{"id":4403,"date":"2015-10-26T02:29:34","date_gmt":"2015-10-26T01:29:34","guid":{"rendered":"http:\/\/cyberpunk.noblogs.org\/?p=4403"},"modified":"2015-11-18T02:29:55","modified_gmt":"2015-11-18T01:29:55","slug":"guia-de-sobrevivencia-contra-drones-es-en","status":"publish","type":"post","link":"https:\/\/cyberpunk.noblogs.org\/?p=4403","title":{"rendered":"GU\u00cdA DE SOBREVIVENCIA CONTRA DRONES (ES-EN)"},"content":{"rendered":"<h1 style=\"text-align: center\" align=\"LEFT\"><span style=\"color: #008000\"><strong><span lang=\"es-CL\">GU\u00cdA DE SOBREVIVENCIA CONTRA DRONES (ES-EN)<\/span><\/strong><\/span><\/h1>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\" align=\"LEFT\"><a href=\"https:\/\/cyberpunk.noblogs.org\/files\/2015\/10\/DSG_LATAM.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/untold-stories.net\/projects\/01_Drone-Survival-Guide\/10.jpg\" alt=\"\" width=\"618\" height=\"433\" align=\"BOTTOM\" border=\"0\" \/><\/a><span style=\"color: #808080\">click en la imagen para descargar<\/span><\/p>\n<h2 class=\"western\"><span style=\"color: #808080\">Vigilancia<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Ataque<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Vigilancia Militar<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Vigilancia Dom\u00e9stica<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Consumo<\/span><\/h2>\n<h2 class=\"western\"><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">S\u00f3lo para uso No-Oficial<\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 class=\"western\"><span style=\"color: #808080\">Despliegue global de <i>Drones <\/i>por parte de la milicia de Estados Unidos<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Spanish<\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><span style=\"color: #999999\"><strong>Observaci\u00f3n de aves en el siglo 21<\/strong><\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Nuestros ancestros pod\u00edan identificar a los depredadores naturales desde lejos por su silueta. \u00bfEstamos igualmente al tanto de los depredadores en el presente? Los <i>Drones<\/i> son planeadores de control remoto que pueden ser utilizados para cualquier fin desde vigilancia y aplicaci\u00f3n de fuerza letal hasta para operaciones de rescate e investigaci\u00f3n cient\u00edfica. Hoy en d\u00eda los <i>Drones<\/i> son utilizados en su mayor\u00eda por poderes militares para vigilar y atacar v\u00eda control remoto, y sus n\u00fameros est\u00e1n creciendo. La Administraci\u00f3n Federal de Aviaci\u00f3n (FAA) predijo en 2012 que dentro de 20 a\u00f1os podr\u00eda haber alrededor de 30,000 <i>Drones<\/i> volando \u00fanicamente sobre suelo Estadounidense. Dado que las aves rob\u00f3ticas ser\u00e1n comunes en el futuro cercano nosotros debemos de prepararnos para identificarlas. Esta gu\u00eda de sobrevivencia es un intento para familiarizarnos a nosotros y a futuras generaciones con un entorno tecnol\u00f3gico cambiante.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Este documento contiene las siluetas de los tipos de <i>Drones<\/i> m\u00e1s com\u00fanmente utilizados hoy en d\u00eda y en el futuro inmediato. Cada uno indica su nacionalidad y si es usado como fuerza letal o sol\u00f3 para vigilancia. Todos los <i>Drones<\/i> se encuentran dibujados a escala para se\u00f1alar su tama\u00f1o. Desde los <i>Drones<\/i> m\u00e1s peque\u00f1os de consumo dom\u00e9stico que se extienden menos de 1 metro hasta el <i>Global Hawk<\/i> cuya longitud es de 39.9 metros. Para mantener este documento ampliamente disponible puede ser descargado en formato .pdf o .doc. Con el tiempo nuevas traducciones ser\u00e1n puestas a disposici\u00f3n.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\"><span lang=\"es-MX\"><span style=\"color: #999999\">ACLARACI\u00d3N:<\/span> El presente documento es s\u00f3lo para fines informativos y con la intenci\u00f3n de distribuir informaci\u00f3n p\u00fablicamente disponible de manera gratuita. No condonamos el comportamiento violento o destructivo contra personas o propiedad de ninguna manera. Todo el contenido puede ser distribuido, adaptado y traducido sin fines de lucro. Disponible gratuitamente en el sitio. <\/span><del><span lang=\"zxx\"><span lang=\"es-MX\">www.dronesurvivalguide.org<\/span><\/span><\/del><\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><span style=\"color: #999999\"><strong>Para ocultarse de los Drones<\/strong><\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Los <i>Drones<\/i> est\u00e1n equipados con c\u00e1maras altamente poderosas que pueden detectar personas y veh\u00edculos a una altura de muchos kil\u00f3metros. Casi todos los <i>Drones <\/i>cuentan con visi\u00f3n nocturna, y\/o c\u00e1maras infrarrojas conocidas como sensores FLIR. \u00c9stas pueden ver se\u00f1ales de calor humano desde lejos, de d\u00eda o de noche.