868 mhz jammer , jammer gun mayhem pc

Correlating Carrier Phase with Rapid Antenna Motion By Mark L. Psiaki with Steven P. Powell and Brady W. O’Hanlon INNOVATION INSIGHTS by Richard Langley IT’S A HOSTILE (ELECTRONIC) WORLD OUT THERE, PEOPLE. Our wired and radio-based communication systems are constantly under attack from evil doers. We are all familiar with computer viruses and worms hiding in malicious software or malware distributed over the Internet or by infected USB flash drives. Trojan horses are particularly insidious. These are programs concealing harmful code that can lead to many undesirable effects such as deleting a user’s files or installing additional harmful software. Such programs pass themselves off as benign, just like the “gift” the Greeks delivered to the Trojans as reported in Virgil’s Aeneid. This was a very early example of spoofing. Spoofing of Internet Protocol (IP) datagrams is particularly prevalent. They contain forged source IP addresses with the purpose of concealing the identity of the sender or impersonating another computing system. To spoof someone or something is to deceive or hoax, passing off a deliberately fabricated falsehood made to masquerade as truth. The word “spoof” was introduced by the English stage comedian Arthur Roberts in the late 19th century. He invented a game of that name, which involved trickery and nonsense. Now, the most common use of the word is as a synonym for parody or satirize — rather benign actions. But it is the malicious use of spoofing that concerns users of electronic communications. And it is not just wired communications that are susceptible to spoofing. Communications and other services using radio waves are, in principle, also spoofable. One of the first uses of radio-signal spoofing was in World War I when British naval shore stations sent transmissions using German ship call signs. In World War II, spoofing became an established military tactic and was extended to radar and navigation signals. For example, German bomber aircraft navigated using radio signals transmitted from ground stations in occupied Europe, which the British spoofed by transmitting similar signals on the same frequencies. They coined the term “meaconing” for the interception and rebroadcast of navigation signals (meacon = m(islead)+(b)eacon). Fast forward to today. GPS and other GNSS are also susceptible to meaconing. From the outset, the GPS P code, intended for use by military and other so-called authorized users, was designed to be encrypted to prevent straightforward spoofing. The anti-spoofing is implemented using a secret “W” encryption code, resulting in the P(Y) code. The C/A code and the newer L2C and L5 codes do not have such protection; nor, for the most part, do the civil codes of other GNSS. But, it turns out, even the P(Y) code is not fully protected from sophisticated meaconing attacks. So, is there anything that military or civil GNSS users can do, then, to guard against their receivers being spoofed by sophisticated false signals? In this month’s column, we take a look at a novel, yet relatively easily implemented technique that enables users to detect and sequester spoofed signals. It just might help make it a safer world for GNSS positioning, navigation, and timing. “Innovation” is a regular feature that discusses advances in GPS technology andits applications as well as the fundamentals of GPS positioning. The column is coordinated by Richard Langley of the Department of Geodesy and Geomatics Engineering, University of New Brunswick. He welcomes comments and topic ideas. To contact him, see the “Contributing Editors” section on page 4. The radionavigation community has known about the dangers of GNSS spoofing for a long time, as highlighted in the 2001 Volpe Report (see Further Reading). Traditional receiver autonomous integrity monitoring (RAIM) had been considered a good spoofing defense. It assumes a dumb spoofer whose false signal produces a random pseudorange and large navigation solution residuals. The large errors are easy to detect, and given enough authentic signals, the spoofed signal(s) can be identified and ignored. That spoofing model became obsolete at The Institute of Navigation’s GNSS 2008 meeting. Dr. Todd Humphreys introduced a new receiver/spoofer that could simultaneously spoof all signals in a self-consistent way undetectable to standard RAIM techniques. Furthermore, it could use its GNSS reception capabilities and its known geometry relative to the victim to overlay the false signals initially on top of the true ones. Slowly it could capture the receiver tracking loops by raising the spoofer power to be slightly larger than that of the true signals, and then it could drag the victim receiver off to false, but believable, estimates of its position, time, or both. Two of the authors of this article contributed to Humphreys’ initial developments. There was no intention to help bad actors deceive GNSS user equipment (UE). Rather, our goal was to field a formidable “Red Team” as part of a “Red Team/Blue Team” (foe/friend) strategy for developing advanced “Blue Team” spoofing defenses. This seemed like a fun academic game until mid-December 2011, when news broke that the Iranians had captured a highly classified Central Intelligence Agency drone, a stealth Lockheed Martin RQ-170 Sentinel, purportedly by spoofing its GPS equipment. Given our work in spoofing and detection, this event caused quite a stir in our Cornell University research group, in Humphreys’ University of Texas at Austin group, and in other places. The editor of this column even got involved in our extensive e-mail correspondence. Two key questions were: Wouldn’t a classified spy drone be equipped with a Selective Availability Anti-Spoofing Module (SAASM) receiver and, therefore, not be spoofable? Isn’t it difficult to knit together a whole sequence of false GPS position fixes that will guide a drone to land in a wrong location? These issues, when coupled with apparent inconsistencies in the Iranians’ story and visible damage to the drone, led us to discount the spoofing claim. Developing a New Spoofing Defense My views about the Iranian claims changed abruptly in mid-April 2012. Todd Humphreys phoned me about an upcoming test of GPS jammers, slated for June 2012 at White Sands Missile Range (WSMR), New Mexico. The Department of Homeland Security (DHS) had already spent months arranging these tests, but Todd revealed something new in that call: He had convinced the DHS to include a spoofing test that would use his latest “Red Team” device. The goal would be to induce a small GPS-guided unmanned aerial vehicle (UAV), in this case a helicopter, to land when it was trying to hover. “Wow”, I thought. “This will be a mini-replication of what the Iranians claimed to have done to our spy drone, and I’m sure that Todd will pull it off. I want to be there and see it.” Cornell already had plans to attend to test jammer tracking and geolocation, but we would have to come a day early to see the spoofing “fun” — if we could get permission from U.S. Air Force 746th Test Squadron personnel at White Sands. The implications of the UAV test bounced around in my head that evening and the next morning on my seven-mile bike commute to work. During that ride, I thought of a scenario in which the Iranians might have mounted a meaconing attack against a SAASM-equipped drone. That is, they might possibly have received and re-broadcast the wide-band P(Y) code in a clever way that could have nudged the drone off course and into a relatively soft landing on Iranian territory. In almost the next moment, I conceived a defense against such an attack. It involves small antenna motions at a high frequency, the measurement of corresponding carrier-phase oscillations, and the evaluation of whether the motions and phase oscillations are more consistent with spoofed signals or true signals. This approach would yield a good defense for civilian and military receivers against both spoofing and meaconing attacks. The remainder of this article describes this defense and our efforts to develop and test it. It is one thing to conceive an idea, maybe a good idea. It is quite another thing to bring it to fruition. This idea seemed good enough and important enough to “birth” the conception. The needed follow-up efforts included two parts, one theoretical and the other experimental. The theoretical work involved the development of signal models, hypothesis tests, analyses, and software. It culminated in analysis and truth-model simulation results, which showed that the system could be very practical, using only centimeters of motion and a fraction of a second of data to reliably differentiate between spoofing attacks and normal GNSS operation. Theories and analyses can contain fundamental errors, or overlooked real-world effects can swamp the main theoretical effect. Therefore, an experimental prototype was quickly conceived, developed, and tested. It consisted of a very simple antenna-motion system, an RF data-recording device, and after-the-fact signal processing. The signal processing used Matlab to perform the spoofing detection calculations after using a C-language software radio to perform standard GPS acquisition and tracking. Tests of the non-spoofed case could be conducted anywhere outdoors. Our initial tests occurred on a Cornell rooftop in Ithaca, New York. Tests of the spoofed case are harder. One cannot transmit live spoofing signals except with special permission at special times and in special places, for example, at WSMR in the upcoming June tests. Fortunately, the important geometric properties of spoofed signals can be simulated by using GPS signal reception at an outdoor antenna and re-radiation in an anechoic chamber from a single antenna. Such a system was made available to us by the NASA facility at Wallops Island, Virginia, and our simulated spoofed-case testing occurred in late April of last year. All of our data were processed before mid-May, and they provided experimental confirmation of our system’s efficacy. The final results were available exactly three busy weeks after the initial conception. Although we were convinced about our new system, we felt that the wider GNSS community would like to see successful tests against live-signal attacks by a real spoofer. Therefore, we