Skip to content
/ owsf Public

Open Weapon Site Finder, Best Digital Forensics Hack at Bitcamp 2019

License

Notifications You must be signed in to change notification settings

rytse/owsf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

63 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OWSF (Open Weapon Site Finder)

Intersections Intersection mapped out on Google Maps

We used the Google Earth Engine to pull data from the Sentinel1 satellite. We analyzed Sentinel's C-band radar data and looked for places where missiles' guidance radars cause consistent interference. We detected this low-power but consistent interference by tracking the pixels that were the "brighest" over the longest period of time. Using this multi-temporal analysis method, we were able to detect several types of military radar systems (more on this later), but by applying a clever polarimetry trick, we were able to isolate C-band phased array radars, which are most commonly used for Patriot surface-to-air missiles. Specifically, we analyzed the "bright spots" in each polarization, and noted that phased array radars interfere with each polarization differently. These differences allowed us to identify Patriot missiles by distinct X-pattern shown below. From images like these, we performed image processing to isolate the coordinates of the missile sites. While we did not have time to run our image processing payload on the entire Earth, we applied our methods to several geographic regions, including part so the US, the Middle East, Western Europe, and Eastern Asia. The sites that we found are indicated below on the map.

More information available on this project's website and DevPost.

Built With

Authors

About

Open Weapon Site Finder, Best Digital Forensics Hack at Bitcamp 2019

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published