Back
OPSEC Notice // Public Release

The Analytical Department and our automated systems process thousands of observations. For operational security reasons, the vast majority of reports are distributed solely to the Defence Forces of Ukraine. Only isolated, carefully selected fragments, cleared of in-depth analytics and key findings, are made available to the public.

Unclassified Brief

Critical Vulnerabilities in the 'Pryshchepka' Anonymisation Method

REPORT ID: LL-319
CLEARANCE: UNCLASSIFIED
DATE: Q3 2023

The 'Pryshchepka' anonymisation method for DJI Mavic class drones is technologically obsolete and highly dangerous for operators due to its vulnerability to dynamic spoofing.

The Operational Challenge

The Ukrainian Defence Forces extensively utilise commercial DJI Mavic class UAVs. The manufacturer has integrated hardware tracking via DJI Aeroscope systems, posing a direct lethal threat to operators. In the spring of 2023, the 'Pryshchepka' method gained popularity, relying on offsetting coordinates via the GNSS module's configuration file.

Analytical Assessment

The 'Pryshchepka' method is frequently conflated with the 'Kanadka' hardware protocol. Critical differences:

'Kanadka': Disables GPS completely, permits take-off without satellite lock, altitude to 1,500m.

'Pryshchepka': Vulnerable to spoofing in ATTI mode, requires GPS for take-off, altitude capped at 500m.

Conclusions and Recommendations

It is strongly recommended to abandon the 'Pryshchepka' offset. Operators must use the 'Kanadka' hardware protocol and physically extract GPS modules from all remote controllers.

Related Strategic Line of Effort Electromagnetic Spectrum Operations (EMSO)