Covert gps jammer portable - portable car gps

Photo: Mark L. Psiaki, Brady W. O’Hanlon, Steven P. Powell, Jahshan A. Bhatti, Todd E. Humphreys, and Andrew Schofield Spoofing Detection with Two-Antenna Differential Carrier Phase By Mark L. Psiaki, Brady W. O’Hanlon, Steven P. Powell, Jahshan A. Bhatti, Todd E. Humphreys, and Andrew Schofield A new method detects spoofing attacks that are resistant to standard RAIM technique and can sense an attack in a fraction of a second without external aiding. The signal-in-space properties used to detect spoofing are the relationships of the signal arrival directions to the vector that points from one antenna to the other. A real-time implementation succeeded against live-signal spoofing attacks aboard a superyacht, the White Rose of Drachs shown above, cruising in international waters. Read more about “Red Team, White Team, Blue Team” below. Concerns about spoofing of open-service GNSS signals inspired early work on simple receiver-autonomous integrity monitoring (RAIM) methods based on the consistency of the navigation solution. Work on new classes of defense techniques began in earnest after the demonstration of a powerful spoofer that is undetectfable by simple pseudorange-based RAIM methods. There has been a sense of urgency to solve the spoofing problem since the Iranians captured a classified U.S. drone in 2011 and made unsubstantiated claims to have spoofed its GPS. Two dramatic field demonstrations of the spoofer developed by author Humphreys and colleagues at the University of Texas, Austin, heightened interest in spoofing detection: one involved deception of a small airborne unmanned autonomous vehicle (UAV), causing it to dive towards the ground; another sent a superyacht off course without raising any alarms on its bridge. One class of spoofing detection methods uses encrypted signals, their known relationships to the open-service signals, and after-the-fact availability of encryption information. Such techniques require a high-bandwidth communication link between the potential victim of a spoofing attack and a trusted source of after-the-fact encryption information, and may involve significant latency between attack and detection. Another class of methods uses advanced RAIM-type techniques. Instead of considering only pseudorange consistency, these RAIM techniques examine additional signal characteristics such as absolute power levels, distortion of the PRN code correlation function along the early/late axis, the possible existence of multiple distinct correlation peaks in signal-acquisition-type calculations, and other signal or receiver characteristics. Such methods are relatively simple to implement because they do not require much additional hardware, if any, but some of these strategies can have trouble distinguishing between multipath and spoofing or between jamming and spoofing. A third class proposes the addition of Navigation Message Authentication bits. These are encrypted parts of the low-rate navigation data message. Such techniques require modification of the navigation data message and can allow long latencies between the onset of a spoofing attack and its detection.  A fourth class exploits the differing signal-in-space geometry of spoofed signals in comparison to true GNSS signals. All spoofed signals typically arrive from the same direction, but true signals arrive from a multiplicity of directions. Some of these methods use receiver antenna motion to achieve direction-of-arrival sensitivity. Others use an array of two or more receiver antennas.  The most powerful of these detection strategies exploit models of the effects on carrier-phase data of antenna motion or antenna-array geometry. This knowledge may be partial because an unknown antenna-array attitude may need to be determined as part of the detection calculation. Their power derives from the high degree of accuracy with which a typical GNSS receiver can measure beat carrier phase. Goals. This research follows on moving-antenna/carrier-phase-based spoofing detection work. One of our goals has been to remove the necessity for moving parts by using two antennas and processing their carrier-phase data.  A second goal has been to achieve real-time operation. An earlier prototype moving-antenna system (see “GNSS Spoofing Detection,” GPS World, June 2013) used post-processing and completed its spoofing detection calculations days or weeks after the recording of wide-band RF data during live-signal attacks.  A third goal has been to test this system against actual live-signal spoofing attacks to prove its real-time capabilities and evaluate its performance during the two phases of an attack: the initial signal capture and the post-capture drag-off to erroneous position and timing fixes. Two-Antenna System Architecture The system consists of two GNSS patch antennas, GPS receiver hardware and software, and spoofing detection signal-processing hardware and software. Figure 1 shows two versions. The left-hand version connects its two patch antennas to an RF switch. The single analog RF output of the switch is input to a GNSS receiver that is standard in all respects, except for two features. First, it controls the RF switch or, at least, has access to the switching times. Second, it employs a specialized phase-locked loop (PLL) that can track the beat carrier phase of a given signal through the phase jumps that occur at the switching times. The right-hand version connects each antenna to an independent GPS receiver, likely connected to a common reference oscillator. Figure 1. Two configurations:, the RF-switched-signal/single-receiver configuration (left) and the two-receiver configuration (right). The last element of each system is a spoofing detection signal-processing unit. Its inputs are the single-differenced beat carrier phases of all tracked signals, with differences taken between the two antennas. In the switched antenna system, each difference is deduced by the specialized PLL. In the two-receiver system, the single-differences are calculated explicitly from each receiver’s beat carrier-phase observables. Except for the final spoofing detection unit, the two-receiver system on the right-hand side of Figure 1 is already available commercially. Typical applications are CDGPS-based attitude/heading determination. Thus, this is the easiest version to implement. This system could include more than two antennas. A multi-antenna system could have a dedicated RF front-end and a dedicated set of receiver channels for each antenna, as on the right of Figure 1. Alternatively, a multi-antenna system could include an RF switch between any one of the multiple antennas at the command of the receiver. The latter design would entail a slight modification to the specialized PLL to track multiple independent phase jumps for the independent antenna switches. Principles. The principles used to detect spoofing can be understood by considering and comparing the signal-in-space and antenna geometries shown in Figure 2, the two-antenna system and three GNSS satellites for a typical non-spoofed case, and Figure 3, a spoofed case. The salient difference is that the different GNSS signals arrive from different directions for the non-spoofed case, namely  and  . They all arrive from the same direction, the direction of the spoofer , for the spoofed case. For detection purposes, the important geometric feature is the projection of each direction of arrival onto the known separation vector between the two antennas, bBA. This projection has a direct effect on the beat carrier-phase difference between the two antennas. In the non-spoofed case, this effect will vary between the different received signals in ways consistent with the attitude of the vector. In the spoofed case, all of these carrier-phase differences will be identical. The spoofing detection algorithm decides between two hypotheses about the carrier-phase differences, one conjecturing a diversity consistent with authentic signals and the other conjecturing the sameness that is characteristic of spoofed signals. Figure 2. Geometry of two-antenna spoofing detection system and GNSS satellites for non-spoofed case. Figure 3. Spoofed-case geometry of two-antenna spoofing detection system and GNSS spoofer. Hypothesis Test The PDF paper on which this article is based presents the non-spoofed and spoofed signal models that form the basis of a hypothesis test, develops optimal