In Chongqing China 2017 college entrance examination, there are more than 20 million students going to the city's 39 test area, 117 test sites of more than 7,000 examination room for the knowledge of the contest.
In order to prevent candidates from using mobile phones and other wireless communication equipment for cheating, government use the cell phone jammers during the contest without interrupting the signals around the test.
It is reported that this year is the second year after "cheating should be put in prison", so the discipline of the examination has become the most important, the opening of the jammers to test the proportion is 100%.
As the main city of Chongqing college entrance examination centers are in the downtown area, a large number of wifi jammers will have a great impact on the normal communication of the surrounding users . How to protect the college entrance examination of the examination room, but also to protect the normal communication of the surrounding users, it has become a problem.
In response to this problem, Chongqing Mobile has taken three initiatives: First, increase the eliminate efforts to surrounding pseudo-base station and put an end to lawless elements of the candidates during the college entrance examination parents psychological cheating, training and other illegal false information.
Second,control the effective jamming radius of the jammers so that be sure that it would not effect the surroundings.
After two days Chongqing Mobile detected a total of 7 pseudo-base station to reduce the illegal SMS more than 50,000 articles, compared to last year's test period, this year's test site within the shielding ability, test network outside the download speed increased 5.2mbps, basically Keep the usual level.
These days, it is almost impossible to catch a movie, or eat in the restaurant, and will not let the phone sounded interrupted.
"Sometimes I went to a restaurant where I wanted to enjoy a meal or coffee, read quietly, and someone started talking loudly on their cell phone, which was annoying," said Charles Crowder, a resident of Oakland, California.
The world's more than 100 million mobile phone growth, the problem may be getting worse. In the United States alone, it is estimated that within five years, 84% of US citizens will have mobile phones.
However, the rebound for cell nuisance has already begun. Restaurants in the United States, requiring visitors to turn off the phone logo is more and more common. In Baxter State Park, Maine, in addition to emergency situations, the phone is illegal. Resistance even reached the White House: President Bush reportedly banned mobile phone staff meetings.
In fact, several governments around the world are considering the legalization of cell signal technology, in the public space on the phone to add rituals.
Mobile Phone Jammers have been in existence since 1998. Interference to send low power coded radio signals or modulated radio waves.
The jammers work in one of two ways. Some devices set their signals to the same frequency as pagers and mobile phones, thereby disconnecting traffic between the handset and the base station. Other people as an electronic filter, fool the phone, that no frequency can be used to make or receive calls. Interference only affects the specified area (most of the radius is tens to hundreds of feet) and can only work on cellular transmissions.
Sounds like a perfect solution for the phone? The problem is that in addition to Israel and Japan, most developed countries, including the United States, Britain, Canada, Switzerland and Australia, mobile phone jammers are still illegal.
However, the tide may be changing. In the past spring, both Hong Kong and Canada have announced that they will consider legalizing the means of interference to curb public telephone behavior. At about the same time, the leaders of the Indian parliament revealed that they had installed the WiFi jammers to avoid interruption during the meeting.
However, this major change in the legal outlook is not so far-fetched as the public's dissatisfaction with chirping continues to grow. Last year, Letstalk.com found that 57 percent of Americans favored phone calls from restaurants, theaters and other public places.
What do you think?
Parents can try the parent's control and monitoring software, but once the child (even the spouse or grandparents) gets the free smartphone through the data plan, good luck and let them speak in the family dinner.
Just as parents have the ability to cut Wi-Fi right at home, they should be able to cut off cellular signals if needed. Putting them on the phone with their hands in the airplane mode may not work properly, turn the house into a Faraday cage, it's just a very much only one that should try the tin foil hat. However, if necessary or needed, the indoor cell phone jammer should be an option.
All of these examples are based on other lines that can be used for emergencies, or at least some people want mobility sufficient to exceed the interference range. There is absolutely no way now, even those most meaningful people can use limited technology, will not disrupt the service, far beyond their classroom, theater, office or family range.
But before you finish, think about it, if you really get hurt, or maybe that time, no cell signal is the best moment of your day. Of Course, if your signal stuck, you may not be able to make a call.
Many people's privacy are now undermined, and hackers or spy organizations (such as the National Security Agency) can easily access our privacy information, and this happens more than one thing. That's why we decided to give you some advice on how to protect your privacy through a variety of jamming devices without hurting others. First of all, we want you to remember that the signal blocker is a weapon that may be bad in the wrong hands, so be careful.
There are many dangerous devices available for tracking, eavesdropping, and can collect many specific data such as login / password, email and people you know - your smartphone. Modern smartphones are dangerous regardless of the manufacturer and the mobile operating system. The main reason is that the device has all of your data. Your personal information, your current coordinates, your friends, private photos and so on.
Hackers are trying to find new ways to snoop on your smartphone. Because the quickest access to large amounts of data is the easiest and cheapest way. The most dangerous thing here is that you do not know what to do to be able to protect your privacy. Hackers are too hard to prevent, no such anti-virus, firewall or encryption method, will be able to protect your data without killing the gadget.
In addition, all of these encryption programs are quite complex, so most people will be confused at all. There are two decent choices that may hide your information. The first is GSM jammers, which will hide you in a very short time, but you will not be able to make or receive calls. The second is to avoid storing private and valuable data on portable gadgets, smartphones, or tablets. Both will cut the functionality of your device, but it will definitely prevent data leakage.
The second thing you should worry about is the wireless network. They are unreliable, hackers use this. Most smartphone users connect free Wi-Fi hot spots in public places, not only online, but also install updates and handle mobile banking information. This is very dangerous, your privacy information is likely to leak because of this.At this time,the WiFi jammer can help you.
