0% found this document useful (0 votes)
174 views2 pages

Drone Survival Guide

This document provides information about drones, including how to identify and hide from them. It outlines different drone types used for surveillance and attacks, and how their use is increasing. It then gives suggestions for hiding from drones using camouflage, waiting for bad weather, avoiding wireless signals, and using decoys. The document also discusses potentially hacking drones by jamming their data link signals or using GPS spoofing to interfere with their navigation.

Uploaded by

vthiseas
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views2 pages

Drone Survival Guide

This document provides information about drones, including how to identify and hide from them. It outlines different drone types used for surveillance and attacks, and how their use is increasing. It then gives suggestions for hiding from drones using camouflage, waiting for bad weather, avoiding wireless signals, and using decoys. The document also discusses potentially hacking drones by jamming their data link signals or using GPS spoofing to interfere with their navigation.

Uploaded by

vthiseas
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Drone Survival Guide

Surveillance Attack Military surveillance Domestic surveillance Consumer

For Unofficial use only Global Drone deployment U.S. Military Englis ! "as to

#$st century bird%atc ing


&ur ancestors could spot natural predators from far by t eir sil ouettes. Are %e e'ually a%are of t e predators in t e present(day) Drones are remote(controlled planes t at can be used for anyt ing from surveillance and deadly force* to rescue operations and scientific researc . Most drones are used today by military po%ers for remote(controlled surveillance and attack* and t eir numbers are gro%ing. + e Federal Aviation Administration ,FAA- predicted in #.$# t at %it in #. years t ere could be as many as /..... drones flying over U.S. Soil alone. As robotic birds %ill become commonplace in t e near future* %e s ould be prepared to identify t em. + is survival guide is an attempt to familiarise ourselves and future generations* %it a c anging tec nological environment. + is document contains t e sil ouettes of t e most common drone species used today and in t e near future. Eac indicating nationality and % et er t ey are used for surveillance only or for deadly force. All drones are dra%n in scale for si0e indication. From t e smallest consumer drones measuring less t an $ meter* up to t e Global 1a%k measuring /2*2 meter in lengt . +o keep t is document %idely available it can be do%nloaded in .pdf or .doc format. 3e% translations %ill be made available over time. D4SC5A4ME6 + is document is for information purposes only* %it t e intent of free distribution of publicly available information. 7e do not condone violent or destructive be avior against people or property in any %ay or form. All content may be freely s ared* adapted* and translation for non( commercial purposes. Available for free on t e %ebsite. %%%.dronesurvivalguide.org

1iding from Drones


Drones are e'uipped %it e8tremely po%erful camera9s % ic can detect people and ve icles at an altitude of several kilometers. Most drones are e'uipped %it nig t vision* and!or infrared vision camera9s* so(called F546 sensors. + ese can see uman eat signatures from far a%ay* day or nig t. 1o%ever t ere are %ays to ide from drones. $. Day camouflage: 1ide in t e s ado%s of buildings or trees. Use t ick forests as natural camouflage or use camouflage nets. #. 3ig t camouflage: ide inside buildings or under protection of trees or foliage. Do not use flas lig ts or ve icle spot lig ts* even at long distances. Drones can easily spot t is during nig t missions.

/. 1eat camouflage: Emergency blankets ,so(called space blankets- made of Mylar can block infrared rays. 7earing a space blanket as a ponc o at nig t %ill ide your eat signature from infrared detection. Also in summer % en t e temperature is bet%een /;<C and =.<C* infrared camera9s cannot distinguis bet%een body and its surroundings. =. 7ait for bad %eat er. Drones cannot operate in ig %inds* smoke* rainstorms or eavy %eat er conditions. >. 3o %ireless communication. Using mobile p ones or G"S based communication %ill possibly compromise your location. ;. Spreading reflective pieces of glass or mirrored material on a car on a roof %ill confuse t e drone9s camera. ?. Decoys. Use manne'uins or uman(si0ed dolls to mislead t e drone9s reconnaissance.

1acking Drones
Drones are remote controlled. + e pilots operating t e drone can be t ousands of kilometers a%ay at Ground Control stations. + e control link is t e satellite transmitted datalink by % ic t e pilot controls t e plane. @y Aamming or intercepting t e datalink* one can interfere %it t e drones controls. + e data link can be encrypted but often is not. $. 4nterception. A sop isticated tec ni'ue is using sky grabber soft%are %it a satellite dis and a +B tuner to intercept t e drone9s fre'uencies. Communication from and to t e drone can be intercepted. #. 4nterference. @y broadcasting on different fre'uencies or pack of fre'uencies t e link bet%een t e drone pilot and t e drone can be disconnected. /. G"S spoofing. Small* portable G"S transmitters can send fake G"S signals and disrupt t e Drones navigation systems. + is can be used* for e8ample* to steer drones into self( destruction flig t pat s or even iAack t em and land t em on a run%ay. Sources: C1ealt 6anger9s intelligence analysis of military drones: payloads* countermeasures and more9* %%%.naturalne%s.com* Duly $;* #.$#. @y Mike Adams C+ e Al(Eaida "apers ( Drones9* + is document is one of several found by + e Associated "ress in buildings recently occupied by al(Eaida fig ters in +imbuktu* Mali. Associated "ress* Feb #.$/. CEvading + ermal 4maging And 6adar Detection9* United States Militia* Special Forces.

You might also like