GNSS Jammers

GNSS is a general term describing any satellite constellation that provides positioning, navigation, and timing (PNT) services on a global or regional basis.
GNSS coordinate systems are used for many projects such as navigation and surveying in geographic areas where terrestrial survey control is sparse or unavailable.

GNSS Jammer can protect against tracking, jamming, and spoofing of GNSS signals – GPS, GLONASS, Galileo, BeiDou, and QZSS. The particular of this device is that the strong static magnetic field (over 8,000 Gauss) completely disables the GNSS receivers and makes the target invisible to your enemy.

Security missions operations at secured zones, compounds, airports, VIP protection, Special Forces, etc. are targeted by extremist, hostile elements, subversives, criminal organizations, and even private individuals by using unmanned small aerial vehicles (UAV or Drones), these systems have been used in certain cases for direct and indirect attacks including the delivery of grenades, improvised explosive devices, such as smuggling of drugs and cellular devices into prisons and invading non-flight zones.
To mitigate the risks faced, a solution to counter the threat from hostile small UAVs of Drone types: Nano, Micro, and Mini UAVs, using mostly unrestricted frequencies, is required.

Our Solution

GNSS spoofing can be used for a variety of purposes, such as redirecting a vehicle to a different location or causing a drone to crash.
The attack works by transmitting a signal that mimics the GPS signal that a receiver would normally receive, but with modified timing or positioning data.
Spoofing attacks can be difficult to detect, as the receiver may not be able to distinguish between a real and a fake signal.
GNSS spoofing attacks can be carried out using relatively low-cost equipment, making them accessible to a wide range of attackers.
As GNSS technology becomes more ubiquitous, the potential for GNSS spoofing attacks is expected to increase.

Highlights

  1. GNSS spoofing can be used for a variety of purposes, such as redirecting a vehicle to a different location or causing a drone to crash.
  2. The attack works by transmitting a signal that mimics the GPS signal that a receiver would normally receive, but with modified timing or positioning data.
  3. Spoofing attacks can be difficult to detect, as the receiver may not be able to distinguish between a real and fake signal.
  4. GNSS spoofing attacks can be carried out using relatively low-cost equipment, making them accessible to a wide range of attackers.
  5. The consequences of a successful GNSS spoofing attack can be serious, such as causing a vehicle to crash or interfering with critical infrastructure.
  6. GNSS spoofing can be mitigated through various means, such as using anti-spoofing techniques or deploying backup systems.
  7. As GNSS technology becomes more ubiquitous, the potential for GNSS spoofing attacks is expected to increase, making it important to take steps to protect against this type of attack

*Phantoms has developed and manufactured a wide range of comprehensive, modular, and scalable active and passive solutions for different markets.

Contact Us
LinkdIn
YouTube
Twitter
Accessibility
Call Now Button