{"title":"在信息活动对象上探测无线电广播的方法","authors":"M. O. Voronin","doi":"10.31673/2409-7292.2022.040010","DOIUrl":null,"url":null,"abstract":"The threat of radio interception devices intercepting confidential acoustic speech information at the objects of information activity and the methods of detecting radio emissions of these devices using radio control tools are considered. The main principles of the construction of radio monitoring systems of electromagnetic radiation, their functionality, the algorithm of the method of detection of activated radio jamming devices are given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods of detecting radio broadcast at objects of information activity\",\"authors\":\"M. O. Voronin\",\"doi\":\"10.31673/2409-7292.2022.040010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The threat of radio interception devices intercepting confidential acoustic speech information at the objects of information activity and the methods of detecting radio emissions of these devices using radio control tools are considered. The main principles of the construction of radio monitoring systems of electromagnetic radiation, their functionality, the algorithm of the method of detection of activated radio jamming devices are given.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.040010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.040010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Methods of detecting radio broadcast at objects of information activity
The threat of radio interception devices intercepting confidential acoustic speech information at the objects of information activity and the methods of detecting radio emissions of these devices using radio control tools are considered. The main principles of the construction of radio monitoring systems of electromagnetic radiation, their functionality, the algorithm of the method of detection of activated radio jamming devices are given.