SlideShare a Scribd company logo
1 of 21
MOBILE JAMMER
1
Content
 What is Mobile Jammer?
 History.
 How Mobile Jammer works?
 Jamming Techniques.
 Block Diagram.
 Power Supply.
 Types of Jammer Device.
 Application.
 Future scope of Jamming Technology.
 Conclusion.
2
What is Mobile Jammer?
 A mobile phone jammer is an instrument
used to prevent cellular phones from
receiving signals from base stations.
 It is a device that transmit signal on the
same frequency at which the GSM system
operates, the jamming success when the
mobile phones in the area where the
jammer is located are disabled.
3
History
 Mobile Jammer were originally developed
for law enforcement and the military to
interrupt communications by criminals and
terrorists.
 Some were also designed to foil the use of
certain remotely detonated explosives.
4
5
A jamming device transmits - same radio
frequencies of greater power as the cell
phone, disrupting the communication
between the phone and the cell-phone base
station in the tower. It's a called a denial-of-
service attack.
How Mobile jammer works
 This causes interference with
communication of cell phones and towers to
render the phones unusable. On most
phones, the network would be out of range.
 So Jammers work by either disrupting
phone to tower freq.. or tower to phone
frequencies.
6
Jamming Techniques
 Type "A" Device: JAMMERS
 Type “B” Device: INTELLIGENT CELLULAR DISABLERS
 Type “C” Device: INTELLIGENT BEACON DISABLERS
 Type “D” Device: DIRECT RECEIVE & TRANSMIT
JAMMERS
7
Jamming Techniques
1. Type "A" Device: JAMMERS
This type of device comes equipped with
several independent oscillators
transmitting ’jamming signals’ capable of
blocking frequencies used by paging
devices as well as those used by cellular
systems control channels for call
establishment.
8
Jamming Techniques
2.Type “B” Device: INTELLIGENT
CELLULAR DISABLERS
Unlike jammers, Type ”B” devices do not
transmit an interfering signal on the control
channels. The device, when located in a
designated ’quite’ area, functions as a
’detector’. It has a unique identification
number for communicating with the cellular
base station.
9
Jamming Techniques
3. Type “C” Device (Intelligent Beacon
Disablers)
Unlike jammers, Type C devices do not
transmit an interfering signal on the control
channels. The device, when located in a
designated ’quiet’ area, functions as a
’beacon’ and any compatible terminal is
instructed to disable its ringer or disable its
operation, while within the coverage area of
beacon.
10
Jamming Techniques
4. Type “D” Device (Direct Receive &
Transmit Jammers)
This jammer behaves like a small,
independent and portable base station,
which can directly interact intelligently or
unintelligently with the operation of the local
mobile phone. The jammer is predominantly
in receive mode and will intelligently choose
to interact and block the cell Phone directly if
it is within close proximity of the jammer.
11
Block Diagram
12
If section Rf section
Jamming
signals
Power
supply
Power Supply
13
Transformer Rectifier Regulatorfilter
Amity university
rajasthan 14
Contd.
Mobile Jammer
Types of Jammer Device
Types of cell phone jammer device. There
are many types of cell phone jammer device
which is used in our daily life .as we take a
example of class room, where we does not
want to use of cell phone than there we can use
cell phone jammer device. By this we can
produce the interface between the cell phone
base station and cell phone. resulting it
disconnect the cell from base station. and we
can not receive the any calls from base station.
For this there are many types of cell phone
jammer devices which is given as below:
17
 Remote Control Mobile jammer
 Adjustable Mobile Jammer
 School &Prison Mobile Jammer
 Explosion – Proof Mobile jammer
 Police & Military Mobile Jammer
 Portable Mobile Jammer
18
19
Application
 To maintain the complete silence in
library and lecture hall
 To avoid fraud in examination hall
 To avoid disturbance in class room
 For providing security in business
conference, board of directors rooms,
seminars, etc.,
 For providing calm and peaceful
atmosphere in Hospitals
 Church/Mosques/Cathedral/Temple/Relig
ious establishment
18
Future scope of Jamming
Technology
 Companies are working on devices that
control a cell phone but do not "jam the
signal.
19
Conclusion
 Every technology has good aspect as well as
bad aspect the important thing is, how we are
using it.
 Cell phone jammers are very useful to the
society from the anti-social elements. We can
save our national leaders. we can restrict the
communication network between the anti-
social elements by using the Mobile jammers.
Cell phone jammers prevent the students
from carrying cell phones to the colleges.
20
mobilejammer

