Signal Inhibitor Solutions Use of Jammers in Prisons

Total Page:16

File Type:pdf, Size:1020Kb

Signal Inhibitor Solutions Use of Jammers in Prisons JAMMERS IN PRISONS: Characteristics, impact and alternative solutions Signal Inhibitor Solutions Use of jammers in prisons GSMA LA 1 JAMMERS IN PRISONS: Characteristics, impact and alternative solutions The GSMA represents the interests of mobile operators BlueNote Management Consulting specialises in worldwide, uniting more than 750 operators with over the telecommunications and media sector, working 350 companies in the broader mobile ecosystem, on strategy, public policy and regulation projects including handset and device makers, software in collaboration with the private sector, official companies, equipment providers and internet agencies and regional entities. companies, as well as organisations in adjacent industry sectors. The GSMA also produces industry-leading BlueNote has two offices, in Buenos Aires events such as Mobile World Congress, Mobile World (Argentina) and Bogotá (Colombia). Its team of Congress Shanghai, Mobile World Congress Americas consultants has a wide range of qualifications and and the Mobile 360 Series of conferences. experience in the telecommunications and media sector, gained in consultancy and public and For more information, please visit the GSMA corporate executive positions. BlueNote operates primarily website at www.gsma.com in Latin America, where its consultants have been Follow the GSMA on Twitter: Twitter: @GSMA and @ involved in technical, regulatory and economic GSMALatam aspects of the sector for more than 15 years. www.bluenotemc.com 2 GSMA LA JAMMERS IN PRISONS: Characteristics, impact and alternative solutions Table of Contents 1. EXECUTIVE SUMMARY 4 2. INTRODUCTIONS 7 3. GENERAL CONCEPTS OF SIGNAL INHIBITORS AND MOBILE NETWORKS 8 3.1. RADIO PROPAGATION BASICS 9 3.2 BASIC PRINCIPLES OF MOBILE NETWORKS 10 3.3 MOBILE SIGNAL INHIBITORS (JAMMERS) 14 3.4 IMPACT OF MOBILE SIGNAL INHIBITORS (JAMMERS) 19 4. INTERNATIONAL EXPERIENCE 22 4.1. OVERVIEW OF MOBILE SIGNAL INHIBITORS (JAMMERS) IN LATIN AMERICA 23 4.2. COMPARATIVE ANALYSIS OF REGULATORY FRAMEWORKS ON THE USE OF 25 JAMMERS 4.3. GOOD PRACTICE IDENTIFIED 29 5. ALTERNATIVE TECHNICAL SOLUTIONS 30 5.1. DESCRIPTION OF ALTERNATIVE TECHNIQUES AVAILABLE ON THE MARKET 31 5.2. ANALYSIS OF ALTERNATIVES 34 5.3. CONCLUSIONS AND RECOMMENDATIONS 36 6. REFERENCES 37 ANNEX I. CASE STUDIES 38 ANNEX II. REGULATORY FRAMEWORKS ON THE USE OF JAMMERS 40 GSMA LA 3 JAMMERS IN PRISONS: Characteristics, impact and alternative solutions Executive summary The use of mobile communication devices smuggled establish or maintain stable communication. Jammers into prisons is one of the main drivers for implementing treat all communication attempts the same and do not technical solutions to block, restrict or inhibit mobile distinguish between different users trying to establish communications signals. One of these solutions is the a connection. This means they cannot discriminate use of mobile signal inhibitors (jammers). between terminals in their coverage area or prevent blocking of emergency numbers. Signal inhibitors or blockers, commonly known as jammers, are radio devices that intentionally transmit In other words, regardless of whether communications signals to affect, block, interfere with or saturate the are authorised or targeted for restriction, blocking will communications services of mobile users. This includes depend on the power level of the signals generated calls, text messages, GPS positioning signals, data by the base station or the mobile device and the services and Wi-Fi networks. power level of the interfering signal. Given the inherent functionalities of mobile phone networks and the These devices are governed by commercial many radio propagation characteristics that affect communications systems and radio propagation the definition of a coverage area, there may be points characteristics. Their coverage depends on two factors in the area targeted for blocking, where calls can be - 1) its design (e.g. including transmission power and established or data services can be accessed. Similarly, filter quality) and 2) radio propagation factors (the there may be points beyond the defined area where frequency it transmits on environmental obstacles communications services are blocked. such as buildings, trees and bodies of water, which can reflect or refract signals or cause them to take several Blocking mobile frequency bands is not sufficient paths). to prevent covert communications, because other services or technologies can be used, including Wi-Fi, Signal inhibitors (jammers) generate a signal that is VHF (walkie talkies) and satellite. intended to interrupt communication between the base station of a communications network and a user’s mobile device. This reduces the ratio between the useful or real signal and the interfering signal measured on the device or at the base station. In these conditions, no digital signal recovery mechanism can differentiate between the signals and it is impossible to 4 EXECUTIVE SUMMARY JAMMERS IN PRISONS: Characteristics, impact and alternative solutions The most common impacts of the use of jammers are: The Latin American countries surveyed all have similar experiences in respect to addressing unauthorised a. Communications are blocked beyond the communications from prisons. Points in common prison grounds, preventing users from accessing include the background context, the initiatives for authorised communications services, including solutions and the institutions involved. In the countries emergency calls. studied, unauthorised