Mobile signal jammer devices become civilian products

In the past two decades, we have seen a dramatic increase in the number of users of mobile communication devices. This has increased the cultural society’s demand for more effective and reliable signal encryptors. Mobile signal jammer devices have become civilian products rather than electronic warfare equipment. As the number of cellular phone users has increased, so has the need to disable cellular phones in certain locations where cellular phones can interfere with ringing. These places include places of worship, lecture halls, hospitals, concert halls, auditoriums, prisons and other places where silence is important. Mobile cell phone jammer are very effective in confidential conference halls, where important information can be passed from the room to the outside without the knowledge of others. Mobile jammers are very effective in disrupting communications between prisoners in prisons.

Run optimized open source software on the backup phone. Therefore, they fool the radio antenna mast like a portable jammer and dip the frequency into a small part of the interference signal. Wrong calls may prevent text messages and calls from being sent to recipients in the area: fake identities and answer questions with strange names. In the worst case, you can even block text messages. Because the radio station sends hundreds of square kilometers of status information before being called. This process is called paging. The lead author of the study said: “You can send a call to all phones in the area.” It contains an identification number that can be used by any phone to check whether it is on the device. ”

However, the replacement phone will answer these questions and accept them, make calls and text messages faster than other phones. At the transmission tower, it seems that the actual receiver has been notified. But he didn’t learn anything. In the best case, only the phone will be lost and no calls will be made. In the worst case, even text messages may be intercepted and read due to broken encryption and lack of authentication. So far, computer scientists have tested the GSM standard only more than 20 years ago, but have used many modern smartphones when necessary. In addition, the researchers said, this gap threatens the communication between machines and the future Internet of Things. New UMTS or LTE networks may also be vulnerable. Gold said: “Many GSM agreements are duplicates.