Read Time:1 Minute, 8 Second

Komor

Mission

The Komor electromagnetic stationary submarine detection system is designed to control the sea-situation to ASW border.

Features

  • detecting undersea targets by their electromagnetic/magnetic fields;
  • calculation their coordinates and moving direction;
  • classification of the detected underwater targets at controlled borderlines;
  • automatic transmission the submarine coordinates to coastal control post.

Composition

  • remote undersea equipment, including sea-bottom modules, relay units, and cable-antenna;
  • equipment of the coastal control post including receiver, data display and control unit.

Capabilities

The electromagnetic border is line of the sea-bottom detection modules. It is activated alarm signal when target crosses controlled borderlines. The antenna generates a primary electromagnetic field (illumination field). When an underwater object crosses it, the system generates a secondary electromagnetic field recorded by the antennae. The recorded data is transmitted to the onshore post.

Advantages

  • highly covert due to the undersea electromagnetic detection capability;
  • automatic operation (registration of current situation, display of intrusions on onshore post monitor, and sound alarm);
  • high anti-interference ability;
  • relatively low cost;
  • possibility of integration into complete situational awareness systems

Main characteristics

Length of the detection border, km

up to 100

Antenna range from coastline, km

up to 75

Setting depth, m

30-400

Accuracy of the coordinates measurement, m

±500

Submarine detection probability

at least 0,9

Operators

1

Onshore post area, m2

10

Detection range, km

up to 100

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: