Can the idea of uniting phones to act as one large distributed antenna be a viable method for countering the challenges posed by Russian electronic warfare?
An American company focused on system development in Ukraine has proposed that networked cell phones running dedicated software could act as a budget-friendly and simple countermeasure against the sophisticated electronic warfare tactics of Russia.
Russian electronic warfare methods, such as signal jamming and GPS spoofing, significantly hinder the operational capabilities of Ukrainian troops, affecting their ability to deploy drones and utilize advanced U.S. weaponry. The detection and identification of enemy jamming devices typically demand high-quality software-defined radios, which are readily available to the United States and other well-funded military forces. However, smaller militaries, including Ukraine's, face considerable challenges in acquiring these essential technologies in adequate quantities due to financial constraints.
The establishment of an economical system designed to locate enemy jamming equipment could significantly aid Ukrainian operators in regaining an upper hand against their better-armed foes. Moreover, it could lead to a reevaluation of how cellphone network providers secure their devices against sophisticated threats.
During the Christmas season of the previous year, the Ukrainian military contacted Sean Gorman and his group at Zephr, a company that specializes in enhancing devices to resist GPS-signal interference. Zephr quickly dispatched six Android Pixel phones, preloaded with their software, to Ukraine, and in April, they began field testing near the frontlines in Donetsk.
During a discussion with Defense One, Gorman stated that the phones were secured to drones, placed in automobiles, and set up on fixed stands. They have also been performing controlled experiments using their own signal jammers, which allows them to determine the exact location.
The central objective was to ascertain whether standard consumer smartphones, collaborating within a network, could reveal the presence of an entity attempting to jam GPS location data. The researchers found that by analyzing the GPS reception from various phones, they could determine when one or more devices were being compromised.
Gorman indicated, "We are fundamentally harnessing the sensors integrated within the phone. The most advantageous sensor is the raw measurements from the global navigation satellite system (GNSS) that the device offers. This includes automatic gain control (AGC), Doppler sensor data, carrier phase, code phase, and additional information that cell phones gather about their distances from satellites, cell towers, and other network elements."
Manufacturers place these sensors within cell phones to enhance their performance, such as by locating the nearest cell tower. These measurements are vital for the GPS-processing software that enables phones to communicate the user's location. By analyzing data from a variety of phones, it is feasible to identify which devices may be facing security threats.
Gorman indicated that the backend computational AI we are utilizing, combined with the sophisticated processing of signals and software, allows for a wide range of functionalities. Rather than depending only on sensors or costly antenna arrays, there is a remarkable potential in networking phones to work together as a comprehensive distributed antenna system.
The investigations also highlighted new revelations about Russian electronic warfare.
Russia's actions in the Baltic Sea include the spoofing of GPS signals, resulting in receivers showing inaccurate location data. NATO officials have deemed this an unsafe condition for civilian aircraft. A common tactic employed against drones is GPS spoofing, which misguides the drone into believing it is located over an airport, compelling it to either land or retreat from areas of restricted airspace.
On the frontlines in Donetsk, Ukraine’s soldiers often report spoofing attacks aimed at their drones. But Gorman and his team found that much of this “spoofing” activity is actually just high-powered jamming attempts. Because those attempts are occurring in the same frequency bands as GPS or GNSS, they appear like satellite signals, effectively creating phantom or ghost satellites in places where they could not possibly exist and still provide signal, such as beneath the horizon.
Gorman described in a document provided to Defense One that the noise does not conform to the standard GNSS signal profile; however, it does include energy at the frequencies the receiver is investigating for satellite signals. The receiver's signal-processing algorithms utilize correlation techniques to identify and track these signals. The presence of a strong jamming signal can induce false correlations, resulting in the receiver mistakenly believing it is detecting satellites that are not genuinely visible.
The collective, now functioning under a contract with the Ukrainian government, is seeking to elevate their research efforts to not only identify cell phone jammer but also to triangulate their positions, thus allowing for effective avoidance or elimination strategies.
“The new techniques we are building will estimate the location of signals of interest using three inputs: 1. localization by range inferred from power; 2. localization by area of effect, and 3. triangulation of jammers based on angle of arrival,” Gorman said in an email. “Each smartphone will detect the interference signal, log the last known position, and timestamp the reception, providing data points across the network. By aggregating and processing these signals centrally, the system will triangulate the jammer's position.”