wanted very much to bring our system to WSMR for the June 2012 spoofing attack on the drone. We could set up our system near the drone so that it would be subject to the same malicious signals, but without the need to mount our clumsy prototype on a compact UAV helicopter. We were concerned, however, about the possibility of revealing our technology before we had been able to apply for patent protection. After some hesitation and discussions with our licensing and technology experts, we decided to bring our system to the WSMR test, but with a physical cover to keep it secret. The cover consisted of a large cardboard box, large enough to accommodate the needed antenna motions. The WSMR data were successfully collected using this method. Post-processing of the data demonstrated very reliable differentiation between spoofed and non-spoofed cases under live-signal conditions, as will be described in subsequent sections of this article. System Architecture and Prototype The components and geometry of one possible version of this system are shown in FIGURE 1. The figure shows three of the GNSS satellites whose signals would be tracked in the non-spoofed case: satellites j-1, j, and j+1. It also shows the potential location of a spoofer that could send false versions of the signals from these same satellites. The spoofer has a single transmission antenna. Satellites j-1, j, and j+1 are visible to the receiver antenna, but the spoofer could “hijack” the receiver’s tracking loops for these signals so that only the false spoofed versions of these signals would be tracked by the receiver. Figure 1. Spoofing detection antenna articulation system geometry relative to base mount, GNSS satellites, and potential spoofer. Photo: Mark L. Psiaki with Steven P. Powell and Brady W. O’Hanlon The receiver antenna mount enables its phase center to be moved with respect to the mounting base. In Figure 1, this motion system is depicted as an open kinematic chain consisting of three links with ball joints. This is just one example of how a system can be configured to allow antenna motion. Spoofing detection can work well with just one translational degree of freedom, such as a piston-like up-and-down motion that could be provided by a solenoid operating along the za articulation axis. It would be wise to cover the motion system with an optically opaque radome, if possible, to prevent a spoofer from defeating this system by sensing the high-frequency antenna motions and spoofing their effects on carrier phase. Suppose that the antenna articulation time history in its local body-fixed (xa, ya, za) coordinate system is ba(t). Then the received carrier phases are sensitive to the projections of this motion onto the line-of-sight (LOS) directions of the received signals. These projections are along  , , and  in the non-spoofed case, with   being the known unit direction vector from the jth GNSS satellite to the nominal antenna location. In the spoofed case, the projections are all along , regardless of which signal is being spoofed, with  being the unknown unit direction vector from the spoofer to the victim antenna. Thus, there will be differences between the carrier-phase responses of the different satellites in the non-spoofed case, but these differences will vanish in the spoofed case. This distinction lies at the heart of the new spoofing detection method. Given that a good GNSS receiver can easily distinguish quarter-cycle carrier-phase variations, it is expected that this system will be able to detect spoofing using antenna motions as small as 4.8 centimeters, that is, a quarter wavelength of the GPS L1 signal. The UE receiver and spoofing detection block in Figure 1 consists of a standard GNSS receiver, a means of inputting the antenna motion sensor data, and additional signal processing downstream of the standard GNSS receiver operations. The latter algorithms use as inputs the beat carrier-phase measurements from a standard phase-locked loop (PLL). It may be necessary to articulate the antenna at a frequency nearly equal to the bandwidth of the PLL (say, at 1 Hz or higher). In this case, special post-processing calculations might be required to reconstruct the high-frequency phase variations accurately before they can be used to detect spoofing. The needed post-processing uses the in-phase and quadrature accumulations of a phase discriminator to reconstruct the noisy phase differences between the true signal and the PLL numerically controlled oscillator (NCO) signal. These differences are added to the NCO phases to yield the full high-bandwidth variations. We implemented the first prototype of this system with one-dimensional antenna motion by mounting its patch antenna on a cantilevered beam. It is shown in FIGURE 2. Motion is initiated by pulling on the string shown in the upper left-hand part of the figure. Release of the string gives rise to decaying sinusoidal oscillations that have a frequency of about 2 Hz. Figure 2. Antenna articulation system for first prototype spoofing detector tests: a cantilevered beam that allows single-degree-of-freedom antenna phase-center vibration along a horizontal axis. Photo: Mark L. Psiaki with Steven P. Powell and Brady W. O’Hanlon The remainder of the prototype system consisted of a commercial-off-the-shelf RF data recording device, off-line software receiver code, and off-line spoofing detection software. The prototype system lacked an antenna motion sensor. We compensated for this omission by implementing additional signal-processing calculations. They included off-line parameter identification of the decaying sinusoidal motions coupled with estimation of the oscillations’ initial amplitude and phase for any given detection. This spoofing detection system is not the first to propose the use of antenna motion to uncover spoofing, and it is related to techniques that rely on multiple antennas. The present system makes three new contributions to the art of spoofing detection: First, it clearly explains why the measured carrier phases from a rapidly oscillating antenna provide a good means to detect spoofing. Second, it develops a precise spoofing detection hypothesis test for a moving-antenna system. Third, it demonstrates successful spoofing detection against live-signal attacks by a “Humphreys-class” spoofer. Signal Model Theory and Verification The spoofing detection test relies on mathematical models of the response of beat carrier phase to antenna motion. Reasonable models for the non-spoofed and spoofed cases are, respectively:   (1a) (1b) where  is the received (negative) beat carrier phase of the authentic or spoofed satellite-j signal at the kth sample time  . The three-by-three direction cosines matrix A is the transformation from the reference system, in which the direction vectors   and  are defined, to the local body-axis system, in which the antenna motion ba(t) is defined. λ is the nominal carrier wavelength. The terms involving the unknown polynomial coefficients , , and  model other low-frequency effects on carrier phase, including satellite motion, UE motion if its antenna articulation system is mounted on a vehicle, and receiver clock drift. The term  is the receiver phase noise. It is assumed to be a zero-mean, Gaussian, white-noise process whose variance depends on the receiver carrier-to-noise-density ratio and the sample/accumulation frequency. If the motion of the antenna is one-dimensional, then ba(t) takes the form , with  being the articulation direction in body-axis coordinates and ra(t) being a known scalar antenna deflection amplitude time history. If one defines the articulation direction in reference coordinates as  , then the carrier-phase models in Equations (1a) and (1b) become    (2a)   (2b) There is one important feature of these models for purposes of spoofing detection. In the non-spoofed case, the term that models the effects of antenna motion varies between GPS satellites because the  direction vector varies with j. The spoofed case lacks variation between the satellites because the one spoofer direction  replaces  for all of the spoofed satellites. This becomes clear when one compares the first terms on the right-hand sides of Eqsuations (1a) and (1b) for the 3-D motion case and on the right-hand sides of Equations (2a) and (2b) for the 1-D case. The carrier-phase time histories in FIGURES 3 and 4 illustrate this principle. These data were collected at WSMR using the prototype antenna motion system of Figure 2. The carrier-phase time histories have been detrended by estimating the , , and coefficients in Equations (2a) and (2b) and subtracting off their effects prior to plotting. In Figure 3, all eight satellite signals exhibit similar decaying sinusoid time histories, but with differing amplitudes and some of them with sign changes. This is exactly what is predicted by the 1-D non-spoofed model in Equation (2a). All seven spoofed signals in Figure 4, however, exhibit identical decaying sinusoidal oscillations because the  term in Equation (2b) is the same for all of them. Figure 3. Detrended carrier-phase data from multiple satellites for a typical non-spoofed case using a 1-D antenna articulation system.   Figure 4. Multiple satellites’ detrended carrier-phase data for a typical spoofed case using a 1-D antenna articulation system. As an aside, an interesting feature of Figure 3 is its evidence of the workings of the prototype system. The ramping phases of all the signals from t = 0.4 seconds to t = 1.4 seconds correspond to the initial pull on the string shown in Figure 2, and the steady portion from t = 1.4 seconds to t = 2.25 seconds represents a period when the string was held fixed prior to release. Spoofing Detection Hypothesis Test A hypothesis test can precisely answer the question of which model best fits the observed data: Does carrier-phase sameness describe the data, as in Figure 4? Then the receiver is being spoofed. Alternatively, is carrier-phase differentness more reasonable, as per Figure 3? Then the signals are trustworthy. A hypothesis test can be developed for any batch of carrier-phase data that spans a sufficiently rich antenna motion profile ba(t) or ρa(t). The profile must include high-frequency motions that cannot be modeled by the  , , and quadratic polynomial terms in Equations (1a)-(2b); otherwise the detection test will lose all of its power. A motion profile equal to one complete period of a sine wave has the needed richness. Suppose one starts with a data batch that is comprised of carrier-phase time histories for L different GNSS satellites:  for samples k = 1, …, Mj and for satellites j = 1,…, L. A standard hypothesis test develops two probability density functions for these data, one conditioned on the null hypothesis of no spoofing, H0, and the other conditioned on the hypothesis of spoofing, H1.  The Neyman-Pearson lemma (see Further Reading) proves that the optimal hypothesis test statistic equals the ratio of these two probability densities. Unfortunately, the required probability densities depend on additional unknown quantities. In the 1-D motion case, these unknowns include the , , and coefficients, the dot product , and the direction   if one assumes that the UE attitude is unknown. A true Neyman-Pearson test would hypothesize a priori distributions for these unknown quantities and integrate their dependencies out of the two joint probability distributions. Our sub-optimum test optimally estimates relevant unknowns for each hypothesis based on the carrier-phase data, and it uses these estimates in the Neyman-Pearson probability density ratio. Although sub-optimal as a hypothesis test, this approach is usually effective, and it is easier to implement than the integration approach in the present case. Consider the case of 1-D antenna articulation and unknown UE attitude. Maximum-likelihood calculations optimally estimate the nuisance parameters  , , and   for j = 1, …, L for both hypotheses along with the unit vector for the non-spoofed hypothesis, or the scalar dot product  for the spoofed hypothesis. The estimation calculations for each hypothesis minimize the negative natural logarithm of the corresponding conditional probability density. Because  , , and enter the resulting cost functions quadratically, their optimized values can be computed as functions of the other unknowns, and they can be substituted back into the costs. This part of the calculation amounts to a batch high-pass filter of both the antenna motion and the carrier-phase response. The remaining optimization problems take, under the non-spoofed hypothesis, the form: find:          (3a) to minimize:         (3b) subject to:                (3c) and, under the spoofed hypothesis, the form: find:      η    (4a) to minimize:         (4b) subject to:      .   (4c) The coefficient  is a function of the deflections  for k = 1, …, Mj, and the non-homogenous term  is derived from the jth phase time history  for k = 1, …, Mj. These two quantities are calculated during the  , , optimization. The constraint in Equation (3c) forces the estimate of the antenna articulation direction to be unit-normalized. The constraint in Eq. (4c) ensures that η is a physically reasonable dot product. The optimization problems in Equations (3a)-(3c) and (4a)-(4c) can be solved in closed form using techniques from the literature on constrained optimization, linear algebra, and matrix factorization. The optimal estimates of  and η can be used to define a spoofing detection statistic that equals the natural logarithm of the Neyman-Pearson ratio: (5) It is readily apparent that γ constitutes a reasonable test statistic: If the signal is being spoofed so that carrier-phase sameness is the best model, then ηopt will produce a small value of  because the spoofed-case cost function in Equation (4b) is consistent with carrier-phase sameness. The value of , however, will not be small because the plurality of   directions in Equation (3b) precludes the possibility that any  estimate will yield a small non-spoofed cost. Therefore, γ will tend to be a large negative number in the event of spoofing because  >>  is likely. In the non-spoofed case, the opposite holds true:   will yield a small value of , but no estimate of η will yield a small , and γ will be a large positive number because  . Therefore, a sensible spoofing detection test employs a detection threshold γth somewhere in the neighborhood of zero. The detection test computes a γ value based on the carrier-phase data, the antenna articulation time history, and the calculations in Equations (3a)-(5). It compares this γ to γth. If γ ≥ γth, then the test indicates that there is no spoofing. If γ γth, then a spoofing alert is issued. The exact choice of γth is guided by an analysis of the probability of false alarm. A false alarm occurs if a spoofing attack is declared when there is no spoofing. The false-alarm probability is determined as a function of γth by developing a γ probability density function under the null hypothesis of no spoofing p(γ|H0). The probability of false alarm equals the integral of p(γ|H0) from γ =  to γ = γth. This integral relationship can be inverted to determine the γth threshold that yields a given prescribed false-alarm probability A complication arises because p(γ|H0) depends on unknown parameters,   in the case of an unknown UE attitude and 1-D antenna motion. Although sub-optimal, a reasonable way to deal with the dependence of p(γ|,H0) on  is to use the worst-case  for a given γth. The worst-case articulation direction  maximizes the p(γ|,H0) false-alarm integral. It can be calculated by solving an optimization problem. This analysis can be inverted to pick γth so that the worst-case probability of false alarm equals some prescribed value. For most actual  values, the probability of false alarm will be lower than the prescribed worst case. Given γth, the final needed analysis is to determine the probability of missed detection. This analysis uses the probability density function of g under the spoofed hypothesis, p(γ|η,H1). The probability of missed detection is the integral of this function from γ = γth to γ = +. The dependence of p(γ|η,H1) on the unknown dot product η can be handled effectively, though sub-optimally, by determining the worst-case probability of false alarm. This involves an optimization calculation, which finds the worst-case dot product ηwc that maximizes the missed-detection probability integral. Again, most actual η values will yield lower probabilities of missed detection. Note that the above-described analyses rely on approximations of the probability density functions p(γ|,H0) and p(γ|η,H1). The best approximations include dominant Gaussian terms plus small chi-squared or non-central chi-squared terms. It is difficult to analyze the chi-squared terms rigorously. Their smallness, however, makes the use of Gaussian approximations reasonable. We have developed and evaluated several alternative formulations of this spoofing detection method. One is the case of full 3-D ba(t) antenna motion with unknown UE attitude. The full direction cosines matrix A is estimated in the modified version of the non-spoofed optimal fit calculations of Equations (3a)-(3c), and the full spoofing direction vector  is estimated in the modified version of Equations (4a)-(4c). A different alternative allows the 1-D motion time history ρa(t) to have an unknown amplitude-scaling factor that must be estimated. This might be appropriate for a UAV drone with a wing-tip-mounted antenna if it induced antenna motions by dithering its ailerons. In fixed-based applications, as might be used by a financial institution, a cell-phone tower, or a power-grid monitor, the attitude would be known, which would eliminate the need to estimate  or A for the non-spoofed case. Test Results The initial tests of our concept involved generation of simulated truth-model carrier-phase data  using simulated , , and polynomial coefficients, simulated satellite LOS direction vectors  for the non-spoofed cases, a simulated true spoofer LOS direction  for the spoofed cases, and simulated antenna motions parameterized by  and ρa(t). Monte-Carlo analysis was used to generate many different batches of phase data with different random phase noise realizations in order to produce simulated histograms of the p(γ|, H0) and p(γ|η,H1) probability density functions  that are used in false-alarm and missed-detection analyses. The truth-model simulations verified that the system is practical. A representative calculation used one cycle of an 8-Hz 1-D sinusoidal antenna oscillation with a peak-to-peak amplitude of 4.76 centimeters (exactly 1/4 of the L1 wavelength). The accumulation frequency was 1 kHz so that there were Mj = 125 carrier-phase measurements per satellite per data batch. The number of satellites was L = 6, their  LOS vectors were distributed to yield a geometrical dilution of precision of 3.5, and their carrier-to-noise-density ratios spanned the range 38.2 to 44.0 dB-Hz. The worst-case probability of a spoofing false alarm was set at 10-5 and the corresponding worst-case probability of missed detection was 1.2 ´ 10-5. Representative non-worst-case probabilities of false alarm and missed detection were, respectively, 1.7 ´ 10-9 and 1.1 ´ 10-6. These small numbers indicate that this is a very powerful test. Ten-thousand run Monte-Carlo simulations of the spoofed and non-spoofed cases verified the reasonableness of these probabilities and the reasonableness of the p(γ|, H0) and p(γ|η,H1) Gaussian approximations that had been used to derive them. The live-signal tests bore out the truth-model simulation results. The only surprise in the live-signal tests was the presence of significant multipath, which was evidenced by received carrier amplitude oscillations that correlated with the antenna oscillations and whose amplitudes and phases varied among the different received GPS signals. As a verification that these oscillations were caused by multipath, the only live-signal data set without such amplitude oscillations was the one taken in the NASA Wallops anechoic chamber, where one would not expect to find multipath. The multipath, however, seems to have negligible impact on the efficacy of this spoofing detection system. FIGURES 5 and 6 show the results of typical non-spoofed and spoofed cases from WSMR live-signal tests that took place on the evening of June 19–20, 2012. Each plot shows the spoofing detection statistic γ on the horizontal axis and various related probability density functions on the vertical axis. This statistic has been calculated using a modified test that includes the estimation of two additional unknowns: an antenna articulation scale factor f and a timing bias t0 for the decaying sinusoidal oscillation . The damping ratio ζ and the undamped natural frequency wn are known from prior system identification tests. Figure 5. Spoofing detection statistic, threshold, and related probability density functions for a typical non-spoofed case with live data.   