Please Note:  All Jamming devices in part or whole may be regulated by the US Department of State in accordance with the guidelines of ITAR (International Traffic in Arms) title 22, Code of Federal Regulations (CFR), Parts 120-130. An export license may be required before proceeding. RF Jamming in some countries is regulated. In the United States, RF Jamming is prohibited by the FCC. Using an RF Jammer without FCC permission is a violation. Some Federal Agencies and US Armed Forces may be exempt.

Upon further examination, it was discovered that some of the Prison Jammers worked too well, jamming beyond areas they were required to suppress. While this was corrected by use of our proprietary Directional DetectorJammer and MS6 Series Directional Cellular Jammers, the need to administer a more intuitive solution, known as the Managed Access solution, became a top priority for many clients.

Managed Access  Black List

Rejects Callers and frees them to access the public phone networks. Examples include: Prison Warden, Guards, Administration

©2007-2017 HSS Development Inc. All Rights Reserved.

Managed Access Origins
For years, the Prison Jammer suite of RF jamming technologies provided a means to deny people from making or receiving cell phone calls. Locations such as prisons, government buildings, defense contractor design and production facilities, diplomatic and consulate facilities, and military installations all utilize Prison Jammers to deal with strict communication silence policies. However, the need for a Managed Access approach became apparent as more HSS clients expressed the desire to have the best of both permission and denial attributes. In other words, our clients did not want to block everyone, just those who were not authorized to communicate.

In order to deal with the problem of unauthorized cell phones in prisons and government buildings, HSS Development offers a Managed Access solution. Simply stated, Managed Access is a unique process that permits or denies cell phone users from making or receiving calls. It permits phone calls by allowing the cellular subscriber (the phone) to connect to the local cellular phone company. In contrast, it denies phone calls by not 'handing over' those calls to the local cellular phone company to complete the 'path' of their call.

Managed Access White List

Attracts Callers and holds them, denying them access to phone networks. Examples: Criminals, Unauthorized Phone Users

Managed Access Configuration
Implementing a Managed Access system for a facility involves the deployment of a central core with corresponding antennas applications. Using this core with base station attributes in conjunction with a software interface, the Managed Access system may acquire communication traffic in the facility.

The software is configured to work in a manner wherein a series of peripheral antennas attract all mobile phone users, then refer to a set of customized rules that permit authorized users while deny non-authorized users (criminals in a prison, for example).

The firmware of the system interacts with these peripheral antennas or ‘Front End’ aerial links that are deployed either as a singular focal point, or in the form of a Distributed Antenna Network. The because the size and complexity of the physical environment varies by facility, a unique assessment would be required by our professional engineers to determine what setup of the Managed Access system will be sufficient to meet the requirements of the client.