Conventional methods for combating drone threats include air interception/ground fire strikes, communication/navigation system interference, signal intrusion, and the like.
1) Air interception / ground fire blow
The UAV flight route is pre-planned, it takes a certain time to change the track, and most reconnaissance UAVs have a slower flight speed, so the soft ribs in maneuverability make it vulnerable to attack by manned or ground small arms. Once the attacked drone is discovered, it can be countered by the aviation ground forces and the naval ship air defense forces, closely coordinated, rationally arrange the strike order, and give the incoming drones a devastating blow. Air interceptions against drones have occurred many times, such as Iraqi aircraft shooting down Predator drones, F-16 shooting down Hezbollah guerrilla drones, and MiG-29 fighters shooting down Hermes “-450 drones and so on. However, the characteristics of the small UAV air target are small, and it is difficult for the fighter to find the target; the flying ground is not easily targeted by the ground personnel, so the independent fire attack means has limitations.
2) Communication / navigation system interference
UAVs rely on on-board electronic devices such as sensors for non-real-time and real-time information intelligence in reconnaissance operations, and exchange information with ground control stations via line-of-sight/weitong measurement and control links. If electronic interference is implemented, the airborne detection equipment and data transmission and processing of the drone will be affected or even fail. In particular, the small reconnaissance drone will use the radio transmission real-time remote control and obtain battlefield information through the ground control station to implement electronic Interference is more likely to achieve combat effectiveness. Such as: Iran captured RQ-170, “Scan Eagle” and other drones.
3) Signal intrusion
Highly intelligent unmanned systems are often connected to computer networks, creating opportunities to crack key passwords or protocols. Line-of-sight or Guardian link signals are easily received, as long as the intercepted data samples are large enough to be cracked after a period of time. In addition, the control station computer of the drone is often not tightly protected. Trojan software such as a keylogger can intercept the operating rules of the drone and analyze useful information.
If you want to get more details about Anti UAV Defence System, pls visit https://www.ericcointernational.com/anti-uav-defence-system/