SlideShare a Scribd company logo
1 of 20
WIRELESS SIGNAL JAMMING
By
Eng. Mahmoud Abdeen Mohammed
Agenda
2
1. Introduction
2. Jamming Types and Forms
3. Components
4. GSM Jamming
Jamming techniques
Comparison between techniques.
Use of Jamming
4. Future step .
3
- Jamming ( prevent victim to receive data
- Spying ( receive data ability to decryption
- Attack ( transmit fake data && control on
victim network
Wireless Attack Phases
What is Jammer
4
is a device that transmit signal on the same
frequency at which the wireless system operates, the
jamming success when the receiver in the area
where the jammer is located are disable to receive
data
Beginning
Communication jamming devices were first
developed and used by military. Where
tactical commanders use RF communications
to exercise control of their forces
5
Jamming types
7
Obvious jamming
- can be heard on the receiving equipment
- easy to detect
Subtle jamming
- Just noise is transmitted
- everything seems normal to the operator
- use in modern equipment
Components
- Noise Source
- Voltage Controlled Oscillator (VCO)
- frequency Tuner Circuit
- RF Amplification Unit
- Transmitting Antenna
5
Jamming Forms
9
Wifi & Bluetooth Jamming
Satellite Jamming
- Libyan Revolution
Radio Jamming
- Used in 2nd world war
GSM mobile Jamming
Figure show signal jamming
10
About GSM
Global System For Mobiles
Spectrum range:
890Mhz - 915MHz [uplink]
935Mhz - 960MHz [downlink]
Short message service [SMS]
11
Jamming techniques
• Type "A" Device: JAMMERS
• Type “B” Device: INTELLIGENT CELLULAR DISABLERS
• Type “C” Device: INTELLIGENT BEACON DISABLERS
• Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
• Type “E” Device: EMI SHIELD - PASSIVE JAMMING
12
Type "A" Device: JAMMERS
- several independent oscillators transmitting
‘jamming signals’[from 890 to 960 MHz]
capable of blocking frequencies used by
paging devices
13
Type “B” Device:
INTELLIGENT CELLULAR DISABLERS
device works as a detector, and it capable to
communicate with the cellular base
station, When the device detects the presence
of a mobile phone in the "silent" room; a
prevention of authorization of call establishment
is done by the software at the base station.
14
Type “C” Device
(Intelligent Beacon Disablers)
• The device, when located in ’quiet’ area, functions as a
’beacon’ and any compatible terminal is ordered to
disable its ringer or disable its operation.
• handset must re-enable its normal function as it leaves
the coverage area of the beacon.
15
Type “D” Device
(Direct Receive & Transmit Jammers)
This jammer is similar to type "A" , but jam signal
would only stay on as long as the mobile trying to make
a link with the base station; otherwise there would be
no jamming transmission.
16
Type E Device
(EMI Shield - Passive Jamming)
This technique is using EMI suppression techniques to
make a room into what is called Faraday cage
Faraday cage essentially Blocks or greatly attenuates all
electromagnetic radiation from entering or leaving the
cage.
17
Comparison between techniques
18
GSM jammer Use :-
Disabling mobile phones in specific places where the
ringing of cell phone would be disruptive as :-
- worship places (Mosque, Church, ... )
- university lecture rooms
- libraries
- hospitals
- concert halls
- meeting rooms
and any other places where silence is appreciated
19
Wireless signal jamming
Wireless signal jamming

More Related Content

What's hot (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
CELL PHONE JAMMER
CELL PHONE JAMMERCELL PHONE JAMMER
CELL PHONE JAMMER
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Training on microwave communication
Training on microwave communicationTraining on microwave communication
Training on microwave communication
 
RADAR Jamming and Anti-Jamming
RADAR Jamming and Anti-JammingRADAR Jamming and Anti-Jamming
RADAR Jamming and Anti-Jamming
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Radio Wave Propagation
Radio Wave PropagationRadio Wave Propagation
Radio Wave Propagation
 
-introduction-to-cellular-mobile-communications
-introduction-to-cellular-mobile-communications-introduction-to-cellular-mobile-communications
-introduction-to-cellular-mobile-communications
 
Presentation on satellite antenna
Presentation on satellite antennaPresentation on satellite antenna
Presentation on satellite antenna
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
wave propagation
wave propagationwave propagation
wave propagation
 
Hf radio
Hf radioHf radio
Hf radio
 
microwave-fundamentals
microwave-fundamentalsmicrowave-fundamentals
microwave-fundamentals
 

Viewers also liked

Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyRumana Firdose
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksShaik Irfan
 
GNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationGNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationMarco Lisi
 
AJAL JAMMING
AJAL JAMMINGAJAL JAMMING
AJAL JAMMINGAJAL A J
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum techniqueTauseef khan
 
Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015Jamie Ross
 
Frequency Synthesized Signal Generator
Frequency Synthesized Signal GeneratorFrequency Synthesized Signal Generator
Frequency Synthesized Signal GeneratorDESH D YADAV
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksSwapnil Salunke
 
Frequency synthesizers
Frequency  synthesizersFrequency  synthesizers
Frequency synthesizerssiva23143
 
synathesized function generator
synathesized function generatorsynathesized function generator
synathesized function generatorJay Patel
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
Electronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air ForceElectronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air ForceTBSS Group
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 

Viewers also liked (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptography
 
Ppt
PptPpt
Ppt
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
GNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationGNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and Mitigation
 
AJAL JAMMING
AJAL JAMMINGAJAL JAMMING
AJAL JAMMING
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
 
Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015
 
Frequency Synthesized Signal Generator
Frequency Synthesized Signal GeneratorFrequency Synthesized Signal Generator
Frequency Synthesized Signal Generator
 
Synthesizers
SynthesizersSynthesizers
Synthesizers
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
 
Frequency synthesizers
Frequency  synthesizersFrequency  synthesizers
Frequency synthesizers
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
synathesized function generator
synathesized function generatorsynathesized function generator
synathesized function generator
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Electronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air ForceElectronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air Force
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot
Honeypot Honeypot
Honeypot
 

Similar to Wireless signal jamming

Similar to Wireless signal jamming (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Govind
GovindGovind
Govind
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Ceplone
CeploneCeplone
Ceplone
 
Mobile Signal jammer
Mobile Signal jammerMobile Signal jammer
Mobile Signal jammer
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Wireless signal jamming

  • 1. WIRELESS SIGNAL JAMMING By Eng. Mahmoud Abdeen Mohammed
  • 2. Agenda 2 1. Introduction 2. Jamming Types and Forms 3. Components 4. GSM Jamming Jamming techniques Comparison between techniques. Use of Jamming 4. Future step .
  • 3. 3 - Jamming ( prevent victim to receive data - Spying ( receive data ability to decryption - Attack ( transmit fake data && control on victim network Wireless Attack Phases
  • 4. What is Jammer 4 is a device that transmit signal on the same frequency at which the wireless system operates, the jamming success when the receiver in the area where the jammer is located are disable to receive data
  • 5. Beginning Communication jamming devices were first developed and used by military. Where tactical commanders use RF communications to exercise control of their forces 5
  • 6. Jamming types 7 Obvious jamming - can be heard on the receiving equipment - easy to detect Subtle jamming - Just noise is transmitted - everything seems normal to the operator - use in modern equipment
  • 7. Components - Noise Source - Voltage Controlled Oscillator (VCO) - frequency Tuner Circuit - RF Amplification Unit - Transmitting Antenna 5
  • 8. Jamming Forms 9 Wifi & Bluetooth Jamming Satellite Jamming - Libyan Revolution Radio Jamming - Used in 2nd world war GSM mobile Jamming
  • 9. Figure show signal jamming 10
  • 10. About GSM Global System For Mobiles Spectrum range: 890Mhz - 915MHz [uplink] 935Mhz - 960MHz [downlink] Short message service [SMS] 11
  • 11. Jamming techniques • Type "A" Device: JAMMERS • Type “B” Device: INTELLIGENT CELLULAR DISABLERS • Type “C” Device: INTELLIGENT BEACON DISABLERS • Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS • Type “E” Device: EMI SHIELD - PASSIVE JAMMING 12
  • 12. Type "A" Device: JAMMERS - several independent oscillators transmitting ‘jamming signals’[from 890 to 960 MHz] capable of blocking frequencies used by paging devices 13
  • 13. Type “B” Device: INTELLIGENT CELLULAR DISABLERS device works as a detector, and it capable to communicate with the cellular base station, When the device detects the presence of a mobile phone in the "silent" room; a prevention of authorization of call establishment is done by the software at the base station. 14
  • 14. Type “C” Device (Intelligent Beacon Disablers) • The device, when located in ’quiet’ area, functions as a ’beacon’ and any compatible terminal is ordered to disable its ringer or disable its operation. • handset must re-enable its normal function as it leaves the coverage area of the beacon. 15
  • 15. Type “D” Device (Direct Receive & Transmit Jammers) This jammer is similar to type "A" , but jam signal would only stay on as long as the mobile trying to make a link with the base station; otherwise there would be no jamming transmission. 16
  • 16. Type E Device (EMI Shield - Passive Jamming) This technique is using EMI suppression techniques to make a room into what is called Faraday cage Faraday cage essentially Blocks or greatly attenuates all electromagnetic radiation from entering or leaving the cage. 17
  • 18. GSM jammer Use :- Disabling mobile phones in specific places where the ringing of cell phone would be disruptive as :- - worship places (Mosque, Church, ... ) - university lecture rooms - libraries - hospitals - concert halls - meeting rooms and any other places where silence is appreciated 19