Categories
|
Prison Jammer
Prison Jammer
The Prison Jammer is a cellular jamming and cellular detection system. Model IJS 6000 is an intelligent cellular Prison Jammer system designed to jam unauthorized cellular phones while permitting authorized cellular phones to operate. With the Prison Jammer, control can be managed over criminal communications in a prison, unauthorized calls in a courthouse, military installation, or specific environment where cell phone activity must be managed. In correctional circles, it is known as the prison jammer or prison jamming system.
Prison Jammer Functionality More than a cell phone jammer, the Prison Jammer is an Intelligent Jamming System. It can detect and manually or automatically blocks unauthorized usage of cell phones and / or cell phone activity in designated areas. The cellular detector composition functions as a cellular detection center and can work as a managed access system or in conjunction with a series of cellular jamming components.
How it works In order control cellular phone activity in any given area, an established configuration is designed. This is comparable to building a fence. However, instead of placing posts and fencing at a physical border, communication control hardware is deployed. Options may include a managed access feature wherein cellular communications may be permitted and denied based on the authorization of the operator.
Alternate options allow for cell phone jamming hardware to be deployed to operate in many (or few) buildings or areas. These cellular jamming units can deny access to a large number of cellular telephones at any given time within a group of separate buildings, or a complex of corridors, conference rooms, numerous small offices and private rooms.
These cellular jammers are in constant control by a central administrator that can permit or deny cellular communications. These cellular jammers are connected via a Controller Area Network (CAN) into a local network and managed by a Central Base Station (CBS). The Intelligent Jamming System controls every element, from detection, to alerting where and when an individual cell phone is attempting to establish communication, to blocking the calls.
Remote Control Activation The IJS can operate by remote control through the use of ON/OFF switching. Should the cell phone jamming components be located in buildings or areas away from the control unit, the Remote Control Activation can operate the cellular jammer from afar.
Users Users of the Intelligent Jamming System include prisons and detention centers to control criminal communications, as well as secrets on military bases, defense installations, operations in and by border control checkpoints, as well as other physical areas that require information to be controlled or restricted.
For more information on managing cellular phone activity in prisons, secure facilities, government offices, or military compounds, Contact Us.
*All specifications are subject to change without notice. Photos are for illustration purposes only. Actual system may vary. NOTE: IT IS ILLEGAL TO JAM ANY RADIO SIGNAL IN THE UNITED STATES.
** Please Note: This website is intended only as a proprietary notice and does not constitute an offer to sell any type of jamming technology. Legal Notice on Cell Phone Jammers: All Cell Phone Jammers and Cellular Jammers, and their respective technologies including RF Jammers and Bomb Jamming devices, IED Jamming devices, RF Jamming devices, and RCIED Jamming devices in part or whole are strictly regulated by the US Department of State in accordance with the guidelines in the International Traffic in Arms (ITAR) per title 22, Code of Federal Regulations (CFR), Parts 120-130 . Therefore, if you are outside the United States of America, an export license must be obtained. Any sales and any shipments are subject to license approval by US Department of State, and any domestic inquiries may be subject to approval by United States and or United Kingdom government agencies that regulate the use of RF Jamming technologies as well as the above mentioned technologies.
|
|
|
|