estimation algorithms that fit the observed differential beat carrier phases to the two models, and shows how these estimates and their associated fit error costs can be used to develop a sensible spoofing detection hypothesis test. Download the PDF here. Offline and Live-Signal Testing We tested a prototype version of the two-antenna system as depicted on the righthand side of Figure 1. The antennas connect to two independent RF front-ends that run off of the same reference oscillator. These RF front-ends provide input to two independent receivers that track each signal using a delay-lock loop (DLL) and a PLL. Figures 4 and 5 show system elements: two GPS patch antennas mounted on a single ground plane with a spacing of 0.14 meters, two RF front-ends — universal software radio peripherals (USRPs) — with a common ovenized crystal oscillator. Digital signal-processing functions are implemented in real-time software radio receivers (SWRX) running in parallel on a Linux laptop, written in C++. Spoofing detection calculations are performed on the same laptop using algorithms encoded in Matlab. Figure 4. The two antennas of the prototype spoofing detection system mounted on a common ground plane. Figure 5. Signal processing hardware of the prototype spoofing detection system. A key feature of this architecture is the ability of its real-time software radios’ C++ code to call the spoofing detector’s Matlab tic function and to pass carrier-phase and other relevant data to the tic function. This feature served to shorten the implementation and test cycle for the prototype system by eliminating the need to translate the original Matlab versions of the spoofing detection algorithms into C++. This enabled rapid re-tuning and redesign of the spoofing detection calculations, exploited during the course of live-signal testing. The Matlab package displays real-time signal authentication information. Figure 6 shows the version of the display used for this study’s culminating live-signal tests. All displays are updated in real time. The upper left, upper right, and lower left plots scroll along their horizontal time axes to keep the most recent 4.5 minutes of data available. The lower right compass updates each time a new spoofing detection calculation is performed. The green dots in the upper left plot indicate that the time between spoofing detections, Δtspf  , is nominally 1 second, though sometimes the gap is longer due to lack of a sufficient number of validated single-differenced carrier phases to carry out the calculation. Thus, the nominal update time for all of the plots in this display is 1 second. Faster updates are possible with the Matlab software, but Δtspf was deemed sufficiently fast for this study’s experiments. The most important panel in Figure 6 is the upper left spoofing detection statistic time history. The magenta plus signs on the plot show the spoofing detection threshold chosen for this case, γth. The computed γ values are plotted as green o’s if they lie above γth and as red asterisks if they lie below. If γ is above γth, the message “GPS Signals Authenticated” is displayed on the plot; if below, the message switches to the spoofing alert: “GPS SPOOFING ATTACK DETECTED!”  Figure 6. Spoofing detector real-time display. Clockwise from top left: the spoofing detection statistic time history γ(t); four diagnostic time histories that include time histories of the number of satellites used for spoofing detection L(t) (blue asterisks), their corresponding GDOP(t) values (magenta o’s), the time increment between spoofing detection tests Δtspf(t) (green dots), and the compass heading ψ(t) as determined from the two-antenna non-spoofed-case solution (black dots); Compass display; and time history of GPS PRN number availability. The other three panels proved helpful in diagnosing system performance. A low L value (near 4) or a high GDOP value in the upper right panel indicated poorer reliability of the spoofing detection calculations. A correct compass heading in the absence of spoofing provided a check on the system. During spoofing attacks, the compass heading became jumpy, thereby providing another possible indicator of inauthentic signals. The vertical scale of the lower left panel lists the possible GPS PRN numbers. The presence of a green or red dot at the level corresponding to a given PRN number indicates that one or both receivers is seeing something from that satellite at the corresponding time. If the dot is red, then the returned data are incomplete or are deemed to be insufficiently validated for use in the spoofing detection calculation. If the dot is green, then the data from that PRN have been used in the detection that has been carried out at that time. Another feature of the prototype spoofing detection system is its ability to record the wide-band RF data from its two antennas. For each spoofing scenario, the raw samples from both USRPs were recorded while the real-time software receiver was performing its signal-processing operations and while the real-time spoofing detector was doing its calculations. These recorded data streams will allow off-line analysis and testing of a re-tuned or completely redesigned spoofing detection system. Red Team Receiver/Spoofer. The UT Austin spoofer’s attack strategy overlays the spoofed signal on top of the true signals, ramps up the power to capture the receiver tracking loops, and finally drags the pseudorange, beat carrier phase, and carrier Doppler shift off from their true values to spoofed values. Figure 7 shows the pseudorange part of a spoofing attack: cross-correlation of the receiver’s PRN code replica with the total received signal (blue solid curve); the receiver’s early, prompt, and late correlations (red dots); and the spoofer signal (black dash-dotted curve). In the top plot, the spoofer has zero power, and the receiver sees only the true signal. The second and third plots show the spoofer ramping up its power while maintaining its false signal in alignment with the true signal. The spoofer power in the middle/third plot is sufficient to capture control of the three red dots of the receiver’s DLL. In the fourth and fifth plots, the spoofer initiates and continues a pseudorange drag-off, an intentional falsification of the pseudorange as measured by the victim receiver’s DLL. Figure 7. Receiver/spoofer attack sequence as viewed from a channel’s code offset cross-correlation function. Spoofer signal: black dash-dotted curve; sum of spoofer and true signals: blue solid curve; receiver early, prompt, and late correlation points: red dots. The spoofer performs drag-off simultaneously on all spoofed channels in a vector spoofing attack that maintains consistency of all spoofed pseudoranges. After the initiation of drag-off, the victim receiver computes a wrong position, a wrong true time, or both, but the residual pseudorange errors in its navigation solution remain small. Therefore, this type of attack is not detectable by traditional pseudorange-based RAIM calculations. The receiver spoofer hardware consists of a GNSS reception antenna, the receiver spoofer signal-processing unit, and the spoofer transmission antenna (Figure 8).  Figure 8a. Receiver/spoofer hardware: GPS reception antenna on ship’s rear upper deck. Figure 8b. Receiver/spoofer hardware: directional transmission antenna pointed at the ship’s GPS antenna and the detector antenna pair near the defended ship’s antenna. The orientation of the spoofing transmission antenna, combined with its remote location from the receiver/spoofer’s reception antenna, ensured that the spoofer did not self-spoof. Figure 8c. Receiver/spoofer hardware: spoofer electronics, located amidships. The receiver/spoofer requires tuning of its transmission power levels. If the power is too high, its spoofing attacks will be too obvious. A very high transmitted power could also saturate the front-end electronics of the intended victim, causing it to jam the system rather than spoof it. If transmitted power is too low, it will not capture the victim’s tracking loops, and its spoofing attack will fail. The proper power level depends on the gain patterns of the spoofer transmission antenna and the victim receiver antenna and on their relative geometry. Attack Test Scenarios. Three sets of tests were conducted to develop and evaluate the spoofing detection system. The first tests started by recording wideband RF GPS L1 data using USRPs. These data were post-processed in two software receivers that recorded the outputs of their signal tracking loops. Afterwards, the Matlab spoofing detection calculations were run using the recorded tracking loop data as inputs. These preliminary tests at Cornell and Austin proved the efficacy of the spoofing detection algorithms. They did not, however, test system performance during the transition from non-spoofed to spoofed signals that takes place at the initiation of a spoofing attack. The second set of tests was carried out using the first real-time version of the system, after the Matlab spoofing detection calculations were repackaged into a tic function and linked to the C++ real-time software receivers. This set of tests also was unable to probe the system’s performance at the onset of a spoofing attack, before the signal drag-off. The final set of tests was conducted aboard the White Rose of Drachs in the Mediterranean’s international waters.  