Use of jammers for mobile phones. The whole truth about how communication jammers work in Russia The difference between cellular communication jammers

Every day we are surrounded by more and more technology that works using wireless networks: mobile phones, smart home gadgets, car alarms, unmanned aerial vehicles.

Unfortunately, these devices are easy to disable. A simple device for a few thousand rubles can neutralize a burglar alarm or cut off cellular communications in an entire office.

If you live in Moscow, then you meet with this regularly in the city center.

In this article, you will learn what kind of household radio frequency suppressors are and for what purposes they are used.

Warning

Jammers can be easily bought on the Internet, but they should only be used with the permission of Roskomnadzor. You can read more about the process of registering radio frequency suppressors in the document Registration of RES and VChU.

Responsibility for violation of the rules for registration of RES and VChU is prescribed in Article 13.4. Code of Administrative Offenses of the Russian Federation. Violation of the rules for the design, construction, installation, registration or operation of radio electronic equipment and (or) high-frequency devices. Individuals are at risk fine up to 500 rubles and confiscation of the device.

How do RF jammers work?

The general principle of operation of all jammers is very simple: they emit a signal in the same frequency range as the device that needs to be suppressed. A field of "white noise" is created around the jammer, in which signals from other sources are lost.

Types of jammers by form factor

Stationary mufflers. These devices are designed to be used permanently in one place and require a network connection to operate. They weigh several kilograms and can simultaneously generate "white noise" on ten or more radio frequency bands.

Portable jammers. Such devices can be carried in your pocket and discreetly turned on as needed, without attracting the attention of others. The battery life of such a device is 1-3 hours.

Portable jammers weigh, on average, 300-700 grams and combine 3-6 antennas to suppress different radio frequency bands.

Cases-blockers. Since the 90s, there have been many legends about the "police mode" built into each GSM phone, which allows the mobile operator to monitor the movements and listen to the conversations of any subscriber.

Usually in such cases there are two compartments. The first compartment is designed to completely block signals, and the second to protect against harmful radiation.

In many countries of the world, high-ranking officials and intelligence officers use specially assembled mobile phones. In Russia, for employees of secret departments, cryptophones SMP-ATLAS/2 and M-549M.

And now let's take a closer look at why suppression of signals in different frequency ranges is used in practice.

cellular

In most cases, cellular jammers are purchased to protect premises from wiretapping using GSM bugs. With a cell phone jammer, you can create silence in the hall at a mass event by blocking incoming calls.

It is possible that soon a law will be passed in our country, according to which cellular communication jammers will be installed in prisons, in schools during the exam, in university auditoriums, theaters and other public places.

Frequency bands:
GSM900: 925-960MHz
GSM1800: 1805-1880MHz
3G: 2110-2170MHz
4G WIMAX: 2570-2690 MHz
4G LTE: 791-820 MHz
CDMA800: 850-894 MHz ( not used by Russian mobile operators since 2010)
PHS: 1900-1930 MHz (Legacy, formerly used in China and Japan)

WiFi/Bluetooth

Such jammers are often combined in one device with cellular jammers. They are designed to block the data transmission channels of wireless cameras. This provides additional protection against information leaks.

If such a jammer is active in the room, then in addition to covert surveillance cameras, routers, wireless keyboards and mice do not work.

Frequency range:
Wi-Fi/Bluetooth: 2400 - 2500 MHz

GPS/Glonass

Service vehicles of truckers and couriers are equipped with GPS beacons that allow the employer to control the location of the employee. But you can protect yourself from such surveillance with the help of an anti-tracker.

A GPS anti-tracker is a small device that is installed in the car's cigarette lighter and blocks the signals of GPS and GLONASS satellites. Some anti-trackers also include a GSM jammer.

GPS and Glonass jammers are also used by car thieves to protect against surveillance of a stolen vehicle.

Frequency bands:
GPS L1: 1570-1620 MHz
GPS and GLONASS L2: 1200-1310MHz
GPS and GLONASS L3: 1380-1410MHz

Radio

In online stores they are sold under the vital name "Antishanson". Such jammers will be useful in minibuses, taxis, shops and other habitats of Radio Dacha and Retro FM listeners.

