Anti fpv backpack counter UAV jamming system

140W anti fpv Backpack counter UAV GPS L1 L2 2.4G 5.8G suppressing fpv drone autel mavic jamming System defence Gan jammer suppressor

Anti fpv backpack counter UAV jamming system

  • Portable Backpack style 433mHz, 900mHz, 1.2G, 1.4G, 1.5G, 2.4G 5.2G. 5.8G drone signal equiment uav defense system
  • High power Manpack drone or mobile phone jammer for cellular phones, GSM 3G 4GLTE/WIMAX 5G Wi-Fi GPS UHF VHF Signals which are currently presented on the market.
  • Also is middle RF power Drone Jammer model with 6 high gains antennas which bring us a strong jamming ability. Build-in battery can works 60 minutes.And it can defend 100% drones UAVs, like Phantom 4, Phantom 3, FPV
  • Professional, advanced, standard series, inspire series up to 1500meters
140W anti fpv Backpack counter UAV GPS L1 L2 2.4G 5.8G suppressing fpv drone autel mavic jamming System defence Gan jammer suppressor
140W anti fpv Backpack counter UAV GPS L1 L2 2.4G 5.8G suppressing fpv drone autel mavic jamming System defence Gan jammer suppressor
140W anti fpv Backpack counter UAV GPS L1 L2 2.4G 5.8G suppressing fpv drone autel mavic jamming System defence Gan jammer suppressor
140W anti fpv Backpack counter UAV GPS L1 L2 2.4G 5.8G suppressing fpv drone autel mavic jamming System defence Gan jammer suppressor

The anti-drone gun is a highly effective UAS countermeasure designed for two hand operation and long range defeat. The product includes high performance directional antennas in a lightweight robust rifle style design; featuring an intuiitive control panel user interface to select and engage the range of jamming frequencies for target defeat. The anti-drone gun provides a safe countermeasure against a wide range of UAS threats (e.g. drones), with no damage to common UAS models or surrounding environment.
When disruption is triggered, UAS targets (e.g. drone) will respond via vertical on the spot landing or return to its remote controller or starting point.
TTSK’s C-UAS defeat capabilities do not involve protocol manipulation or “cyber” tactics, given the limitations of those methods. Our defeat technologies offer non-kinetic jamming for the controlled management of threats.