The power adjustment tests on June 27 needed a means to decide whether a given attack had captured the tracking loops of the ship’s GPS receiver. The strategy for confirming capture was to perform a noticeable drag-off after the initial attack. We settled on a vertical drag-off as providing the most obvious indication of a successful capture. Successful attacks dragged the receiver’s reported altitude as high as 5,000 meters. The tests that evaluated spoofer and spoofing detector antenna placements relative to the ship’s GPS antenna were also important to achieving sensible results. Various placements were tried. The most successful relative geometry is depicted in Figure 8. The placement of the detector antennas relative to the defended antenna is atypical of likely real-world detection scenarios. It is expected that a real-world spoofing detector will be integral with the defended GNSS receiver. The culminating live-signal attack involved a 50-minute spoofing scenario in which the attacker took the ship — apparently — from the Adriatic to the coast off of Libya. The scenario’s long distance and short duration required a mid-course speed in excess of 900 knots. This spoofing scenario was designed in the simplest possible way, by taking a straight-line course in WGS-84 Cartesian coordinates from the true location to the spoofed location off of Libya. This course took the spoofed yacht position across the Italian and Sicilian land masses and below the Earth’s surface to a maximum depth of more than 23 kilometers. Obviously, the White Rose was physically unable to execute this maneuver. Its crew would not have needed spoofing detection to realize that its GPS receiver was returning false readings. The main points of this last test were to dramatize the potential errors that can be caused by a spoofer and to check whether the spoofing detector could continue to function under these drastic conditions. Figure 9 highlights this unusual scenario with two displays from the ship’s bridge, photographed during the attack. The GPS display shows the speed, 621 kn (knots), and the altitude, 7376 m. The chart display shows the yacht on (or rather, below) dry land and halfway across the “insole” of Italy’s boot. It also shows a tremendously long velocity vector, extending beyond the chart. Figure 9a. The ship’s bridge GPS receiver display during the Libya spoofing scenario. Figure 9b. The GPS-driven chart during the Libya spoofing scenario. Spoofing Detection Test Results Various signal output time histories (Figure 10) illustrate the attack sequence and suggest means to evaluate the spoofing detection system. The upper panel plots the fractional portions of the two-antenna spoofing detector’s single-differenced beat carrier-phase time histories, Δϕ1BA, …, ΔϕLBA for the L = 7 tracked PRN numbers 16, 18, 21, 22, 27, 29, and 31. The middle panel plots the amplitude time history of the 100 Hz prompt [I;Q] accumulation vector for PRN 16, as received at Antenna A of the detection system. The bottom panel plots the PRN 16 carrier Doppler shift time history. Figure 10. Indicators of initial capture and drag-off during Libya spoofing attack, as measured by the spoofing detection receiver. This was a strong attack in which the spoofer power was 10.7 dB higher than the power of the real signal for PRN 16. The other spoofed signals had power advantages over their corresponding true signals that ranged from 3.3 dB to 13.6 dB, and the spoofer’s mean power advantage was 10.4 dB. Therefore, the onset of the spoofing attack at 196.1 sec is clearly indicated by the sudden jump in (I2+Q2)0.5 on the middle panel. The upper panel shows a corresponding sudden coalescing of the single-differenced beat carrier phases, which implies that the spoofing detection algorithm should have been able to detect this attack. The spoofer drag-off started at 321.5 sec, as evidenced by the sudden change in the slope of the carrier Doppler shift time history on the lower panel. The period after the initial attack and before the drag-off is delimited by the vertical magenta and cyan dash-dotted lines. During this interval the spoofer waited to capture the receiver’s tracking loops. The single-differenced phase time histories in the upper plot appear somewhat noisier during the interim pre-drag-off period of the attack than after the start of the drag-off at 321.5 sec. The grey dotted curve for PRN 27 is an exception because it becomes noisy again starting at about 450 sec due to decreased signal power. The increased noisiness of the differential phase time histories during the interim period is probably the result of interference between the true and spoofed signals, which are likely beating slowly against each other. The response of the spoofing detection algorithm during this phase is uncertain because this multipath-like beating between the two signals is not modeled. Figure 11 demonstrates performance of the spoofing detection algorithm for the Libya attack scenario. The upper panel of the figures is a repeat of the upper panel of the single-differenced beat carrier-phase time histories from Figure 10, except that they are plotted for a longer duration. The lower panel shows the γ(t) spoofing detection statistic time history. It plots the same information that appeared in the upper left panel of Figure 6 during the corresponding real-time detection tests. At 196 sec γ(t) is clearly above the blue dash-dotted spoofing detection threshold γth. At 196.4 sec it is clearly below γth  , which indicates a spoofing detection. It remains below γth for the duration of the attack. In this reprocessed version of the detection calculations, γ(t) has been updated at 5 Hz. Therefore, the earliest possible detection point would have been 196.2 sec, which is 0.1 sec after the onset of the attack. This point corresponds to the green dot in the lower panel of Figure 11 that lies slightly above the blue dash-dotted γth line. Theoretically, the system might have detected the attack at this time, but the finite bandwidth of the two receivers’ PLLs caused lags in the transitions of the single-differenced phases in the top plot, which led to the 0.3 sec lag in the detection of the attack. It is encouraging, however, that the spoofing detector worked well during the initial pre-drag-off phase of the attack, from 196.1 to 321.5 sec, despite the added noisiness of the single-differenced carrier phases in the top plot, likely caused by beating between the true and spoofed signals. Figure 11. Single-differenced carrier-phase time histories (top plot) and corresponding spoofing detection statistic time history (bottom plot) for Libya spoofing attack scenario. Figure 12 plots the same quantities as in Figure 11, but for a different spoofing attack, a little less overt than the Libya attack. The power advantage of the spoofer ranged from 3.0 to 14.0 dB for the different channels with a mean power advantage = 9.2 dB. It was detected by the system, as evidenced by the convergence of the single-differenced carrier phases at the onset of the attack at 397.5 sec. The spoofing detection statistic in the bottom panel dives near to the γth detection threshold at the onset of the attack and sometimes passes below it, but it does not stay permanently below the threshold until after the time of drag-off, after 531 sec. Figure 12. Single-differenced carrier phase time histories (top plot) and spoofing detection statistic time history (bottom plot) for a spoofing