use of radio devices that intentionally or maliciously interfere with authorised b. Communications services are degraded the communications is classified as a clandestine, or area surrounding prisons, resulting in constantly unlawful use of spectrum. In the United States, the sale, dropped calls, poor quality of communications marketing and importing of these devices is restricted and slow data services. by legislation, although exceptions based on public safety or general interest allow their use in confined c. Using jammers with poor quality filters and spaces, such as prisons. In all the cases examined, it is a transmitters can generate harmful emissions requirement that communications services beyond the outside the operating band, affecting radio prison grounds must not be affected. services that operate in other bands. The following table provides a summary of the main d. When jammers operate in multiple frequency regulations passed in Latin America on the use of bands, they can generate harmful interfering jammers. signals in other bands and affect all types of services. They may even obstruct the work of police by blocking law enforcement radio communications systems, due to a phenomenon known as intermodulation products 1. e. Blind spots can occur inside prisons, where unauthorised communications can still be established. FIGURE 1 Regulations on jammer characteristics and installation procedures Source: BNMC 1. Comments made to the NTIA by the industry about the deployment of jammers in prisons (NTIA, 2010) EXECUTIVE SUMMARY 5 JAMMERS IN PRISONS: Characteristics, impact and alternative solutions In the countries studied, national laws and regulations ShawnTech, CellAntenna and SESP, five basic categories state that under prison regulations and the of technology solutions for controlling unauthorised competences of the institutions involved, responsibility communications from correctional centres can be for implementing signal blocking solutions lies with identified: i) blocking by generating interfering radio detention centres and prisons. Telecommunications signals with some selectivity, ii) capturing communications authorities have a role in advising and developing to control access to commercial networks (Managed regulations applicable to the sector, while Access Systems), iii) techniques that mimic a mobile communications service operators have a cooperation network cell but do not allow access to services (dummy and advisory role. cells), iv) detection, and v) hybrid solutions combining two or more of these techniques. Based on the experience in the countries studied and the product portfolio of some of the leading The following table provides a comparative analysis of the manufacturers of call restriction solutions, such as Harris, alternatives available. FIGURE 2 Comparative analysis of alternatives Source: BNMC The table shows that the technical alternatives available The problem of unauthorised communications from on the market to restrict unauthorised communications prisons must be addressed across the board. This from prisons do not perform satisfactorily across involves revising security procedures to restrict the the differing factors analysed. Thus, each prison entry of communications devices into prisons, blocking should be studied individually to identify the solution or restricting unauthorised communications, detecting that best meets its needs and priorities. It is also and seizing contraband terminals that have entered advisable to adopt good practice in the installation of prisons, and analysing intelligence information to follow radiocommunication systems suggested by the industry up incidents and identify patterns of behaviour to avoid and constantly monitor their impact. reoccurrence. 6 EXECUTIVE SUMMARY INTRODUCTION 7 JAMMERS IN PRISONS: Characteristics, impact and alternative solutions Introduction The use of mobile communication devices smuggled This document is structured as follows: into prisons to commit offences such as threats, extortion
Recommended publications
  • Mobile Phone Jammer.Pdf
    Mobile Phone Jammer By:- Himanshu Pandey EI-040, Galgotias College Of Engg. And Technology What Is It????? The GSM Jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located canǯt communicate. The basic idea was for military use That was called DzDenial Of Service Attackdz. Why might cell phone use be destructive? How do they work? Jammers simply overflow the frequency used by wireless phones with radio waves. Jamming signal needs enough power to collide and cancel GSM signal. Cell- phones are designed to increase their power when facing low level interface. Jammer should recognize that power . Power of Jamming signal should match the power increase from the phone. Sophisticated Jammers can block several networks to head off dual or tri-mode phone that automatically switch among different network to find open signal. High end devices can block all frequencies. GSM( Global System For Mobile Communication) ranges- Europe- 900 MHz Asia- 1800 MHz USA- 1.9 GHz Types of Jammer Type DzAdz:- Jammer Type DzBdz:- Intelligent Cellular Disablers Type DzCdz:- Intelligent Beacon Disablers Type DzDdz:- Direct Receive And Transmit Jammers Type DzEdz:- EMI Shield Or Farady Cage Type ũAŪ :- Jammer Overpowers communicating signal with a stronger signal. Independent Oscillator. Having only one jamming signal. Very poor frequency selectivity. Leads to interference with a larger amount of spectrum than it was originally intended to. Brute-face type of jamming- Blocks everything. High power consumption. Type ũBŪ :- Intelligent Cellular Disablers Acts as a Detector.