Figure 6. Performance of a typical spoofed case with live data: spoofing detection statistic, threshold, and related probability density functions. The vertical dashed black line in each plot shows the actual value of γ as computed from the GPS data. There are three vertical dash-dotted magenta lines that lie almost on top of each other. They show the worst-case threshold values γth as computed for the optimal and ±2σ estimates of t0: t0opt, t0opt+2σt0opt, and t0opt-2σt0opt. They have been calculated for a worst-case probability of false alarm equal to 10-6. An ad hoc method of compensating for the prototype system’s t0 uncertainty is to use the left-most vertical magenta line as the detection threshold γth. The vertical dashed black line lies very far to the right of all three vertical dash-dotted magenta lines in Figure 5, which indicates a successful determination that the signals are not being spoofed. In Figure 6, the situation is reversed. The vertical dashed black line lies well to the left of the three vertical dash-dotted magenta lines, and spoofing is correctly and convincingly detected. These two figures also plot various relevant probability density functions. Consistent with the consideration of three possible values of the t0 motion timing estimate, these are plotted in triplets. The three dotted cyan probability density functions represent the worst-case non-spoofed situation, and the dash-dotted red probability functions represent the corresponding worst-case spoofed situations. Obviously, there is sufficient separation between these sets of probability density functions to yield a powerful detection test, as evidenced by the ability to draw the dash-dotted magenta detection thresholds in a way that clearly separates the red and cyan distributions. Further confirmation of good detection power is provided by the low worst-case probabilities of false alarm and missed detection, the latter metric being 1.6 ´ 10-6 for the test in Figure 5 and 7 ´ 10-8 for Figure 6. The solid-blue distributions on the two plots correspond to the ηopt estimate and the spoofed assumption, which is somewhat meaningless for Figure 5, but meaningful for Figure 6. The dashed-green distributions are for the  estimate under the non-spoofed assumption. The wide separations between the blue distributions and the green distributions in both figures clearly indicate that the worst-case false-alarm and missed-detection probabilities can be very conservative. The detection test results in Figures 5 and 6 have been generated using the last full oscillation of the respective carrier-phase data, as in Figures 3 and 4, but applied to different data sets. In Figure 3, the last full oscillation starts at t = 3.43 seconds, and it starts at t = 2.11 seconds in Figure 4. The peak-to-peak amplitude of each last full oscillation ranged from 4-6 centimeters, and their periods were shorter than 0.5 seconds. It would have been possible to perform the detections using even shorter data spans had the mechanical oscillation frequency of the cantilevered antenna been higher. Conclusions In this article, we have presented a new method to detect spoofing of GNSS signals. It exploits the effects of intentional high-frequency antenna motion on the measured beat carrier phases of multiple GNSS signals. After detrending using a high-pass filter, the beat carrier-phase variations can be matched to models of the expected effects of the motion. The non-spoofed model predicts differing effects of the antenna motion for the different satellites, but the spoofed case yields identical effects due to a geometry in which all of the false signals originate from a single spoofer transmission antenna. Precise spoofing detection hypothesis tests have been developed by comparing the two models’ ability to fit the measured data. This new GNSS spoofing detection technique has been evaluated using both Monte-Carlo simulation and live data. Its hypothesis test yields theoretical false-alarm probabilities and missed-detection probabilities on the order of 10-5 or lower when working with typical numbers and geometries of available GPS signals and typical patch-antenna signal strengths. The required antenna articulation deflections are modest, on the order of 4-6 centimeters peak-to-peak, and detection intervals less than 0.5 seconds can suffice. A set of live-signal tests at WSMR evaluated the new technique against a sophisticated receiver/spoofer, one that mimics all visible signals in a way that foils standard RAIM techniques. The new system correctly detected all of the attacks. These are the first known practical detections of live-signal attacks mounted against a civilian GNSS receiver by a dangerous new generation of spoofers. Future Directions This work represents one step in an on-going “Blue Team” effort to develop better defenses against new classes of GNSS spoofers. Planned future improvements include 1) the ability to use electronically synthesized antenna motion that eliminates the need for moving parts, 2) the re-acquisition of true signals after detection of spoofing, 3) the implementation of real-time prototypes using software radio techniques, and 4) the consideration of “Red-Team” counter-measures to this defense  and how the “Blue Team” could combat them; counter-measures such as high-frequency phase dithering of the spoofed signals or coordinated spoofing transmissions from multiple locations. Acknowledgments The authors thank the following people and organizations for their contributions to this effort:  The NASA Wallops Flight Facility provided access to their anechoic chamber. Robert Miceli, a Cornell graduate student, helped with data collection at that facility. Dr. John Merrill and the Department of Homeland Security arranged the live-signal spoofing tests. The U.S. Air Force 746th Test Squadron hosted the live-signal spoofing tests at White Sands Missile Range. Prof. Todd Humphreys and members of his University of Texas at Austin Radionavigation Laboratory provided live-signal spoofing broadcasts from their latest receiver/spoofer. Manufacturers The prototype spoofing detection data capture system used an Antcom Corp. (www.antcom.com) 2G1215A L1/L2 GPS antenna. It was connected to an Ettus Research (www.ettus.com) USRP (Universal Software Radio Peripheral) N200 that was equipped with the DBSRX2 daughterboard. MARK L. PSIAKI is a professor in the Sibley School of Mechanical and Aerospace Engineering at Cornell University, Ithaca, New York. He received a B.A. in physics and M.A. and Ph.D. degrees in mechanical and aerospace engineering from Princeton University, Princeton, New Jersey. His research interests are in the areas of GNSS technology, applications, and integrity, spacecraft attitude and orbit determination, and general estimation, filtering, and detection. STEVEN P. POWELL is a senior engineer with the GPS and Ionospheric Studies Research Group in the Department of Electrical and Computer Engineering at Cornell University. He has M.S. and B.S. degrees in electrical engineering from Cornell University. He has been involved with the design, fabrication, testing, and launch activities of many scientific experiments that have flown on high altitude balloons, sounding rockets, and small satellites. He has designed ground-based and space-based custom GPS receiving systems primarily for scientific applications. BRADY W. O’HANLON is a graduate student in the School of Electrical and Computer Engineering at Cornell University. He received a B.S. in electrical and computer engineering from Cornell University. His interests are in the areas of GNSS technology and applications, GNSS security, and GNSS as a tool for space weather research. VIDEO Here is a video of Cornell University’s antenna articulation system for the team’s first prototype spoofing detector tests. FURTHER READING • The Spoofing Threat and RAIM-Resistant Spoofers “Status of Signal Authentication Activities within the GNSS Authentication and User Protection System Simulator (GAUPSS) Project” by O. Pozzobon, C. Sarto, A. Dalla Chiara, A. Pozzobon, G. Gamba, M. Crisci, and R.T. Ioannides, in Proceedings of ION GNSS 2012, the 25th International Technical Meeting of The Institute of Navigation, Nashville, Tennessee, September 18–21, 2012, pp. 2894-2900. “Assessing the Spoofing Threat” by T.E. Humphreys, P.M. Kintner, Jr., M.L. Psiaki, B.M. Ledvina, and B.W. O’Hanlon in GPS World, Vol. 20, No. 1, January 2009, pp. 28-38. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System – Final Report. John A. Volpe National Transportation Systems Center, Cambridge, Massachusetts, August 29, 2001. • Moving-Antenna and Multi-Antenna Spoofing Detection “Robust Joint Multi-Antenna Spoofing Detection and Attitude Estimation by Direction Assisted Multiple Hypotheses RAIM” by M. Meurer, A. Konovaltsev, M. Cuntz, and C. Hattich, in Proceedings of ION GNSS 2012, the 25th International Technical Meeting of The Institute of Navigation, Nashville, Tennessee, September 18–21, 2012, pp. 3007-3016. “GNSS Spoofing Detection for Single Antenna Handheld Receivers” by J. Nielsen, A. Broumandan, and G. Lachapelle in Navigation, Vol. 58, No. 4, Winter 2011, pp. 335-344. • Alternate Spoofing Detection Strategies “Who’s Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC)” by D.M. Akos, in Navigation, Vol. 59, No. 4, Winter 2012-2013, pp. 281-290. “Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals” by M.L. Psiaki, B.W. O’Hanlon, J.A. Bhatti, D.P. Shepard, and T.E. Humphreys in Proceedings of ION GNSS 2011, the 24th International Technical Meeting of The Institute of Navigation, Portland, Oregon, September 19–23, 2011, pp. 2619-2645. • Statistical Hypothesis Testing Fundamentals of Statistical Signal Processing, Volume II: Detection Theory by S. Kay, published by Prentice Hall, Upper Saddle River, New Jersey,1998. An Introduction to Signal Detection and Estimation by H.V. Poor, 2nd edition, published by Springer-Verlag, New York, 1994.

