After the alleged drone attack on London Gatwick Airport in 2018, we have been looking for effective countermeasures against these fraudulent drone operators. An interesting solution was developed in Turkey and briefly recorded on his Drone sensory page through Crowdsupply. Since the agreement was not disclosed, there are some gaps in the description, but we can make some good guesses about what is missing.
Not just one, but two LimeSDRs were sent into the air on a customized drone to track other drones and take them out by jamming their signals. Usually, this is much safer than trying to launch a missile into the air!
The UAV hardware used by his team is a customized S600 frame with a T-Motor U3 motor and a 40 A speed controller. The take-off weight is 5 kg. Adventech single board computer is the main controller with Pixhawk auxiliary controller, and the most important is a large 4 W Drone jammer with a range of 4 W and 2.4 GHz and a range of 1200 meters.
The biggest benefit of taking countermeasures instead of trying to send fighters on the ground is that the power of UAV jammers near the UAV can be reduced, which means less interference to other RF equipment in the area. Rogue drones are specially designed for them.
In one of LimeSDR, a GNU radio flow chart was run with a specially designed module to detect the FM signal of rogue drones. The process looked like a machine learning classification script. Another LimeSDR runs another *secret* flowchart, and a custom script running on the SBC combines the two flowcharts.
What is LimeSDR doing now? Some of the more obvious problems in the overall concept are that drones are self-interfering, and rogue drones may have anti-interference features installed. In this case, she only needs to return home. Maybe the second SDR will be there to track the drone back home and use it to catch the operator?