Once upon a time, this article was written to make it easier for users of fabrics and jammers to determine which equipment is more suitable to use.
Last update: 09/04/2020
This article has the most important information about the three types of anti-theft systems, but by the beginning of 2020, one of the three types, or rather EM, has already dropped out of the list since the production of these systems by all manufacturers has been stopped for several years for many reasons:
1. very high power consumption (not economical).
2. low percentage of trigger on tags.
3. very difficult selection of the correct label for the EM gate of a particular manufacturer, so that the label is detected perfectly. When you look at the photo you will see that the tags of this system differ in length, width and configurations.
4. The decline in the production of EM tags by Chinese manufacturers due to negative feedback from suppliers.
As a result, this technology has been dying for several years and it is quite difficult to meet it in reality. Based on this, we did not consider the EM system in the filming of this video, BUT:- thanks to our knowledge collected over all years,
we created this unique video in which all the nuances of AM and RF anti-theft systems
, their vulnerabilities and all the tools for using these vulnerabilities are examined.
And now this video is the best addition to this article or vice versa, you decide.
If you do not have knowledge of the English language, do not worry, we filled the video with the highest quality subtitles in English.
This means that you can enable the automatic translation of subtitles and they will be translated very high quality into any language of the world.
P.S.: we apologize for the camera's autofocus failure and not the perfect mood.. comprehensive preparation for video shooting has spent a lot of energy, I hope for your understanding.
02:35 - 1. Theoretical minimum.
10:00 - 2. Labels. The biggest difference.
15:52 - 3. Plastic (Hard) tags:
15:52 - AM tags.
22:22 - RF tags.
28:19 - universal AM+RF tags.
35:42 - 4. EAS systems (gates).
44:30 - 5. identified EAS vulnerabilities.
55:20 - 6. high-tech exploitation of EAS vulnerabilities.
1:00:05 - 7. lifehacks and fun.
Please do not put this intelligence about the endless expanse of the Internet, as these are my individual hours of work and this post is based on my personal knowledge. It was partly realized because of your financial support of my projects, as without it I could not bring myself to find time for these posts.. I hope this creation will be important and will be continued on other issues that are interesting to you. Please do not upbraid me for the design and sizes of the images, as in this case it's much more important to convey the information and not to show off any unnecessary garbage..
Chapter 1. Theoretical minimum.
1. There are three common widespread antitheft systems:
Acousto-magnetic -> AM
Radiofrequency -> RF
Electromagnetic -> EM
(Subsequently we'll use the abbreviations)
2. The most important fact, that you have to realize is that all these systems use three completely different principles of detecting EAS TAGS (hereinafter – the "tag").
AM works on the principle of resonant response of the tag, when the gates firstly create the generation in it, and then listen to the definite frequency response from the generated tags. In this moment of «hearing» the gates themselves are «silent». professionals use for this system method "jamming" with the help of special jammer:
Smart AM EAS sensormatic jammer (for Anti-Jammer) 58kHz
EAS AM+RF jammer "2in1" v.2021
RF works on the principle of self-field analysis in order to identify the "sinks of the field (tag)». That's why the RF system must always be set on the basis of 2 columns, as it's impossible to make the steady electromagnetic field, using only one gate. This system is easily overcome with the help of shielding fabric or RF jammer:
EM runs on the principle of magnetostriction, when there is an impact on two metal strips of different shape and length. If the label falls into that field, the oscillations of two strips create their own frequency response, which is picked up by the receiver in the EM gate.
Due to it, it should be understood that the correct methods of dealing with these systems can't be the same.