The United States military is investing extensively in alternatives to GPS, known as alternative position, navigation, and timing, or Alt PNT, to support individuals, drones, and similar technologies in locating themselves. However, the returns on these investments have, in many instances, been less than satisfactory.
Gorman emphasized that the effectiveness of the system hinges on having an initial known position, which is nearly impossible to ascertain in the absence of GPS.
This networked approach is not designed to replace other, more expensive military systems that focus on detecting and locating jammers. Instead, it offers a solution that can be deployed quickly and at a lower cost for military forces like Ukraine and other organizations that could be affected by jamming activities, such as first responders. While it will not eliminate the need for developing alternative position, navigation, and timing methods, it has the potential to enhance their overall effectiveness.
Gorman remarked that there might be an entirely different way to conceptualize this issue. Rather than dedicating all resources to Alt PNT and GNSS resilience, which are certainly valuable, it may be beneficial to investigate how this situation has come to fruition. He underscored the significance of mapping and comprehending the area concerning the emitters, allowing us to avoid those regions and eliminate the emitters.
The extensive use of wireless communication devices has ushered in remarkable convenience. Although these devices have transformed the way we communicate and access information, they can also be associated with interference, privacy concerns, and security issues. If used in a responsible and legal manner, signal jammers possess the potential to create several positive effects that can improve daily life.
Signal jammers are critical for the enhancement of security and the protection of privacy. In sensitive settings, including government facilities, military installations, and high-security areas, the use of signal jammers effectively prevents unauthorized wireless communications, thereby lowering the risks of espionage, hacking, and unauthorized recording. Furthermore, these devices contribute to the safeguarding of personal privacy in public spaces by hindering unauthorized filming or recording, thus allowing individuals to exercise greater control over their privacy.
Frequency jammers can significantly enhance concentration and productivity in specific environments. In places where silence and focus are critical, such as classrooms, libraries, and offices, these devices can reduce interference from ringing phones, unauthorized wireless device usage, and disruptive sounds. This can lead to an environment that is more conducive to learning, concentration, and effective communication, thereby improving overall productivity and efficiency.
There are multiple strategies to block cell phone signals, the most common of which involves the use of cell phone jammers. These devices transmit particular radio frequencies that disrupt the communication between a cell phone and its nearest base station, thus preventing the phone from making calls, sending text messages, and accessing the internet.
An additional technique for blocking cell phone signals is to utilize a signal-blocking box or bag. These devices are commonly constructed from particular materials that effectively isolate electromagnetic signal interference, effectively placing the phone in a "dead zone" where it cannot receive any signals.
The range of a cell phone signal jammer is subject to considerable variation based on its power output and design specifications. Certain compact, portable jammers may only function effectively within a few meters, making them suitable for confined spaces like classrooms or meeting rooms. In contrast, more powerful jammers can extend their operational range to several hundred meters, successfully blocking signals across a wider expanse.
His Majesty’s Prison is reinforcing its strategies to limit the illegal use of mobile phones by inmates, with the anticipated introduction of mobile phone jammers in the coming weeks.
Lieutenant Colonel Trevor Pennyfeather, the governor of the prison, has confirmed that the implementation of jammers will take place soon as part of efforts to enhance the facility's security measures.
Pennyfeather conveyed, "A new plan is now in effect, and we are progressing well. I believe that in another two weeks, given that the necessary materials are already secured, the signal jammers will be operational, certainly within a three-week period."
Prior efforts to use jammers were thwarted, as inmates discovered ways to interfere with the system. However, with the updated plans, officials are now confident that this approach will effectively eliminate unauthorized mobile phone communications.
This decision is a facet of a more extensive strategy aimed at fortifying prison security and obstructing inmates from utilizing banned devices to maintain criminal operations while behind bars.
I was curious about the range of the jammers and how it would affect members of the public on nearby roads. Jammers have a range and there is not a lot of space between buildings at St John’s. It is important to remember that mobile phones are emergency devices and are at the heart of communications. I think a better approach would be to provide pay phones that prisoners can use and tighten security to remove cell phones. Prisoners should have a way to contact their families. Another issue to consider is moving the jail out of town is long overdue. Let's focus on better solutions and appropriate punishments for violations.
ATLANTA, GA – Attorney General Chris Carr is urging the Federal Communications Commission (FCC) to take immediate action to allow for the use of cell phone jamming devices within state prisons and local jails. The FCC currently prohibits the use of cell phone “signal jammer,” and that prohibition extends to state and local governments. Yet in prisons and jails throughout the country, contraband cell phones are being used to plan and orchestrate violent attacks and other criminal activity, posing a real and substantial safety risk to correctional officers, visitors, inmates, and the public at large.
