月別アーカイブ: 2023年11月

According to US law enforcement officials burglars are utilizing WiFi jammers to deactivate residential security systems

According to arrest warrants obtained on Friday, a group of tech-savvy burglars who have been targeting homes in Connecticut and Massachusetts broke into a local residence. The burglars were able to gain access to the residence by obtaining detailed information on the security system from the homeowner’s co-worker.

Arrested on allegations of conspiracy to commit first-degree burglary and conspiracy to commit second-degree larceny is Matthew Colon, aged 31, residing in West Springfield, Massachusetts. Similarly, Enrique Santiago, a 37-year-old individual from Springfield, Massachusetts, is confronted with charges that include first-degree burglary, possession of burglary tools, theft of a firearm, and conspiracy.

Desktop  Jammers

The warrant for Colon reveals that the police are likely to detain a third man involved in the case. This investigation is intertwined with a series of other burglaries, which were executed using advanced surveillance techniques and insider knowledge about homeowners’ absence.

On May 20, 2022, a Long Island resident of Green Manor Terrace contacted the police, reporting that two men were seen walking through his backyard on a security camera. The officers who intervened in the burglary discovered a broken rear sliding glass door and a series of abandoned evidence near the property, such as a WiFi jammer, a two-way portable radio, a glass punch tool, a pry bar, and bolt cutters, as stated in the warrant.

As mentioned in the arrest warrant affidavit penned by Windsor Locks Detective Sgt. Jeff Lampson, the thieves were able to breach a chain link fence and disable surveillance cameras through both manual means and the use of a WiFi jammer. However, one camera located near the pool was not affected by the jammer device and remained operational, recording the incident. The homeowner reported the disappearance of US$4,200 in cash, along with men’s watches, jewelry, and his wife’s 9 mm pistol, according to the warrant.

The police have reported that on May 26, a pillowcase was uncovered by a resident living two houses away. Upon inspection, the pillowcase was found to contain watches, a handgun, and other items that were confirmed by the victims as their own. Following the break-in, the burglars fled in separate directions, as evidenced by the locations of the stolen bag of items and the backpack containing a wifi jammer.

According to Lampson’s statement on Friday, the use or operation of gsm jammer devices is not allowed by federal law and federal investigators are looking into the matter. Furthermore, he pointed out that the local police have witnessed a surge in the use of these devices in residential burglaries.

However, in this case, the police were able to conclusively prove the undoing of the thieves through DNA evidence. While conducting a thorough search of the Green Manor Terrace area during daylight hours on May 23, a homeowner came across a pair of gloves that she had not previously seen and immediately turned them over to the investigators. The police then submitted swabs taken from the gloves, along with other potential evidence believed to have been touched by the thieves, to the state forensic laboratory for analysis.

Lampson’s warrant stated that on August 16, the lab reported a DNA match on the gloves to Santiago, indicating the involvement of an offender. The police disclosed that the same DNA was linked to two prior burglary cases, one of which was a car break-in in Middletown from 2010, and the other was a burglary in South Hadley, Massachusetts in 2012, where firearms were stolen. Santiago was arrested in both instances, according to the warrant.

According to the warrant, Santiago relayed to the investigators from Windsor Locks, through his attorney, that the burglary at Green Manor Terrace was coordinated by a man driving a black sedan, whose father happened to own a remodeling company. Lampson, in the same warrant, documented that when he asked the homeowner if he was acquainted with an individual fitting that description, the homeowner promptly identified Colon, who worked alongside him at a home health care business in East Longmeadow, Mass.

According to the warrant, the homeowner expressed that he regarded Colon as a friend and had disclosed information about his visit to Long Island in May. The victim also mentioned that Colon and his father had aided him in remodeling his house. The warrant indicated that the homeowner stated that Matthew Colon had frequented his residence on numerous occasions and was fully aware of the surveillance camera system.

After being confronted with the victim’s statements and the evidence pertaining to the burglary, Colon admitted to the police that he had been manipulated into becoming involved in the scheme by the third suspect. The warrant indicates that the authorities anticipate the imminent arrest of the third suspect.