Frequency range:

FM: 88-108MHz

Also, MP3 players with FM transmitters are used to counter chanson and trolling drivers. With their help, you can not only turn off the radio, but make the entire minibus listen to your favorite tracks.

Audio recording

Microphone jammers are included in the comprehensive eavesdropping protection kit along with cellular and Wi-Fi/Bluetooth jammers. There are two ways to prevent audio recording:

ultrasonic suppression. The device generates ultrasound that is not perceived by human hearing, but creates interference that blocks recording from smartphones and pocket recorders.

acoustic suppression. The device generates an audible "chorus of voices" interference.

A "mic jammer" usually weighs several kilograms, looks like a regular speaker and looks organic in the interior. It is controlled by a remote control that can be hidden in a pocket.

How are jammers masked?

For suppression of radio signals imperceptible to others, jammers camouflaged under various objects are sold in online stores. Portable jammers with a range of up to 15 meters are disguised as purses or packs of cigarettes, and more powerful universal jammers as briefcases, diplomats or interior details.

A program to detect wiretapping of your phone.
. A simple and reliable program for detecting the activity of GSM Monitoring System equipment designed for active and passive interception of voice and data of any modifications of GSM networks. Supports up to 4 GSM bands (850, 900, 1800, 1900), which makes it applicable anywhere in the world where there is a GSM network.

Detects the activity of the following types of spyware:

  • 1. Active GSM Interceptor with A 5.x decoder, which can intercept incoming and outgoing GSM calls and sms with any type of real-time encryption. Work with moving and stationary objects and provide conversations and real-time data, analyze received data, intercept IMSI / IMEI and do selective suppression of GSM traffic in a given area
  • 2. 3G IMSI / IMEI / TMSI Catcher (invader), designed to influence the selected phone to make it switch to GSM mode, in order to be able to intercept data from such a phone by a passive interceptor.
  • 3. Blocker of selected cell phones (Cell Firewall), for selective or mass jamming of GSM/UMTS targets. Based on the Active Base Station, the Cellular Firewall allows authorized GSM/UMTS subscribers to use their phones as usual, receive calls, make, receive and send sms and so on, while unauthorized phones in the immediate vicinity of the system are deprived of cellular services. .
  • 4. GSM IMSI/IMEI/TMSI Catcher (invader), which is designed to detect the presence of GSM phones in the area of ​​interest. The whole system is based on a laptop and a compact mini-BTS and is an active system and thus it causes GSM phones in its vicinity to register to it.
  • and the like...

The program was developed with the advisory support of technical specialists of cellular operators who have a moral conviction about the right of each of us to privacy, the prohibition of any form of arbitrary interference in private life by the state and protection from such interference by third parties.

In progress:

  • 1. Choice between 2 sim.

Pro version:

  • 1.2 Dual sim support
  • 2. Auto-blocking (resetting) the connection of hardware interceptors to your phone.
  • 3. Analysis of the statistics of "interceptors", so that you can see in what places, when and how often, your phone falls into the range of "interceptors"
  • 4. Identification of interceptors. (fortunately, spies usually don't clean up spoofed eavesdropper data, knowing that phone owners don't see GSM connection specs and don't suspect eavesdropping). This will allow you to determine: who listens to you and how often, whether "he" follows you around the city, whether "he" knows where you live and work, and so on. Or you accidentally got into the zone of interceptors. In the longer term
  • 5. Definition of wiretapping through the operator. A very difficult task to implement and without a 100% guarantee of the accuracy of the definition. Will only be in the paid PRO version.
  • 6. Detection of non-selective GSM signal jammers. These are often used by car thieves who, with the help of a signal jammer, block the operation of a car GSM GPS location finder.
  • 7. NEW! 7. Calculation of hacker virtual cells stealing your money from your phone!
  • 8. Notification about disabling encryption of conversations.

Download GSM Spy Finder app for Android you can follow the link below

Based on the SIP protocol. Today I'll just show you some useful programs that will allow you to avoid listening to your phone.

This program differs from the previous one and its main function is to track any suspicious activity on the network, including when using SMS, which can be sent without the permission of the owner of the phone. The application evaluates in real time how secure your network is and what encryption algorithm is used at that moment and much more.




This application also helps to protect your smartphone from any connections to pseudo-bases. The only disadvantage of this program is that you will not find it on Google Play, and if you still want to install it, you will have to tinker with this procedure.

