SlideShare a Scribd company logo
1 of 22
.
Welcome
to
Our Presentation
Course Instructor : RETHWAN FAIZ
.
• Group members…………
• ## Hossain,md.riaz ----------------------- 13-24434-2
• ##Jesan,Jahidur rahman ------------------- 13-24453-2
• ## Puja,ananya dey ----------------------- 13-24322-2
• ## Hosssain md rubayet------------------- 13-25385-3
• ## Rakin farhan tanvir --------------------- 13-25389-3
.
• Drones can be fun to fly, but they're also a headache for security.
Drones are flying spies, poking their nose in sensitive areas, and there
are rising concerns they could be used as flying improvised explosive
devices (IEDs.)
• Small, nimble, and fast, drones are hard to shoot down . Even then,
shooting at a drone with a weapon presents a problem—missed shots
can endanger the public.
Drone destroyer guns……………
CONTENTS…………..
• *** Battle drone defender
• *** The laser gun
• *** Drone Hijacking With Maldrone
• *** Micro wave gun
• *** Drone defenses
The Battelle Drone Defender is a rifle made
for electronic warfare, as first reported by
motherboard. The gun looks like a
hodgepodge of science fiction props
strapped together
BATTLE DRONE DEFENDER
.
.
LASER GUN………
The laser focuses on the tail of the drone, which is a good
way to disable it. A laser gun has to keep the beam on the
target for long enough to burn through something crucial.
Better targeting and more powerful beams both improve a
laser’s ability to destroy a drone. In Boeing’s test, it took
15 seconds to destroy the target.
.
• The Blighter works by severing the invisible tether of radio frequency commands that
connects the drone with its operator. Cut the tether and the drone can no longer receive
commands. The drone will fall out of the sky or fly on until it crashes.
• Blighter consists of three pieces of equipment. The first, an air security radar, scans for
incoming drones. Once detected, it hands off the target to the EO (electro-optical) tracker.
The EO tracker, which features a 12x zoom and thermal imager, locks onto the drone and
allows the operator to visually inspect it.
• Once the operator decides the drone must die, he activates the Directional Radio
Frequency Inhibitor. This is the "gun" of the system, which "fires" directed radio signals at
the same frequency as the drone's controls. Unable to receive further commands, the
drone is effectively neutralized.
• Blighter's system is promising, and could help to keep the skies free of bullets. The
system may continue to work against commercial drones,
DETECTION RANGE: 8 KM
MINIMUM TARGET SIZE (RCS): 0.01 M2
FREQUENCY BAND: KU-BAND
RADAR TYPE: E-SCAN FREQUENCY MODULATED CONTINUOUS WAVE
(FMCW) DOPPLER SURVEILLANCE RADAR
TRANSMITTER POWER (NOMINAL): 4 WATT
AZIMUTH COVERAGE: 180° (STANDARD) OR 90° (OPTIONAL)
DRONE HIJACKING WITH MALDRONE
.
• Maldrone may be the world’s first drone virus – infecting approaching drones with
malware and dropping them out of the air like a bag of hammers.
• The Python-language script has been successfully tested by inserting the code into a
Parrot AR Drone via Wi-Fi.
• Maldrone was originally intended to demonstrate security vulnerabilities in consumer-level
drones rather than as a malicious “drone death ray.” Nevertheless, it’s not difficult to see
how such a drone zapper could easily be distributed among the hacker community as a
malicious way to stop drones.
THE STATED SPECIFICATIONS OF THE
RANETS WAS ALMOST IDENTICAL TO
THE NEW MICROWAVE GUN. THE
COMPLEX WEIGHING 5 TONS WAS
SUPPOSED TO HIT THE ENEMY
ELECTRONICS WITHIN A RADIUS OF 10
KM AND HAD A DEFENSIVE CAPABILITY
OF UP TO 60 DEGREES VERTICALLY
AND 360 DEGREES HORIZONTALLY.
MICROWAVES CONSIST OF ANY
WAVELENGTH BETWEEN 300 MHZ
(0.3 GHZ) AND 300 GHZ.
A large transformer
A large capacitor (rated around 1-2 kV; 1-100
uF),
Some high voltage diodes
A magnetron
drone destroy guns
drone destroy guns
drone destroy guns
drone destroy guns

More Related Content

Similar to drone destroy guns

Mechanical Aspects in Stealth Technology
Mechanical Aspects in Stealth TechnologyMechanical Aspects in Stealth Technology
Mechanical Aspects in Stealth Technology
BipinKumarJha1
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT
IJRISE Journal
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technology
Pragati Garg
 

Similar to drone destroy guns (20)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- Underwater Drone
IRJET- Underwater DroneIRJET- Underwater Drone
IRJET- Underwater Drone
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
C-UAS Technoligies.pptx
C-UAS Technoligies.pptxC-UAS Technoligies.pptx
C-UAS Technoligies.pptx
 
Make Tea Not War
Make Tea Not WarMake Tea Not War
Make Tea Not War
 
Mechanical Aspects in Stealth Technology
Mechanical Aspects in Stealth TechnologyMechanical Aspects in Stealth Technology
Mechanical Aspects in Stealth Technology
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT
 
Smart missile navigation in defence system using rc4 algorithm to detect target
Smart missile navigation in defence system using rc4 algorithm to detect targetSmart missile navigation in defence system using rc4 algorithm to detect target
Smart missile navigation in defence system using rc4 algorithm to detect target
 