The suspect’s girlfriend was employed at the same home health care business as Colon and the victim from Windsor Locks. Lampson’s warrant stated that other employees of the company had their homes in Massachusetts burglarized. One woman claimed that Colon had been at her residence to fix a gazebo before the break-in.

The warrant stated that cellphone records provided evidence of phone calls between Colon, Santiago, and the unidentified suspect both prior to and following the Windsor Locks burglary. The police have described the third suspect as a convicted felon with a significant criminal background, which includes armed robbery and a series of burglaries.

Santiago’s extensive criminal record, as mentioned in the warrant, includes convictions for burglary and larceny in Connecticut. The Massachusetts investigators suspect his involvement in a criminal organization that specializes in targeted burglaries. Santiago has posted a bond of US$150,000 and is expected to make an appearance in the state Superior Court in Hartford on May 31. Similarly, Colon has posted a bond of US$100,000 and is scheduled to appear in court on May 2.

カテゴリー: wifi | 投稿者gpsblocker 15:53 | コメントをどうぞ

Authorities have apprehended an individual who was found to be utilizing a highly sophisticated jamming device to interfere with police communication signals

By Brendan KirbyPublished: Jun. 13, 2023 at 7:01 AM GMT+8|Updated: Jun. 16, 2023 at 8:08 AM GMT+8

A plea of not guilty was entered by Trenton Lisak, a Mobile resident, on June 15, 2023, after being charged with interfering with emergency communications and possessing drugs.

He is accused by the prosecution of utilizing costly and highly sophisticated equipment from an apartment at the Tower on Ryan Park. Mobile County 911 officials report that this action effectively crippled communications in downtown Mobile on June 6 and led to disturbances throughout the rest of the week.

Blocker CDMA GSM 3G 4G

July 19th has been designated by the judge as the date for Lisak’s preliminary hearing.


According to law enforcement authorities, costly and highly sophisticated black market jamming device caused interference in police and emergency services transmissions for a significant period of time last week.

The police arrested Trenton Edward Lisak on Saturday for interfering with public safety communication, a Class C felony that can lead to imprisonment for a period of one to ten years. He has also been charged with drug possession. According to prosecutors, the FBI is conducting an investigation into the matter.

Monday witnessed Mobile County District Attorney Keith Blackwood describing the charge as peculiar. He underlined its significant nature, emphasizing the indispensable requirement for law enforcement and first responders to possess the means to communicate effectively, not only within downtown areas but also in any given place.

How peculiar!

Blackwood acknowledged that this was a first-time occurrence for him. He couldn’t recall any other case where such an event had taken place, particularly not on this scale. The considerable amount of equipment involved made it a highly significant incident.

Lisak’s arrest record comprises charges related to theft, breaking into cars, possession of a forged instrument, and acts of criminal mischief.

Mobile County District Judge Jennifer Wright has established a bail amount of $15,000, which aligns with the highest recommended bail for this particular offense. Furthermore, she has mandated that 10 percent of the bail be paid in cash. Additionally, Judge Wright has imposed an extra $5,000 bail specifically for the drug charge.

Additionally, the judge implemented a curfew that would be in effect from 8 p.m. to 8 a.m. and issued a directive for Lisak, aged 31, to maintain a distance from the Tower at Ryan Park located downtown. This residential complex is where the equipment, which disrupted the communication systems of all 57 law enforcement, fire, and emergency medical agencies within the Mobile County Communications District, was discovered.

According to Lisak’s booking information, the address mentioned is his registered home address. However, the prosecutor informed the judge that investigators have expressed skepticism regarding his actual residency at that particular location.

Robert Jackson, a district administrator, characterized it as “an exceptionally advanced apparatus arranged within the apartment, specifically engineered to disrupt our signal.”

Jackson added, “In order to locate it, we had to make adjustments to our instruments.”