More Related Content

What's hot (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Govind
GovindGovind
Govind
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 

Similar to mobilejammer

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxLingaSwamy10
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxVinodDoddaka
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentationManikandan Jeeva
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile JammersRamaBoya2
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2mgnboy
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networksijtsrd
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jammingPREMKUMAR
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksIJMER
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?xiha tareen
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd Iaetsd
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 

Similar to mobilejammer (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Ceplone
CeploneCeplone
Ceplone
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 

More from Naga Dinesh

More from Naga Dinesh (20)

pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
Firewall
FirewallFirewall
Firewall
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

mobilejammer

  • 2. Content  What is Mobile Jammer?  History.  How Mobile Jammer works?  Jamming Techniques.  Block Diagram.  Power Supply.  Types of Jammer Device.  Application.  Future scope of Jamming Technology.  Conclusion. 2
  • 3. What is Mobile Jammer?  A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations.  It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. 3
  • 4. History  Mobile Jammer were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists.  Some were also designed to foil the use of certain remotely detonated explosives. 4
  • 5. 5 A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of- service attack. How Mobile jammer works
  • 6.  This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range.  So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. 6
  • 7. Jamming Techniques  Type "A" Device: JAMMERS  Type “B” Device: INTELLIGENT CELLULAR DISABLERS  Type “C” Device: INTELLIGENT BEACON DISABLERS  Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS 7
  • 8. Jamming Techniques 1. Type "A" Device: JAMMERS This type of device comes equipped with several independent oscillators transmitting ’jamming signals’ capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. 8
  • 9. Jamming Techniques 2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS Unlike jammers, Type ”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It has a unique identification number for communicating with the cellular base station. 9
  • 10. Jamming Techniques 3. Type “C” Device (Intelligent Beacon Disablers) Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 10
  • 11. Jamming Techniques 4. Type “D” Device (Direct Receive & Transmit Jammers) This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and block the cell Phone directly if it is within close proximity of the jammer. 11
  • 12. Block Diagram 12 If section Rf section Jamming signals Power supply
  • 15. Types of Jammer Device Types of cell phone jammer device. There are many types of cell phone jammer device which is used in our daily life .as we take a example of class room, where we does not want to use of cell phone than there we can use cell phone jammer device. By this we can produce the interface between the cell phone base station and cell phone. resulting it disconnect the cell from base station. and we can not receive the any calls from base station. For this there are many types of cell phone jammer devices which is given as below: 17
  • 16.  Remote Control Mobile jammer  Adjustable Mobile Jammer  School &Prison Mobile Jammer  Explosion – Proof Mobile jammer  Police & Military Mobile Jammer  Portable Mobile Jammer 18
  • 17. 19
  • 18. Application  To maintain the complete silence in library and lecture hall  To avoid fraud in examination hall  To avoid disturbance in class room  For providing security in business conference, board of directors rooms, seminars, etc.,  For providing calm and peaceful atmosphere in Hospitals  Church/Mosques/Cathedral/Temple/Relig ious establishment 18
  • 19. Future scope of Jamming Technology  Companies are working on devices that control a cell phone but do not "jam the signal. 19
  • 20. Conclusion  Every technology has good aspect as well as bad aspect the important thing is, how we are using it.  Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti- social elements by using the Mobile jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. 20