2. Agenda
2
1. Introduction
2. Jamming Types and Forms
3. Components
4. GSM Jamming
Jamming techniques
Comparison between techniques.
Use of Jamming
4. Future step .
3. 3
- Jamming ( prevent victim to receive data
- Spying ( receive data ability to decryption
- Attack ( transmit fake data && control on
victim network
Wireless Attack Phases
4. What is Jammer
4
is a device that transmit signal on the same
frequency at which the wireless system operates, the
jamming success when the receiver in the area
where the jammer is located are disable to receive
data
5. Beginning
Communication jamming devices were first
developed and used by military. Where
tactical commanders use RF communications
to exercise control of their forces
5
6. Jamming types
7
Obvious jamming
- can be heard on the receiving equipment
- easy to detect
Subtle jamming
- Just noise is transmitted
- everything seems normal to the operator
- use in modern equipment
7. Components
- Noise Source
- Voltage Controlled Oscillator (VCO)
- frequency Tuner Circuit
- RF Amplification Unit
- Transmitting Antenna
5
8. Jamming Forms
9
Wifi & Bluetooth Jamming
Satellite Jamming
- Libyan Revolution
Radio Jamming
- Used in 2nd world war
GSM mobile Jamming
10. About GSM
Global System For Mobiles
Spectrum range:
890Mhz - 915MHz [uplink]
935Mhz - 960MHz [downlink]
Short message service [SMS]
11
11. Jamming techniques
• Type "A" Device: JAMMERS
• Type “B” Device: INTELLIGENT CELLULAR DISABLERS
• Type “C” Device: INTELLIGENT BEACON DISABLERS
• Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
• Type “E” Device: EMI SHIELD - PASSIVE JAMMING
12
12. Type "A" Device: JAMMERS
- several independent oscillators transmitting
‘jamming signals’[from 890 to 960 MHz]
capable of blocking frequencies used by
paging devices
13
13. Type “B” Device:
INTELLIGENT CELLULAR DISABLERS
device works as a detector, and it capable to
communicate with the cellular base
station, When the device detects the presence
of a mobile phone in the "silent" room; a
prevention of authorization of call establishment
is done by the software at the base station.
14
14. Type “C” Device
(Intelligent Beacon Disablers)
• The device, when located in ’quiet’ area, functions as a
’beacon’ and any compatible terminal is ordered to
disable its ringer or disable its operation.
• handset must re-enable its normal function as it leaves
the coverage area of the beacon.
15
15. Type “D” Device
(Direct Receive & Transmit Jammers)
This jammer is similar to type "A" , but jam signal
would only stay on as long as the mobile trying to make
a link with the base station; otherwise there would be
no jamming transmission.
16
16. Type E Device
(EMI Shield - Passive Jamming)
This technique is using EMI suppression techniques to
make a room into what is called Faraday cage
Faraday cage essentially Blocks or greatly attenuates all
electromagnetic radiation from entering or leaving the
cage.
17
18. GSM jammer Use :-
Disabling mobile phones in specific places where the
ringing of cell phone would be disruptive as :-
- worship places (Mosque, Church, ... )
- university lecture rooms
- libraries
- hospitals
- concert halls
- meeting rooms
and any other places where silence is appreciated
19