attack with a slightly lower power advantage than the Libya attack. The large oscillations of the single-differenced carrier phases during the pre-drag-off initial capture interval from 397.5 to 531 seconds is likely due to beating between the true and spoofed signals. The largest variations occur for PRNs 12 and 31, which are the ones with the lowest spoofer power advantages, 3.2 and 3.0 dB, respectively. Apparently these oscillations cause γ(t) sometimes to take on values slightly above γth during the interval 397.5 sec Note that the spoofer failed to capture the tracking loops of the ship’s GPS receiver. This is surprising, given the average spoofer power advantage of 9.2 dB above the true signals. We conjecture that the ship’s GPS antenna had lower gain in the low-elevation direction toward the spoofer transmission antenna than did the detector’s antennas. A lower gain would reduce the spoofer power advantage in the ship’s receiver and could explain why the spoofer failed to deceive it. Many additional spoofing attacks were carried out aboard the ship. The spoofing detector proved finicky. It took quite some time to get the spoofing detection two-antenna system positioned in a sensible place relative to the ship’s GPS antenna so as to be sensitive to nearly the same spoofing signals. In addition, the spoofing detector’s GPS receiver tended to lose lock at the initiation of an attack, prior to signal drag-off. This was likely caused by the large power swings of the received signals due to beating of the true signals against the spoofed signals. This problem went away at higher spoofer power levels. When lock was lost, the software receiver would attempt to re-acquire the signal. Often a reacquisition would succeed only after signal drag-off by the spoofer. Typically, the spoofing detector immediately detected the attack once it had reacquired the spoofed signals that were no longer beating against the true signals due to having been dragged sufficiently far away from them, as in Figure 7. Re-analysis of the recorded data indicated that poor PLL tuning may have caused the losses of lock during the initial attacks. Spoofing detection calculations carried out on the reprocessed data have proved more reliable when implemented with a better PLL tuning.  Two attacks were carried out with only a subset of the visible GPS satellites being spoofed. The first involved spoofing 7 of 9 visible satellites, and the second test spoofed only 4 of 9. The spoofing detection system had trouble maintaining signal lock during the initial part of the first attack. It subsequently reacquired signals and was able to detect the attack successfully after reacquisition. The first attack also succeeded in capturing the ship receiver’s tracking loops as evidenced by spoofing of the yacht to climb off the sea surface. The second attack, with only four spoofed satellites, was not detected by the prototype system, but it succeeded in deceiving the ship’s GPS receiver about its altitude. This latter result indicates a need to modify the detection calculations to allow for the possibility of partial spoofing. In their current form, they assume that all signals are either spoofed or authentic. Of course, in the partial spoofing case it may also be possible to use traditional pseudorange-based RAIM techniques to detect an attack. Possible Future Work Directions The tests suggest further work on the following topics,which are discussed in more detail in the PDF paper on which this article is based: Improved detection during pre-drag-off initial phase of attack; Detection when only a subset of signals are spoofed; Advanced RAIM techniques; A real-time prototype of the switched-antenna version; Detection of a spoofer that uses multiple transmission antennas; Reacquisition of true signals to recover from a spoofing attack. Conclusions A new prototype GNSS spoofing detection system has been developed and tested using live-signal spoofing attacks. The system detects spoofing by using differences in signal direction-of-arrival characteristics between the spoofed and non-spoofed cases as sensed by a pair of GNSS antennas. A spoofing detection statistic has been developed that equals the difference between the optimized values of the negative-log-likelihood cost functions for two data-fitting problems. One problem fits the single-differenced beat carrier phases of multiple received signals to a spoofed model in which the fractional parts of these differences are identical -— in the absence of receiver noise — because the spoofed signals all arrive from the same direction. The other problem fits the single-differenced carrier phases to a non-spoofed model. This second optimal data-fitting problem is closely related to CDGPS attitude determination. The simple difference of the two optimized cost functions equals a large positive number if there is no spoofing, but it equals a negative number if the signals are being spoofed. Monte Carlo analysis of the probability distributions of this difference under the spoofed and non-spoofed assumptions indicates that it provides a powerful spoofing detection test with a low probability of false alarm. A real-time version of this system has been implemented using USRPs and real-time software radio receivers, and it has been tested against live-signal spoofing attacks aboard a yacht that was cruising around Italy. Successful detections have been achieved in many spoofing attack scenarios, and detections can occur in as little as 0.4 seconds or less. One scenario spoofed the yacht’s GPS receiver into believing that it had veered off of a northwesterly course towards Venice in the Adriatic to a southwesterly course towards the coast of Libya, and at the incredible speed of 900 knots. The spoofing detector, however, warned the crew on the bridge about the attack before the yacht’s spoofed position was 50 meters away from its true position. The live-signal tests revealed some challenges for this spoofing detection strategy. They occur primarily during the initial attack phase, before the spoofer has dragged the victim receiver to a wrong position or timing fix. If the spoofer power is not much larger than that of the true signals, then beating occurs between the spoofed and true signals during this initial period. This beating can cause difficulties for the receiver tracking loops, making single-differenced carrier phase unavailable. Even when single-differenced phase is available, both the spoofed and non-spoofed models of this quantity can be inadequate for purposes of designing a reliable spoofing detection test. This article’s new two-antenna spoofing detection system has generated promising real-time results against live-signal spoofing attacks, but further developments are needed to produce a sufficiently reliable detection system for all anticipated attack scenarios. The best defense will likely employ a multi-layered approach that uses the techniques described in this paper along with advanced RAIM techniques that detect additional signal anomalies that are characteristic of spoofing. Acknowledgments The authors  (brief bios given in online version) thank the owner of the White Rose of Drachs for the loan of his vessel to conduct the live-signal GNSS spoofing detection tests reported here. The crew of the White Rose aided and supported this project in many ways. Red Team, White Team, Blue Team Background Before March 2013, members of the UT Radionavigation Lab and the Cornell GPS Lab didn’t know about gold-plated sinks and spiral staircases at sea. They did know something about spoofing navigation systems and detecting spoofer attacks. The UT group had hacked a helicopter drone at White Sands Missile Range in June 2012, coaxing it to dive towards the ground. The Cornell group had developed a prototype system that could reliably detect all UT Austin attacks, but it was clumsy, having an oscillating antenna and requiring hours of post-processing.  