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Sin embargo existe forma de esconderse de ellos.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">1. Camuflaje diurno: Oc\u00faltese en las sombras de edificios y \u00e1rboles. Utilice los bosques densos como camuflaje natural o use redes camufladas.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">2. Camuflaje nocturno: Oc\u00faltese dentro de edificios o bajo la protecci\u00f3n de los \u00e1rboles y el follaje. No use linternas o los faros de los veh\u00edculos, a\u00fan a grandes distancias los <i>Drones <\/i>pueden detectarlas con facilidad durante misiones nocturnas.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">3. Camuflaje t\u00e9rmico: Las mantas de emergencia (tambi\u00e9n conocidas como mantas espaciales) hechas de Mylar pueden bloquear rayos infrarrojos. El portar una manta espacial como poncho en la noche ocultar\u00e1 su se\u00f1al t\u00e9rmica de la detecci\u00f3n infrarroja. En verano cuando la temperatura oscila entre 36\u00b0C y 40\u00b0C las c\u00e1maras infrarrojas no pueden distinguir entre un cuerpo y su entorno.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">4. Espere al mal tiempo: Los <i>Drones<\/i> no puede operar en vientos r\u00e1pidos, humo, tormentas o en condiciones clim\u00e1ticas severas.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">5. Sin comunicaci\u00f3n inal\u00e1mbrica: Utilizar comunicaci\u00f3n m\u00f3vil o GPS posiblemente delatar\u00e1 su localizaci\u00f3n.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">6. Desplegar trozos de espejo o de alg\u00fan material reflejante sobre un auto o en una azotea confundir\u00e1 la c\u00e1mara de los <i>Drones<\/i>.<\/span><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">7. Se\u00f1uelos: Use maniqu\u00edes o mu\u00f1ecas de tama\u00f1o humano para distraer a los <i>Drones<\/i> durante el reconocimiento.<\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><strong><span style=\"color: #999999\">Hackeando Drones<\/span><\/strong><\/h2>\n<h2 class=\"western\"><span style=\"color: #808080\">Los <i>Drones<\/i> son controlados de manera remota. Los pilotos que operan la nave pueden estar a miles de kil\u00f3metros de distancia en estaciones de Control Terrestre. El piloto controla la nave mediante una se\u00f1al de datos transmitida v\u00eda satelital. Uno puede interferir con el control de los <i>Drones<\/i> si intercepta o interfiere con la se\u00f1al de datos. \u00c9sta se\u00f1al puede estar encriptada pero muchas veces no es as\u00ed.<\/span><\/h2>\n<ol>\n<li>\n<h2 class=\"western\"><span style=\"color: #808080\">Intercepci\u00f3n. Una t\u00e9cnica sofisticada es utilizar <i>software<\/i> de captura a\u00e9rea con un disco satelital y un sintonizador de se\u00f1al de TV para interceptar las frecuencias de los <i>Drones<\/i>. Tanto la comunicaci\u00f3n entrante como saliente puede ser interceptada.<\/span><\/h2>\n<\/li>\n<li>\n<h2 class=\"western\"><span style=\"color: #808080\">Interferencia. Al transmitir en una o en varias frecuencias distintas el enlace entre la nave y el piloto puede ser desconectada.<\/span><\/h2>\n<\/li>\n<li>\n<h2 class=\"western\"><span style=\"color: #808080\">Enga\u00f1ar al GPS. Peque\u00f1os transmisores GPS port\u00e1tiles puede enviar se\u00f1ales falsas y perturbar los sistemas de navegaci\u00f3n de los <i>Drones<\/i>. Esto puede ser usado, por ejemplo, para que sigan un recorrido de vuelo autodestructivo o incluso piratearlos para que aterricen en una pista.<\/span><\/h2>\n<\/li>\n<\/ol>\n<h4 class=\"western\"><span style=\"color: #999999\">Fuentes:<\/span><\/h4>\n<h4 class=\"western\"><span style=\"color: #808080\">\u00ab\u00a0<i>Health Ranger\u2019s intelligence analysis of military drones: payloads, countermeasures and more<\/i>\u00a0\u00bb (\u00ab\u00a0<i>Analisis de Drones militares\u00a0: capacidades, contramedidas y m\u00e1s<\/i>\u00a0\u00bb), Mike Adams, www.naturalnews.com, Julio 16 2012.