https://www.hackers-arise.com/post/sdr-for-hackers-jamming-russian-military-signals-in-ukraine
First, you will need a HackRF One. The RTL-SDR is inadequate for this task. Although the inexpensive RTL-SDR is an excellent receiver, it is ONLY a receiver. We need hardware that can transmit signals that can jam the Russian military signals. You can purchase one here and you can set it up in this tutorial here.
Next, you need an installation of Kali Linux (most other Linux distributions will work equally well). You will then need to install GNU Radio and gr-osmosdr. Fortunately, both are in the Kali repository so we can use the apt utility to install.
kali > sudo apt install gnuradio
kali > sudo apt install gr-osmosdr
Step #2: Identify the Frequencies Used by the Russian Military
The frequencies used by the Russian military are published online in numerous location including the one below.
https://wiki.radioreference.com/index.php/Category:Russia_Military_Frequencies
In addition, the adept radio jammer is recommended to simply listen to the frequencies around them to identify potential frequencies to jam.
Step #3 Jamming their Signals
osmosdr package we just downloaded has a utility named osmocom_siggen_nogui. This is a signal generator. As a signal generator, it has the capability of also jamming signals.
This signal generator is capable of producing various signals useful for jammimg including;
constant
sinusoid
uniform noise
Gaussian noise
Frequency sweep
GSM bursts
Two Tone
Let's take a look at the help screen for this utility.
kali > osmocom_siggen_nogui -h
Now, check that your HackRF One is connected and functioning.
Kali > sudo hackrf_info
Now, we can begin the jamming! Select a frequency that the Russians are using for communication or other purposes and create a command similar to the following;
kali > osmocom_siggen_nogui -a hackrf -f 4182e6 --gaussian -x 2e6 -y 10 -v
This command uses our HackRF (-a hackrf) at 4182 kHz (one of Russian military communication frequencies) and uses a Gaussian noise (similar to white noise) jamming technique.
To apply this jamming on other communication frequencies, simply edit the frequency setting (in this case, 4182e6) and possibly the jamming technique. Different jamming techniques work better on different frequencies and communication protocols (GSM bursts, for instance, on GSM cellular communication).
Limitations
The primary limitation we must be concerned with is strength of signal. These are only effective if we are close to the receiver or can project a VERY strong signal. In addition, Russian military signals employ frequency hopping where the signal changes frequencies at a very rapid rate. In such cases, we may have employ multiple transceivers and target multiple frequencies (we don't need to target all the frequencies as missing components will garble the signal adequately) or set the sending bandwidth very wide to cover the multiple frequencies.
Summary
Signal jamming has long and storied history in military tactics. Although some military communication is encrypted (many of the Russian shortwave communication is unencrypted and can be intercepted) this does not stop us from jamming it. It essence, jamming it keeps the signal from being received as sent as the receiver. That can have critical military implications.
Look for more tutorials here on using our HackRF to blunt the Russian attack in Ukraine.