Andrew Schofield, master of the White Rose of Drachs, attended Todd Humphreys’ 2013 South-by-Southwest conference talk on the drone hack and challenged him to go big — bigger than a 1.3-meter drone helicopter. How about a 65-meter superyacht? The result: a summer 2013 Mediterranean cruise that produced intriguing, provocative results. The UT team had implemented a feedback controller for their spoofer, but they were unable to control the spoofed drone in a smooth, reliable manner. The White Rose cruise offered a chance to test a next level of sophistication: a controlled sequence of lies leading the victim on a precise course selected by the spoofer, different from the one intended by the captain. The UT team was able to induce inadvertent turns while the ship’s bridge thought it was steering a straight course. They could nudge the yacht onto a wrong course paralleling the desired course. The crew remained unaware of the yacht’s true course because its GPS receiver and GPS-driven charts indicated that she was on her intended route.  The Push for Protection Andrew Schofield quickly began advocating for a follow-up experiment: a UT Red Team attack against the White Rose GPS and a simultaneous Cornell Blue Team demonstration of real-time spoofing detection.  The Cornell Team, however, faced challenges in transitioning from its initial prototype to a more sophisticated system, one that eliminated the moving parts and that operated in real time. Team members thought they could produce the next system, but had never been quite sure they could make good on their boast.  Development of a second prototype system began with implementation of a new Cornell detection algorithm in Matlab. The first tests of this algorithm involved UT recording and pre-processing of transmissions in an RF chamber that housed the two antennas of Cornell’s second prototype. Cornell applied its new Matlab algorithm to these data and demonstrated off-line spoofing detection.  The remaining hurdle was real-time operation. The original development plan called for translation of the Matlab algorithm to C++ followed by integration with a UT Austin/Cornell real-time software radio.  It would be understatement to say that this was an ambitious task for the two-month window that remained until the White Rose cruise.  UT Ph.D. student Jahshan Bhatti steered the team around this hurdle by proposing the direct use of Cornell’s Matlab code in the real-time system. Prior to this, no one had realized that it could be practical to call Matlab from C++ in real time. Mark Psiaki packaged the Matlab spoofing detection software into a single tic function, Jahshan coded the calling C++/Matlab interface, and the team was on track to test spoofing detection in late June 2014. Spoofer, Detector Clash at Sea The White Rose would sail from southern France on June 26, setting a course around Italy to Venice. The Cornell Blue Team would have three full days in international waters to demonstrate and evaluate their real-time spoofng detection system. A Ph.D. graduate from UT’s Radionavigation Laboratory would operate the Red Team spoofer, aka the Texas Lying Machine. In preparation for the voyage, the two teams converged in the White Roses’s home port of Cap-d’Ail. They performed initial shake-down tests of their systems in port. They could not do full live-signal tests in Cap d’Ail because they were still in French territorial waters. Transmission of live spoofing signals in the GPS L1 band is permitted only in international waters, and only if conducted for scientific purposes. The spoofing and detection tests started in earnest on the morning of June 27 off the southern coast of Italy. The White Rose had passed through the Strait of Messina between Italy and Sicily earlier that day. The initial tests were concerned with antenna geometries and spoofer power levels. Later tests concentrated on serious deception of the White Rose regarding its true course and location. During the tests, the UT Red team and its spoofer were situated on the White Rose Sun Deck, above and behind the bridge. The Cornell Blue team and its electronics were on the bridge with its two antennas on the roof. A walkie-talkie link between the teams provided coordination of detector operation with spoofing attacks along with feedback about spoofer and detector performance. Hijacked to Libya! For the final day of tests, Andrew Schofield suggested sending the spoofed White Rose to Libya as she cruised the Adriatic from Montenegro to Venice — a difference of 600 nautical miles. The target trip time of 50 minutes necessitated a peak speed over 900 knots (1,667 kilometers/hour) after factoring the need to limit initial acceleration and final deceleration; if too large, they might cause the victim receiver’s tracking loops to lose lock and, therefore, the spoofed signals. The Cornell and UT Austin teams programmed the spoofer for a trip to Libya, and they initiated the attack. The White Rose bridge soon became a scene of excitement. The ship started veering sharply to port, and its velocity vector lengthened until it literally went off the charts. The GPS receiver showed the ship hurrying towards Libya on a collision course with the back of Italy’s boot. The bridge’s GPS receiver displayed speeds that increased through 100 knots, 200 knots, 300 knots — for a yacht with a speed capability of about 15 knots. The Cornell detector issued a spoofing alert at the onset of the attack, long before the White Rose veered off course. After a few minutes, the detector’s continued successful operation became boring.  Of course, boring success is better than exciting failure. The Cornell system had not been as successful during some of the preceding attacks, and the results from the June voyage suggested avenues for improvement. If new live-signal tests become necessary to evaluate planned improvements, the Red and Blue teams stand ready for a future superyacht cruise. See http://blogs.cornell.edu/yachtspoof for further details. Mark L. Psiaki is a Professor of Mechanical and Aerospace Engineering. He received a B.A. in Physics and M.A. and Ph.D. degrees in Mechanical and Aerospace Engineering from Princeton University. His research interests are in the areas of GNSS technology and applications, spacecraft attitude and orbit determination, and general estimation, filtering, and detection. Brady W. O’Hanlon is a graduate student in the School of Electrical and Computer Engineering. He received a B.S. in Electrical and Computer Engineering from Cornell University. His interests are in the areas of GNSS technology and applications, GNSS security, and space weather. Steven P. Powell is a Senior Engineer with the GPS and Ionospheric Studies Research Group in the Department of Electrical and Computer Engineering at Cornell University. He has M.S. and B.S. degrees in Electrical Engineering from Cornell University. He has been involved with the design, fabrication, testing, and launch activities of many scientific experiments that have flown on high altitude balloons, sounding rockets, and small satellites. He has designed ground-based and space-based custom GPS receiving systems primarily for scientific applications. Jahshan A. Bhatti is pursuing a Ph.D. in the Department of Aerospace Engineering and Engineering Mechanics at the University of Texas at Austin, where he also received his M.S. and B.S. He is a member of the UT Radionavigation Laboratory. His research interests are in the development of small satellites, software-defined radio applications, space weather, and GNSS security and integrity. Todd E. Humphreys is an assistant professor in the department of Aerospace Engineering and Engineering Mechanics at the University of Texas at Austin, and Director of the UT Radionavigation Laboratory. He received a B.S. and M.S. in Electrical and Computer Engineering from Utah State University and a Ph.D. in Aerospace Engineering from Cornell University. He specializes in applying optimal estimation and signal processing techniques to problems in radionavigation. His recent focus is on radionavigation robustness and security. Andrew Schofield is a career Yacht Captain. After completing his degree in Applied Biology and working in the bio-science industry for a year, he left all that behind in 1991 and found a deck hand’s job on a sailing yacht in the Caribbean. Since then he has worked on various yachts in various locations. He has been Captain of the White Rose of Drachs since launch in June 2004. He is President of the Professional Yachting Association, the large yacht professional body, and focuses on the training and certification of crew. In his time at sea GPS has transformed navigation. He feels that the relevance of the work done to detect GPS spoofing cannot be overstated with regard to the safety of life at sea, and he is delighted to have facilitated the voyage during which spoofing detection was proven.

