InfiniDome carried out a live demonstration of its GPS interference / spoofing protection for autonomous vehicles on site

CAESAREA, Israel, June 25, 2019 / PRNewswire / – infiniDome Ltd., the Wireless Security Company, held a live demonstration of GPS interference / spoofing protection for a self-driving autonomous car on June 11 at the EcoMotion Main Event at The Centerpiece of the international future mobility conference, the EcoMotion Week 2019.

In the demonstration, the BWR self-driving car was operating in the conference demo center when a nearby handheld gps jammer was activated and the navigation functions of the autonomous car were deactivated. Then infiniDome CTO could easily connect the GPSdome protection solution, and the same autonomous car with the same GPS system could not only detect the jamming attack, but also maintain the GPS signal and navigation functions during the jamming attack.

handheld gps signal jammer

“In our live demo, we presented our proven solution for protecting GPS-based systems from nuisance attacks from major players in the industry, some of which are key partners with DRIVE (the automotive accelerator in TLV to which we are a part),” said Omer Sharar, CEO of infiniDome. “The competitive advantage of our cyber solution is that the GPS signal is preserved during these attacks. Unlike the competition, our approach is not only to detect the attacks, but also to protect them. We strongly believe that the autonomous car cannot stop by the side of. ” The road, when attacked, must go on. ”

“The EW (Electronic Warfare) approach of our GPSdome protection is a breakthrough in the field of autonomous cars,” said Moshe Kaplan, CTO of infiniDome. “We are advancing our technology to fully protect the autonomous car from interference and spoofing attacks from other wireless communications it depends on, such as 5.9 GHz (used for V2X communications) and its cellular connection to the world.”

“GPSdome is field-tested and is supplied to numerous customers around the world,” said Ehud Sharar, President of infiniDome. “Our commercial product is a technology that will allow the industry to continue to rely on the availability of GPS for navigation, sensor fusion and V2X that simply won’t work without GPS.”

infiniDome Ltd. offers front-end cyber solutions that protect wireless communication from interference and spoofing attacks. The company’s first product, GPSdome, protects against interference and spoofing of GPS-based systems, which are critical to autonomous vehicles, drones and connected fleets. GPSdome has proven itself in the field and is sold to customers worldwide.

Recording jammer to prevent eavesdropping from being recorded!

Have you ever had such confusion: private meetings and conversations with friends are worried about being eavesdropped or recordings reveal privacy; business negotiations are afraid of being eavesdropped by competitors leading to project failure; the conversations of confidential meetings of the unit are recorded or eavesdropped leading to leakage, etc. and many more. How to protect the valuable conversation information from being stolen by others?

While high-tech brings convenience to the general public, the pursuit of high-quality life has also become a life attitude that people admire. Therefore, the protection of privacy rights has become a hot topic at the moment, and more and more politicians, celebrities and business people are beginning to understand protection The legitimate rights and interests of one’s own privacy, how to prevent recording and anti-eavesdropping has been paid attention to. How to effectively prevent the disclosure of secrets caused by recording and eavesdropping? Choosing a high-end and safe anti-recording device becomes your wisest choice right now!

The wireless jammer is a very effective product. It can send out interference signals to prevent the pickup or microphone from picking up normal voice information, and pick up the “buzzing” noise to protect the voice information. The recording jammer is It is the simplest and most effective to protect the security of voice information from the source of sound collection. Shenzhou Mingda has focused on information security for 14 years. The newly developed L7B recording jammer is upgraded on the basis of the original equipment. The FPGA-based ultrasonic noise algorithm eliminates the high frequency noise of the old equipment.

handheld blocker

Features of recording jammer MDPB-L7B:

1. High interference intensity: Our self-developed FPGA-based ultrasonic band noise algorithm can effectively interfere with digital devices such as mobile phones and voice recorders, can record noises, and completely eliminate the harsh sound that a few people can hear.

2. Long interference distance: The anti-recorder has an interference distance of more than two meters for 95% of mobile phones, an interference distance of more than 5 meters for 60% of mobile phones, and an interference distance of 10 meters for iPhone X and iPhone 8, which can be effective Protect the conversation

3. There are many interference devices: it has good interference effects on various mobile phones such as iPhone series, Huawei mate, Honor, OPPO, VIVO, Samsung, Nubia, Meizu, Nuts, etc., and it has good interference effects on Sony, Samsung, Sanyo, Newman, Lenovo, Olympa. Sound recorder test interference effect is good

4. Mute work: The anti-recorder has replaced the ultra-quiet fan, and the sound produced during work is smaller and quieter than the old equipment.

