Sunday, October 4, 2009

Cellular Jammer- Cellular Jammers & IED Jammers


Jammers Objectives in Military and Law enforcement applications.

TYPES OF RF Jammers under review: Cellular Jammers & IED Jammers
What is a Cellular Jammer?
A Cellular Jammer is a device intended solely for the disruption of cellular handsets within proximity of the jammers' jamming signal, or, if placed or directed at a local cellular antenna tower, a Cellular Jammer can jam the tower from receiving transmissions from cellular handsets throughout a geographic region.
What is an IED Jammer?
An IED Jammer is a device intended to jam radio equipment used as radio triggers for Improvised Explosive Devices (IED). By definition, IEDs are built from home made appliances and chemical ingredients, compared to military grade remote controlled detonators used for radio controlled weapons.
Origins of RF Jammers

Objectives: Cellular Jammers:

Cellular Jammers were designed to maintain cellular communication silence to block criminals from communicating to each other or to the media. Originally, Cellular Jammers were intended to deal with the nuisance levels stemming from the abuse of cellular phones in public places such as concert halls, restaurants, libraries, churches, etc. Additional applications for security and protection involve blocking cellular communication in secure facilities and research centers, and also the management of cellular communications in restricted areas such as correctional facilities, army barracks, or government offices.

Objective :IED Jammers

IED Jammers were built to combat suspected explosive devices and to prevent covertly planted bombs from receiving remote control radio trigger signals sent by terrorists and insurgents. IED Jammers were designed to perform based on the premise that the manufacturers who built Jammers understood the rudimentary nature of those terrorists or insurgents building Improvised Explosive Devices. This understanding is vital when designing and building an electronic countermeasures solution to defeat roadside bombs from going off by means of radio trigger switches.
RF Jammer Goals


Deployment goals of Cellular Jammers:

Cellular Jammers are used in any location where cell phone use is prohibited, unauthorized, or unwanted either due to location or event sensitivity. Examples include: hostage situations, law enforcement stake outs -- wherever one finds terrorist or illegal activities -- government offices, air and naval bases, military installations, and especially correctional facilities, where inmates are known to direct outside criminal operations via cell phones.

Deployment goals of IED Jammer:

IED Jammers are used convoys, force protection, VIP and diplomatic transport, and any time one is involved in Explosive Detection work in a high-risk environment or situation, such as VIP or Executive Protection, military convoys, border security patrols, and road or countryside vehicle checkpoints.
Part II - RF Jamming Methodology
Without revealing too much about the sensitive nature of countering Remote Controlled Improvised Explosive Devices, an explanation is offered outlining the proper way to neutralize remotely detonated IED weapons such as roadside bombs, car bombs, and remotely ignited mines for ambushes.
Fact: IED Jammers are designed to counter a Remote Controlled Improvised Explosive Device (RCIED) or roadside bombs.

IED Jammers like the Bomb Jammer ?

line of RF Jammers can manually and automatically block radio signals located at frequency ranges of cellular phone bandwidths and beyond. These Bomb Jammers are user programmable, as well as factory programmable, and that means if the operator decides to jam radio signals at all frequencies deemed to pose a threat (be they cellular phone frequencies, or other areas of the RF spectrum), then this IED Jammer can broadcast the proper level of RF interference within the whole spectrum.
Fact: Cellular Jammers are designed to block radio frequencies used by cellular phones only.

What jamming methods are used in most Cellular Jammers and how are they detrimental when dealing with Improvised Explosive Devices? Cellular Jammers from most manufacturers operate using Swept Spectrum criterion to create output power levels that overcome the cellular signals targeted for jamming. When manufactures use this method of Swept Spectrum jamming with the goal in mind to attack triggering mechanisms of an IED or Cellular Phone IED, dangerously high levels of output power are required to create a 'jam wave' that can stifle or prevent the receiver from receiving a detonation signal.


These high levels of output power used for SWEPT SPECTRUM Jamming can accomplish basic jamming needs, yet this particular technology is not one to be relied upon, as it was introduced for jamming communications and cell phones, not RCIED's. The byproduct of the 'high power' given off during the operation of Cellular Phone Jammers is HEAT. Even with heat sinks and fans installed into the Cellular Jammming hardware, heat makes the Cellular Jammer susceptible to overheating, and can lead to the failure of primary RF Jamming requirements.

In addition, Cellular Jammers disseminating abnormally high levels of energy to accomplish the jamming of an IED's remote controlled trigger can have an effect on the health of those exposed to Swept Spectrum jamming operation.
For more information on how harmful effects may arise during the exposure of people to EM energy fields by frequency emissions ranging from 3 kHz to 300 GHz, a white paper that bears importance to RF Jamming may be viewed here:
http://standards.ieee.org/reading/ieee/std_public/description/emc/C95.1-1991_desc.html


Part III - RF Jamming Accuracies & Misconceptions

What makes up an RCIED or Remote Controlled Improvised Explosive Device? RCIEDs are composed of an explosive payload that is detonated by an explosive detonator or blasting cap which is activated by an electronic radio controlled receiver. This radio controlled receiver can be a cellular phone, yet it can also be a satellite phone, car alarm receiver, garage door opener receiver, cordless phone receiver, two-way radio, portable radio, walkie talkie radio, etc.

So the big question remains: Can a Cellular Jammer or Cell Phone Jammer hinder the radio controlled receiver of: satellite phones, portable phones, 2 Way Radios, remote controlled consumer or commercial electronics, etc.

The answer is YES & NO. Yes, Cellular Jammers may cause some trace levels of interference, however, the radio frequencies are far from Cellular frequency bands and therefore are porous to transmissions from non-cellular based frequencies.
Fact: IED Jammers are designed to counter a Remote Controlled Improvised Explosive Device ( RCIED) or roadside bombs

But the real question to be asked is: Do IED Jammers designed by those who have built Cellular Jammers deviate from the Cellular Jamming architecture in a manner that is fitting to assure that RF Jamming will properly block all threats to be countered?


Broadcasting high levels of radio frequency interference based on oscillation principles originally intended to target Cellular bands is not a reliable way to neutralize Radio Frequency IED threats. Will jamming signals transmitted at the speeds used to counter Cellular Radio Waves be able to saturate the environment and block all neighboring radio frequencies? Cellular Jammer manufacturers never really intended for their technology to spill over into non-cellular based communication bands to block Improvised Explosive Devices from receiving their detonation signals.




Cellular Jammers may have an impact on signal reception, but IED Jammers designed to target threats throughout the spectrum will have a bigger impact. For those who build IED Jammers based upon the configuration and RF Jamming methods of Cellular Jammers, the dangers are inherent in the design, and in interest of safety, should NOT BE USED to counter a Remote Controlled IED. That is why IED Jammers like the Bomb Jammer ? series are more reliable when defending against roadside bombs planted by terrorists or insurgents in hostile territories.




Technology Top Blogs