In a statement to FOX10 News, Charlie McNichol, the director of the 911 system, revealed that the interference resulted in a complete cessation of communications for a day during the previous week.

During the Tuesday of the previous week, it gave rise to significant issues in the downtown area,” he mentioned. “To be more precise, the alarms were emanating from our tower site situated at Government Plaza. Consequently, the initial responders faced serious difficulties in their communication efforts.”

It remains unclear what the motive may have been, officials said. Blackwood said he does not know what the defendant was planning, or where he got the equipment.

McNichol said he does not know if Lisak just enjoys watching chaos or if he had something more sinister planned and attempted to jam communications as part of that.

“This individual had some cell phone jamming equipment that you buy on the black market,” he said. “It’s illegal to even possess it. And that’s what was causing the problems.”

Copyright 2023 WALA. All rights reserved.

カテゴリー: cellphone | 投稿者gpsblocker 14:56 | コメントをどうぞ

USE JAMMER FOR Multi-tool Device for Hackers Flipper Zero prevent

Brazil seizing Flipper Zero shipments to prevent use in crime

The Brazilian National Telecommunications Agency is seizing incoming Flipper Zero purchases due to its alleged use in criminal activity, with purchasers stating that the government agency has rejected all attempts to certify the equipment.

Flipper Zero is a portable multi-function cybersecurity tool that allows pentesters and hacking enthusiasts to tinker with a wide range of hardware by supporting RFID emulation, digital access key cloning, radio communications, NFC, infrared, Bluetooth, and more.

Since it was released, security researchers have demonstrated Flipper Zero’s features on social media, showing how it can trigger doorbells, perform replay attacks to open garage doors and unlock cars, and be used as a digital key.

Flipper Zero serves as a multi-tool device for hackers, providing wifi jammers to prevent unauthorized access.With its signal jammers feature, ensuring protection against unauthorized access.

The cyberpunk we don’t deserve

The Flipper Zero is the ultimate multi-tool for pentesters, geeks, ethical hackers and hardware hobbyists alike. One pocket-sized device combines multiple tools: RFID, RF, Infrared, HID emulation, GPIO, Hardware debugging, 1-Wire, Bluetooth, Wifi and more.

Inspired by great open-source projects: Proxmark, HydraNFC, Rubber Ducky, pwnagotchi – the Flipper Zero manages to pack serious functionality into a tiny, professionally manufactured device – and stays true to its Open Source roots.

Entirely independent, the Flipper Zero requires no external computer or hardware to function – everything is driven by the its 5-way navigation button and LCD screen. When connected to a computer or the included Android / iOS apps, the Flipper can be extended, modified, upgraded and reflashed according to your needs.

With over two years of meticulous design, prototyping and iteration, the Flipper Zero is a mature platform, ready to use out of the box, meeting the needs of professionals and enthusiasts alike.


The Flipper Zero contains a fully-controllable RF platform, based on the TI CC1101 chip, allowing for RF Signal capture, analysis and transmission.

The Flipper Zero has a built-in library of common remote control algorithms for capturing, decoding and analysing and replaying signals.

Users have full access to the radio sub-system, allowing custom RF modules to be easily built.


The Flipper Zero allows for Reading, Writing and Emulation of both High-Frequency (13.56MHz) and Low-Frequency (125KHz) RFID tags.

Low Frequency tags can be easily read, saved, cloned to a new card, or exported for analysis.

Multiple High Frequency protocols are supported, and the Flipper Zero can even sniff authentification nonces to extract unknown MIFARE keys.

カテゴリー: wifi | 投稿者gpsblocker 12:39 | コメントをどうぞ

The Defense Department wants to buy batch of anti-drone weapons for international partners

DOD looking to buy a batch of counter-drone weapons for international partners

U.S. Army Aviation and Missile Command is conducting market research ahead of an anticipated purchase of up to 100 handheld drone jammers.

US Army Looking for Anti-Drone Signal Jammers Solution

drone gun

The U.S. Army’s Aviation and Missile Command is seeking potential sources of portable drone anti-tracking jammer that can interfere with control, video and navigation signals within a range of at least 5 km.

