{"title":"The Livermore secure-voice radio system","authors":"C. E. Davis","doi":"10.1109/CCST.1988.76003","DOIUrl":null,"url":null,"abstract":"Lawrence Livermore National Laboratory has designed and installed a security radio system that protects sensitive radio traffic against interception and deception while providing full radio coverage of the desired service area. The interception often includes penetration into buildings and heavily-shielded basement areas. The system is protected from possible assault or natural disasters. Expansion, flexibility, and integration of the control system with the security command console have been provided for. The system uses digital voice encryption throughout a system of receiver voting, VHF repeaters, and slotted transmission line for building penetration. It achieves redundancy and system protection by the use of backup antenna sites, secondary radio channels, a standby control system, and special electronics to monitor and control operation of the field units.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1988.76003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Lawrence Livermore National Laboratory has designed and installed a security radio system that protects sensitive radio traffic against interception and deception while providing full radio coverage of the desired service area. The interception often includes penetration into buildings and heavily-shielded basement areas. The system is protected from possible assault or natural disasters. Expansion, flexibility, and integration of the control system with the security command console have been provided for. The system uses digital voice encryption throughout a system of receiver voting, VHF repeaters, and slotted transmission line for building penetration. It achieves redundancy and system protection by the use of backup antenna sites, secondary radio channels, a standby control system, and special electronics to monitor and control operation of the field units.<>