<\/span><\/h4>\n<h4 class=\"western\"><span style=\"color: #808080\">\u00ab\u00a0<i>The Al-Qaida Papers \u2013 Drones<\/i>\u00a0\u00bb (\u00ab <i>Los docuentos de Al-Qaeda \u2013 Drones<\/i>\u00a0\u00bb,), <i>AP<\/i>, Febrero 2013. Este documento es uno de muchos encontrados por <i>The Associated Press<\/i> en edificios ocupados por guerreros de <i>Al-Qaida<\/i> en Timbukt\u00fa, Mali.<\/span><\/h4>\n<h4 class=\"western\"><span style=\"color: #808080\">\u00ab\u00a0<i>Evading Thermal Imaging And Radar Detection<\/i>\u00a0\u00bb (\u00ab <i>Evadiendo la detecci\u00f3n t\u00e9rmica e infrarroja\u00a0<\/i>\u00bb),\u00a0Fuerzas Militares Especiales de Estados Unido<\/span><\/h4>\n<p><span style=\"color: #808080\">__________________________________________<\/span><\/p>\n<h2 style=\"text-align: center\"><span style=\"color: #008000\"><strong>Drone Survival Guide<\/strong><\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #808080\">Surveillance<\/span><\/h2>\n<h2><span style=\"color: #808080\">Attack<\/span><\/h2>\n<h2><span style=\"color: #808080\">Military surveillance<\/span><\/h2>\n<h2><span style=\"color: #808080\">Domestic surveillance<\/span><\/h2>\n<h2><span style=\"color: #808080\">Consumer Photography<\/span><\/h2>\n<h2><\/h2>\n<h2><span style=\"color: #808080\">For Unofficial use only<\/span><\/h2>\n<h2><span style=\"color: #808080\">Drone deployment U.S. Military<\/span><\/h2>\n<h2><span style=\"color: #808080\">English<\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><span style=\"color: #999999\"><strong>21st century birdwatching<\/strong><\/span><\/h2>\n<h2><span style=\"color: #808080\">Our ancestors could spot natural predators from afar by their silhouettes. Are we equally aware of the predators in the present-day? Drones are remote-controlled planes that can be used for anything from surveillance and deadly force, to rescue operations and scientific research. Most drones are used today by military powers for remote-controlled surveillance and attack, and their numbers are growing. The Federal Aviation Administration predicted in 2012 that within 20 years there could be as many as 30.000 drones flying over U.S. soil alone. As robotic birds will become commonplace in the near future, we should be prepared to identify them. This survival guide is an attempt to familiarise ourselves and future generations, with a changing technological environment.<\/span><\/h2>\n<h2><span style=\"color: #808080\">More than 87 nations in the world have drone technology, with over 200 types of drones. This document contains the silhouettes of the most common drone species used today and in the near future. Each indicating nationality and whether they are used for surveillance only or for deadly force. All drones are drawn in scale for size indication. From the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39,9 meter in length. To keep this document widely available it can be downloaded in .pdf or .doc format. More translations are available on the website.<\/span><\/h2>\n<h2><span style=\"color: #808080\">DISCLAIMER This document is for information purposes only, with the intent of free <\/span><\/h2>\n<h2><span style=\"color: #808080\">distribution of publicly available information. We do not condone violent or destructive <\/span><\/h2>\n<h2><span style=\"color: #808080\">behavior against people or property in any way or form. All content may be freely shared, adapted, and translation for non-commercial purposes. Available for free on the website. <del><span lang=\"zxx\">www.dronesurvivalguide.org<\/span><\/del><\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><span style=\"color: #999999\"><strong>Hiding from Drones<\/strong><\/span><\/h2>\n<h2><span style=\"color: #808080\">Drones are equipped with extremely powerful cameras which can detect people and vehicles at an altitude of several kilometers. Most drones are equipped with night vision, and\/or infrared vision cameras, so-called FLIR sensors. These can see human heat signatures from far away, day or night. However there are ways to hide from drones.<\/span><\/h2>\n<ol>\n<li>\n<h2><span style=\"color: #808080\">Day camouflage: Hide in the shadows of buildings or trees.<\/span><\/h2>\n<\/li>\n<\/ol>\n<h2><span style=\"color: #808080\">Use thick forests as natural camouflage or use camouflage nets. <\/span><\/h2>\n<ol start=\"2\">\n<li>\n<h2><span style=\"color: #808080\">Night camouflage: Hide inside buildings or under protection of trees or foliage. Do not use flashlights or vehicle spot lights, even at long distances. Drones can easily spot these during night missions.