H04K2203/22

Method and device for detecting a decoy operation of a GNSS system
11635524 · 2023-04-25 · ·

A method of detecting an operation to spoof a first positioning device carried by a first vehicle moving in a zone in which at least one second vehicle carrying a second positioning device is also moving, the method comprising the step of causing at least one first positioning value to be calculated for each vehicle from initial satellite signals received by each device; the method being characterized in that it further comprises the steps of: causing the second device to initiate a latching stage in order to make a new search for satellite signals and using the new satellite signals received by the second device to calculate a second positioning value for the second vehicle at the same instant as the first value; comparing the first and second values relating to the second vehicle; and issuing a warning when the two values do not coincide.

System and method for defending unmanned aerial vehicles from hijack cyber attacks

The system and methods described herein aids in the defense of unmanned vehicles, such as aerial vehicles, from wifi cyber attacks. Such attacks usually do not last long and in the case of many point-to-point command and control systems, the attacks originate from close proximity to the unmanned vehicle. The system and methods described herein allow a team to rapidly identify and physically respond to an adversary trying to take control of the unmanned vehicle. Another aspect of the embodiment taught herein is to allow for the location of a wifi signal in a hands-free manner by able to visualize the source of the signal using an augmented reality display coupled to an antenna array.

METHOD AND SYSTEM FOR CONTROLLING A MOBILE COMMUNICATION DEVICE

Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. The present method and system determines whether the vehicle is being operated by a user that may also have access to a mobile communication device which, if used concurrently while the vehicle is in operation, may lead to unsafe operation of the vehicle. If the mobile services control system determines that a vehicle operator has potentially unsafe access to a mobile communication device, the mobile services control system may restrict operator access to one or more services that would otherwise be available to the operator via the mobile communication device.

Ultra-wide band electromagnetic jamming projector
11632187 · 2023-04-18 · ·

A radio frequency (RF) jamming device includes a differential segmented aperture (DSA), a jammer source outputting a jamming signal at one or more frequencies or frequency bands to be jammed, and RF electronics that amplify and feed the jamming signal to the DSA so as to emit a jamming beam. The DSA includes an array of electrically conductive tapered projections, and the RF electronics comprise power splitters configured to split the jamming signal to aperture pixels of the DSA. The aperture pixels comprise pairs of electrically conductive tapered projections of the array of electrically conductive tapered projections. The RF electronics further comprise pixel power amplifiers, each connected to amplify the jamming signal fed to a single corresponding aperture pixel of the DSA. The RF jamming device may include a rifle-shaped housing, with the DSA mounted at a distal end of the barrel of the rifle-shaped housing.

IDENTIFYING, TRACKING, AND DISRUPTING UNMANNED AERIAL VEHICLES

Systems, methods, and apparatus for identifying, tracking, and disrupting UAVs are described herein. A tracking system can include one or more first computing devices that receive sensor data associated with an object in a particular airspace from one or more sensors. The first computing device can analyze the sensor data relating to the object to determine information about the object. A portable countermeasure device can include one or more second computing devices. The second computing device can receive the information relating to the object. The second computing device can display a visual indicator indicating the information on a display.

METHOD AND SYSTEM FOR CONTROLLING A MOBILE COMMUNICATION DEVICE IN A MOVING VEHICLE
20230113971 · 2023-04-13 ·

Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. The present method and system determines whether the vehicle is being operated by a user that may also have access to a mobile communication device which, if used concurrently while the vehicle is in operation, may lead to unsafe operation of the vehicle. If the mobile services control system determines that a vehicle operator has potentially unsafe access to a mobile communication device, the mobile services control system may restrict operator access to one or more services that would otherwise be available to the operator via the mobile communication device.

A RECONNAISSANCE AND COMMUNICATION ASSEMBLY

According to a first aspect of the present invention, there is provided a reconnaissance and communication assembly, adapted to be launched from a gun barrel into the air. The assembly comprises a carrier (with a cavity) and a payload (within the cavity). The payload is arranged to be controllably expelled from the carrier and once expelled from the carrier, the payload transmits a signal.

Directional High-Energy Radio Frequency Weapon
20230152067 · 2023-05-18 ·

Systems, methods and apparatus are described for a HERF weapon that may emit high-energy radio waves at a target based on locational information and a frequency associated with the target. The HERF weapon may receive the frequency and locational information from a sensing system. The HERF weapon may emit a high energy pulse toward the target and on the frequency associated with the target to disable or destroy the target without affecting nearby devices. The HERF weapon may allow the user to avoid detection by using a frequency that corresponds to the target's operating frequency.

Deterrent for unmanned aerial systems

A system for providing integrated detection and deterrence against an unmanned vehicle including but not limited to aerial technology unmanned systems using a detection element, a tracking element, an identification element and an interdiction or deterrent element. Elements contain sensors that observe real time quantifiable data regarding the object of interest to create an assessment of risk or threat to a protected area of interest. This assessment may be based e.g., on data mining of internal and external data sources. The deterrent element selects from a variable menu of possible deterrent actions. Though designed for autonomous action, a Human in the Loop may override the automated system solutions.

Identifying potential attacks against cellular networks

Aspects of the present invention disclose a method for identifying indications of an attack on a cellular network. The method includes one or more processors scanning a geographic area of a cellular network, wherein the geographic area includes a plurality of transceivers of the cellular network. The method further includes identifying a symptom that impacts a transceiver of the cellular network based at least in part on connectivity between a computing device and the plurality transceivers of the cellular network. The method further includes performing one or more assessments on the transceiver of the cellular network impacted by the symptom. The method further includes determining whether the symptom of the cellular network is associated with an attack on the cellular network based at least in part on the one or more assessments.