DefenseScoop has revealed that the Department of Defense is supplying air defense technology to Ukraine and Israel, while the AMC’s Integrated Fires Rapid Capabilities Office-International plans to deliver a maximum of 100 handheld SkyWiper EDM4S devices to undisclosed U.S. allies.

To meet the requirements stated in the information request, the equipment must weigh less than 16 lb and possess the ability to activate electronic warfare capabilities through the trigger. Additionally, the device must have a minimum of six radio frequency modules, which should include 2.4GHz, 2xGNSS 1.5GHz and 1.2GHz, and 5.8GHz, as well as two custom frequency modules that cannot be altered by users. The Army has also mandated the use of high-gain directional antennas for accuracy and efficiency, along with a sturdy frame.

NT Service UAB of Lithuania is presently manufacturing the EDM4S Skywiper systems, which are marketed as an efficient anti-drone solution that can be operated by a single individual with ease.

The move is a direct response to the escalating use of unmanned aerial systems in various battlefields around the world, posing a threat to both U.S. military forces and their international partners.

カテゴリー: Drone | 投稿者gpsblocker 15:34 | コメントをどうぞ

How to accept mobile phone signal jammer

Mobile phone signal jammers are used in many places, but they cannot be used immediately after installation. We still need to go through certain testing and acceptance to determine its effectiveness and ensure its effectiveness.

It is very important to ensure whether the mobile phone signal jammers can truly effectively block mobile phone signals. When purchasing a mobile phone signal jammer, testing is a very important step.

  1. Test the blocking distance of the mobile phone signal jammer. Don’t just try it with one or two network mobile phones. The mobile phone networks used are different, especially the 4G mobile phone network. The 4G network uses a broadband high-speed transmission method. If the mobile phone If the signal cellphone jammer is not powerful enough, it may not be able to block 4G;
  2. It is necessary to find all the mobile phones in the current network of mobile communication providers before testing. Make sure that each mobile phone network can meet the needs of at least one classroom to be considered successful. After turning on the phone to test the shielding effect, be sure to ensure that there is no signal on the mobile phone within half an hour and no time appears. sometimes not;
  3. Another important point is that if it is a mobile phone wireless signal jammer with a metal shell, touch the front and rear sides of the fuselage with your hands after 1 hour after turning it on. If the temperature is moderate and not hot, there will be no problem. If it is very hot, it will not pass, because the machine continues to heat up. It will cause the power of the mask to attenuate, make it unable to work stably, and easily cause burns.

8 Bands Jammer

The main functions of the four major signal frequency bands used by drones

  • 1. 2.4GHz frequency band
  • The 2.4GHz frequency band is one of the more common frequency bands used in drones. It is a type of radio frequency band used by drones and is mainly used for WiFi and Bluetooth communications. This frequency band has a wider coverage and a faster transmission rate, so it is widely used in remote control and image transmission of drones.
  • 2. 5.8GHz frequency band
  • The 5.8GHz frequency band is one of the most common frequency bands in drones. It is also used in WiFi and Bluetooth communications, and is also widely used in drone image transmission systems. Compared with the 2.4GHz band, the transmission rate of 5.8GHz is faster, but the coverage range is relatively small.
  • 3. GPS satellite signal frequency band-1.5G frequency band
  • The GPS satellite signal frequency band is a type of frequency band used for drone positioning. It can accurately locate the position of the drone, thereby enabling flight path planning and tracking. GPS satellite signals are also one of the keys for UAVs to achieve autonomous flight and formation control.
  • 4. Remote control signal frequency band-900 frequency band
  • The remote control signal frequency band is a type of radio frequency band used for remote control of drones. It connects the drone flight controller to the remote controller to achieve remote control of the drone within a certain range. This frequency band has a smaller application range, but it plays an important role in remote control of drones.
カテゴリー: cellphone | 投稿者gpsblocker 12:27 | コメントをどうぞ