The Analytical Department and our automated systems process thousands of observations. For operational security reasons, the vast majority of reports are distributed solely to the Defence Forces of Ukraine. Only isolated, carefully selected fragments, cleared of in-depth analytics and key findings, are made available to the public.
Critical Vulnerabilities in the 'Pryshchepka' Anonymisation Method
The 'Pryshchepka' anonymisation method for DJI Mavic class drones is technologically obsolete and highly dangerous for operators due to its vulnerability to dynamic spoofing.
The Operational Challenge
The Ukrainian Defence Forces extensively utilise commercial DJI Mavic class UAVs. The manufacturer has integrated hardware tracking via DJI Aeroscope systems, posing a direct lethal threat to operators. In the spring of 2023, the 'Pryshchepka' method gained popularity, relying on offsetting coordinates via the GNSS module's configuration file.
Analytical Assessment
The 'Pryshchepka' method is frequently conflated with the 'Kanadka' hardware protocol. Critical differences:
'Kanadka': Disables GPS completely, permits take-off without satellite lock, altitude to 1,500m.
'Pryshchepka': Vulnerable to spoofing in ATTI mode, requires GPS for take-off, altitude capped at 500m.
Conclusions and Recommendations
It is strongly recommended to abandon the 'Pryshchepka' offset. Operators must use the 'Kanadka' hardware protocol and physically extract GPS modules from all remote controllers.
