{"id":395,"date":"2022-08-23T12:32:56","date_gmt":"2022-08-23T07:02:56","guid":{"rendered":"https:\/\/www.zentechnologies.com\/blog\/?p=395"},"modified":"2024-10-25T10:17:40","modified_gmt":"2024-10-25T10:17:40","slug":"drone-suppression-systems","status":"publish","type":"post","link":"https:\/\/www.zentechnologies.com\/blog\/drone-suppression-systems\/","title":{"rendered":"Drone Suppression Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"395\" class=\"elementor elementor-395\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e13f91 elementor-section-boxed elementor-section-height-default elementor-section-height-default rt-parallax-bg-no\" data-id=\"7e13f91\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5627e4\" data-id=\"b5627e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0bed0f4 elementor-widget elementor-widget-image\" data-id=\"0bed0f4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1116\" height=\"500\" src=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/Drone-Suppression-Systems_Cover-Image.jpg\" class=\"attachment-full size-full wp-image-8822\" alt=\"\" srcset=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/Drone-Suppression-Systems_Cover-Image.jpg 1116w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/Drone-Suppression-Systems_Cover-Image-300x134.jpg 300w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/Drone-Suppression-Systems_Cover-Image-1024x459.jpg 1024w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/Drone-Suppression-Systems_Cover-Image-768x344.jpg 768w\" sizes=\"(max-width: 1116px) 100vw, 1116px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50ab342 elementor-widget elementor-widget-text-editor\" data-id=\"50ab342\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In the previous articles, we have covered <a href=\"https:\/\/www.zentechnologies.com\/blog\/classification-of-drones-based-on-endurance\/\">Drone Classification<\/a> and <a href=\"https:\/\/www.zentechnologies.com\/blog\/detection-of-drones\/\">Detection\u00a0 techniques<\/a>. Today we will read about Drone Neutralising or suppressing technologies, and keep it specific to Soft Kill Systems.<\/p><p>Drones can be suppressed by denying it access to a protected zone through soft kill or hard kill measures. Soft kill implies that the drone is not physically impeded or hit but neutralised using jamming. Hard Kill implies that the drone is physically destroyed or neutralised through some means.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-334e81e elementor-widget elementor-widget-image\" data-id=\"334e81e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/drone-sup-1024x576.jpg\" class=\"attachment-large size-large wp-image-406\" alt=\"drone sup\" srcset=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/drone-sup-1024x576.jpg 1024w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/drone-sup-300x169.jpg 300w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/drone-sup-768x432.jpg 768w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/drone-sup.jpg 1361w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf6cc48 elementor-widget elementor-widget-text-editor\" data-id=\"cf6cc48\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4><strong><u>Soft Kill Measures<\/u><\/strong><\/h4><ul><li><strong>RF Jamming. <\/strong>The best option to neutralise a drone would be by disrupting the command and control link. This would imply that the anti-drone jammer must overpower the GCS uplink signal. Analog modulated links need a Jammer to Signal ratio (J\/S) of at least 10 dB. The duty cycle of the Jammer also needs to be 100%. This is on account of the human in the loop who can fill in the blanks adaptively especially in military communications where message formats are quite rigid. For digital modulated links a J\/S ratio of 0 DB and a duty cycle of 33% is usually sufficient to ensure a bit error rate greater than 50%. On disruption of the command\/ control link the UAV may do one of three things depending on its sophistication. First, the basic version would start descending in a gradual freefall. Most commercial UAVs are likely to be neutralised in this manner. Next, it could use its current location from the onboard GNSS receiver\u00a0 to determine the shortest path to return home. Finally, it could be programmed to retrace its path home even without using the GNSS. This feature is generally available only in military UAVs. Therefore, it would also be necessary to jam the GNSS receiver on-board the UAV to fully disable the UAV. Jamming FH and DS links<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f83be6 elementor-widget elementor-widget-image\" data-id=\"8f83be6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/signal-1024x576.jpg\" class=\"attachment-large size-large wp-image-407\" alt=\"signal\" srcset=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/signal-1024x576.jpg 1024w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/signal-300x169.jpg 300w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/signal-768x432.jpg 768w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/signal.jpg 1514w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-774e2bb elementor-widget elementor-widget-text-editor\" data-id=\"774e2bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>would need to take into account the spreading gains offered by spread spectrum technology and the J\/S Ratio would have to be at least 30 dB. TRD and HP Wust offer RF Jammers.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-971ca20 elementor-widget elementor-widget-image\" data-id=\"971ca20\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/gnss-spoof-1024x576.jpg\" class=\"attachment-large size-large wp-image-408\" alt=\"gnss spoof\" srcset=\"https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/gnss-spoof-1024x576.jpg 1024w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/gnss-spoof-300x169.jpg 300w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/gnss-spoof-768x432.jpg 768w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/gnss-spoof-1536x864.jpg 1536w, https:\/\/www.zentechnologies.com\/blog\/wp-content\/uploads\/2022\/08\/gnss-spoof.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da8efd6 elementor-widget elementor-widget-text-editor\" data-id=\"da8efd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><strong>GNSS Spoofing.<\/strong><\/li><\/ul><p>Drones normally rely on the latitude and longitude coordinates continuously updated by the GNSS receiver on board for navigation. If the precise location of the drone is known either through Radar or RF triangulation, then it would be possible to trick the drone by gradually supplanting the GNSS location information with spoofed information so that it eventually lands in an area of the anti-drone system\u2019s choosing once control over the drone is gained. Centum offers a GNSS spoofer.To conclude, drones threats can be prioritised to be engaged using soft kill measures or hard kill measures. For situations such as VIP Security, Drone threats in urban areas, critical infrastructures, and overall homeland security \u2013 Soft Kill Measures are recommended. In the next article we will cover Hard Kill Systems &#8211; which has an interesting byte on Birds of Prey which can be trained to neutralise drones among other methods.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the previous articles, we have covered Drone Classification and Detection\u00a0 techniques. Today we will read about Drone Neutralising or suppressing technologies, and keep it specific to Soft Kill Systems. Drones can be suppressed by denying it access to a protected zone through soft kill or hard kill measures. Soft kill implies that the drone [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-counter-drone"],"_links":{"self":[{"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":20,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/395\/revisions"}],"predecessor-version":[{"id":9028,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/395\/revisions\/9028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/media\/8772"}],"wp:attachment":[{"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zentechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}