{"id":11834,"date":"2018-04-09T10:12:22","date_gmt":"2018-04-09T08:12:22","guid":{"rendered":"http:\/\/www.centsys.co.za\/?p=11834"},"modified":"2018-04-09T10:12:22","modified_gmt":"2018-04-09T08:12:22","slug":"whitepaper-the-truth-about-signal-jamming","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/","title":{"rendered":"Whitepaper: The Truth About Signal Jamming"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]There has been a lot of attention given to so-called remote \u201csignal jamming\u201d in the news of late.\u00a0 Signal jamming refers to the shady and highly illegal practice of using a remote control device \u2013 such as the ones used to open garage doors or entrance gates \u2013 to \u201cjam\u201d the signal transmitted by the remote that you use to lock your car, arm its alarm, etc.<\/p>\n<p><strong><u>The problem<\/u><\/strong><\/p>\n<p>Let\u2019s first take a look at the technology behind it all.\u00a0 The hand transmitter \u2013 or remote control, as it is more commonly known \u2013 transmits a RF signal that is picked up by a receiver.\u00a0 The receiver, which is basically a tuned circuit, in turn converts this signal to an output which will then be used to operate a gate motor, activate a car\u2019s central locking, or whatever the case may be.\u00a0 In South Africa the frequency band on which all remote devices operate is 433MHz, as decided by the regulator for the South African communications sector, ICASA.\u00a0 This band is shared by all RF devices.<\/p>\n<p>Criminals abuse this novel technology by pressing and holding their remotes at exactly the same time as an unsuspecting vehicle owner is endeavouring to remotely lock his or her car, or to arm the vehicle\u2019s alarm, and in so doing leaving the car vulnerable to intrusion.\u00a0 It must be remembered that the signal sent out by these transmitters is comparatively small, and can thus be swamped by interfering signals. <strong>Any remote control operating at 433MHz can be used for signal jamming, irrespective of who the manufacturer is<\/strong>.<\/p>\n<p>Naturally, the <em>raison d\u2019\u00eatre <\/em>of remote controls is to provide the user with convenience and peace of mind, and every possible precaution has been taken to ensure that remote controls are as secure as possible, with gate motor manufacturers such as CENTURION even implementing revolutionary code-hopping technology to prevent \u201ccode-grabbing\u201d, another dastardly practice favoured by modern criminals.\u00a0\u00a0 Remote controls using code-hopping technology never transmit the same signal twice, dramatically increasing the security of RF communication and rendering code-scanning devices completely useless.<\/p>\n<p>However, as discussed earlier, even these highly secure remotes are required to operate at a frequency of 433MHz, and as such criminals have been known to use them for signal-jamming.<\/p>\n<p><strong><u>The Solution<\/u><\/strong><\/p>\n<p>Most vehicle manufacturers equip their cars with some sort of confirmation signal, be it a beep, double beep or flashing of the headlights, to indicate that the vehicle in question has been securely locked or the alarm has been armed, etc.\u00a0 CENTURION therefore recommends that all vehicle owners listen carefully for these confirmation signals before leaving their vehicles unattended, and that they remain acutely aware of their surroundings at all times.\u00a0 It is better to adopt a pro-active approach when dealing with this new breed of tech-savvy criminal.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There has been a lot of attention given to so-called remote \u201csignal jamming\u201d in the news of late.\u00a0 Signal jamming refers to the shady and highly illegal practice of using a remote control device \u2013 such as the ones used to open garage doors or entrance gates \u2013 to \u201cjam\u201d the signal transmitted by the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11836,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"There has been a lot of attention given to so-called remote \u201csignal jamming\u201d in the news of late.\u00a0 Signal jamming refers to the shady and highly illegal practice of using a remote control device \u2013 such as the ones used to open garage doors or entrance gates \u2013 to \u201cjam\u201d the signal transmitted by the remote that you use to lock your car, arm its alarm, etc.\n\n<strong><u>The problem<\/u><\/strong>\n\nLet\u2019s first take a look at the technology behind it all.\u00a0 The hand transmitter \u2013 or remote control, as it is more commonly known \u2013 transmits a RF signal that is picked up by a receiver.\u00a0 The receiver, which is basically a tuned circuit, in turn converts this signal to an output which will then be used to operate a gate motor, activate a car\u2019s central locking, or whatever the case may be.\u00a0 In South Africa the frequency band on which all remote devices operate is 433MHz, as decided by the regulator for the South African communications sector, ICASA.\u00a0 This band is shared by all RF devices.\n\nCriminals abuse this novel technology by pressing and holding their remotes at exactly the same time as an unsuspecting vehicle owner is endeavouring to remotely lock his or her car, or to arm the vehicle\u2019s alarm, and in so doing leaving the car vulnerable to intrusion.