    [Show full text]
  • An Architecture Design of Novel Mobile Jammer Using FPGA
    DOI 10.4010/2014.254 ISSN-2321 -3361 © 2014 IJESC Research Article September 2014 Issue An Architecture Design of Novel Mobile Jammer using FPGA 1 2 M. Raveendranad , Mr. D.M.K. Chaitanya M Tech (VLSI) 1, M.E. (Ph.d), M.B.A, Associate Professor & Head,Dept. of ECE2 Avanthi Institute of Engineering & technology, Hyderabad. Abstract: Mobile Jammer is one of the instruments used to prevent the cellular phones from receiving signals from Base Stations. Cell Phone Jammers are very useful to the society from the anti social elements by using the mobile jammers. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the cell phone working not the signal receiving from Base Station, which make effective use of the situation where jammers actually used.By using the FPGA and RF technology to implement low cost jammers is implemented. Keywords: Jammers, Mobile Jammer, FPGA, RF Transmitter, RF Receiver, LCD. Introduction Mobile Phone Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, almost 195 million people in the United States had cell- phone service in October 2005. And cell phones are even more ubiquitous in Europe. A Mobile Phone Jammer is basically defined as a Device that stops any communication process within Phones. Due to the rising Number of Mobile Phone Subscribers, there are also rising concerns such as breach of privacy and cheating at exams in Schools/College/University. Mobile Phone Jammers are also use to disrupt communications by outlaws and rebels, Inside Cell Phone Jammers which hampers their illegal and violent Operations.
    [Show full text]
  • Wireless Jamming Networks with VLSI 1Diddi
    International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 2229-5518 2042 Wireless Jamming Networks with VLSI 1Diddi. Saritha ,2 CH. Sridevi Reddy 1,2 Department of Electronic and Communication Engineering, SR Engineering College Warangal. Email:[email protected] Abstract— A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer effectively disables cellular phones. These devices can be used in practically any location, but are found primarily in places where a phone call would be particularly disruptive because silence is expected. But the existing mobile phone jammers are having several defects so we are going to design a new mobile phone jammer using VLSI Technology which will be more efficient than existing jammers. Index terms— Jammers, Mobile Jammer, FPGA, RF Transmitter, RF Receiver, LCD, Frequency Jamming. ------------------------------------------------------------------------------------------------------------------------------------------------------------ The choice of mobile jammers are based on the required range starting with the personal pocket mobile jammer 1. Introduction that can be carried along with you to ensure undisrupted meeting with your client or a personal portable mobile mobile phone jammer is an instrument used to jammer for your room or medium power mobile jammer or high power mobile jammer for your organisation to A prevent cellular phones from receiving signals very high power military jammers to jam a large from base stations. When used, the jammer campuses. effectively disables cellular phones. These devices can be used in practically any location, but are found 2. Need & History of Jammers primarily in places where a phone call would be The rapid proliferation of cell phones at the beginning particularly disruptive because silence is expected.