STEALTH technology.pptx
STEALTH technology.pptxSTEALTH technology.pptx
STEALTH technology.pptx
 
Ricky seminar
Ricky seminarRicky seminar
Ricky seminar
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technology
 
D0312015019
D0312015019D0312015019
D0312015019
 
Stealth aircraft and anti stealth technology
Stealth aircraft and anti stealth technologyStealth aircraft and anti stealth technology
Stealth aircraft and anti stealth technology
 
Understanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdfUnderstanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdf
 
Stopping Drone Intruders: The Advantages of Using Drone Detection Radar
Stopping Drone Intruders: The Advantages of Using Drone Detection RadarStopping Drone Intruders: The Advantages of Using Drone Detection Radar
Stopping Drone Intruders: The Advantages of Using Drone Detection Radar
 
Laser warning system
Laser warning systemLaser warning system
Laser warning system
 
Radar_E_Magazine
Radar_E_MagazineRadar_E_Magazine
Radar_E_Magazine
 
Stealth Technology
Stealth Technology Stealth Technology
Stealth Technology
 
IRJET - Landmine Detection using Wireless Robot
IRJET - Landmine Detection using Wireless RobotIRJET - Landmine Detection using Wireless Robot
IRJET - Landmine Detection using Wireless Robot
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

drone destroy guns

  • 2. . • Group members………… • ## Hossain,md.riaz ----------------------- 13-24434-2 • ##Jesan,Jahidur rahman ------------------- 13-24453-2 • ## Puja,ananya dey ----------------------- 13-24322-2 • ## Hosssain md rubayet------------------- 13-25385-3 • ## Rakin farhan tanvir --------------------- 13-25389-3
  • 3. . • Drones can be fun to fly, but they're also a headache for security. Drones are flying spies, poking their nose in sensitive areas, and there are rising concerns they could be used as flying improvised explosive devices (IEDs.) • Small, nimble, and fast, drones are hard to shoot down . Even then, shooting at a drone with a weapon presents a problem—missed shots can endanger the public.
  • 5. CONTENTS………….. • *** Battle drone defender • *** The laser gun • *** Drone Hijacking With Maldrone • *** Micro wave gun • *** Drone defenses
  • 6. The Battelle Drone Defender is a rifle made for electronic warfare, as first reported by motherboard. The gun looks like a hodgepodge of science fiction props strapped together BATTLE DRONE DEFENDER
  • 7.
  • 8. .
  • 9. .
  • 11. The laser focuses on the tail of the drone, which is a good way to disable it. A laser gun has to keep the beam on the target for long enough to burn through something crucial. Better targeting and more powerful beams both improve a laser’s ability to destroy a drone. In Boeing’s test, it took 15 seconds to destroy the target.
  • 12. . • The Blighter works by severing the invisible tether of radio frequency commands that connects the drone with its operator. Cut the tether and the drone can no longer receive commands. The drone will fall out of the sky or fly on until it crashes. • Blighter consists of three pieces of equipment. The first, an air security radar, scans for incoming drones. Once detected, it hands off the target to the EO (electro-optical) tracker. The EO tracker, which features a 12x zoom and thermal imager, locks onto the drone and allows the operator to visually inspect it.
  • 13. • Once the operator decides the drone must die, he activates the Directional Radio Frequency Inhibitor. This is the "gun" of the system, which "fires" directed radio signals at the same frequency as the drone's controls. Unable to receive further commands, the drone is effectively neutralized. • Blighter's system is promising, and could help to keep the skies free of bullets. The system may continue to work against commercial drones,
  • 14. DETECTION RANGE: 8 KM MINIMUM TARGET SIZE (RCS): 0.01 M2 FREQUENCY BAND: KU-BAND RADAR TYPE: E-SCAN FREQUENCY MODULATED CONTINUOUS WAVE (FMCW) DOPPLER SURVEILLANCE RADAR TRANSMITTER POWER (NOMINAL): 4 WATT AZIMUTH COVERAGE: 180° (STANDARD) OR 90° (OPTIONAL)
  • 16. . • Maldrone may be the world’s first drone virus – infecting approaching drones with malware and dropping them out of the air like a bag of hammers. • The Python-language script has been successfully tested by inserting the code into a Parrot AR Drone via Wi-Fi. • Maldrone was originally intended to demonstrate security vulnerabilities in consumer-level drones rather than as a malicious “drone death ray.” Nevertheless, it’s not difficult to see how such a drone zapper could easily be distributed among the hacker community as a malicious way to stop drones.
  • 17. THE STATED SPECIFICATIONS OF THE RANETS WAS ALMOST IDENTICAL TO THE NEW MICROWAVE GUN. THE COMPLEX WEIGHING 5 TONS WAS SUPPOSED TO HIT THE ENEMY ELECTRONICS WITHIN A RADIUS OF 10 KM AND HAD A DEFENSIVE CAPABILITY OF UP TO 60 DEGREES VERTICALLY AND 360 DEGREES HORIZONTALLY.
  • 18. MICROWAVES CONSIST OF ANY WAVELENGTH BETWEEN 300 MHZ (0.3 GHZ) AND 300 GHZ. A large transformer A large capacitor (rated around 1-2 kV; 1-100 uF), Some high voltage diodes A magnetron