CatcherCatcher

The CatcherCatcher program, like its counterparts above, is engaged in identifying false base stations that attackers (or special services?) use as intermediate "intermediary bridges" between the subscriber and the real base station.

And finally, we recommend using special applications to ensure the security of personal conversations and data, including encrypting your conversations. Similar counterparts are the anonymous web browsers Orbot or Orweb, for example. There are also special programs that encrypt your telephone conversations, photos, and many already use secure messengers.

The emergence of a huge number of listening devices allows third parties to obtain information that no one should know about. But at the same time, equipment is being developed that prevents unwanted guests from entering personal or business life. The simplest option of which is jammers for mobile phones, they are also blockers and suppressors.

Exploitation

Blockers are used to protect privacy, ensure the confidentiality of conversations, and to maintain silence in public places where mobile phones cannot be used. Among the standards that the jammer jams are GSM, GPS, 3G, 4G, less often bluetooth and wi-fi.

Jammer Efficiency depends on several factors. The most common are the degree of battery charge and the distance between the phone and the base station. In the first case, for normal operation, the battery must be full. In the second, the quality of signal suppression is inversely proportional to the distance of the receiving device from the source. Influencing the latter does not seem real, it remains just to take this moment into account.

Depending on the power and available frequencies, mobile phone jammers are able to stop transmitting information from the following devices: GSM and GPS bugs, navigators, trackers and 3G Internet.

The devices protect against information leakage and unauthorized tracking of a person or his vehicle.

Operated The mobile phone jammer is simple - to start, you need to charge, install antennas (if any) and, in fact, turn it on. The first item is optional in devices that have a connection to a household outlet or car cigarette lighter.

Frequencies. To turn off unnecessary frequencies, just use the settings. This method also corrects the inherent frequency parameters, which makes it possible to intercept non-standard signals.

Range of action. A personal mobile phone jammer has a short range of about 20 m. This zone is reduced in the presence of obstacles in the form of walls, so neighbors in the porch will easily use wireless networks.

Device Operation Check (Standard Type)

Powerful stationary jammer

How much does a cell phone jammer cost? The purchase of the simplest option with one frequency range will cost approximately 4-5 thousand rubles. The more standards, and hence the means of communication, can paralyze the device, the higher the price will be.

Products designed for mass use are already sold for hundreds of thousands. For private use, the functions of a product worth more than twenty thousand are hardly useful. In addition, there is a question about the legality of the operation of the equipment.

Legality. What is strictly forbidden is to invade someone else's privacy. And to stop unauthorized encroachments means to protect personal space, here the law supports the user. But, as soon as the action of a personal suppressor extends to gadgets and similar devices of other people, the situation changes in the opposite direction. The layman has no right to do this.

Device features and settings

There are three principles of operation of silencers that suppress the communication of gadgets and bugs with base stations. In domestic conditions, the most convenient second type.

Types of signal jamming:

  1. sending a signal to the phone or bug that causes a malfunction;
  2. the creation of radio interference that blocks the signal;
  3. conclusion in an electromagnetic shield that suppresses signals in both directions.

Device device. The mobile jammer has three main components. The main component is a voltage-controlled generator that creates a connection with the suppressed equipment. An open-loop or closed-loop circuit allows you to adjust the frequency. The produced signal is propagated by an antenna.

Expand coverage Connecting an RF amplification unit will help. This will increase the power of action and the area of ​​coverage, but the operating time will decrease. A homemade device is tuned once to the selected frequency ranges, unlike most industrial products.

Sometimes a charged and turned on jammer does not paralyze calls, mobile Internet and other actions, or it functions at a minimum distance. This suggests that the telecom operator uses non-standard frequencies. The problem is solved by adjusting the settings of the blocker, if such a function is provided by the manufacturer.

Device board

There are two resistors in the circuit - regulating the upper and lower limits. The desired one turns either to the right to increase, or to the left to decrease the frequency. It is important to remember that this method is intended for professionals and in the event of a breakdown, the blocker is not subject to warranty service.

When using a silencer, it is necessary to isolate third parties from its influence. The exceptions are confidential negotiations and maintaining order in places where telephone conversations are prohibited. Technologies are designed to protect against information leakage, surveillance, and they cope with this task.