In modern society, recording conditions such as mobile phones and voice recorders are very convenient. Any important negotiation, especially business negotiation (such as legal negotiation, contract negotiation and other legal relationship communication) or other important matters, is very worried about being recorded by the other party. Evidence against oneself. The latest L7B recording jammer developed by Shenzhou Mingda can solve your worries. The recording jammer is a portable, highly integrated security protection device that integrates ultrasonic interference and voice sound wave interference. It can effectively interfere with digital and analog recordings such as voice recorders, mobile phone recordings, and tape recordings, and interfere with wireless eavesdropping, wired eavesdropping, and isolation. Various voice eavesdropping devices such as wall tapping and laser tapping make it impossible to identify the conversation voice obtained by the eavesdropper, thus effectively protecting your privacy.

You can use a recording blocker to prevent recording during important meetings!

The most effective means to prevent recording is to generate random noise signals through the recording masker, which can suppress the voice signal, so that the recording equipment picks up only noise information, but cannot distinguish the voice information and cannot restore it from the recorded signal. The original information is output to ensure the security of voice information. The recording blocker adopts security encryption processing, and effectively prevents post-restoration by mixing high and low frequency audio sources.

Jammer-mart has focused on information security for 14 years. The newly developed L7B recording jammer has been upgraded on the basis of the original equipment. The FPGA-based ultrasonic noise algorithm eliminates the high frequency noise of the old equipment. It has joined the brands that have been on the market in the past two years. The information of mobile phones and recording devices has a very obvious effect on new recording devices and mobile phone recording. It is suitable for confidential meeting rooms, public security bureau petition centers, procuratorate reception halls, courts, negotiation rooms, offices and other places for private conversations.

desktop signal blocker

The recording blocker is completely silent when working. The sound recorded by ultrasonic recording and eavesdropping equipment is completely noisy, and no meaningful information can be extracted. Designed with the appearance of ordinary audio. Confidential meeting room, public security bureau petition center, prosecutor’s office reception hall, courtroom, negotiation room, office and other places for private conversation.

Working principle: The recording jammer emits ultrasonic waves with random noise that cannot be perceived by human ears. When digital devices such as mobile phones are recording, these noises are recorded into the digital device together with the sound of normal conversation, making the recorded audio invalid. The audio information in the captured video also has the same interference effect. Because the noisy ultrasonic noise is randomly generated and cannot be restored, the audio after the interference cannot be restored, thus ensuring that the original information is not leaked and spread.

As a new product, recording jammers have received more and more attention and support from people. From the previous government agencies (mainly the public security system and service-oriented windows) to the current enterprises, the needs of enterprises have gradually increased. An important reminder for us. It shows that business people are gradually attaching importance to the safety of voice information and their awareness of self-protection has increased. Imagine if in a conversation scene, if any participant turns on the recording device, or connects the call and keeps it in the call state, the remote personnel can There is no security to hear the content of the conversation at will. In this case, the recording blocker can play a good role in protecting the security of audio information.

Russian drones can interfere with cell phones 60 miles away

With new cell phone jammers, these drones can disrupt communications over a distance of 135 miles from their launch site.

The Russian Defense Ministry announced on Nov. 6 that the nation had extended the range of its drone-borne jammers to 100 km, or more than 60 miles. Drones as a platform, rather than just a target, of electronic warfare mean that the sight of a flying robot overhead can signal an incoming strike and a sudden inability to call for help.

“Russia has been using a UAV-mounted cell phone jammer for a number of years,” said Samuel Bendett, research analyst at the Center for Naval Analyzes. The drones work in a pod with two or three vehicles and a ground station, which are combined as an “empty 3” system.

indoor phone jammer

“When these UAVs fly in teams, one acts as a signal and communication relay while another acts as a jammer,” said Bendett. “At this point in time, these Leer-3 systems have been around for about two years.”

What is changed is the range of the jammer. The Orlan-10 drones already have a range of 75 miles, which means that with the latest update to the jammer, the drone pod can interfere with signals up to 135 miles from where the drone was launched. TASS reports that the 60 mile range is a 3.5 fold increase in distance from the original range.

Additionally, Bendett said that there is a chance that this ability, or an earlier version of it, has already been seen in conflict.