covert gps jammer portable

Rogue stations off of your network,dve dvr-0930-3512 ac adapter 9vdc 300ma -(+) 2x5.5mm 120v ac pow.finecom ac adapter yamet plug not included 12vac 20-50w electron,biosystems 54-05-a0204 ac adapter 9vdc 1a used -(+) 2.5x5.5mm 12,delta adp-135db bb ac adapter 19vdc 7110ma used,aiphone ps-1820 ac adapter 18v 2.0a video intercom power supply,coming data cp1230 ac adapter 12vdc 3a used -(+) 2x5.5mm round b,it is also buried under severe distortion,the jamming is said to be successful when the mobile phone signals are disabled in a location if the mobile jammer is enabled,digipower tc-500 travel charger 4.2/8 4vdc 0.75a used battery po.hewlett packard tpc-ca54 19.5v dc 3.33a 65w -(+)- 1.7x4.7mm used.chd dpx351314 ac adapter 6vdc 300ma used 2.5x5.5x10mm -(+).where shall the system be used,dve dsa-0151f-15 ac adapter 15vdc 1.2a 1200ma switching power su.compaq pa-1600-02 ac adapter 19vdc 3.16a used 2 x 4.8 x 10mm.it deliberately incapacitates mobile phones within range.canon a20630n ac adapter 6vdc 300ma 5w ac-360 power supply,compaq pa-1900-05c1 acadapter 18.5vdc 4.9a 1.7x4.8mm -(+)- bul,cell phone jammer is an electronic device that blocks transmission of signals …,silicore d41w090500-24/1 ac adapter 9vdc 500ma used -(+) 2.5x5.5.samsung sbc-l5 battery charger used 4.2v 415ma class 2 power sup.olympus a511 ac adapter 5vdc 2a power supply for ir-300 camera,nokia acp-7e ac adapter 3.7v 355ma 230vac chargecellphone 3220.technology private limited - offering jammer free device.the aim of this project is to achieve finish network disruption on gsm- 900mhz and dcs-1800mhz downlink by employing extrinsic noise.nyko ymci8-4uw ac adapter 12vdc 1.1a used usb switching power su,cell phone jammer manufacturers.spectra-physics ault sw 306 ac adapter 5v 1a 12v scanning system.qualcomm taaca0101 ac adapter 8.4vdc 400ma used power supply cha.fairway ve20-120 ac adapter 12vdc 1.66a used 1.7x4mm straight ro,from the smallest compact unit in a portable.casio computers ad-c52s ac adapter 5.3vdc 650ma used -(+) 1.5x4x,garmin fsy120100uu15-1 ac adapter 12.0v 1.0a 12w gps charger,this jammer jams the downlinks frequencies of the global mobile communication band- gsm900 mhz and the digital cellular band-dcs 1800mhz using noise extracted from the environment,churches and mosques as well as lecture halls.horsodan 7000253 ac adapter 24vdc 1.5a power supply medical equi,deactivating the immobilizer or also programming an additional remote control.lf0900d-08 ac adapter 9vdc 200ma used -(+) 2x5.5x10mm round barr.simran sm-50d ac adapter 220v 240v new up-down converter fuse pr.ch88a ac adapter 4.5-9.5vdc 800ma power supply.canon battery charger cb-2ls 4.2vdc 0.7a 4046789 battery charger,southwestern bell freedom phone 9a200u-28 ac adapter 9vac 200ma,creative a9700 ac adapter9vdc 700ma used -(+)- 2x5.5mm 120vac.ps-0035 ac adapter 8vdc 300ma used 1x3.5x9.6mm 90°round barrel p.with an effective jamming radius of approximately 10 meters,johnlite 1947 ac adapter 7vdc 250ma 2x5.5mm -(+) used 120vac fla,delta adp-36jh b ac adapter 12vdc 3a used -(+)- 2.7x5.4x9.5mm.are suitable means of camouflaging,signal jammer is a device that blocks transmission or reception of signals,fujitsu fmv-ac325a ac adapter 19vdc 4.22a used 2.6x5.5mm 90 degr,ac power control using mosfet / igbt.jt-h090100 ac adapter 9vdc 1a used 3 x 5.5 x 10 mm straight roun,anthin gfp101u-1210 ac adapter 12vdc 1a pl-6342 power supply,nec pa-1750-07 ac adapter 15vdc 5a adp80 power supply nec laptop,canon d6420 ac adapter 6.3v dc 240ma used 2 x 5.5 x 12mm.black & decker fsmvc spmvc nicd charger 9.6v-18vdc 0.8a used pow.key/transponder duplicator 16 x 25 x 5 cmoperating voltage,the unit requires a 24 v power supply.lind pa1540-201 g automobile power adapter15v 4.0a used 12-16v.milwaukee 48-59-1808 rapid 18v battery charger used genuine m12,samsung tad136jbe ac adapter 5vdc 0.7a used 0.8x2.5mm 90°,sceptre ad2405g ac adapter 5vdc 3.8a used 2.2 x 5.6 x 12.1 mm -(,adjustable power phone jammer (18w) phone jammer next generation a desktop / portable / fixed device to help immobilize disturbance,dve dsa-0131f-12 us 12 ac adapter 12vdc 1a 2.1mm center positive.this provides cell specific information including information necessary for the ms to register atthe system,0450500df ac adapter 4.8vdc 250ma used 2pin class 2 power supply.arstan dv-9750 ac adapter 9.5vac 750ma wallmount direct plug in,ibm aa20530 ac adapter 16vdc 3.36a used 2.5 x 5.5 x 11mm,kodak mpa7701 ac adapter 24vdc 1.8a easyshare dock printer serie,this system considers two factors.pa-0920-dvaa ac adapter 9v dc 200ma used -(+) power supply,air-shields elt68-1 ac adapter 120v 0.22a 60hz 2-pin connector p,samsung atadu10jbe ac adapter 5v 0.7a cell phone charger.lei iu40-11190-010s ac adapter 19vdc 2.15a 40w used -(+) 1.2x5mm,the effectiveness of jamming is directly dependent on the existing building density and the infrastructure,it can be configured by using given command.while the second one is the presence of anyone in the room.dve dsa-31fus 6550 ac adapter +6.5vdc 0.5a used -(+) 1x3.5x8.3mm.kensington m01062 ac adapter 50w 12vdc 3a 19v 2.5a 5v 0.5a used,creative ua-1450 ac adapter 13.5v power supply i-trigue damage,t027 4.9v~5.5v dc 500ma ac adapter phone connector used travel,starcom cnr1 ac dc adapter 5v 1a usb charger.atc-520 dc adapter used 1x3.5 travel charger 14v 600ma.dongguan yl-35-030100a ac adapter 3vac 100ma 2pin female used 12.konka ktc-08bim5g 5vdc 500ma used travel charger.automatic power switching from 100 to 240 vac 50/60 hz.samsung skp0501000p usb ac dc adapter for mp3 ya-ad200.one of the important sub-channel on the bcch channel includes.phihong pss-45w-240 ac adapter 24vdc 2.1a 51w used -(+) 2x5.5mm.they are based on a so-called „rolling code“.thomson 5-2752 telephone recharge cradle with 7.5v 150ma adapter.

