Prison Jammer Functionality
More than a cell phone jammer, the Prison Jammer is an Intelligent Jamming System. It can detect and manually or automatically blocks unauthorized usage of cell phones and/or cell phone activity in designated areas. The cellular detector composition functions as a cellular detection center and can work as a managed access system or in conjunction with a series of cellular jamming components.
How it works
In order to control cellular phone activity in any given area, an established configuration is designed. This is comparable to building a fence. However, instead of placing posts and fencing at a physical border, communication control hardware is deployed. Options may include a managed access feature wherein cellular communications may be permitted and denied based on the authorization of the operator.
Alternate options allow for cell phone jamming hardware to be deployed to operate in many (or few) buildings or areas. These cellular jamming units can deny access to a large number of cellular telephones at any given time within a group of separate buildings, or a complex of corridors, conference rooms, numerous small offices, and private rooms.
These cellular jammers are under constant control by a central administrator that can permit or deny cellular communications. These cellular jammers are connected via a Controller Area Network (CAN) into a local network and managed by a Central Base Station (CBS). The Intelligent Jamming System controls every element, from detection to alerting where and when an individual cell phone is attempting to establish communication, to blocking the calls.
Remote Control Activation
The IJS can operate by remote control through the use of ON/OFF switching. Should the cell phone jamming components be located in buildings or areas away from the control unit, the Remote Control Activation can operate the cellular jammer from afar.
Users of the Intelligent Jamming System include prisons and detention centers to control criminal communications, as well as secrets on military bases, defense installations, operations in and by border control checkpoints, as well as other physical areas that require information to be controlled or restricted.