Electronic Bulletin / Number 51 - September, 2008

Versión Español

Harmful interference location methods

In the process of identifying mainly unauthorized transmissions, the following techniques or methods can be used: geolocation and verification of transmissions, which are the most widely accepted and valid for satellite operators to identify the source generating these transmissions.

1. Geolocation

It is a technique that makes it possible to geographically locate a terrestrial station that is emitting a transmission to a specific satellite, whether an unauthorized transmission or, in general, some interference associated with breakdowns in station equipment or human error.

The result of this geolocation is generated in terms of latitude and longitude with an accuracy that is typically under 10 km, that is, the terrestrial station that is transmitting the geolocated signal is generally less than 10 km away from the coordinates obtained in the geolocation process.

This technique was scientifically developed more than 20 years ago and is used by the main satellite operators internationally, and it has proven its high degree of reliability in many different cases.

The following diagram illustrates the concept of this technique of geolocation, as described below:

The unknown transmitter antenna is aimed at the interfered satellite, transmitting most of its energy through the main lobe and a smaller part of its energy through the side lobes, which reaches adjacent satellites at a very low level.

When the original signal is transmitted to two satellites that are located in different orbital positions (the interfered satellite and the adjacent satellite), the signal travels different distances to reach the two adjacent terrestrial stations to simulate one single monitoring point indicated on the diagram as “Receiving stations of both satellites,” which involves a time difference of arrival (TDOA) on the order of µs.

Likewise, the signal experiences a frequency difference of arrival (FDOA) on the order of Hz, which is shown by the Doppler effect generated between the two satellites.

These parameters, TDOA and FDOA, are processed in the geolocation system and are represented by two lines that, depending on the satellites used, intersect in an area inside the interfered satellite’s coverage, thus tracing an ellipse with central geographical coordinates that indicate the zone where the terrestrial station that is transmitting the unknown signal is located.

To achieve this, known signals have to be used to compare them with the unknown signal, and by a series of triangulations that the geolocation system itself processes, the corresponding ellipse, indicated below, can be obtained:

2. Verification of transmission of possible sources of harmful interferences

Once the ellipse has been obtained, there is a point of departure inside the satellite coverage to find the interference, and the following step by the satellite operator to try to find the source generating this interference is to contact its customers in the zone to check their transmissions.

In most cases of accidental interferences because of equipment breakdown or human errors, it is probable that contact by phone and maybe testing by switching the equipment off and on may identify the station that generates the interference in order to subsequently take the relevant remedial actions.

Nevertheless, in the case of unauthorized transmission being dealt with here, it is difficult to contact by phone the responsible person in the terrestrial station because the operator of the terrestrial station shall not accept any responsibility.

Once the above has been accomplished, the satellite operators shall report it to the Regulator and shall draw up a solution strategy, investigating the origin of said unauthorized transmission. The Regulator shall use its own search methods, with the participation of the affected satellite operator, who shall be able to provide technical assistance and human resources with specialized brigades in detecting harmful interferences.

Verification via horn antennas

In some cases, transmissions from a terrestrial station can be verified without any physical connection to the station’s ascending chain, including the possibility of obtaining samples from said transmissions although from a location outside the station’s facilities.

This method is illustrated and described below:

This method uses a spectrum analyzer and a horn antenna operating in the frequency range of interest, which for this type of verification would be the transmission frequency to the satellite in the corresponding operation band.

The idea is to be sufficiently close to the transmitting antenna, whether by land or by air, to be able to receive the uplink frequency of the interfering carrier or signal that is present on the satellite and that is monitored on the downlink frequency by the satellite operator.

By comparing the spectrum form of the interfering carrier or signal observed in this verification of transmissions with the reference chart of the satellite downlink, one can be sure that it is the transmitting station that one is looking for:

Conclusions

The transmission geolocation and verification methods described in the present document are reliable enough to help identify the source generating unauthorized transmissions and interferences by radiofrequency on satellite communications.

 

Alonso Picazo
Chair

Sub Working Group on Harmful
Interference to Satellite Systems

 

Additional Information: Resolution CCP.II/RES. 35(VIII-06).

 


© Copyright 2008. Inter-American Telecommunication Commission
Organization of American States.
1889 F St., N.W., Washington, D.C. 20006 - United States
Tel. (202)458-3004 | Fax. (202) 458-6854 | [email protected] | http://citel.oas.org

To unsubscribe please follow this link: [email protected]