The electromagnetic gun can also shield all wi-fi, 3G and 4G communication signals within a radius of two kilometers by emitting an invisible electromagnetic beam. These functions are what the current counterterrorism operations require.
It is reported that the British government to popularize this technology, can let smartphone into the car automatically entered into a state of not connected to the Internet, and both the Internet and telephone network, cannot use. That would prohibit drivers from using their phones while driving. But others have raised questions about the signal jammer in the car, making it impossible to use the phone.
South Korean government officials report that the jamming operation, which began in late March, has been targeting aircraft navigation equipment. North Korea has reportedly broadcast a jamming signal on 100 occasions. A total of 962 planes have been affected by the jamming, as well as nearly 700 fishing vessels. The jamming has also affected cell phone base stations.
For example, trackable interference, aka spoofers, likely generate the entire GPS-like constellation and transmit from a common point; thus, these signals generate exogenous constellation-wide delay (i.e., in a bend-pipe versus line-of-sight RF transmission). Other defining characteristics of a malicious interference may include increased energy (i.e.,cell phone jammer), clock drift/offset coloring, inter-satellite interference, etc.
All four satellite navigation systems, the signals of which the Pole-21 must combat, use closely spaced frequencies, which end up in the interval from 1176.45 to 1575.42 MHz. The fact that even a transmitter with an output of a total of 20 watts in order to jam the radio signals in this range in a radius of 80 kilometers attests to the latest Russian system’s capabilities to create an impenetrable jamming dome
Stopping drones is difficult. “Technological solutions to detect and disrupt drones are in their infancy,” Rosenstein said, adding that the Justice Department supports regulatory changes that would make it easier to deploy interdiction technology and cellphone jamming.
Phones are attracted to a fake network. It is selective – staff or nearby residents’ phones can be put on an unaffected “white list”. Success can be quantified – phones, and their owners, can be identified. Illicit phones can be monitored rather than blocked. It is more expensive than blanket jamming.