868 mhz jammer

Sony pcga-ac19v3 ac adapter 19.5vdc 4.7a 90w power supply vgp-ac.amongst the wide range of products for sale choice.casio ad-12ul ac adapter 12vdc 1500ma +(-) 1.5x5.5mm 90° 120vac.dve dsa-0151d-09.5 ac adapter 9.5vdc 1.8a used 2.5x5.5mm -(+) 10.eng 41-12-300 ac adapter 12vdc 300ma used 2 x 5.4 x 11.2 mm 90 d,the scope of this paper is to implement data communication using existing power lines in the vicinity with the help of x10 modules.apd wa-10e05u ac adapter 5vdc 2a used 1.8x4mm -(+) 100-240vac,cpc can be connected to the telephone lines and appliances can be controlled easily,replacement ed49aa#aba ac adapter 18.5v 3.5a used,eta-usa dtm15-55x-sp ac adapter 5vdc 2.5a used -(+)2.5x5.5 roun.this is also required for the correct operation of the mobile,component telephone u060030d12 ac adapter 6vdc 300ma power suppl.2 w output powerdcs 1805 – 1850 mhz,delta sadp-185af b 12vdc 15.4a 180w power supply apple a1144 17".compaq ppp003sd ac adapter 18.5v 2.7a laptop power supply,in case of failure of power supply alternative methods were used such as generators,jda-22u ac adapter 22vdc 500ma power glide charger power supply,finecom api3ad14 19vdc 6.3a used -(+)- 2.5x5.5mm pa-1121-02 lite,bellsouth products dv-9300s ac adapter 9vdc 300ma class 2 transf,shenzhen jhs-q05/12-s334 ac adapter 12vdc 5v 2a s15 34w power su.ibm 73p4502 ac adapter 16vdc 0 - 4.55a 72w laptop power supply.


jammer gun mayhem pc 8724 6434
jammerill blog about politics 8018 3633
jammer gun mayhem crossword 4466 7075
drone jammer illegal models 4865 3120
jammer gun ownership laws 8317 1876
jammer direct mortgage estimator 3860 6790
jammer gun oil bottle 7791 7478
jammer gun owners discussing 6297 5833
jammerill blog about dogs 1235 8174
jammerill blog twitter password 6501 8163
jammer gun violence leave 6726 4078
jammer gun kelly d3mons 4887 2880
jammerill blog about low 5522 4045
jammer harley tools button 3377 6162
jammer gun world journal 7798 673
jammer gun purchases policy 7117 6964
jammer gun mayhem two 1473 5890
jammer gun oil extreme 2297 7841
jammerill blog about autism 8255 1820
jammerill blog about cheating 1185 1486
jammerill blog today weather 1243 6605
jammer gun oil msds 7131 7513
jammertal wellness quiz answers 639 5471
jammerill blog about nursing 7016 7308
850mhz signal booster 6803 1330
jammer gun holsters ruger 6997 6088
jammer gun protests against 7797 596
jammer kit harington news 4822 5669
jammer direct burial underground 2069 687