“The Ukrainian armed forces claim to have discovered Leer-3 systems in eastern Ukraine, while there is potential evidence that Leer-3 has also been used in Syria,” Bendett said. “The Russian Armed Forces are constantly training with empty 3 UAVs while they practice the suppression, identification and eventual destruction of enemy forces through enemy signals and cellular communication. Indeed, this type of training is part of the official tactics, techniques, and procedures in electronic warfare and other forces in the Russian military. ”

Advances in electronic warfare are a key component in developing autonomous systems for the military. Right now, drones are waging an electronic war on cellular communications, but it’s not difficult to imagine the same lessons being applied with new technologies. In this scenario, it’s easy to imagine other vehicles turning into jamming machines on future battlefields … and maybe even present ones.

Cell phone jammers installed in Paris Health Prison

The Paris establishment, which has been closed for several years, is now “opening” its doors again and is now equipped with a new system of cell phone jammer, with fixed telephones installed in the cells.

Inaugurated in 1867, the 2.8 hectare health prison in the heart of the 14th arrondissement of Paris had become the most blatant symbol of the decay of French prisons over the years.

Camouflage handheld phone jammer

Healthcare, closed for several years for work, is reopening today by incorporating an important technological development at the prison universe level that, if it worked, could be used in other facilities.

In 2017, 40,067 phones and accessories were confiscated from the 70,000 inmates in 180 French prisons.

In addition, the government stated that the disruptive systems were largely ineffective.

During the renovation of the health prison in Paris, the authorities decided to develop and maintain a brand new jamming system for mobile phones for six people for the French company SAGI.fr.

At the same time, landline phones are now installed in the cells.

Telio, one of the leading European companies in this sector, has been granted a public-law license for landline telephony for ten years, reports the AFP.

“Access to the landline phone in the cell is an appeal to the detention center.

Detainees can call their families without restriction, “said the director of the institution, Christelle Rotach, quoted by the AFP.

Prisoners can only call pre-approved numbers.

No telephone will be installed in the isolation or disciplinary rooms.

In the case of landline telephones, Telio finances the entire investment and is compensated for by the price of calls paid by prisoners.

The cost of calling a landline is 0.08 euros per minute and 0.18 euros for a mobile phone on mainland France.

Can you protect yourself in this smart phone world?

Read this carefully and remember: from now on you will be watched. Does it sound awesome or scary to you? Take a good look at the stranger at the other end of the hall. Although it looks like he’s talking on his smartphone, he actually takes pictures of you using a special app. And thats just the beginning. At that morning meeting last Tuesday, when you made that outrageous joke about your new boss, your colleague’s smartphone, lying quietly at the table, recorded every word you said. Later that night when you were in the restaurant and made a flirtatious but innocent joke on the waitress, someone videotaped the entire interaction.

At first glance, it seems that there is nothing you can do to prevent things like this from happening again and again. Millions of smartphones around the world mean millions of active recording devices ready to quickly capture any word or movement. And when these recordings are made, it is no big deal to throw pictures, videos or audios on the internet and share them with everyone. Maybe there is some way to prevent all of this from happening? Let’s see. Perhaps someone smart enough will create a cloak of invisibility like in fantasy films, or companies may use clues from James Bond films and develop high-tech counter-surveillance devices that allow us to move around in public without worrying about potential privacy issues having to worry.

In fact, it might be the companies we already know well, especially since there is already some type of technology that I am talking about. For example, late last year Apple patented a new technology that allows an iPhone’s camera to be easily deactivated using infrared sensors aimed at the camera. It was developed to prevent film piracy. But even ordinary people can use such a device in advance. Todd Morris, founder and chief executive of surveillance and surveillance company BrickHouse Security, said some early technologies existed to protect people from intentional recording. For example, any woman can use a wireless camera detector in the locker room to find out if a hidden camera is installed in her clothing. Yes, that happens and quite a bit.

gsm network jammers

There are some limits, however, as the changing room or business office is completely different from the large and crowded public place. For example, if you use this Apple device that disables the camera, you will definitely make a lot of people feel harassed just to imagine some sights or to take photos to remember friends. The same is partly true for gsm jammer, but it can vary from place to place (for example, the cinema must definitely have such devices in order to make the visitor’s experience uninterrupted and thus even better).

“While you don’t wear a fake mustache or stocking over your head, no one in a large crowd can prevent them from being secretly pictured,” claimed Todd Morris. “In these cases, we need to use our technology to fight technology only at the server level using algorithms that say,” Don’t post this photo of me on the internet. “” If these companies can tag someone on the internet by simply recognizing their voice or even their face, they should be able to remove them the same way. However, when everyone starts using those Google glasses and other augmented reality glasses, we will face the new type of surveillance as they are likely to record everything they see.

Will Israel buy $ 50,000 worth of portable anti-drone vests?