    [Show full text]
  • Jammers: a Case Study
    ISSN XXXX XXXX © 2017 IJESC Research Article Volume 7 Issue No.6 Jammers: A Case Study Subodh Chouhan1, Sushil Kumar2, Aman Singh3, Prateek Rawat4, Vishwajeet Singh5 Student1, 2, 3, 4, 5 Department of Electronics & Communication Engineering1, 2, 3, 4 Department of Mechanical Engineering5 Technovision Education Group, Lucknow, Uttar Pradesh, India Abstract: It’s a comprehensive analysis of three types of jammer known today. The mobile phone, radio & radar jamming techniques are discussed here, the legality of the issue at international level in different countries & the subtypes of it. The counter measures of radar jamming are also discussed in brief. Also the electronic circuits of following are shown. Keywords: Jamming, Interference, Subtle, Stealth, Chaff, Decoys, Corner Reflectors, Spot, Sweep, Barrage I. INTRODUCTION ii) Australia: Illegal to operate Mobile Phone Jammer, supply or possess unless the user(agency) has a National PMTS MOBILE PHONE JAMMER C telecommunications license under the Radio communications (Interpretation) Determination2000. iii) Brazil: Illegal, but installation of the device in jails has been proposed for security reasons. iv) Canada: Illegal, except by federal law-enforcement agencies who have obtained approval. v) European Union: Highly Illegal, according to the rule of European Commission's "Interpretation of the Directive 1999/5/EC". vi) New Zealand: Illegal to sell& marketing, manufacture or use unless one holds prior permission. Legal inside jails by Department of Corrections, Govt. of New Zealand. vii) Pakistan: Illegal to use without prior permission. The Figure.1. Mobile Phone Jammer individuals or institutions must get No Objection Certificates (NOCs) before installation of such devices from government or A mobile phone jammer is an instrument used in defense & associated agencies.
    [Show full text]
  • Study of Mobile Phone Jammer Technique
    International Journal of Computer Sciences and Engineering Open Access Review Paper Vol.-6, Issue-7, July 2018 E-ISSN: 2347-2693 Study of Mobile Phone Jammer Technique Waman R. Parulekar1*, Damini D. Bhingarde2 1Department of MCA, Finolex Academy of Management and Technology, Ratnagiri 2Department of MCA, Finolex Academy of Management and Technology, Ratnagiri *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 10/Jul/2018, Published: 31/Jul/2018 Abstract— the following research paper presents an overview of mobile phone jammer technique. It focuses on study of mobile jammer, its components, architecture and different types of jammers. With the increased use of mobile phone it has been observed that and different studies proved that mobile phone caused many accidents. Unnecessary use of mobile phone is creating disturbance in public places. Mobile phones are being used for many unethical purposes. The solution to this problem is the use of mobile jammer. This paper gives clear idea about the use of jammers and how mobile jammer works. Keywords— Jammers, Mobile, Mobile Jammer, Jammer Devices I. INTRODUCTION for pleasant purposes. Factory espionage, exaction - not all criminal activities, it is just a small elements of the activity A mobile phone jammer or trammel is a tool which in which cellular phones are involved. In the 21st century purposely blocks transmitting or receiving signal from device humanity was faced with the issue of unrestricted "flooding" to base station. Jammer prevent device from receiving of mobile devices. Conference halls, theatres, etc. are forced incoming signal. Jammers first used by military to jam signal to use the phone jammers in those locations where it is from transmitter to receiver.