\u00a0 It must be remembered that the signal sent out by these transmitters is comparatively small, and can thus be swamped by interfering signals. <strong>Any remote control operating at 433MHz can be used for signal jamming, irrespective of who the manufacturer is<\/strong>.\n\nNaturally, the <em>raison d\u2019\u00eatre <\/em>of remote controls is to provide the user with convenience and peace of mind, and every possible precaution has been taken to ensure that remote controls are as secure as possible, with gate motor manufacturers such as CENTURION even implementing revolutionary code-hopping technology to prevent \u201ccode-grabbing\u201d, another dastardly practice favoured by modern criminals.\u00a0\u00a0 Remote controls using code-hopping technology never transmit the same signal twice, dramatically increasing the security of RF communication and rendering code-scanning devices completely useless.\n\nHowever, as discussed earlier, even these highly secure remotes are required to operate at a frequency of 433MHz, and as such criminals have been known to use them for signal-jamming.\n\n<strong><u>The Solution<\/u><\/strong>\n\nMost vehicle manufacturers equip their cars with some sort of confirmation signal, be it a beep, double beep or flashing of the headlights, to indicate that the vehicle in question has been securely locked or the alarm has been armed, etc.\u00a0 CENTURION therefore recommends that all vehicle owners listen carefully for these confirmation signals before leaving their vehicles unattended, and that they remain acutely aware of their surroundings at all times.\u00a0 It is better to adopt a pro-active approach when dealing with this new breed of tech-savvy criminal.","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[191],"tags":[],"class_list":["post-11834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-remote-controls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Whitepaper: The Truth About Signal Jamming - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"We take an in-depth look at the issue of signal jamming, and what you can do to help prevent falling victim to this criminal practice\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: The Truth About Signal Jamming - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"We take an in-depth look at the issue of signal jamming, and what you can do to help prevent falling victim to this criminal practice\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2018-04-09T08:12:22+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"Whitepaper: The Truth About Signal Jamming\",\"datePublished\":\"2018-04-09T08:12:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/\"},\"wordCount\":530,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"remote controls\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/\",\"name\":\"Whitepaper: The Truth About Signal Jamming - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-04-09T08:12:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"description\":\"We take an in-depth look at the issue of signal jamming, and what you can do to help prevent falling victim to this criminal practice\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/whitepaper-the-truth-about-signal-jamming\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: The Truth About Signal Jamming\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: The Truth About Signal Jamming - Centurion Systems French","description":"We take an in-depth look at the issue of signal jamming, and what you can do to help prevent falling victim to this criminal practice","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/","og_locale":"en_US","og_type":"article","og_title":"Whitepaper: The Truth About Signal Jamming - Centurion Systems French","og_description":"We take an in-depth look at the issue of signal jamming, and what you can do to help prevent falling victim to this criminal practice","og_url":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/","og_site_name":"Centurion Systems French","article_published_time":"2018-04-09T08:12:22+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"Whitepaper: The Truth About Signal Jamming","datePublished":"2018-04-09T08:12:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/"},"wordCount":530,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#primaryimage"},"thumbnailUrl":"","articleSection":["remote controls"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/","url":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/","name":"Whitepaper: The Truth About Signal Jamming - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-04-09T08:12:22+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"description":"We take an in-depth look at the issue of signal jamming, and what you can do to help prevent falling victim to this criminal practice","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/whitepaper-the-truth-about-signal-jamming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: The Truth About Signal Jamming"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/11834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=11834"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/11834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=11834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=11834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=11834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}