Wireless signal jammer
||It has been suggested that this article be merged into Radio jamming. (Discuss) Proposed since February 2013.|
||This article needs attention from an expert on the subject. (December 2010)|
|This article needs additional citations for verification. (October 2006)|
Use for denial of service
Wireless signal jammers are most often used to interfere with wireless local area networks (WLAN), a type of denial of service (DoS) attack. Advanced and more expensive versions are used to jam satellite communications. The Wireless Signal Jammer Device can be used to temporarily stop transmission, temporarily short out or turn off the power during the usage of units. These include Radios, Televisions, Microwaves, or any unit that receives electrical signals for operation.
Jammer Device Method:
Intentional communications jamming is usually aimed at electrical signals to disrupt control of a battle. A transmitter, tuned to the same frequency as the opponents' receiving equipment and with the same type of modulation, can, with enough power, override any signal at the receiver.
The most common types of this form of signal jamming are random noise, random pulse, stepped tones, warbler, random keyed modulated CW, tone, rotary, pulse, spark, recorded sounds, gulls, and sweep-through. These can be divided into two groups – obvious and subtle.
Obvious jamming is easy to detect because it can be heard on the receiving equipment. It usually is some type of noise such as:
- Random noise. This is synthetic radio noise. It is random in amplitude and frequency. It is similar to normal background noise and can be used to degrade all types of signals. Operators often mistake it for receiver or atmospheric noise and fail to take appropriate ECCM actions.
- Stepped tones. These are tones transmitted in increasing and decreasing pitch. They resemble the sound of bagpipes. Stepped tones are normally used against single-channel AM or FM voice circuits.
- Spark. The spark signal is easily produced and is one of the most effective for jamming. Bursts are of short duration and high intensity. They are repeated at a rapid rate. This signal is effective in disrupting all types of radio communications.
- Gulls. The gull signal is generated by a quick rise and slow fall of a variable radio frequency and is similar to the cry of a sea gull. It produces a nuisance effect and is very effective against voice radio communications.
- Random pulse. In this type of interference, pulses of varying amplitude, duration, and rate are generated and transmitted. They are used to disrupt teletypewriter, radar, and all types of data transmission systems.
- Wobbler. The wobbler signal is a single frequency which is modulated by a low and slowly varying tone. The result is a howling sound that causes a nuisance effect on voice radio communications.
- Recorded sounds. Any audible sound, especially of a variable nature, can be used to distract radio operators and disrupt communications. Music, screams, applause, whistles, machinery noise, and laughter are examples.
- Preamble jamming. This type of jamming occurs when a tone resembling the synchronization preamble of the speech security equipment is broadcast over the operating frequency of secure radio sets. Preamble jamming results in all radios being locked in the receive mode. It is especially effective when employed against radio nets using speech security devices.
Various combinations of these methods may be used often accompanied by regular morse identification signal to enable individual transmitters to be identified in order to assess their effectiveness.
The purpose of this type of jamming is to block out reception of transmitted signals and to cause a nuisance to the receiving operator.
Subtle jamming is not obvious, which no sound is heard on the receiving equipment. The unit does not receive incoming signals yet everything seems superficially normal to the operator. These are often technical attacks on modern equipment, such as "squelch capture".
Use to enhance security
Wireless signal jammers are also used to enhance the security of wireless LANs by jamming the wireless signals in a restricted geographical area.
- "EU Challenges Iranian Satellite Jamming", Space Daily. March 23, 2010. Accessed June 17, 2011
- Communications Techniques: Electronic Counter-Countermeasures, FM 24-33, Department of the Army, Washington, DC 17 July 1990
|This electronics-related article is a stub. You can help Wikipedia by expanding it.|