The role of WiFi jammer interferes with WiFi

The chairman of the Association of Police Chiefs of England and Wales suggested in an interview that wifi jammer used to interfere with the Internet-devices on the ankles or wrists-could be used as a more sensible punishment for cyber crimes rather than prisons. "We must stop using 19th century punishment to deal with 21st century crimes," he said. It must be said that for hackers, this punishment is indeed fatal.

Portable 16 antennas hidden jammer 4G / 3G / 2G + WiFi2.4G / 5G + GPSL1-L5 + UHF / VHF walkie talkie + LOJACK + RC433 315 868MHZ

"Although we urgently need to replace prisons, it is technically infeasible and unreliable not to use wireless jamming devices," said Cal Leeming, who was imprisoned by hackers as a teenager and is now a security consultant. "Even if you do manage to achieve it without breaking nearby connections, this is inherently difficult to achieve due to how the radio works, so it can be easily bypassed by using cables."

The network can be called deauth-attack by flooding APs with Deauthentication Frames. By assuming the identity (MAC address) of the station on the network, the AP will cancel the authentication of the real station. Then, the real station will try to re-authenticate, but due to the interception of our deauth-frames, it will never succeed, and its network access will be effectively blocked.

To be very clear, it is inaccurate to call this technical interference, but this has not prevented some developers from using the term, so we just want to maintain consistency. In order to properly block WiFi (or any other form of radio communication), you basically generate a lot of random noise on the frequency used by a particular technology. It is very simple in concept, but as far as FCC friends are concerned, this is also a very big violation; so this is not something you would not do with any consumer-grade WiFi hardware.

Since high-power interference is impossible at the hardware level, many developers have found a way to prevent WiFi communication in software. This is more similar to a denial of service attack, where a tool is used to repeatedly send de-authentication packets at the WiFi access point and the client to force them to disconnect. With appropriate software and a powerful WiFi adapter that supports packet injection, attackers can restrict legitimate communications.