Jammers devices also include Wi-Fi jammers and cell phone jammer which can prevent your mobile phone from receiving or making calls, emails and text messages. They can also prevent your Wi-Fi enabled device from getting connected to the internet for several operations, prevent you from receiving the exact positioning signals with the use of GPS, and prevent you from getting located by a first responder in an emergency.
The Arexis [escort] jammer pod has the capability to screen and so protect the approach and departure of entire strike formations against lower frequency radars by the smart utilisation of DRFM-based jamming techniques, such as smart noise, coherent false targets and various saturation techniques.
But the service still kept MAPS going in the background. Its goal became developing an open architecture — the Modular APS Framework (MAF) — that could used on any current or future armored vehicle to plug-and-play the best radars, jammers, and hard-kill shooters from different vendors. That way, the Army can easily update vehicle protection with whatever new technology becomes available from any vendor.
Jamming GPS is a bit more difficult when the trajectory is made many miles away. US missiles ballistic missiles usually have their destination in mind well before they are close to the target. They also have a nifty method of calculating distance to the target that isn’t reliant on GPS as they get closer. Even then, GPS disruption is very difficult on a large scale. But is isn’t too difficult to cause minor changes, just enough to make super precise weapons ineffective. When you know someone is going to be operating in a very specific area, like the ships we broadcast to the whole world. Or lets say, one of our stealth drones that we kept flying on the same recon mission over and over again (looking at Iran). It’s easier to fuck with. Because you know pretty much exactly where they are operating, so you can focus on that specific area. It makes it easy to fuck with training operations.
Advancements in electronic warfare are one of the key components guiding the development of autonomous systems for the military. For now, drones are conducting electronic warfare against cellular communications, but it’s not hard to imagine the same doctrines applied with new technology. In that scenario, it easy to picture other vehicles transforming into jamming machines on future battlefields … and maybe even present ones.
Deauthentication attacks, or more generally “jamming”, might violate certain laws or regulations, depending on the country. However it is often hard to identify the jamming source, because it can be small and easily hidden.