We use radio signals to make rogue signals look like noise. It's based on a microsecond level of timing.

With the SSM enabled... we make their transmissions invisible to anyone on the network by corrupting [the rogue's] packets.

I need not remind the court of the presumption of innocence.

We offer radio jamming and scrambling, without changing anything on the client. It's layered on top of standard protection.