Вы находитесь на странице: 1из 2

Drone Survival Guide

Surveillance Attack Military surveillance Domestic surveillance Consumer

For Unofficial use only Global Drone deployment U.S. Military Englis ! "as to

#$st century bird%atc ing


&ur ancestors could spot natural predators from far by t eir sil ouettes. Are %e e'ually a%are of t e predators in t e present(day) Drones are remote(controlled planes t at can be used for anyt ing from surveillance and deadly force* to rescue operations and scientific researc . Most drones are used today by military po%ers for remote(controlled surveillance and attack* and t eir numbers are gro%ing. + e Federal Aviation Administration ,FAA- predicted in #.$# t at %it in #. years t ere could be as many as /..... drones flying over U.S. Soil alone. As robotic birds %ill become commonplace in t e near future* %e s ould be prepared to identify t em. + is survival guide is an attempt to familiarise ourselves and future generations* %it a c anging tec nological environment. + is document contains t e sil ouettes of t e most common drone species used today and in t e near future. Eac indicating nationality and % et er t ey are used for surveillance only or for deadly force. All drones are dra%n in scale for si0e indication. From t e smallest consumer drones measuring less t an $ meter* up to t e Global 1a%k measuring /2*2 meter in lengt . +o keep t is document %idely available it can be do%nloaded in .pdf or .doc format. 3e% translations %ill be made available over time. D4SC5A4ME6 + is document is for information purposes only* %it t e intent of free distribution of publicly available information. 7e do not condone violent or destructive be avior against people or property in any %ay or form. All content may be freely s ared* adapted* and translation for non( commercial purposes. Available for free on t e %ebsite. %%%.dronesurvivalguide.org

1iding from Drones


Drones are e'uipped %it e8tremely po%erful camera9s % ic can detect people and ve icles at an altitude of several kilometers. Most drones are e'uipped %it nig t vision* and!or infrared vision camera9s* so(called F546 sensors. + ese can see uman eat signatures from far a%ay* day or nig t. 1o%ever t ere are %ays to ide from drones. $. Day camouflage: 1ide in t e s ado%s of buildings or trees. Use t ick forests as natural camouflage or use camouflage nets. #. 3ig t camouflage: ide inside buildings or under protection of trees or foliage. Do not use flas lig ts or ve icle spot lig ts* even at long distances. Drones can easily spot t is during nig t missions.

/. 1eat camouflage: Emergency blankets ,so(called space blankets- made of Mylar can block infrared rays. 7earing a space blanket as a ponc o at nig t %ill ide your eat signature from infrared detection. Also in summer % en t e temperature is bet%een /;<C and =.<C* infrared camera9s cannot distinguis bet%een body and its surroundings. =. 7ait for bad %eat er. Drones cannot operate in ig %inds* smoke* rainstorms or eavy %eat er conditions. >. 3o %ireless communication. Using mobile p ones or G"S based communication %ill possibly compromise your location. ;. Spreading reflective pieces of glass or mirrored material on a car on a roof %ill confuse t e drone9s camera. ?. Decoys. Use manne'uins or uman(si0ed dolls to mislead t e drone9s reconnaissance.

1acking Drones
Drones are remote controlled. + e pilots operating t e drone can be t ousands of kilometers a%ay at Ground Control stations. + e control link is t e satellite transmitted datalink by % ic t e pilot controls t e plane. @y Aamming or intercepting t e datalink* one can interfere %it t e drones controls. + e data link can be encrypted but often is not. $. 4nterception. A sop isticated tec ni'ue is using sky grabber soft%are %it a satellite dis and a +B tuner to intercept t e drone9s fre'uencies. Communication from and to t e drone can be intercepted. #. 4nterference. @y broadcasting on different fre'uencies or pack of fre'uencies t e link bet%een t e drone pilot and t e drone can be disconnected. /. G"S spoofing. Small* portable G"S transmitters can send fake G"S signals and disrupt t e Drones navigation systems. + is can be used* for e8ample* to steer drones into self( destruction flig t pat s or even iAack t em and land t em on a run%ay. Sources: C1ealt 6anger9s intelligence analysis of military drones: payloads* countermeasures and more9* %%%.naturalne%s.com* Duly $;* #.$#. @y Mike Adams C+ e Al(Eaida "apers ( Drones9* + is document is one of several found by + e Associated "ress in buildings recently occupied by al(Eaida fig ters in +imbuktu* Mali. Associated "ress* Feb #.$/. CEvading + ermal 4maging And 6adar Detection9* United States Militia* Special Forces.

Вам также может понравиться