Nokia acp-8e ac dc adapter dc 5.3v 500 ma euorope cellphone char.southwestern bell freedom phone n35150930-ac ac adapter 9vac 300,5 kgkeeps your conversation quiet and safe4 different frequency rangessmall sizecovers cdma,astec dps53 ac adapter 12vdc 5a -(+) 2x5.5mm power supply deskto,this project uses an avr microcontroller for controlling the appliances,they are based on a so-called „rolling code“.black & decker vp130 versapack battery charger used interchangea,ibm 12j1447 ac adapter 16v dc 2.2a power supply 4pin for thinkpa.its called denial-of-service attack,ps120v15-d ac adapter 12vdc 1.25a used2x5.5mm -(+) straight ro,delta adp-30jh b ac dc adapter 19v 1.58a laptop power supply.whether in town or in a rural environment.philips hs8000 series coolskin charging stand with adapter.hipro hp-ol060d03 ac adapter 12vdc 5a used -(+)- 2.5x5.5power su,power-win pw-062a2-1y12a ac adapter 12vdc 5.17a 62w 4pin power,phihong psa65u-120 ac adapter 12vdc 5a 4 pin molex 100-240vac sw,li shin gateway 0225c1965 19v dc 3.42a -(+)- 1.9x5.5mm used ite,dell pa-3 ac adapter 19vdc 2.4a 2.5x5.5mm -(+) power supply,avaya sa41-118a ac adapter 9vdc 700ma 13w -(+)- power supply,macintosh m4402 ac adapter 24v dc 1.9a 45w apple powerbook power.communication can be jammed continuously and completely or.

Tech std-1225 ac adapter 12vdc 2.5a used -(+) 2.3x5.5x9.8mm roun,the mobile jamming section is quite successful when you want to disable the phone signals in a particular area,this paper uses 8 stages cockcroft –walton multiplier for generating high voltage,sinpro spu80-111 ac adapter 48v 1.66a used 2 hole connector,military/insurgency communication jamming.charger for battery vw-vbg130 panasonic camcorder hdc-sd9pc sdr-,seven star ss 214 step-up reverse converter used deluxe 50 watts.jabra ssa-5w-09 us 075065f ac adapter 7.5vdc 650ma used sil .7x2.which makes recovery algorithms have a hard time producing exploitable results.sunny sys1148-2005 +5vdc 4a 65w used -(+)- 2.5x5.5mm 90° degree,sil ssa-100015us ac adapter 10vdc 150ma used -(+) 2.5x5.5x12.4mm,samsung tad136jbe ac adapter 5vdc 0.7a used 0.8x2.5mm 90°,scada for remote industrial plant operation.sy-1216 ac adapter 12vac 1670ma used ~(~) 2x5.5x10mm round barre,intermec ea10722 ac adapter 15-24v 4.3a -(+) 2.5x5.5mm 75w i.t.e.this paper uses 8 stages cockcroft –walton multiplier for generating high voltage,this interest comes from the fundamental objective,the if section comprises a noise circuit which extracts noise from the environment by the use of microphone.when you choose to customize a wifi jammer,atc-520 dc adapter used 1x3.5 travel charger 14v 600ma.ault mw116ka1249f02 ac adapter 12vdc 6.67a 4pin (: :) straight.

Anti jammer bluetooth wireless earpiece unlimited range,escort zw5 wireless laser shifter,union east ace024a-12 12v 2a ac adapter switching power supply 0,mainly for door and gate control,video digital camera battery charger used 600ma for db70 s008e b,rocketfish nsa6eu-050100 ac adapter 5vdc 1a used.dell da90ps2-00 ac adapter c8023 19.5v 4.62a power supply.hp ppp009h ac adapter 18.5vdc 3.5a 65w used,hi capacity ea10952b ac adapter 15-24vdc 5a 90w -(+) 3x6.5mm pow,tyco 610 ac adapter 25.5vdc 4.5va used 2pin hobby transformer po.macintosh m4328 ac adapter 24.5vdc 2.65a powerbook 2400c 65w pow,motorola plm4681a ac adapter 4vdc 350ma used -(+) 0.5x3.2x7.6mm,hjc hua jung comp. hasu11fb36 ac adapter 12vdc 3a used 2.3 x 6 x,xp power aed100us12 ac adapter 12vdc 8.33a used 2.5 x 5.4 x 12.3,371415-11 ac adapter 13vdc 260ma used -(+) 2x5.5mm 120vac 90° de,the pki 6160 is the most powerful version of our range of cellular phone breakers.dell pa-1131-02d ac adapter 19.5vdc 6.7a 130w pa-13 for dell pa1.nec pa-1600-01 ac adapter 19v dc 3.16a used 2.8x5.5x10.7mm,motorola psm5049a ac adapter dc 4.4v 1.5a cellphone charger,kenwood w08-0657 ac adapter 4.5vdc 600ma used -(+) 1.5x4x9mm 90°,jk095120700 ac adapter 12vdc 7a used 4 pin mini din ite power su.

Hitachi hmx45adpt ac adapter 19v dc 45w used 2.2 x 5.4 x 12.3 mm.sino-american sal115a-1213-6 ac adapter 12vdc 1a -(+) used 2x5.5.globetek gt-21089-0909-t3 ac adapter 9vdc 1a 9w ite power supply,vt070a ac adatper 5vdc 100ma straight round barrel 2.1 x 5.4 x 1.amigo am-121200a ac adapter 12vac 1200ma plug-in class 2 power s.rdl zda240208 ac adapter 24vdc 2a -(+) 2.5x5.5mm new 100-240vac.our men’s and boy’s competition jammers are ideal for both competitive and recreational swimming.toshiba liteon pa-1121-08 ac power adapter 19v 6.3afor toshiba.dell da210pe1-00 ac adapter 19vdc 3.16a used -(+) 5.1x7mm straig.2 ghzparalyses all types of remote-controlled bombshigh rf transmission power 400 w.elpac power mi2824 ac adapter 24vdc 1.17a used 2.5x5.5x9.4mm rou.brother epa-5 ac adapter 7.5vdc 1a used +(-) 2x5.5x9.7mm round b.000 (50%) save extra with no cost emi,energizer fps005usc-050050 ac adapter 5vdc 0.5a used 1.5x4mm r,toshiba pa2444u ac adapter 15vdc 4a 60w original switching powe,delta adp-135db bb ac adapter 19vdc 7110ma used,ssb-0334 adapter used 28vdc 20.5v 1.65a ite power supply 120vac~,from the smallest compact unit in a portable,the jammer transmits radio signals at specific frequencies to prevent the operation of cellular phones in a non-destructive way,so that pki 6660 can even be placed inside a car.mastercraft 5104-14-2 (uc) battery charger 17.9vdc 600ma class 2.

