Jamming involves pumping out RF in the frequency range they are using enough to overpower their own signals. So, you need power and you need to know the frequency range. Since RF drops off as the square of the distance, unless you can aim it very carefully, you have to be close or have lots of power. They don’t really publish exactly where it is you need to point, so go with needing lots of power.
As the drone industry is taking off, some individuals and groups have started using drones for malicious purposes around the globe. Many companies are watching the trend and are trying to get into the counter drone industry. They have introduced all sorts of drone guns, anti-UAS shotgun shells, attack birds, net cannons, lasers, missiles, radio signal jammers, radio spoofers, etc.
A new generations of GPS jammer were introduced too, they could cover a broad range of frequencies and perform specific “set-on” jamming which mean that “rather than confuse a receiver with a modified version of its own signal, Duke had a series of built-in jamming responses, designed to fool very specific devices.” And as jammers got better, the insurgents in Iraq largely abandoned the use of IEDs and deaths from IEDs dropped.
The Central Board of Secondary Education says that the cell phone jammer, if installed, would also block access to the internet-based educational programmes run by many schools.There are plenty of legal application for such a use case besides jamming, no need to attack the OP for asking. Also I personally would like to know as well, how wide can you get this thing to transmit. Plenty of SHF and higher apps for that too.
The Navy sent to Iraq hundreds of electronic warfare specialists, to bring the cacophony produced by 14 kinds of jammers into some sort of harmony. Protocols were established, to allow one device to send its signal and then go silent for a few milliseconds, so another gadget could broadcast; that allowed Warlock Red and Warlock Green to be packaged into a single, combination unit…The intelligence specialists at the Combined Explosive Exploitation Cells got faster and faster at analyzing which frequencies the insurgents were using. That, in turn, allowed the jammers to be updated more quickly, so they could counter emerging threats.