-
Hacking into the "Black Fly" UAV navigation system, so as to achieve interception control of UAVs that require flight control using the navigation system, so that they cannot fly into protected areas
- By radiating low-power regenerative navigation satellite signals (power no more than 10dBm), the "black fly" UAV navigation system is invaded, so as to achieve the interception and control of the UAV that needs to use the navigation system for flight control, so that it cannot fly into the protected area and ensure the low-altitude safety of the area. The equipment is designed with portable pull-rod box, which can be flexibly deployed in key areas of the field.
- $ Inquiry
- 0 in Stock NowJR-MD1135
-
Group
JR1135
-
QUANTITY
- Contact Online
dvantages:Certified by the National Committee, the transmitting power is ≤10mW(to meet the requirements of anti-terrorism prevention)
Description:Product function: By regenerating at least two frequencies of satellite navigation spoofing signals, spoofing the satellite navigation coordinate information received by the UAV using satellite navigation positioning to achieve no-fly zone projection or a
Application Fields: The device adopts portable drawbar box design, which can be flexibly deployed to power plants, petroleum and petrochemical, regulatory sites, activity sites and other key areas.
Continuous operationThe equipment can operate 7x24 hours and is not affected by the environment, and can work in thunderstorms, fog and bad weather.
Defensive distanceThe equipment adopts omnidirectional column antenna, no protection blind area. The active defense distance is greater than 500 meters, less than 1000 meters and can be adjusted within 500 meters.
Guard against multiple modelsBy sending false navigation satellite signals, it can deceive the navigation terminal of the drone and set up a no-fly zone, which can effectively prevent 99% of the drones with navigation on the market.
Integrated useThe system can be extended to integrate the radio detection function, set the detection and decoy function in one, and support the single machine work and networking work. A variety of countermeasures combine to easily cope with cluster saturation attacks.