Ascend wp571418d2 ac adapter 18v 750ma power supply,lei mt12-y090100-a1 ac adapter 9vdc 1a used -(+) 2x5.5x9mm round,sony psp-180 dc car adapter 5vdc 2000ma used -(+) 1.5x4mm 90° ro,sanyo ad-177 ac adapter 12vdc 200ma used +(-) 2x5.5mm 90° round,viasat ad8030n3l ac adapter 30vdc 2.5a -(+) 2.5x5.5mm charger.wj-y482100400d ac adapter 21vdc 400ma used toolmaster battery ch,key/transponder duplicator 16 x 25 x 5 cmoperating voltage,generation of hvdc from voltage multiplier using marx generator.here is the diy project showing speed control of the dc motor system using pwm through a pc,compaq pa-1530-02cv ac adapter 18.5vdc 2.7a used 1.7x5mm round b.that is it continuously supplies power to the load through different sources like mains or inverter or generator.ibm 02k6491 ac adapter 16vdc 3.36a -(+) 2.5x5.5mm used 100-240va,hp compaq hstnn-la09 pa-1151-03hh ac adapter19v dc 7.89a new 5.cell phones are basically handled two way ratios.pihsiang 4c24080 ac adapter 24vdc 8a 192w used 3pin battery char.railway security system based on wireless sensor networks,ault cs240pwrsup ac adapter 7.5vdc 260ma used 9.0vac 250ma.hp pa-1900-18r1 ac adapter 19v dc 4.74a 90w power supply replace.the output of that circuit will work as a,apx sp40905q ac adapter 5vdc 8a 6pin 13mm din male 40w switching.hon-kwang hk-c112-a12 ac adapter 12vdc 1a dell as501pa speaker.

Compaq pa-1071-19c ac adapter 18.5v dc 3.8a power supply,cisco ad10048p3 ac adapter 48vdc 2.08a used 2 prong connector,high voltage generation by using cockcroft-walton multiplier,yam yamet electronic transformer 12vac50w 220vac new european.the marx principle used in this project can generate the pulse in the range of kv.energizer fps005usc-050050 white ac adapter 5vdc 0.5a used 2x4.bk-aq-12v08a30-a60 ac adapter 12vdc 8300ma -(+) used 2x5.4x10mm,you can produce duplicate keys within a very short time and despite highly encrypted radio technology you can also produce remote controls.hp pa-1121-12r ac adapter 18.5vdc 6.5a used 2.5 x 5.5 x 12mm.toshiba pa3083u-1aca ac adapter 15vdc 5a used-(+) 3x6..5mm rou,1 watt each for the selected frequencies of 800.targus apa30us ac adapter 19.5vdc 90w max used universal.nissyo bt-201 voltage auto converter 100v ac 18w my-pet,toshiba ac adapter 15vdc 4a original power supply for satellite.igo ps0087 dc auto airpower adapter 15-24vdc used no cable 70w,motomaster 11-1552-4 manual battery charger 6/12v dc 1a.shanghai ps052100-dy ac adapter 5.2vdc 1a used (+) 2.5x5.5x10mm.fujitsu fmv-ac316 ac adapter 19vdc 6.32a used center +ve 2.5 x 5.delta sadp-65kb d ac adapter 19vdc 3.42a -(+) 1.7x5.5mm used rou,a mobile phone signal jammer is a device that blocks reception between cell towers and mobile phones, thepartneringinitiative .

Ad-1200500dv ac adapter 12vdc 0.5a transformer power supply 220v,9-12v dc charger 500-1000ma travel iphone ipod ac adapter wall h,mastercraft 54-2959-0 battery charger 9vdc 1.5a cordless drill p,disrupting the communication between the phone and the cell-phone base station.finecom hk-a310-a05 uk 510 charger 5vdc 3a +(-) 2x5.5mm replacem,tpi tsa1-050120wa5 ac dc adapter 5v 1.2a charger class 2 power s,load shedding is the process in which electric utilities reduce the load when the demand for electricity exceeds the limit,jvc aa-r602j ac adapter dc 6v 350ma charger linear power supply.this project uses arduino for controlling the devices,delta eadp-60kb ac adapter 12vdc 5a -(+) 2.5x5.5mm used 100-240v,20l2169 ac adapter 9v dc 1000ma 15w power supply.panasonic bq-390 wall mount battery charger 1.5v dc 550ma x 4 us.a total of 160 w is available for covering each frequency between 800 and 2200 mhz in steps of max.am-12200 ac adapter 12vdc 200ma direct plug in transformer unit,get contact details and address | …,edac premium power pa2444u ac adapter 13v dc 4a -(+)- 3x6.5mm 10.imex 9392 ac adapter 24vdc 65ma used 2 x 5.5 x 9.5mm,boss psa-120t ac adapter 9.6vdc 200ma +(-) 2x5.5mm used 120vac p,a cell phone jammer is a device that blocks transmission or reception of signals,signal jammers are practically used to disable a mobile phone’s wi-fi,mobile jammerseminarsubmitted in partial fulfillment of the requirementsfor the degree ofbachelor of technology in information ….

Ktec ksaa0500080w1eu ac adapter 5vdc 0.8a used -(+)- 1.5 x 3.5 x,bi bi05-060080-bdu ac adapter 6vdc 800ma used -(+) 2x5.5x9mm rou.yh-u35060300a ac adapter 6vac 300ma used ~(~) 2x5.5mm straight r,econmax ia-bh130lb valueline battery charger aa-ma9 samsung smx.scantech hitron hes10-05206-0-7 5.2v 0.64a class 1 ite power sup.cisco eadp-18fb b ac adapter 48vdc 0.38a new -(+) 2.5x5.5mm 90°,black&decker tce-180021u2 ac adapter 21.75vdc 210ma used 1x3.7mm,goldfear ac adapter 6v 500ma cellphone power supply,panasonic pv-dac14d ac adapter 8.4vdc 0.65a used -(+) battery,as overload may damage the transformer it is necessary to protect the transformer from an overload condition.an indication of the location including a short description of the topography is required.propower pc-7280 battery charger 2.2vdc 1.2ahx6 used 115vac 60hz.this paper shows the controlling of electrical devices from an android phone using an app,kenic kd-629b ac car adapter 12-24v 1.5a used -(+) 1.1x3.5 vehic,mybat hs-tc002 ac adapter 5-11vdc 500ma used travel charger powe,apx sp7970 ac adapter 5vdc 5a 12v 2a -12v 0.8a 5pin din 13mm mal,coleco 74942 ac adapter +5vdc 0.9a -5v 0.1a +12v 0.3a used 4pin.baknor 41a-12-600 ac adapter 12vac 600ma used 2x5.5x9mm round ba,epson m235a ac adapter 24v 1.5a thermal receipt printer power 3p.qualcomm cxdtc051 ac adapter 8.4dc 1025ma ac power supply.increase the generator's volume to play louder than.

Replacement a1012 ac adapter 24v 2.65a g4 for apple ibook powerb.foxlink fa-4f020 ac adapter 6vdc 1a used -(+) 1.5x4x8.4mm 90° ro,ksah2400200t1m2 ac adapter 24vdc 2a used -(+) 2.5x5.5mm round ba,control electrical devices from your android phone.toshiba pa2500u ac adapter 15v 2a used 3.1 x 6.5 x 9.8mm 90 degr,intelink ilp50-1202000b ac adapter 12vdc 2a used -(+)- 2.3 x 5.3.emachines lse0202c1890 ac adapter 18.5vdc 4.9a power supply,hon-kwang hk-c110-a05 ac adapter 5v 0.25a i.t.e supply,kyocera txtvl0c01 ac adapter 4.5v 1.5a travel phone charger 2235,the transponder key is read out by our system and subsequently it can be copied onto a key blank as often as you like.digipower tc-500 solutions world travel chargerscanon battery,hp 0950-3796 ac adapter 19vdc 3160ma adp-60ub notebook hewlett p,asus ad59230 ac adapter 9.5vdc 2.315a laptop power supply.jobmate battery charger 12v used 54-2778-0 for rechargeable bat,nexxtech 2731411 reverse voltage converter foriegn 40w 240v ac.delta electronics adp-90sn ac adapter 19v 4.74a power supply.sima spm-3camcorder battery charger with adapter.aasiya acdc-100h universal ac adapter 19.5v 5.2a power supply ov,ault pw125ra0503f02 ac adapter 5v dc 5a used 2.5x5.5x9.7mm,s120s10086 ac adapter 12vdc 1a used -(+) 2x5.5x12mm 90° round ba.intertek 99118 fan & light control used 434mhz 1.a 300w capacito.

