Making the Night Hostile: Using Cellular Architecture and EW to Counter Shaheds
Russia’s Shahed drones exploit Ukraine’s cell networks at night, using SIM cards to refine navigation when GNSS is jammed. But what if Ukraine made its cellular networks hostile at night? By localizing and layering high-power GSM/LTE “honeypots” along the borders and FLOT, using Timing Advance and propagation delay to identify drones moving at flight speeds, Ukraine can reject or blackhole these signals systematically. Coupled with GNSS/GLONASS disruption, this would force Shaheds to fly blind, degrading their effectiveness and flipping the cost equation on Russia’s cheap terror weapons.

Photo – Ukraine National Police
If Russia wants to use the night, Ukraine should make the night bite back.
Situation
Russia’s Shahed/Geran-136 drones are painted black for a reason. Darkness hides them from visual detection, and RF signals propagate cleaner at night, reducing background noise and clutter. Russia knows it, and that’s why Shaheds come in waves when the sun goes down.
If Russia wants to use the night, Ukraine needs to make its cellular architecture and RF environment hostile at night—not for its people, but for every Shahed trying to grab a signal.
Why Cellular Matters to Shaheds
Some Shaheds/ Gerans are equipped with Ukrainian SIM cards, hopping between cell towers to refine navigation, get position updates, and assist with command & control back to Russian operators. In short, these drones can use the very networks Ukraine relies on to kill Ukrainians more efficiently.
We don’t have to let them.
The Solution: Make Cell Hostile at Night
Here’s the idea:
1. Localize cellular infrastructure (GSM, UMTS, LTE, 5G) in border regions with Russia/Belarus and along current FLOTs (forward lines of troops).
2. Deploy specialized Cell-on-Wheels (COWs) with high-power GSM/clean LTE signals to create attractive “honeypots” for drones seeking a network.
3. Layer GNSS/GLONASS jamming/spoofing to force Shaheds to seek cellular fallback for navigation and targeting.
4. Once these drones approach the borders or FLOT, actively reject them:
- Monitor Timing Advance (TA), Propagation Delay, and Observed Time Difference of Arrival (OTDOA).
- A flying drone will have propagation delays and TAs far outside human speeds.
- Program towers to auto-reject any PLMNs/IMSI/IMEIs requesting access at flying speeds with rejection codes (6, 13, or equivalent).
- Blacklist all PLMNs temporarily at night in critical sectors so no device is trusted unless pre-whitelisted.
- Enable “nighttime aggression”: make the cell network a trap for anything in the sky.
5. Use dual/multi-layered COWs with directional antennas to expand coverage, lure multi-SIM drones, and overwhelm them with powerful signals that they lock onto before crossing into Ukraine.
Why This Matters
This strategy does not require removing cell service for civilians countrywide. It’s about localized, time-bound, aggressive cell denial:
- Makes GNSS/GLONASS jamming more effective by removing fallback nav options.
- Forces drones to fly blind or off course, making them easier for kinetic defenses to target.
- Disrupts Russian attempts to refine flight paths or revector Shaheds mid-flight.
- Potentially prevents drones from successfully completing their terminal attack dive or even staying airborne in the right direction.
Done correctly, this would layer seamlessly with kinetic and drone-on-drone defenses, creating a hostile electromagnetic environment from the border all the way to deep Ukrainian territory.
4G/5G NR: An Untapped Edge
Modern LTE and 5G networks provide:
1. Finer-grain location tracking.
2. Faster TA/OTDOA/Timing synchronization.
3. Improved propagation delay measurement.
This means Ukraine can precisely differentiate a flying object at 115 mph vs. a car at 60 mph, or a civilian phone at walking speed.
With carefully crafted rejection policies and tower programming, Ukraine can avoid false positives while systematically denying drones.
So What?
The Shahed is a cheap, effective terror weapon because it abuses the RF environment at night. If Ukraine makes the night RF environment actively hostile, Russia’s cost advantage shrinks.
Take cellular off the table at night.
Force Shaheds to fly blind. Force them to fail navigation. Force them into kill boxes for drone interceptors and mobile AAA teams.
If Russia wants to use the night, make the night bite back.
Our Take
Making Ukraine’s cellular networks a hostile environment at night could flip the cost equation on Russia’s Shahed campaign, forcing their cheap terror weapons to become blind and ineffective.
