RF MODES
CheckPoint + new NEDAP
Main
NEDAP
NEDAP+
CROSSPOINT 2026
Experimental v.2021
Blue Stripe v.2023
Lucatron
DETAILED MODE DESCRIPTION
— Effective against most Chinese-made gates.
— Effective against some of the newest NEDAP models; no guarantees provided as these are still being studied, but statistics show Mode 1 is effective.
This setting is applied when at least four pedestals are installed; it is rare, and the probability of encountering it is extremely low. In Russia, it is found in Sportmaster.
How to identify if this mode is required?
— During passage, neighboring or distant pedestals may alarm, or trigger from a distance.
High versatility has also been identified for many other RF systems, excluding only NEDAP and GateWay.
There is some probability that the method used in this mode will yield results for the latest Checkpoint NEO systems, but current statistics are insufficient to claim total victory.
**We never rush to replace Mode #1 with another method until the new solution has been proven over time.**
*Since Mode #2 was our 2021 milestone, we evolved the concept by re-studying everything; it certainly helps when other modes fail to resolve the problem.
Compatibility with gates from other manufacturers has not been verified; likely effective for many except NEDAP.
ARRANGEMENT LOGIC
Why is the mode sequence arranged this way? How does it differ from the chronological AM layout?
The previous version of our jammer lacked smartphone app control and relied solely on vibrations for indication, making it impossible to skip directly from Mode #2 to Mode #7, for example.
Mode #2 was taken as the foundation, as it provided unique results for its time. Modes are arranged around it specifically for operational selection speed:
- If Mode 2 fails, you are likely facing a NEDAP system or a Chinese unit. Only one action is required to switch to the solution.
- If that fails and the system is NEDAP, Mode #4 will resolve your issue.
Other modes are placed further down the list because CROSSPOINT, Lucatron Venus, and Russian "Blue Stripe" gates are visually distinct and easy to identify at a glance.
This entire logic could be felt when using the previous generation 2-in-1 jammer (which is still viable and has its place). Believe us, this was engineered based on real-world experience in the field.
HISTORY OF RF TECHNOLOGY DEVELOPMENT
For those interested, I will briefly conclude with the history of how events unfolded regarding the development of RF jammer technology.
In the beginning, long before public sales, our RF jammers featured only one mode. It remains first on the list as it is the base method—which we have naturally modified and improved over time—but the principle holds.
This mode demonstrated definitive effectiveness against Checkpoint, Amersec systems, some legacy Gateway models, various RF systems using metal-pipe frames, and many other units.
WHY DIDN'T WE SELL THIS SOONER?
However, at that time, a problem existed that prevented us from releasing the RF jammer to the public until 2018.
The invention and initial experiments began back in 2013. For five years, we shielded users from purchasing equipment that wasn't ready for high-efficiency operation and predictable reliability.
Only after we decoded the Nedap algorithms—which were "impenetrable" to the first mode—and studied the specifics of certain Chinese systems, did we release the jammer to the market.
At that time, it featured five modes:
- First mode was the base.
- Second — our first specialized mode for Nedap.
- Third — experimental mode for the same system.
- Fourth was intended for Russian Detex Line and Gateway antennas.
- Fifth mode was created for rare systems; its purpose was mainly for our future experiments in understanding how to defeat protection technology as a whole.
SEARCHING FOR THE "GOLDEN KEY"
Our ultimate goal has always been finding a universal "key" to the entire technology—the vulnerability we are still searching for today. We do not give up: after creating one solution, we constantly return to development and refinement with fresh insights, strength, and data.
This is evident in our refusal to release the technology for the first five years, and the subsequent multi-stage evolution that followed.
Currently, we are at the eighth major stage of RF suppression technology refinement. These aren't empty words: it represents eight large-scale attempts to overcome protection completely, re-engineer every mode, and reconsider every theory to build something new.
And every time, we succeeded; every time, we claimed another victory.
There is a high probability that if this equipment remains in demand, we will continue to improve it. New attempts will be made to find that "magic key" that will allow for the simplest possible device, operating on the principle: "SWITCH ON — AND YOU'RE DONE."