Many people unknowingly place private information at risk. They are shared with their smartphones via social networks and transmitted over the Internet with unencrypted protocols. That's why we always tell the reader that the security of their private information is their concern if they do not at least do that nobody can protect it. Protect your information, it's easy, but very important!
There are a couple of different ways how to tack a precise location of a mobile phone and his user. The most widely spread are using its built-in GPS module, or cell tower triangulation. It doesn’t even need to be sending out GPS coordinates — communicating at all with a cell tower could expose you. But how that technology works?
First of all,by comparing the signal strength of your cell phone on multiple cell towers, someone looking for you can approximate your location with triangulation. This requires access to data about the base stations of your carrier and their coordinates, which should keep it out of reach for criminalsthe . There are lots of such data bases on the Internet, opnecellid.org or location-api.com for example. And the point here in that, that the more bases that man has – the more accurate the results will be. By the way, the accuracy of such a tracking technique is not really high. It will be 150-300 meters in densely populated areas, where there are lots of cell towers and 2-5 kilometers in rural areas. Luckily, it is impossible to get more accurate location with only a cell tower triangulation, GPS will be required.
So, it will be far easier to locate your phone, if it is hacked, or compromised with a virus. We recommend to always check permission to Android users, because lots of apps require permissions for base stations tracking.
Finally, if the coordinates of the closest cell towers are known – it is not hard to calculate the location of the phone between three closest cell towers, using the signal power of each of them. Also, you should know that data transmission speeds of an ordinary GSM, or CDMA network lets evildoers to refresh the data every 10-15 seconds, so it is almost a live tracking.
Despite such an apparent complexity, that base stations tracking technique is rather widely spread and popular, because it lets to track all the phones, it doesn't matter of they have a GPS or GLONASS module. Unfortunately, there is no way to make sure that no one will try to use such a tracking against you and the only way to protect yourself from that is using a decent jammer, which won't let your mobile device to connect the base stations. Unfortunately even if you will turn your smartphone off, it still may be tracked, or turned on remotely.
Recently, the Haidian police arrested a suspect in the campus door using jammers to steal the property of the parents car.
In China Haidian police station received a warning from Mr. Dong said that he drove the child after school to school, found out that the value of 36,000 yuan of items all gone in the car, including luxury handbags and wallet each one and two mobile phones and other property , considering from the school to the company he didn't stay long on the way, he suspected that things are stolen in front of the school, "I parked the car on the roadside, remember to lock the car, then send the child to the school gate.Just a few minutes, Something is lost."
The police immediately called the school peripheral monitoring, and soon found a trace of suspicious middle-aged man. The man has been standing near, when Mr. Dong left the car to send their children to school, the man quickly went to the car, open the car and took the property and quickly leave. Because there is no prying action, the police judge the man is likely to use a car remote control jammer , so that Mr. Dong's car is not locked in order to steal.
Soon, the police to identify the suspects surnamed Wang, after committing the crime has returned home in Zhengzhou, Haidian police immediately went to the local, in the home of Wang, won the value of tens of thousands of luxury brand satchel, wallet and the value of thousands of mobile phones.
After review, Wang had been arrested for the theft of Henan court sentenced to imprisonment for one year, after the release of "re-operating the old industry." Wang account, between 2015 and 2017, he was in the Haidian District, near the famous primary school, aimed at sending children to school luxury car, with a jammer to interfere with the owner of the normal lock car theft, has been verified five cases, the amount involved More than ten million yuan. At present, Wang was suspected of theft by Haidian police criminal detention, the case is still in the trial.
Mobile phones are generally not allowed in prison because this can lead to some dangerous plans that can be made after using this communication device. But some prisoners managed to smuggle the phone in a prison by ingenious means, but smarter people now can help check out these unwanted communications.
When a prisoner gets a cell phone, they can send and receive information through a series of devices on the phone; these are phone, text, social media, email and the Internet.
Now that we have a variety of facilities to check the use of mobile phones in prison cells, one of the best ways to control the illegal communication between prisoners and the outside world is to use cell phone jammers. These Jammers are effective in helping to control any unnecessary data transmission across the prison boundaries. The special ability of prison mobile jammers is that they only allow specific mobile phones to work in prisons, which are pre-determined by the prison authorities.
Prisoners can not use mobile phones that are smuggled in their cells by illegal means because the prison phone jammers prohibit the mode of operation of all unauthorized mobile phones in a particular area of the prison.
Many prisons are now adapting to this new technology. This will benefit the prison authorities and better keep the prisoners.
When the thorough inspection, the mechanism used by mobile phone jitter is not very complicated. The main part of this device is called part of the communication control hardware. Upon activation, the hardware immediately restricts or prohibits communication through the cellular telephone within a certain range of the prison. The prison authorities can then determine which numbers or numbers are allowed to access and separate legal phones with smuggling.
These cell phone jammers are being monitored by authorities. The mobile phone Jammers are placed in different buildings, and they communicate with each other through the controller local area network (CAN). CAN is very effective in maintaining communication protocols. The entire system manager controls it from the central base station. These controllers perform many different functions simultaneously, including detecting, scanning the network, warning the authorities and interfering with the phone.
Mobile jammers are used in a variety of locations, including prisons, detention centers and military bases, where communications with the outside world are illegal and may cause serious damage to their security systems.
Equipment with 2G, 3G and CDMA contraband devices can use high power jammers and are located in very short periods of time. This provides a simple solution for some related issues. It has recently been suggested that these facilities find a place in various other areas to improve the defense mechanism.