The IDF and Israeli police are considering purchasing personal anti-drone systems at a cost of $ 50,000 each, Calcalist reported.

The vests were made by the Israeli startup SKYUP, part of the Avnon Group, and have already been sold to the US Army and NATO forces.

Enemy drones have become a growing threat and unlike in the past when they were only installed in vehicles, there is now a need for personal equipment for soldiers and police officers to protect them from the threat of drones. According to SKYLOCK, the portable systems, which weigh just 1.5 kilograms, can neutralize any drone within a kilometer.

3 bands uav blocker

The vests are equipped with a drone detector and an drone jammer. Upon notification of a UAV in their vicinity, carriers can activate the anti-drone jammer.

The vest is intended for use in situations where traditional anti-drone products normally installed in buildings or vehicles are not suitable due to the need for a mobile protection system, e.g. B. at special units of the army or guards of the president.

A quick and dirty guide to monitoring mobile phones during protests

As riots against police brutality and institutionalized racism swept across the country, many people were exposed to the full power of law enforcement weapons and surveillance for the first time. Whenever protesters, cell phones and police are in the same place, protesters should pay attention to cell phone surveillance. Usually, security practitioners or other protesters respond to this issue through suggestions provided by local law enforcement agencies using cell location simulators (also known as CSS, IMSI catchers, stingrays, earth boxes, hail, fake base stations, or crosses). However, in many cases, this suggestion is wrong, or it is due to fundamental reasons such as not knowing what the cellular base station simulator is, its function and frequency of use.

Denial of service or signal interference is an additional function of CSS. In fact, the FBI has admitted that CSS can cause signal jammer to local personnel. Unfortunately, for the same reasons, it is difficult to determine the use of CSS, and it is difficult to tell how often they interrupt service, whether intentionally or unintentionally. Signal towers that look like signal interference may also be overloaded and disconnected. If many people suddenly gather in one place, it may overload the network, which is not the purpose of the design.

Professional high-power interceptor

How to protect yourself from cellular signals

As we mentioned in our self-defense guide for monitoring protesters, the best way to protect yourself from cellular site simulators is to put your phone in airplane mode and then turn off GPS [2], WiFi and Bluetooth, and cellular data. (Although “receive only” GPS and not lose its own location information, many apps track GPS location data, which is ultimately stored in a database that law enforcement agencies can search for later.)

We know that some IMSI capturers can also intercept content, but as far as we know, if you don’t downgrade your cellular connection to 2G, none of them can do it. If you want to protect your device from this attack, the best option is to use encrypted messages such as Signal or WhatsApp and put it in airplane mode when you find that your phone has fallen to 2G. (There are many valid reasons. Your phone may downgrade some of your connections to 2G, but it is safer than regretting.) However, an important part of the protest may be live broadcast/recording and immediate upload of police reports against protesters. Violent video. This is inconsistent with the recommendation to keep the phone off/in airplane mode. Up to you

Unfortunately, iOS and Android currently do not provide an easy way to force your phone to use 4G only, although developers can of course add it to their operating systems. If you can turn off 2G on your phone, this is a good preventive measure.

GIDAS’s real-time interference detection makes the navigation system safer

It is estimated that there are currently the same number of navigation receivers on Earth as humans. Positions, navigation and time signals from space-based constellations such as Galileo and GPS form an invisible, indispensable infrastructure that lays the foundation for many modern aspects of modern life (communication, energy, and transportation).

Satellite navigation is helping to control more and more planes, ships, trains and self-driving cars. At the same time, navigation-based time stamps can mark real financial transactions worth billions of euros and coordinate the synchronization of the grid. Satellite navigation is always active and available anywhere on the planet. Therefore, it is easy to take usability for granted. These signals from space are equally important, and they are also susceptible to ground interference.

Andreas Lesch of OHB Digital Solutions in Austria said: “It’s just a matter of output power.” “The navigation signal on the ground corresponds to the light of the 60-watt lamp on the satellite. For Galileo, its distance in space is about 23,222 kilometers. These weaker signals may be accidentally or deliberately destroyed by stronger local radio signals or even misleading false navigation signals (so-called deception).”

“We have developed a new GNSS interference detection and analysis system, GIDAS, to protect critical infrastructure from damage or deception by continuously monitoring important signal frequency bands. In this way, GIDAS can trigger alarms in real time, determine the nature of the failure, and then determine the cause of the failure. The location of those dangerous portable devices so that the authorities can take immediate remedial measures.”