    [Show full text]
  • End of Trust Interior Pages Lores.Pdf
    Something Went Wrong 0003 © 2018 McSweeney’s Quarterly Concern assisted by: Mieko Anders, Rachel Z. and the contributors, San Francisco, Arndt, Amy Barnes, Landon Bates, Ellie California. Issue 54, The End of Trust— Bozmarova, Rita Bullwinkel, Jessica otherwise referred to as “Long Island DeCamp, Tasha Kelter, Trang Luu, Iced Tea Shares Went Gangbusters After Jane Marchant, Christina Ortega, Lydia Changing its Name to Long Blockchain” Oxenham, Leon Pan, Alexandre Pomar, and Other Oddities of the Fourth Industrial Enzo Scavone, Courtney Soliday. Revolution—is distributed under the terms web development: Brian Christian. of the Creative Commons Attribution- publishing associate: Eric Cromie. copy NonCommercial-NoDerivatives 4.0 editor: Daniel Levin Becker. founding International License and may be freely editor: Dave Eggers. executive and distributed in its original, unmodified editorial director: Kristina Kearns. form for noncommercial purposes, as art direction: Sunra Thompson. long as the author(s) and collection are managing editor: Claire Boyle. properly attributed and the CC BY-NC-ND standards are followed. jacket and interior illustrations: Sunra Thompson. The pieces in this collection are under copyright by their respective authors sidebars compiled by: for them to do with whatever they damn Landon Bates, Trang Luu, Leon Pan. well please, and, unless otherwise noted below, are distributed under the Creative editorial advisors: The Electronic Commons Attribution 4.0 International Frontier Foundation, with special License. “Search Queries of Visitors thanks to Bill Budington, Cindy Cohn, Who Landed at the Online Litmag The Andrew Crocker, Bennett Cyphers, Big Ugly Review, but Who, We Are Pretty Hugh D’Andrade, Cory Doctorow, Elliot Sure, Were Looking for Something Harmon, Aaron Jue, Jason Kelley, Dave Else” by Elizabeth Stix and “The Digital Maass, Corynne McSherry, Soraya Blues” by Jennifer Kabat are distributed Okuda, Seth Schoen.
    [Show full text]
  • Mobile Phone Jammer - Wikipedia, the Free Encyclopedia
    Mobile phone jammer - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Mobile_phone_jammer Mobile phone jammer From Wikipedia, the free encyclopedia A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer effectively disables cellular phones. These devices can be used in practically any location, but are found primarily in places where a phone call would be particularly disruptive because silence is expected. Contents 1 History 2 Operation 2.1 Antenna 2.2 Circuitry 2.3 Power supply 3 Legalities 4 Notes and references 5 External links History The rapid proliferation of cell phones at the beginning of the 21st century to near ubiquitous status eventually raised problems such as their potential use to invade privacy or contribute to rampant and egregious academic cheating. In addition public backlash was growing against the intrusive disruption cell phones introduced in daily life. While older analog cell phones often suffered from chronically poor reception and could even be disconnected by simple interference such as high frequency noise, increasingly sophisticated digital phones have led to more elaborate counters. Cell phone jamming devices are an alternative to more expensive measures against cell phones, such as Faraday cages, which are mostly suitable as built in protection for structures. They were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. Some were also designed to foil the use of certain remotely detonated explosives. The civilian applications were apparent, so over time many companies originally contracted to design jammers for government use switched over to sell these devices to private entities.
    [Show full text]
  • Sentinel Project
    SENTINEL PROJECT REPORT ON GNSS VULNERABILITIES SENTINEL Project – GNSS Vulnerabilities The SENTINEL Project investigated a number of interconnected activities involving mission-critical or safety-critical services which need to be able to “trust” GNSS signals at the point of use. The SENTINEL Project was concerned with GNSS interference and jamming, and techniques for mitigating such jamming. This Report also records some of the world-wide press and television coverage stimulated by presentations of the results of SENTINEL at numerous conferences and symposia. PROPRIETARY INFORMATION THE INFORMATION CONTAINED IN THIS DOCUMENT IS THE PROPERTY OF CHRONOS TECHNOLOGY LIMITED. EXCEPT AS SPECIFICALLY AUTHORISED IN WRITING BY CHRONOS TECHNOLOGY LIMITED, THE HOLDER OF THIS DOCUMENT SHALL KEEP ALL INFORMATION CONTAINED HEREIN CONFIDENTIAL AND SHALL PROTECT SAME IN WHOLE OR IN PART FROM DISCLOSURE AND DISSEMINATION TO ALL THIRD PARTIES TO THE SAME DEGREE IT PROTECTS ITS OWN CONFIDENTIAL INFORMATION. © COPYRIGHT CHRONOS TECHNOLOGY LIMITED 2011. Registered in England No. 2056049. Registered Office: Stowfield House, Upper Stowfield, Lydbrook, GL17 9PD. VAT No: G.B. 791 3120 44 N.B. Only documents bearing the Document Status ‘APPROVED CHRONOS DOCUMENTATION’ in the panel below are deemed official literature. Originated by: Prof. Charles Curry. BEng, CEng, FIET Title: Managing Director, Chronos Technology SENTINEL Project – Report on GNSS Document Status: RELEASED Vulnerabilities 04 April 2014 Page 1 of 59 RECORD OF ISSUE Issue Date Author Reason for
    [Show full text]