SlideShare a Scribd company logo
1 of 23
Presented
By
Shivam Jaiswal
(0832cs121096)
1
• What is Mobile Jammer?
• History.
• How Mobile Jammer works?
• Jamming Techniques.
• Design Parameters/Specification.
• Block Diagram.
• Power Supply.
• Types of Jammer Device.
• Application.
• Future scope of Jamming Technology.
• Conclusion.
• Bibliography.
2
• A mobile phone jammer is an instrument used
to prevent cellular phones from receiving signals
from base stations.
• It is a device that transmit signal on the same
frequency at which the GSM system operates,
the jamming success when the mobile phones in
the area where the jammer is located are
disabled.
3
• Mobile Jammer were originally developed for law
enforcement and the military to interrupt
communications by criminals and terrorists.
• Some were also designed to foil the use of
certain remotely detonated explosives.
4
5
A jamming device transmits - same radio
frequencies of greater power as the cell
phone, disrupting the communication
between the phone and the cell-phone base
station in the tower. It's a called a denial-of-
service attack.
How Mobile jammer works
• This causes interference with
communication of cell phones and towers to
render the phones unusable. On most
phones, the network would be out of range.
• So Jammers work by either disrupting phone
to tower freq.. or tower to phone
frequencies.
6
• Type "A" Device: JAMMERS
• Type “B” Device: INTELLIGENT CELLULAR DISABLERS
• Type “C” Device: INTELLIGENT BEACON DISABLERS
• Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
• Type “E” Device: EMI SHIELD - PASSIVE JAMMING
7
1. Type "A" Device: JAMMERS
This type of device comes equipped with
several independent oscillators transmitting
’jamming signals’ capable of blocking
frequencies used by paging devices as well
as those used by cellular systems control
channels for call establishment.
8
2.Type “B” Device: INTELLIGENT CELLULAR
DISABLERS
Unlike jammers, Type ”B” devices do not
transmit an interfering signal on the control
channels. The device, when located in a
designated ’quite’ area, functions as a ’detector’.
It has a unique identification number for
communicating with the cellular base station.
9
3. Type “C” Device (Intelligent Beacon Disablers)
Unlike jammers, Type C devices do not transmit
an interfering signal on the control channels. The
device, when located in a designated ’quiet’
area, functions as a ’beacon’ and any compatible
terminal is instructed to disable its ringer or
disable its operation, while within the coverage
area of beacon.
10
4. Type “D” Device (Direct Receive &
Transmit Jammers)
This jammer behaves like a small,
independent and portable base station, which
can directly interact intelligently or
unintelligently with the operation of the local
mobile phone. The jammer is predominantly
in receive mode and will intelligently choose
to interact and block the cell Phone directly if
it is within close proximity of the jammer.
11
5. Type E Device (EMI Shield - Passive
Jamming)
This technique is using EMI suppression
techniques to make a room into what is called
Faraday cage. Although labor intensive to
construct, the Faraday cage essentially
Blocks or greatly attenuates, virtually all
electromagnetic radiation from entering or
leaving the cage - or in this case a target
room. 12
Free space loss {F}= Path Loss (dB)= 32.44 + 20
log D(km) + 20log f(MHz)
13
The frequency bands
Distance to be jammed (D)
Power calculations
14
If section Rf section
Jamming
signals
Power
supply
15
Transformer Rectifier Regulatorfilter
Amity university rajasthan 16
Contd.
Mobile Jammer
Types of cell phone jammer device. There
are many types of cell phone jammer device
which is used in our daily life .as we take a
example of class room, where we does not
want to use of cell phone than there we can use
cell phone jammer device. By this we can
produce the interface between the cell phone
base station and cell phone. resulting it
disconnect the cell from base station. and we
can not receive the any calls from base station.
For this there are many types of cell phone
jammer devices which is given as below:
17
• Remote Control Mobile jammer
• Adjustable Mobile Jammer
• School &Prison Mobile Jammer
• Explosion – Proof Mobile jammer
• Police & Military Mobile Jammer
• Portable Mobile Jammer
18
• To maintain the complete silence in library and lecture
hall
• To avoid fraud in examination hall
• To avoid disturbance in class room
• For providing security in business conference, board of
directors rooms, seminars, etc.,
• For providing calm and peaceful atmosphere in Hospitals
• Church/Mosques/Cathedral/Temple/Religious
establishment
19
• While the law clearly prohibits using a
device to actively disrupt a cell-phone
signal, there are no rules against passive
cell-phone blocking.
• Companies are working on devices that
control a cell phone but do not "jam the
signal.
20
• Every technology has good aspect as well as
bad aspect the important thing is, how we are
using it.
• Cell phone jammers are very useful to the
society from the anti-social elements. We can
save our national leaders. we can restrict the
communication network between the anti-
social elements by using the Mobile jammers.
Cell phone jammers prevent the students from
carrying cell phones to the colleges. 21
• Google
• Wikipedia
23
Mobile jammer

