he said.

There are other examples much closer to home. For instance, drug traffickers use illegitimate transmissions to converse with each other along the U.S./Mexico border, Hiebert said. Other examples can be found in U.S. prisons.

“They’re actually looking for crime lords that are running their empires from behind bars,” Hiebert said. “They get their electronics confiscated, but somebody smuggles them a cell phone.”

In addition, the RFHawk searches for intentional transmitters (i.e., jammers), as well as listen-only devices—e.g., receivers that eavesdrop, for nefarious purposes, on another entity’s legitimate transmissions. Then there are intermittent transmitters, whose history dates back decades.

“If you go back to World War II, the French Underground had a technique where they knew at what time, and on what day of the week, to turn on their radio transmitters to broadcast a message to the Allies,” Hiebert said, adding that digital technology has made locating intermittent transmitters more challenging. “You can turn on and turn off in much shorter bursts to uplink data. So trying to find those transmitters that aren’t on all the time is more difficult.”

The RFHawk’s location capability is provided via a mapping application. However, it is the device’s ability to classify the signals that makes it truly unique, according to Hiebert. “This is the magic,” he said.

The device uses spectral correlation analysis to compare identified signals with known signal types in the area. RFHawk users can visually compare the shape of the questionable signal with the shape of known signals in the area to determine whether the questionable signal is indeed a problem.

“You can think of this as an RF-fingerprinting tool,” Hiebert said.

When a signal is determined to be a threat, the RFHawk pinpoints the location, aided by the device’s directional antenna and its ability to generate signal-strength readings that are linked to GPS and in-building maps, which enables rapid narrowing of the search area. In addition, the RFHawk, which lists for $38,900, logs and stores measurement data for each rogue signal that’s identified.

Tags: Call Center/Command

Most Recent


  • Diffusing the connected car's ticking data-privacy timebomb
    Connected and autonomous vehicles (CAVs) collate a significant amount of data to ensure vehicle safety, requiring an always-on internet connection and hundreds of sensors. An entire industry has been developed around monitoring, logging, analyzing and monetizing it. Yet, the danger is, particularly with increasing cyber-attacks, that this data could end up being leaked and stolen. […]
  • Patch madness: Vendor bug advisories are broken, so broken
    BLACK HAT USA – Las Vegas – Keeping up with security-vulnerability patching is challenging at best, but prioritizing which bugs to focus on has become more difficult than ever before, thanks to context-lacking CVSS scores, muddy vendor advisories, and incomplete fixes that leave admins with a false sense of security. That’s the argument that Brian […]
  • IWCE: Tektronix launches ‘signal hunter’ for surveillance, security sectors
    Newscan: D.C. appeals court upholds FCC decision to share 5.9 GHz V2V spectrum with Wi-Fi
    Web Roundup Items from other news organizations D.C. appeals court upholds FCC decision to share 5.9 GHz V2V spectrum with Wi-Fi Auto industry lost its spectrum fight with FCC because V2V was always a fantasy FCC, FEMA raise alarm bells about vulnerabilities in Emergency Alert System Gigi Sohn’s backers dismiss call for different FCC nominee […]
  • Researchers developing health-monitoring e-tattoo
    Stories of people embedding digital devices into their bodies are becoming increasingly common; with these digital implants capable of everything from aiding mobility to paying for products, unlocking doors and storing data. A team of researchers from the Korea Advanced Institute of Science and Technology have taken a similar concept and applied it to the […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Private wireless networks in the US start going public
  • Microsoft patches 6 zero-day vulnerabilities under active attack
  • IoT connectivity spending climbs as COVID-19 cases decline
  • The battle over connected cars drags on

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Diffusing the connected car’s ticking data-privacy timebomb dlvr.it/SWdCw2

14th August 2022
UrgentComm

Patch madness: Vendor bug advisories are broken, so broken dlvr.it/SWcvFR

14th August 2022
UrgentComm

What the 6 GHz band might mean to fixed-wireless access dlvr.it/SWctfk

14th August 2022
UrgentComm

FirstNet PTT technical progress highlighted by AT&T at APCO 2022 dlvr.it/SWZtNJ

13th August 2022
UrgentComm

Newscan: D.C. appeals court upholds FCC decision to share 5.9 GHz V2V spectrum with Wi-Fi dlvr.it/SWZQpx

13th August 2022
UrgentComm

Cisco confirms data breach, hacked files leaked dlvr.it/SWV8l9

12th August 2022
UrgentComm

Researchers developing health-monitoring e-tattoo dlvr.it/SWV749

12th August 2022
UrgentComm

Partnership launches no-cost wastewater monitoring service for local governments dlvr.it/SWV5PK

12th August 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X