Jammers can intercept insurgents' improvised explosive devices

- jammerspecialist

Improvised explosive devices (IEDs) have long been one of the main threats to security forces and armies around the world. Terrorists and insurgents use modern technology, especially mobile phones and wireless communication devices, to remotely detonate these devices, making them a highly destructive weapon. Simple in design but powerful in nature, IEDs pose a serious threat not only to combatants but also to civilians and infrastructure.cell phone jammer

  How telephone-controlled IEDs work

  IEDs are dangerous not only because of the huge amount of explosives they carry, but also because of how they are remotely activated.signal jammer Using a mobile phone or other wireless communication device, an operator can remotely detonate an IED. Typically, these devices are designed by terrorists using simple circuits to connect a mobile phone signal to a detonator. GPS jammer When the operator calls a mobile phone connected to the IED, an electric current flows through the line to detonate the detonator, causing the explosive to explode. Wifi jammer

  Terrorists often remove the vibrator or speaker from a mobile phone and connect the circuit of these devices to the detonator of the explosive. Once the call is connected, the circuit is closed and the current triggers the detonator to explode. The charge of IEDs ranges from tens of kilograms to hundreds of kilograms. Many IEDs are filled with mortar shells, howitzer shells, or even civilian demolition explosives. Their explosive power is enough to destroy armored vehicles and even tanks. Israel's Merkava main battle tank and Saudi Arabia's M1A2 main battle tank have been destroyed by this type of IED. The explosive power can directly blow the tank turret away for more than ten meters.

  However, there are certain limitations to using a phone to remotely control IEDs. For example, any call to this mobile phone will trigger an explosion, including wrong dialing or advertising calls. This uncertainty increases the risk of operation. Therefore, terrorists often modify their mobile phones and set whitelists or blacklists to ensure that only specific numbers can detonate the bomb. More advanced terrorists will even modify the mobile phone software so that it can only trigger the explosion after receiving a specific text message, but this requires more technical investment and cost.

続きを見る >>