Although at least three stations are required to locate interference sources connected to the entire monitoring center, GIDAS can provide interference detection and orientation through a single reporting station. Monitoring centers can also be connected to each other, which makes the GIDAS system easy to expand, from ensuring a single port, airport or key location of the system to the entire city or region.

Although at least three stations are required to locate the interference source connected to the entire monitoring center, GIDAS can provide interference detection and orientation through a single reporting station. (Photo: ESA)

gps wifi cell phone jammers

“People are only catching up with the severity of this problem now,” Andreas added. “In parts of Europe, the highest density surveys show about three to four signal jammers per hour.

These small devices are technically illegal, but can be purchased online for a few hundred dollars or less, and are usually sold as data protection devices. The sales range of the jammer is only a few meters, but the actual use range may reach tens of meters or more, which may cause unnecessary widespread interference. For example, the famous American truck driver takes the jammer while sailing at Newark Airport as long as he passes. Will shut down the system.

Could the police actually shut down a city’s cellular service?

At around 1 am on Monday, a strange tweet claimed that Washington, DC had been disconnected from the digital world. The Washington Post later reported that the Twitter accounts of only three followers were the first to report a suspected interruption. When people wake up and register online, #DCblackout is all the rage in the United States. The hashtag appeared in thousands of tweets, accompanied by reports of explosions, missing protesters and silencers of police rifles. What followed was a brief online chaos: Did the police really block the cell phone tower? What should the so-called failure cover? The local reporter quickly tweeted that they had not experienced any failures, and later that day, the rumors were thoroughly debunked. It turns out that a power outage is the highest level of error message. This also dispersed the interference of local protests. The local police used violent methods against the protesters all night, including pepper spray, rubber bullets and tear gas.

However, the prerequisite for the power outage is that the police (or the federal government) can completely shut down the communication network-this behavior has seriously affected the freedom of speech and assembly rights, as well as the safety of protesters and passersby. Although it did not happen on Monday, the joke raised the question of whether it is possible for law enforcement agencies to cause technical and legal power outages.

Americans tend to view deliberate service interruption as a dangerous strategy used by oppressive regimes abroad. In a speech by the American Civil Liberties Union, Jay Stanley, a senior political analyst for the Privacy and Technology Project, told me that interruptions in communication are often seen as “a terrible form of abuse” and are used worldwide to cover up repression of sexual violence and other violations. Human rights behavior. ”

But this form of censorship has occurred at least once in the United States. In 2011, the Bay Area Rapid Transit System (BART) suspended cell phone service at a subway station in downtown San Francisco after hearing about plans to protest the BART police’s plan to kill a man. The purpose of BART is to prevent protesters from coordinating, but it is short-sighted, thus making the agency the center of freedom of speech controversy across the country. The Federal Communications Commission intervened, and BART’s actions were condemned by human rights organizations such as the Electronic Frontier Foundation (the incident was called the “BART La Mubarak in San Francisco” incident). The FCC investigated BART, but like Harold Feld, the senior vice president of non-profit public knowledge told me that the committee decided not to make a declarative decision on the incident. This boils down to a technical problem: BART actually shuts down the service by shutting down the equipment in the underground system instead of destroying the signal.

No similar incidents have been confirmed since, but in the 2016 Tateishi protests, Wired reported that tribal leaders believed that the police had blocked their phones. The problem with proving these claims is that it is difficult to determine whether malicious behavior is occurring or just a bad signal. Only agencies like the FCC have not yet investigated the claims to truly verify the occurrence of traffic congestion.

smartphone signal blocker

The BART controversy and, to a lesser extent, the Standing Rock controversy, both show how complicated the shutdown signal can be in the United States-and how we truly fail to understand and resolve the blueprint for current and future law enforcement blackouts. What we do know is that almost ten years later, it is still possible from a technical point of view. According to Joshua M. Pearce, a professor of materials science and engineering at the Michigan Technological Institute, there are two ways to cause ground blackouts. (Turning off BART is an unusual situation because the authorities can access the device themselves.) The first is to ask (or require) the service provider to shut down a specific set of cell phone towers. It’s as simple as flipping a switch

The second method (and the more difficult method) is to use jamming technology, which sometimes sends false signals, overwhelming the signal from the cell phone tower. Small short-range equipment can be purchased abroad (for example, equipment used by some overseas universities to stop fraud, which led to the suspension of a high school teacher in Florida in 2015). In theory, you can use a large number of such small devices to call neighbors, but this is not convenient. Pearce believes that signal jammer have greater coverage, but only organizations like the National Security Agency own them.