waterproof performance and Big high output power, the device shows the good nature in many aspects. The shielding radius is up to 1000 meters which is more than 10 times to the common device. Used in the prison, it can greatly reduce the possibility of break prison. What’s more, it has metal enclosure which prevents sabotage. With the integrated incoming air filter, it makes sure the device cooling system operation normally.
With the IP 68 standard, this Waterproof Cell Phone Jammer could completely prevent dust and it can be dipped into the water. Cell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate proximity. Jammers are typically used by the police and military to control or disrupt communication between hostage situations and bomb threats.
Designed to cut off wave only in the downlink band width, therefore, it doesn’t affect any interference to base station and repeater
Remote Control
Specification:
Output Interface | Output Frequency | RF Output watt |
CH1 | CDMA/GSM: 851-960MHz | 100W |
CH2 | DCS: 1805-1880MHz | 100w |
CH3 | PCS: 1930-1990MHz | 100w |
CH4 | 3G: 2110-2170MHz | 100w |
CH5 | 4G LTE:(USA:725-770MHz) or (Europe:790-826MHz) | 100w |
CH6 | 4G Wimax:(USA:2345-2400MHz) or (Europe:2620-2690MHz) | 100w |
CH7 | WiFi 2.4G: 2400-2500MHz | 100w |
CH8 | WiFi 5.8G: 5700-5800MHz | 100w |
CH9 | 5G: 3500-3600MHz | 100w |
CH10 | 5G: 3600-3800MHz | 100w |
Total output power | 1000W | |
Jamming range | up to 1000m,still depends on the strength signal in given area | |
Jammer Module Number | 8-10 | |
External double channel directional panel antennas | all the TX frequency covered down link only | |
Power supply | 50 to 60Hz, 100 to 240V AC | |
With AC adapter | (AC100-240V-DC27V) | |
Dimension | 420×480×130 mm |
Accessories
Monitor software function: (Option)
· Remote control switches of each machine.
· Remote viewing each machine working state.
· The power output of each machine remote adjustment.
· Remote viewing offline log of each machine.
· Mail receiving each machine working state.
· The system can set permissions to log on.