More Related Content

What's hot (20)

Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 

Viewers also liked

Viewers also liked (12)

Simple cell phone jammer
Simple cell phone jammerSimple cell phone jammer
Simple cell phone jammer
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portability
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Big data by samiran parui
Big data by samiran paruiBig data by samiran parui
Big data by samiran parui
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
49540326 electronic-eye
49540326 electronic-eye49540326 electronic-eye
49540326 electronic-eye
 

Similar to Mobile jammer

Similar to Mobile jammer (20)

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Ceplone
CeploneCeplone
Ceplone
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
 
Govind
GovindGovind
Govind
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Mobile jammer

  • 2. • What is Mobile Jammer? • History. • How Mobile Jammer works? • Jamming Techniques. • Design Parameters/Specification. • Block Diagram. • Power Supply. • Types of Jammer Device. • Application. • Future scope of Jamming Technology. • Conclusion. • Bibliography. 2
  • 3. • A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. • It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. 3
  • 4. • Mobile Jammer were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. • Some were also designed to foil the use of certain remotely detonated explosives. 4
  • 5. 5 A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of- service attack. How Mobile jammer works
  • 6. • This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range. • So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. 6
  • 7. • Type "A" Device: JAMMERS • Type “B” Device: INTELLIGENT CELLULAR DISABLERS • Type “C” Device: INTELLIGENT BEACON DISABLERS • Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS • Type “E” Device: EMI SHIELD - PASSIVE JAMMING 7
  • 8. 1. Type "A" Device: JAMMERS This type of device comes equipped with several independent oscillators transmitting ’jamming signals’ capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. 8
  • 9. 2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS Unlike jammers, Type ”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It has a unique identification number for communicating with the cellular base station. 9
  • 10. 3. Type “C” Device (Intelligent Beacon Disablers) Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 10
  • 11. 4. Type “D” Device (Direct Receive & Transmit Jammers) This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and block the cell Phone directly if it is within close proximity of the jammer. 11
  • 12. 5. Type E Device (EMI Shield - Passive Jamming) This technique is using EMI suppression techniques to make a room into what is called Faraday cage. Although labor intensive to construct, the Faraday cage essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage - or in this case a target room. 12
  • 13. Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) 13 The frequency bands Distance to be jammed (D) Power calculations
  • 14. 14 If section Rf section Jamming signals Power supply
  • 16. Amity university rajasthan 16 Contd. Mobile Jammer
  • 17. Types of cell phone jammer device. There are many types of cell phone jammer device which is used in our daily life .as we take a example of class room, where we does not want to use of cell phone than there we can use cell phone jammer device. By this we can produce the interface between the cell phone base station and cell phone. resulting it disconnect the cell from base station. and we can not receive the any calls from base station. For this there are many types of cell phone jammer devices which is given as below: 17
  • 18. • Remote Control Mobile jammer • Adjustable Mobile Jammer • School &Prison Mobile Jammer • Explosion – Proof Mobile jammer • Police & Military Mobile Jammer • Portable Mobile Jammer 18
  • 19. • To maintain the complete silence in library and lecture hall • To avoid fraud in examination hall • To avoid disturbance in class room • For providing security in business conference, board of directors rooms, seminars, etc., • For providing calm and peaceful atmosphere in Hospitals • Church/Mosques/Cathedral/Temple/Religious establishment 19
  • 20. • While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. • Companies are working on devices that control a cell phone but do not "jam the signal. 20
  • 21. • Every technology has good aspect as well as bad aspect the important thing is, how we are using it. • Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti- social elements by using the Mobile jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. 21