AIRPORT-SHIELD - Protection against radio interferences in airports

Brief Overview

Modern airports are crowded with several types of RF signals, distributed over a wide range of frequencies.


Airports’ signals, communication, radio navigation and precise landing systems are critical for the safety and the security of airport activities and airborne operations. Unfortunately, at the same time unauthorised communications and interferences can easily be generated with a dramatic impact on airworthiness.


AIRPORT-SHIELD provides the capability to monitor the entire electromagnetic environment in the aerodrome and to detect and geolocalise with high accuracy the source of interferences.



  • Automatic RF interference and unauthorised transmissions detection and geolocalisation
  • Protection of communications integrity in airports, ports and strategic sites
  • ITU-R automatic spectrum measurements, monitoring of communications quality and conformity to regulations (including ICAO in airports)
AIRPORT-SHIELD Graphical User Interface AIRPORT-SHIELD Graphical User Interface

Concept of Operations

AIRPORT-SHIELD can operate in “Interference Identification” mode or in “Continuous Surveillance” mode.


Interference Identification: during normal airport operations, control tower operators, air traffic controllers or aircraft crews may encounter difficulties using communication systems and navaids.

Procedure requires that the Control Tower is informed of such an event. It is at this point that AIRPORT-SHIELD enters into action. After selecting in AIRPORT-SHIELD the radio channel affected by the interference or the specific malfunctioning navaids, AIRPORT-SHIELD verifies the presence of interfering signals and identifies the position of the source.


The Control Tower can then send security guards to the exact position which the interference comes from. At the same time, AIRPORT-SHIELD checks that the airport systems emit RF signals which conform to specifications (for example, ICAO regulations). This operation is necessary to exclude cases of fake interference due to malfunctioning airport equipment.


Continuous Surveillance: in this mode AIRPORT-SHIELD continuously monitors the electromagnetic environment around the airport and compares it with the alarm database. In this database, the operators can insert a list of authorized and unauthorised signals, specifying for each one their respective parameters (e.g. frequency, modulation, power, emitter position, spectral mask etc.). If AIRPORT-SHIELD detects abnormalities, it will immediately send a notification to the personnel responsible.


Continuous Surveillance mode, therefore, allows continuous and automatic monitoring to define whether the regulations regarding use of radio devices in airport environments are being respected as well as monitoring the efficiency of airport communication and navigation systems.

AIRPORT-SHIELD Interference Detection Sensor AIRPORT-SHIELD Interference Detection Sensor

General Features

  • Standard Frequency Coverage (frequency extension options available):
    • Monitoring: 9 kHz - 6 GHz
    • Direction Finding 20 MHz - 6 GHz
  • Standard Instantaneous Bandwidth: 24 MHz
  • High Instrument DF accuracy: ≤ 0.5 RMS @ SNR = 10 dB
  • DF-while-Scan technology for monitoring and DF of multiple signals at the same time (key feature for short transmissions DF)
  • Single channel, multi-channel and frequency range monitoring
  • Completely customizable channel bandwidth (including 6.25, 8.33, 12.5 and 25 kHz)
  • Automatic surveillance based on user defined alarm plans (e.g. frequency, modulation, power, signal parameters, emitter position, etc.)
  • Automatic spectral mask analysis for ICAO compliancy
  • Alarm parameters and signal recording for further off-line investigations
  • Network centric installation using combined, fixed, transportable and mobile monitoring units
  • 2D and 3D map with easy to use Graphical Interface

System Options

  • GPS signal analysis for interference and spoofing detection
  • Precision approach (e.g. ILS) interference detection
  • Wide band RF spectrum recording
  • Planning software for optimal sensor positioning and configuration

System Architecture

AIRPORT-SHIELD is a geolocalisation network which consists of a certain number of Monitoring Units and a Control Centre. The Monitoring Units provides Lines of Bearing (LOB) to the Control Centre in order to triangulate and geolocalise the source of interference.

The number of Monitoring Units and their position is in accordance with the operative requirements, the installation constraints and the propagation conditions in the airport area. The Control Centre allows the operator to monitor the electromagnetic environment and to analyse the interference.


The Control Centre is equipped with a 2D and 3D map and an easy to use Graphical Interface.


It is not necessary to be a radio monitoring expert in order to operate AIRPORT-SHIELD.


AIRPORT-SHIELD Monitoring Units are based on RMS-DF-X, LOG.IN’s Intercept and DF family of systems. RMS-DF-X offers high dynamic range, high sensitivity and wide instantaneous bandwidth.


Standard frequency coverage is 9 kHz – 6 GHz but frequency extension options are available.


LOG.IN’s software application SMS-NET connects the Monitoring Units and provides the geolocalisation capability.


Click here to go to the RMS-DF-X page for additional information on the AIRPORT-SHIELD Monitoring Units.


AIRPORT-SHIELD Monitoring Units can be connected via a wired or wireless network.
Monitoring Units can be fixed, transportable or mobile.


Different types of DF antennas are available. An automatic calibration feature is also available.


LOG.IN has an extensive catalogue of solutions to meet even the most challenging operative requirements.

3 Monitoring Units Configuration 3 Monitoring Units Configuration

In accordance with English and Italian law it may be necessary for LOG.IN to obtain an export license from the Export Control Authority.


LOG.IN does not expect any difficulties in obtaining the export license but the final response can only be given from the authority after the system configuration, the content of the service and the End Customer have been clearly identified.

Quick Links

Privacy Policy