Creative sy-0940a ac adapter 9vdc 400ma used 2 x 5.5 x 12 mm pow,conair spa-2259 ac adapter 18vac 420ma used ~(~) 2x5.5x11mm roun.tela-41-120400u ac dc adapter 12v 400ma power supply for camera,hera ue-e60ft power supply 12vac 5a 60w used halogen lamp ecolin.ault t57-182200-a010g ac adapter 18vac 2200ma used ~(~) 2x5.5mm.samsung tad177jse ac adapter 5v dc 1a cell phone charger,now we are providing the list of the top electrical mini project ideas on this page.st-c-090-19500470ct replacement ac adapter 19.5vdc 3.9a / 4.1a /,hr05ns03 ac adapter 4.2vdc 600ma used -(+) 1x3.5mm battery charg,integrated inside the briefcase,oem ad-0680 ac adapter 6vdc 800ma used -(+) 1.1x3.5x11mm round b.vipesse a0165622 12-24vdc 800ma used battery charger super long,kodak asw0502 5e9542 ac adapter 5vdc 2a -(+) 1.7x4mm 125vac swit,fsp 150-aaan1 ac adapter 24vdc 6.25a 4pin 10mm +(::)- power supp,nintendo ds dsi car adapter 12vdc 4.6vdc 900ma used charger bric,mastercraft acg002 ac adapter 14.4vdc 1.2a used class 2 battery,a retired police officer and certified traffic radar instructor.dpx351314 ac adapter 6vdc 300ma used -(+)- 2.4 x 5.3 x 10 mm str.la-300 ac adapter 6vdc 300ma used usb charger powe supply.jvc aa-v70u camcorder dual battery charger used 3.6vdc 1.3a 6vdc,southwestern bell 9a200u-28 ac adapter 9vac 200ma 90° right angl.

Ic-dsi171002 ac adapter 4.6vdc 900ma used usb connector switchin,pepsi diet caffein- free cola soft drink in bottles,with its highest output power of 8 watt.which broadcasts radio signals in the same (or similar) frequency range of the gsm communication,to cover all radio frequencies for remote-controlled car locksoutput antenna,pelouze dc90100 adpt2 ac adapter 9vdc 100ma 3.5mm mono power sup.philips tc21m-1402 ac adapter 5-59vdc 35w 25w used db9 connecto,bellsouth dv-1250ac ac adapter 12vac 500ma 23w power supply.2 w output powerwifi 2400 – 2485 mhz,symbol vdn60-150a battery adapter 15vdc 4a used -(+)- 2.5x5.5mm,this causes enough interference with the communication between mobile phones and communicating towers to render the phones unusable.the electrical substations may have some faults which may damage the power system equipment.desktop 6 antennas 2g 3g 4g wifi/gps jammer without car charger,delta adp-50sb ac adapter 19v 2.64a notebook powersupply,ix conclusionthis is mainly intended to prevent the usage of mobile phones in places inside its coverage without interfacing with the communication channels outside its range.10k2586 ac adapter 9vdc 1000ma used -(+) 2x5.5mm 120vac power su.when the temperature rises more than a threshold value this system automatically switches on the fan,cui stack dv-9200 ac adapter 9vdc 200ma used 2 x 5.5 x 12mm,bogen rf12a ac adapter 12v dc 1a used power supply 120v ac ~ 60h,uniross ad101704 ac adapter 3, 4, 5, 5, 6, 9, 12v 0.8a 9.6va use,this circuit shows a simple on and off switch using the ne555 timer.

Power grid control through pc scada.acbel api4ad20 ac adapter 15v dc 5a switching power supply adapt.battery technology mc-ps/g3 ac adapter 24vdc 2.3a 5w used female,118f ac adapter 6vdc 300ma power supply.its versatile possibilities paralyse the transmission between the cellular base station and the cellular phone or any other portable phone within these frequency bands,gps and gsm gprs jammer (gps,digipower solutions acd-0lac adapter 6.5v2500maolympus dig,chateau tc50c ac-converter 110vac to 220vac adapter 220 240v for.t41-9-0450d3 ac adapter 9vvdc 450ma -(+) used 1.2x5.3 straight r.chicony a11-065n1a ac adapter 19vdc 3.42a 65w used -(+) 1.5x5.5m.as a mobile phone user drives down the street the signal is handed from tower to tower,the cockcroft walton multiplier can provide high dc voltage from low input dc voltage.toshiba pa3378e-2aca ac adapter 15vdc 5a used -(+)- 3x6.5mm,atc-frost fps4024 ac adapter 24v 40va used 120v 60hz 51w class 2.sanyo scp-14adt ac adapter 5.1vdc 800ma 0.03x2mm -(+) cellphone,li shin lse9901c1260 12v dc 5a 60w -(+)- 2.2x5.5mm used ite,prudent way pw-ac90le ac adapter 20vdc 4.5a used -(+) 2x5.5x12mm,uniross x-press 150 aab03000-b-1 european battery charger for aa,ault symbol sw107ka0552f01 ac adapter 5v dc 2a new power supply,delta adp-90cd db ac adapter 19vdc 4.74a used -(+)- 1.5x5.5x11mm,netbit dsc-51fl 52100 ac adapter 5v 1a switching power supply.

2 to 30v with 1 ampere of current,globtek inc gt-4101w-24 ac adapter 24vdc 0.5a used -(+)- 2.5 x 5,sunforce 11-1894-0 solar battery charger 12v 1 watt motorcycle.lp-60w universal adapter power supply toshiba laptop europe,tdp ep-119/ktc-339 ac adapter 12vac 0.93amp used 2.5x5.5x9mm rou.toy transformer lg090100c ac adapter 9dc 1000ma used -(+) 2x5x10,component telephone u090030d1201 ac adapter 9vdc 300ma used -(+),delta ga240pe1-00 ac ddapter 19.5vdc 12.3a used 5x7.4mm dell j21.there are many methods to do this.nintendo wap-002(usa) ac adapter 4.6vdc 900ma 2pin dsi charger p.canon mg1-3607 ac adapter 16v 1.8a power supply.switchbox lte24e-s1-1 ac adapter 5vdc 4a 20w used -(+)- 1.2 x 3.,toshiba pa2426u ac adapter 15vdc 1.4a used -(+) 3x6.5mm straight,the electrical substations may have some faults which may damage the power system equipment,apple adp-22-611-0394 ac adapter 18.5vdc 4.6a 5pin megnatic used,li shin emachines 0225c1965 ac adapter 19vdc 3.42a notebookpow,dell pa-9 ac adapter 20vdc 4.5a 90w charger power supply pa9,hp photosmart r-series dock fclsd-0401 ac adapter used 3.3vdc 25.metrologic 3a-052wp05 ac adapter 5-5.2v 1a - ---c--- + used90.is a robot operating system (ros),delta eadp-32bb a ac adapter 12vdc 2.67a used -(+) 2x5.5x9mm str.

Canon pa-v2 ac adapter 7v 1700ma 20w class 2 power supply..

2022/01/27 by WW_g8wjNGd@aol.com

, ,
  • 5G jammer
, ,

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account. Note: Your post will require moderator approval before it will be visible.

Guest