Open-Source Drone Warfare

russian drones.jpgThere’s no doubt about it in my mind and the minds of many- Drones on the modern battlefield are having the same impact as the advent of the motorcar and the machine gun. It is becoming exponentially easier for small groups to take off-the-shelf equipment and modify it closing the gap between non-state actors and government forces in terms of capability.

The idea of remote aircraft themselves is nothing new; we’ve been figuring out how to remotely fly nearly since Wilbur and Orville first took off at Kitty Hawk. But the technology over the past decade has experienced a renaissance. Rightly so. It has a number of significant advantages- namely, the eye in the sky provides a large force multiplier eliminating dead space (what groups on the ground can’t see), can in some cases provide a communications relay platform, and most significant, provides a weapons delivery system that attacks with little to no warning and carries with it no culpability. From the State’s perspective this reduces the human cost of war and is politically advantageous; from the insurgent perspective, a platform that kills without warning.  The examples are in no short supply but their effectiveness cannot be argued; Russian Drones in Ukraine, more on the weapon the Russians used, and the reports of ISIS mirroring the tactical advantage in Iraq.

droneThe technology itself is going nowhere anytime soon and at least in my own opinion, from seeing it fielded at the macro-level, Small Unit level and now at the “under the Christmas Tree” level, it’s important to understand a few things about how they work and a strategy to mitigate the threat. While the Government equipment may not work on these exact frequencies, the common equipment being weaponized by insurgents are all of the commercial variety. First, we know these are radio controlled. So for the commercial models, the frequency data is obtainable via open sources. These devices must be FCC certified. According to the FCC ID for the drone pictured above:

2AANZ

We find that the frequency data listed is:

2.407-2.477 GHz under Part 15.

What shares this frequency space? Well, by using this tool we can find anything and everything listed occupying that space. Doing a quick search of that spread of spectrum we find:

ITU # 9 – UHF Ultra high frequency – TV broadcasts, microwave ovens, mobile phones, wireless LAN, Bluetooth, GPS, and Two-Way Radios (300-3000 MHz)

2400- 2417 This band is used in the Amateur Radio Service. Operation of unlicensed Part 15 Devices is permitted between 2400 and 2417 MHz.
2417- 2450 This band is used in the Amateur Radio Service. This band is allocated for both Federal and Non-Federal use. Operation of unlicensed Part 15 Devices is permitted between 2417 and 2450 MHz.
2450- 2483.5 This band is used in the Fixed Microwave Service, the Industrial, Scientific and Medical Equipment Service (ISM), the Local Television Transmission Service, the Radiolocation Service, the Public Safety Radio Service, and the TV Broadcast Auxiliary Service. Operation of unlicensed Part 15 Devices is permitted between 2450 and 2483.5 MHz.

Finding all of that data via Open Sources, we now have a huge step towards doing two things: Intercepting Drone Data or Jamming and Disabling them. From knowing the properties of the frequencies themselves, we can say that the ground control is Line of Sight, meaning the operator is nearby and can be intercepted themselves. But this is not the only spread of spectrum Common Off The Shelf (COTS) drones operate on. Digging a little deeper, we also find them operating on 5.8GHz for real-time video, or First Person View operation. This means guiding it via a camera. But what if, in the field, drones are being built that don’t use this spectrum? These are for the off-the-shelf or open source models, but not necessarily for 100% of them in the air. The only way to know is to have the capability to monitor the airwaves in that spectrum. None of the low-end SDRs I’m aware of can intercept transmissions in this area, but slightly higher-end models absolutely can. So after reading back over this primer on SDR use from a while back and some experience actually doing it, we can learn once more how to competently intercept the data. All this being said, what you do with the information is up to you but these guys build a pretty good jamming system for the price of a middle-ground AR-15 or you can experiment and build one yourself. I suppose force multipliers are all in what you value.

 

 

Advertisements

26 thoughts on “Open-Source Drone Warfare

  1. The Jammer-Store’s unit is significant for A2AD, as it includes an option for L1 through L5. This would, effectively, even kick the autonomous units square in the sacks.

    Nice find.

    Monitoring is absolutely critical as well; some of the LR DIY kits operate between 433-440 MHz.

    Liked by 1 person

  2. On the flip side of the above, anyone not incorporating an affordable COTS, ready-made ISR system into their preps is an absolute asshole.

    The ability to obtain a 400′ high, ad-hoc, field-expedient OP is worth its weight in beans bullets and bandaids.

    Liked by 3 people

  3. Good stuff.
    Agree that anyone not using this stuff isn’t thinking things through- or they would rather buy more unneeded tacticool crap because they believe cool guy gear makes them into “operators”.
    Cabelas recently had a sale on some decent quality drones in the $500.00-$1,000.00 range.
    Since I buy way too much stuff from them I get tons of sale catalogs and flyers via snail mail, along with almost daily e-mails.
    Related- sort of are trail cameras that upload any pics they take.
    They’re useful for monitoring areas you can’t get a clear view of from the sky, like deep woods, overgrown creekbottoms etc.

    Liked by 2 people

      1. There’s a lot of good security presentations there. One of my favorite’s was Matt Blaze’s audit of P25 vulnerabilities. The USPS was the only agency that fully had their act together. Sad.

        Liked by 1 person

  4. Pingback: Open-Source Drone Warfare – Lower Valley Assembly

  5. PRCD

    A good jammer could be made out of a relatively cheap DAC outputting a noise-like waveform and some coax components for about $1k. It could be aimed by hand with some sort of dish antenna or Yagi.

    Liked by 2 people

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s