<\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">Heat camouflage: Emergency blankets (so-called space blankets) made of Mylar can block infrared rays. Wearing a space blanket as a poncho at night will hide your heat signature from infrared detection. Also in summer when the temperature is between 36\u00b0C and 40\u00b0C, infrared cameras cannot distinguish between body and its surroundings. <\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">Wait for bad weather. Drones cannot operate in high winds, smoke, rainstorms, or heavy weather conditions.<\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">No wireless communication. Using mobile phones or GPS-based communication will compromise your location.<\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">Spreading reflective pieces of glass or mirrored material on a car on a roof will confuse the drone\u2019s camera. <\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">Decoys. Use mannequins or human-sized dolls to mislead the drone\u2019s reconnaissance.<\/span><\/h2>\n<\/li>\n<\/ol>\n<h2><\/h2>\n<h2 style=\"text-align: center\"><span style=\"color: #999999\"><strong>Hacking Drones<\/strong><\/span><\/h2>\n<h2><span style=\"color: #808080\">Drones are remote controlled. The pilots operating the drone can be thousands of kilometers away at ground control stations. The control link is the satellite transmitted datalink by which the pilot controls the plane. By jamming or intercepting the datalink, one can interfere with the drones controls. The data link is sometimes encrypted but not always.<\/span><\/h2>\n<ol>\n<li>\n<h2><span style=\"color: #808080\">Interception. A complicated technique is to use sky grabber software with a satellite dish and a TV tuner to intercept the drone\u2019s frequencies. Communication from and to the drone can be intercepted. <\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">Interference. By broadcasting on different frequencies or pack of frequencies the link between the drone pilot and the drone can be disconnected. <\/span><\/h2>\n<\/li>\n<li>\n<h2><span style=\"color: #808080\">GPS spoofing. Small, portable GPS transmitters can send fake GPS signals and disrupt the drones\u2019 navigation systems. This can be used, for example, to steer drones into self-destruction flight paths or even hijack them and land them on a runway.<\/span><\/h2>\n<\/li>\n<\/ol>\n<h2><strong><span style=\"color: #999999\">Sources:<\/span> <\/strong><\/h2>\n<h2><span style=\"color: #808080\">\u2018Health Ranger\u2019s intelligence analysis of military drones: payloads, countermeasures and more\u2019, www.naturalnews.com, July 16, 2012. By Mike Adams <\/span><\/h2>\n<h2><span style=\"color: #808080\">\u2018The Al-Qaida Papers &#8211; Drones\u2019, This document is one of several found by The Associated Press in buildings recently occupied by al-Qaeda fighters in Timbuktu, Mali. Associated Press, Feb 2013. \u2018Evading Thermal Imaging And Radar Detection\u2019, United States Militia, Special Forces.<\/span><\/h2>\n<h6><span style=\"color: #808080\">____________________<\/span><\/h6>\n<h6><span style=\"color: #999999\"><strong>Fuente y otros idiomas: <\/strong><span style=\"color: #808080\"><del><span lang=\"zxx\"><span lang=\"es-MX\">www.dronesurvivalguide.org<\/span><\/span><\/del><\/span><\/span><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>GU\u00cdA DE SOBREVIVENCIA CONTRA DRONES (ES-EN) &nbsp; click en la imagen para descargar Vigilancia Ataque Vigilancia Militar Vigilancia Dom\u00e9stica Consumo S\u00f3lo para uso No-Oficial &nbsp; Despliegue global de Drones por parte de la milicia de Estados Unidos Spanish &nbsp; Observaci\u00f3n &hellip; <a href=\"https:\/\/cyberpunk.noblogs.org\/?p=4403\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9930,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[32,41],"class_list":["post-4403","post","type-post","status-publish","format-standard","hentry","category-materiales","tag-hacking","tag-materiales-2"],"_links":{"self":[{"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/4403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=\/wp\/v2\/users\/9930"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4403"}],"version-history":[{"count":8,"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/4403\/revisions"}],"predecessor-version":[{"id":4572,"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/4403\/revisions\/4572"}],"wp:attachment":[{"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberpunk.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}