Create Profile

Creating your profile will enable you to submit photos and stories to get published on News24.

Please provide a username for your profile page:

This username must be unique, cannot be edited and will be used in the URL to your profile page across the entire 24.com network.

Facebook Sign-In

Hi News addict,

Join the News24 Community to be involved in breaking the news.

Log in with Facebook to comment and personalise news, weather and listings.


MyNews24 is a user-generated section of News24 Kenya. The stories here come from users.

Latest Badges:

View all MyNewsKenyaEd's badges.

Mobile phone network jamming in Mpeketoni plausible?

19 June 2014, 12:40 Gicharu Mathigu

Nairobi - A day after the Mpeketoni Attacks, the Interior CS Joseph Ole Lenku released a statement that attackers had jammed Safaricom’s mobile network. This statement was later refuted by the Minister who said that base tower ran out of fuel, causing mobile coverage outage in the area. As a result, local residents could not send out distress calls through their mobile phones.

This has since opened up discussions as to whether of jamming mobile phone signals is feasible.

Electronic signal jamming has long been employed towards various objectives.

It was launched as a form of military espionage during World War II when ground operators attempted to mislead pilots by falsifying instructions in the pilots’ own language. This was known as a spoofing attack.

The technique later evolved into radar jamming which disrupts radar guidance in enemy aircraft and missiles.

Today, electronic signal jamming is generally employed by totalitarian governments to prevent foreign radio and mobile phone signals from reaching the country.

In the United States, mobile phone jamming is heavily used in various institutions where mobile phone use is undesirable. Cell phone jammers are common in churches, movie theaters and shopping malls there.

However, the legality of cell phone jammers is still a grey area.

In May this year, the Federal Communications Commission in the US arrested a man who had rigged a cell phone jammer in his car.

His jammer rendered every cell phone around his blue Toyota Highlander unable to connect to the nearby cell phone tower on Florida’s 1-4 highway. The tower seemed to fail every morning and evening, times the man cruised the highway.

The cell phone used by the man was a commercially available cell phone jammer that knocked out cell phone towers contained in a radius of not less than 100 feet.

When police stopped the man’s car, even their own two way radios gave out from what they termed as strong wideband emissions.

Such was the power of the small jammer the man had rigged to his car. It was no bigger than a 7 inch smartphone.

Cell phone signal jammers work by transmitting a barrage of high powered signals on the same frequency as the one used by cell phones to communicate with cell phone towers.

This drives cell phones nuts, and in-line with their design, they dedicate more battery power to emit high powered frequencies in a frenzied attempt to re-establish contact with base towers.

The effect of this is generally observable as the cell phone will drain its battery at an unusually high rate.

The signal from cell phone jammers is very strong, creating a denial of service in the area of deployment. Mobile phones are consequently knocked off the grid.

Cursory surfing the Internet points to dozens of manufacturers selling all manner of cell phone jammers. These jammers make short work of both 2G and 3G networks and are relatively cheap to acquire at less than $200.

One can only assume that malicious individuals can easily access these devices and deploy them with relative ease.

On a more scary development, a researcher has successfully forced cell phones to abandon their registered network and latch on to a network set up by him. Using a variation of cell phone jammers, the researcher was able to force all cell phones in greater Las Vegas to connect to his independent network in 2010.

With such capabilities, it is possible to read or listen to any communication from cell phones or direct such communications to any destination the researcher preferred. The researcher demonstrated this during the 18th DEFCON conference in 2010.

For the latest on national news, politics, sport, entertainment and more follow us on Twitter and like our Facebook page!

Disclaimer: All articles and letters published on MyNews24 have been independently written by members of News24's community. The views of users published on News24 are therefore their own and do not necessarily represent the views of News24. News24 editors also reserve the right to edit or delete any and all comments received.

4 ways to handle your cheating man

24 October 2016, 21:02

Read News24’s Comments Policy

Comment on this story
Comments have been closed for this article.

Read more from our Users

Submitted by
Shakila Alivitsa
4 ways to handle your cheating ma...

He is cheating. How do you handle him?

Submitted by
Shakila Alivitsa
Why do men choose second wives?

Why do men choose to have second wives?

Submitted by
Eugene Odanga
Wizkid set for twin Kenyan shows

Wizkid is back in Kenya. For two shows.

Submitted by
Eugene Odanga
Udada women's festival begins in ...

The Udada women's festival has arrived in Nairobi.

Submitted by
Uhuru pardons 2747 death row conv...

President Uhuru Kenyatta has pardoned a number of death row convicts, sending them to life sentences instead. Read more...

Submitted by
Eugene Odanga
WATCH: Kaka Sungura arrested in t...

Was Kaka Sungura arrested in town?