Sunteți pe pagina 1din 2

Drone Survival Guide

Surveillance
Attack
Military surveillance
Domestic surveillance
Consumer
For Unofficial use only
Global Drone deployment U.S. Military
Englis ! "asto
#$
st
century bird%atcing
&ur ancestors could spot natural predators from far by teir silouettes. Are %e e'ually a%are of te
predators in te present(day) Drones are remote(controlled planes tat can be used for anyting
from surveillance and deadly force* to rescue operations and scientific researc. Most drones are
used today by military po%ers for remote(controlled surveillance and attack* and teir numbers are
gro%ing. +e Federal Aviation Administration ,FAA- predicted in #.$# tat %itin #. years tere
could be as many as /..... drones flying over U.S. Soil alone. As robotic birds %ill become
commonplace in te near future* %e sould be prepared to identify tem. +is survival guide is an
attempt to familiarise ourselves and future generations* %it a canging tecnological environment.
+is document contains te silouettes of te most common drone species used today and in te
near future. Eac indicating nationality and %eter tey are used for surveillance only or for
deadly force. All drones are dra%n in scale for si0e indication. From te smallest consumer drones
measuring less tan $ meter* up to te Global 1a%k measuring /2*2 meter in lengt. +o keep tis
document %idely available it can be do%nloaded in .pdf or .doc format. 3e% translations %ill be
made available over time.
D4SC5A4ME6 +is document is for information purposes only* %it te intent of free distribution
of publicly available information. 7e do not condone violent or destructive beavior against people
or property in any %ay or form. All content may be freely sared* adapted* and translation for non(
commercial purposes. Available for free on te %ebsite. %%%.dronesurvivalguide.org
1iding from Drones
Drones are e'uipped %it e8tremely po%erful camera9s %ic can detect people and veicles at an
altitude of several kilometers. Most drones are e'uipped %it nigt vision* and!or infrared vision
camera9s* so(called F546 sensors. +ese can see uman eat signatures from far a%ay* day or nigt.
1o%ever tere are %ays to ide from drones.
$. Day camouflage: 1ide in te sado%s of buildings or trees.
Use tick forests as natural camouflage or use camouflage nets.
#. 3igt camouflage: ide inside buildings or under protection of trees or foliage. Do not use
flasligts or veicle spot ligts* even at long distances. Drones can easily spot tis during
nigt missions.
/. 1eat camouflage: Emergency blankets ,so(called space blankets- made of Mylar can block
infrared rays. 7earing a space blanket as a ponco at nigt %ill ide your eat signature
from infrared detection. Also in summer %en te temperature is bet%een /;<C and =.<C*
infrared camera9s cannot distinguis bet%een body and its surroundings.
=. 7ait for bad %eater. Drones cannot operate in ig %inds* smoke* rainstorms or eavy
%eater conditions.
>. 3o %ireless communication. Using mobile pones or G"S based communication %ill
possibly compromise your location.
;. Spreading reflective pieces of glass or mirrored material on a car on a roof %ill confuse te
drone9s camera.
?. Decoys. Use manne'uins or uman(si0ed dolls to mislead te drone9s reconnaissance.
1acking Drones
Drones are remote controlled. +e pilots operating te drone can be tousands of kilometers a%ay
at Ground Control stations. +e control link is te satellite transmitted datalink by %ic te pilot
controls te plane. @y Aamming or intercepting te datalink* one can interfere %it te drones
controls. +e data link can be encrypted but often is not.
$. 4nterception. A sopisticated tecni'ue is using sky grabber soft%are %it a satellite dis
and a +B tuner to intercept te drone9s fre'uencies. Communication from and to te drone
can be intercepted.
#. 4nterference. @y broadcasting on different fre'uencies or pack of fre'uencies te link
bet%een te drone pilot and te drone can be disconnected.
/. G"S spoofing. Small* portable G"S transmitters can send fake G"S signals and disrupt te
Drones navigation systems. +is can be used* for e8ample* to steer drones into self(
destruction fligt pats or even iAack tem and land tem on a run%ay.
Sources:
C1ealt 6anger9s intelligence analysis of military drones: payloads* countermeasures and more9*
%%%.naturalne%s.com* Duly $;* #.$#. @y Mike Adams
C+e Al(Eaida "apers ( Drones9* +is document is one of several found by +e Associated "ress in
buildings recently occupied by al(Eaida figters in +imbuktu* Mali. Associated "ress* Feb #.$/.
CEvading +ermal 4maging And 6adar Detection9* United States Militia* Special Forces.

S-ar putea să vă placă și