“The easiest way to protect the public from the harms caused by contraband cell phones is to allow for the use of cell phone jamming technology in prisons and jails, but the FCC continues to block our efforts,” said Carr. “This outdated guidance limits legitimate law enforcement tools, presents dangerous conditions for correctional officers, and allows for the escalation of criminal networks both inside and outside prison walls. We’re committed to combatting violent crime wherever it occurs, which is why we continue to call on the federal government to remove this substantial barrier to public safety.”
In Georgia alone, 8,074 contraband cell phones were confiscated in 2023, with 5,482 confiscated to date in 2024. Recently, an incarcerated leader of the infamous street gang, “Yves Saint Laurent Squad,” used a contraband cell phone to order a hit which resulted in the death of an 88-year-old Georgia veteran. A gang leader in North Carolina was able to order the kidnapping of a prosecutor’s father via a cell phone in prison. In California, prison gangs used contraband cell phones to order murders within the prison system and traffic drugs.
“There are hundreds of examples from across the country of how a contraband cell phone in the hands of an inmate can be used as a deadly weapon and gives them the ability to continue their criminal enterprise. We are incensed by the length these individuals go to in continuing those activities and endangering the public,” said Georgia Department of Corrections Commissioner Tyrone Oliver. “As attempts to infiltrate our facilities with contraband cell phones evolve, access to jamming technology is paramount in our efforts to combat those attempts. We appreciate the support of Attorney General Carr in our ongoing commitment to public safety and the safe operations of our facilities.”
In his letter, Carr notes that the FCC policy relies on a statute enacted in the early 1990s, years before prison inmates began using contraband cell phones to plan and engage in unlawful and dangerous activity.
Carr further states: “Nothing in the language of 47 U.S.C § 333 prohibits the FCC from revising its position to allow state agencies to use cell phone jamming devices in prisons. In fact, the United States Bureau of Prisons has recognized the potential value of cell phone jammer already and is permitted to use jamming devices at several federal penitentiaries, including at least one in Georgia.”
In January 2023, Carr joined a 22-state coalition of attorneys general in urging Congressional leaders to pass legislation that would allow states to implement a cell phone jamming system in correctional facilities.
Carr’s Gang Prosecution Unit has also partnered with the Georgia Department of Corrections (GDC) to investigate and prosecute currently incarcerated individuals who are alleged to have engaged in criminal gang activity and discussions regarding the packaging and shipping of contraband items into a GDC facility.
The principal of a high school in Salzburg wanted to use a jammer to prevent cheating with a mobile phone during written Mathura, and the Ministry of Communications' Telecommunications Office confiscated the transmitter and filed a lawsuit against the principal. He bought the device completely legally from a school supplies supplier in Sankt Pölten. The procedure ended with a warning. Gerhard Klampfer, dean of the Salzburg School of Economics, confirmed the radio report of the Salzburg ORF to APA on Monday.
In teaching, the information here is often photographed, "Klampfer said in an interview. And it's useless to collect mobile phones: "They take two mobile phones, give them to the teacher, and keep their own smartphones. "So he bought this cell phone jammer for about 350 euros and placed it in a conspicuous place next to the toilet at the end of high school. As a result, the signal could not be received within a radius of about 10 meters.
A network operator claims to have noticed this disruption and informed the authorities. "This is the official version. Since only the building itself was disturbed, I doubt that someone had reported the interference," the rector said. Two employees of the telecommunications office arrived with large tracking equipment, found the signal jammers and confiscated it, "causing a big commotion."
The lawsuit was soon launched and the school rector was questioned on June 17, 2011. He made it clear that he had purchased the transmitter legally from a school supply company. "I'm not the only one who bought this equipment, I'm just the only one who got caught." Krampfer eventually suffered a loss: he was warned for violating the Telecommunications Act. Paragraph 74 states that the authorities may only use jammers when it comes to public safety, defense, national security or criminal justice tasks. The maximum fine is 4,000 euros.
This meant that the rector was exempt from disciplinary action. The jammer was returned to the school, but Krampfer had to agree not to use it again. Nevertheless, he was still puzzled by the fact that, as far as he knew, mobile phones sometimes did not work during university entrance exams, such as at the medical school. "I don't know how they did it. "