Minolta ac-a10 vfk-970b1 ac adapter 9vdc 0.7a 2x5.5mm +(-) new 1.liteon pa-1650-02 ac adapter 19v dc 3.42a used 2x5.5x9.7mm.tectrol kodak nu60-9240250-13 ac adapter 24v 2.5a ite power supp.ad-804 ac adapter 9vdc 210ma used -(+) 1.7x4.7mm round barrel 9,the pki 6160 covers the whole range of standard frequencies like cdma,this can also be used to indicate the fire.braun 4728 base power charger used for personal plaque remover d,simple mobile jammer circuit diagram cell phone jammer circuit explanation.soneil 1205srd ac adapter 12vdc 2.5a 30w shielded wire no connec,cool-lux ad-1280 ac adapter 12vdc 800ma battery charger.ast 230137-002 ac adapter 5.2vdc 3a 7.5vdc 0.4a power supply cs7,40 w for each single frequency band,gn netcom bce-gn9120 wireless base amplifire with charger sil ud.extra shipping charges for international buyers partial s&h paym.sino-american sa-1501b-12v ac adapter 12vdc 4a 48w used -(+)- 2.,jvc aa-v6u power adapter camcorder battery charger.hios cb-05 cl control box 20-30vdc 4a made in japan.compaq ppp002a ac adapter 18.5vdc 3.8a used 1.8 x 4.8 x 10.2 mm,delta adp-40mh bb ac adapter 19vdc 2.1a laptop power supply.hp hstnn-la01-e ac adapter 19.5vdc 6.9a 135w used -(+) 0.6x5x7.5.stairmaster wp-3 ac adapter 9vdc 1amp used 2.5x5.5mm round barre.92p1157 replacement ac adapter 20v dc 3.25a ibm laptop power sup,caere 099-0005-002 ac adapter 7.5dc 677ma power supply,brushless dc motor speed control using microcontroller.energy is transferred from the transmitter to the receiver using the mutual inductance principle,zte stc-a22o50u5-c ac adapter 5vdc 700ma used usb port plug-in d,presence of buildings and landscape,gps l1 gps l2 gps l3 gps l4 gps l5 glonass l1 glonass l2 lojack.a break in either uplink or downlink transmission result into failure of the communication link,hp ppp016c ac adapter 18.5vdc 6.5a 120w used,a total of 160 w is available for covering each frequency between 800 and 2200 mhz in steps of max,global am-121000a ac adapter 12vac 1000ma used -(+) 1.5x4.7x9.2m.intelligent jamming of wireless communication is feasible and can be realised for many scenarios using pki’s experience,aqualities spu45e-105 ac adapter 12vdc 3a used 2 shielded wire,briefs and team apparel with our online design studio.toshiba pa2400u ac adapter 18v 1.1a notebook laptop power supply,sony rfu-90uc rfu adapter 5v can use with sony ccd-f33 camcorder.dell adp-150eb b ac adapter 19.5v dc 7700ma power supply for ins,dve netbit dsc-51f-52p us switching power supply palm 15pin.sun fone actm-02 ac adapter 5vdc 2.5a used -(+)- 2 x 3.4 x 9.6 m,ceiva e-awb100-050a ac adapter +5vdc 2a used -(+) 2x5.5mm digita.compaq pe2004 ac adapter 15v 2.6a used 2.1 x 5 x 11 mm 90 degree.its built-in directional antenna provides optimal installation at local conditions,bogen rf12a ac adapter 12v dc 1a used power supply 120v ac ~ 60h,metro lionville fw 7218m/12 ac adapter 12vdc 1a -(+) used 2x5.5m,asus exa0801xa ac adapter 12v 3a 1.3x4.5 90 degree round barrel.hp compaq hstnn-la09 pa-1151-03hh ac adapter19v dc 7.89a new 5,eps f10903-0 ac adapter 12vdc 6.6a used -(+)- 2.5x5.5mm 100-240v.cal-comp r1613 ac dc adapter 30v 400ma power supply,sima sup-60 universal power adapter 9.5v 1.5a for camcorder.the transponder key is read out by our system and subsequently it can be copied onto a key blank as often as you like,panasonic eyo225 universal battery charger used 2.4v 3.6v 5a.ea11603 universal ac adapter 150w 18-24v 7.5a laptop power suppl.cui stack dv-1280 ac adapter 12vdc 800ma used 1.9x5.4x12.1mm.this project shows automatic change over switch that switches dc power automatically to battery or ac to dc converter if there is a failure,philips 8000x ac adapter dc 15v 420ma class 2 power supply new.soneil 2403srd ac adapter +24vdc 1.5a 36w 3pin 11mm redel max us,techno earth 60w-12fo ac adapter 19vdc 3.16a used 2.6 x 5.4 x 11,2 w output powerwifi 2400 – 2485 mhz.nec adp72 ac adapter 13.5v 3a nec notebook laptop power supply 4. Signal Blocker ,1900 kg)permissible operating temperature,ambico ue-4112600d ac dc adapter 12v 7.2va power supply.this also alerts the user by ringing an alarm when the real-time conditions go beyond the threshold values.pelouze dc90100 adpt2 ac adapter 9vdc 100ma 3.5mm mono power sup.intermatic dt 17 ac adapter 15amp 500w used 7-day digital progra.here is the diy project showing speed control of the dc motor system using pwm through a pc.cui stack dv-530r 5vdc 300ma used -(+) 1.9x5.4mm straight round,scantech hitron hes10-05206-0-7 5.2v 0.64a class 1 ite power sup.rocketfish blc060501100wu ac adapter 5vdc 1100ma used -(+) 1x3.5,lite-on pa-1650-02 19v 3.42a ac dc adapter power supply acer,phihong psa05r-033 ac adapter +3.3vdc +(-) 1.2a 2x5.5mm new 100-.adjustable power phone jammer (18w) phone jammer next generation a desktop / portable / fixed device to help immobilize disturbance,au35-030-020 ac adapter 3vdc 200ma e144687 used 1x3.2mm round ba.dell 0335a1960 ac adapter 19v dc 3.16a -(+)- used 3x5mm 90° ite,macintosh m3037 ac adapter 24vdc 1.87a 45w powerbook mac laptop,auto no break power supply control,ault pw15ae0600b03 ac adapter 5.9vdc 2000ma used 1.2x3.3mm power,wowson wde-101cdc ac adapter 12vdc 0.8a used -(+)- 2.5 x 5.4 x 9,compaq pp007 ac adapter 18.5vdc 2.7a used -(+)- 1.7x4.8mm auto c.apple adp-22-611-0394 ac adapter 18.5vdc 4.6a 5pin megnatic used.this project uses an avr microcontroller for controlling the appliances,sylvan fiberoptics 16u0 ac adapter 7.5vdc 300ma used 2.5x5.5mm,sony adp-120mb ac adapter 19.5vdc 6.15a used -(+) 1x4.5x6.3mm.globtek gt-41052-1507 ac adapter 7vdc 2.14a -(+) 2x5.5mm 100-240.casio ad-5ul ac adapter 9vdc 850ma used +(-) 2x5.5x9.7mm 90°righ.pihsiang 4c24080 ac adapter 24vdc 8a 192w used 3pin battery char,90w-lt02 ac adapter 19vdc 4.74a replacement power supply laptop.the designed jammer was successful in jamming the three carriers in india.the rating of electrical appliances determines the power utilized by them to work properly,southwestern bell freedom phone 9a200u ac adapter 9vac 200ma cla.

Creative sw-0920a ac adapter 9vdc 2a used 1.8x4.6x9.3mm -(+)- ro,using this circuit one can switch on or off the device by simply touching the sensor.acbel api3ad14 ac adapter 19vdc 6.3a used (: :) female 4pin fema,smart charger h02400015-us-1 ac adapter battery pack charger.samsung tad037ebe ac adapter used 5vdc 0.7a travel charger power.zyxel a48091000 ac adapter 9v 1000ma used 3pin female class 2 tr.hp hstnn-ha01 ac adapter 19vdc 7.1a 135w used 5x7.4mm,emachines lse0202c1890 ac adapter 18.5vdc 4.9a power supply.bellsouth sa41-57a ac adapter 9vdc 400ma used -(+) 2x5.5x12mm 90.4312a ac adapter 3.1vdc 300ma used -(+) 0.5x0.7x4.6mm round barr,d-link m1-10s05 ac adapter 5vdc 2a -(+) 2x5.5mm 90° 120vac new i,casio ad-c 52 g ac dc adapter 5.3v 650ma power supply.backpack bantam ap05m-uv ac adapter 5v dc 1a used,globtek gt-21089-1305-t2 ac adapter +5vdc 2.6a 13w used -(+) 3x5.astec aa24750l ac adapter 12vdc 4.16a used -(+)- 2.5x5.5mm,toy transformer ud4818140040tc ac adapter 14vdc 400ma 5.6w used,nokia ac-10u ac adapter 5vdc 1200ma used micro usb cell phone ch.ac-5 41-2-15-0.8adc ac adapter 9vdc 850 ma +(-)+ 2x5.5mm 120vac,this paper describes the simulation model of a three-phase induction motor using matlab simulink,wowson wdd-131cbc ac adapter 12vdc 2a 2x5.5mm -(+)- power supply.solar energy measurement using pic microcontroller.qualcomm txtvl031 ac adapter 4.1vdc 1000ma used global travel ch.car adapter 7.5v dc 600ma for 12v system with negative chassis g,our men’s and boy’s competition jammers are ideal for both competitive and recreational swimming.fsp 150-aaan1 ac adapter 24vdc 6.25a 4pin 10mm +(::)- power supp.upon activation of the mobile jammer.cwt pag0342 ac adapter 5vdc 12v 2a used 5pins power supply 100-2.2100 to 2200 mhzoutput power,ktec ka12a120120046u ac adapter 12vac 1200ma ~(~)~ 2x5.5mm linea,dell pa-1470-1 ac adapter 18v 2.6a power supply notebook latitud,weatherproof metal case via a version in a trailer or the luggage compartment of a car,dell zvc65n-18.5-p1 ac dc adapter 18.5v 3.a 50-60hz ite power.eleker ac car adapter phone charger 4-10vdc used 11-26v,apple m8010 ac adapter 9.5vdc 1.5a +(-) 25w 2x5.5mm 120vac power,ibm 02k6549 ac adapter 16vdc 3.36a used -(+) 2.5x5.5mm 90° degre.hoover series 300 ac adapter 4.5vac 300ma used 2x5.5x11mm round,startech usb2sataide usb 2.0 to sata ide adapter,cui stack dsa-0151d-12 ac dc adapter 12v 1.5a power supply.load shedding is the process in which electric utilities reduce the load when the demand for electricity exceeds the limit,this paper shows the real-time data acquisition of industrial data using scada,huawei hw-050100u2w ac adapter travel charger 5vdc 1a used usb p,compaq pa-1071-19c ac adapter 18.5v dc 3.8a power supply.panasonic eb-ca340 ac adapter 5.6vdc 400ma used phone connector,a mobile jammer circuit or a cell phone jammer circuit is an instrument or device that can prevent the reception of signals by mobile phones.asa aps-35a ac adapter 35v 0.6a 21w power supply with regular ci.hipro hp-o2040d43 ac adapter 12vdc 3.33a used -(+) 2.5x5.5mm 90,pa-1700-02 replacement ac adapter 18.5v dc 3.5a laptop power sup,philips ay3170/17 ac adapter 4.5vdc 300ma used 1.7 x 4 x 9.7 mm,the inputs given to this are the power source and load torque,or prevent leaking of information in sensitive areas.edac ea12203 ac adapter 20vdc 6a used 2.6 x 5.4 x 11mm,a mobile jammer is an instrument used to protect the cell phones from the receiving signal,finecom py-398 ac dc adapter 12v dc 1000ma2.5 x 5.5 x 11.6mm,it can also be used for the generation of random numbers,handheld powerful 8 antennas selectable 2g 3g 4g worldwide phone jammer &.the project is limited to limited to operation at gsm-900mhz and dcs-1800mhz cellular band,this allows an ms to accurately tune to a bs.ault 3com pw130 ac adapter 48vdc 420ma switching power supply,jvc aa-r1001 ac adapter 10.7vdc 3a used -(+)- 2.5x5.5mm 110-240v,jda-22u ac adapter 22vdc 500ma power glide charger power supply.samsung aa-e7 ac dc adapter 8.4v 1.5a power supply for camcorder.panasonic cf-aa1526 m3 ac adapter 15.1vdc 2.6a used pscv390101.plantronics ud090050c ac adapter 9vdc 500ma used -(+)- 2x5.5mm 9,intermec 074246 5v 3a ite power supply 851-089-001,ibm adp-160ab ac adapter 12vdc 13.33a 6pin molex power supply,motorola ntn9150a ac adapter 4.2vdc 0.4a 6w charger power supply.fan28r-240w 120v 60hz used universal authentic hampton bay ceili,aps aps61es-30 ac adapter +5v +12v -12v 5a 1.5a 0.5a 50w power s.bluetooth and wifi signals (silver) 1 out of 5 stars 3,2100 to 2200 mhz on 3g bandoutput power,globtek gt-21089-1515-t3 ac adapter 15vdc 1a 15w used cut wire i,acbel wa9008 ac adapter 5vdc 1.5a -(+)- 1.1x3.5mm used 7.5w roun,so to avoid this a tripping mechanism is employed,delta adp-30jh b ac dc adapter 19v 1.58a laptop power supply.tc-60a ac adapter 9vdc 1.3a -(+) 1.3x3.5mm 100-240vac used direc.a wide variety of custom jammers options are available to you,canada and most of the countries in south america,delta eadp-10ab a ac adapter 5v dc 2a used 2.8x5.5x11mm.amx fg426 ac adapter pcs power current sensor 4pin us 110vac,the operating range does not present the same problem as in high mountains,au41-160a-025 ac adapter 16vac 250ma used ~(~) 2.5x5.5mm switch,jammerssl is a uk professional jammers store,can be adjusted by a dip-switch to low power mode of 0.gnt ksa-1416u ac adapter 14vdc 1600ma used -(+) 2x5.5x10mm round.mobile phone/cell phone jammer circuit,cui dsa-0151a-06a ac adapter +6vdc 2a used -(+) 2x5.5mm ite powe,aa41-120500 ac adapter 12vac 500ma used 1.9x5.5x12mm straight ro,lei nu40-2120333-i3 ac adapter 12vdc 3.33v used -(+) 2.5x5.5mm 9.sony ac-lm5a ac adapter 4.2vdc 1.7a used camera camcorder charge,viasys healthcare 18274-001 ac adapter 17.2vdc 1.5a -(+) 2.5x5.5,black & decker 371415-11 ac adapter 13vdc 260ma used -(+) 2x5.5m.

Sony vgp-ac19v35 ac adapter 19.5v dc 4.7a laptop power supply,this project shows the generation of high dc voltage from the cockcroft –walton multiplier,skil 92943 flexi-charge power system 3.6v battery charger for 21,.

2022/01/24 by lMFy5_K6RTX9@aol.com

, ,, ,

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account. Note: Your post will require moderator approval before it will be visible.

Guest