SlideShare a Scribd company logo
1 of 24
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
MOBILE JAMMER
 What is Mobile Jammer?
 History.
 How Mobile Jammer works?
 Jamming Techniques.
 Design Parameters/Specification.
 Block Diagram.
 Power Supply.
 Types of Jammer Device.
 Application.
 Future scope of Jamming Technology.
 Conclusion.
 Bibliography.
2
 A mobile phone jammer is an instrument
used to prevent cellular phones from
receiving signals from base stations.
 It is a device that transmit signal on the
same frequency at which the GSM system
operates, the jamming success when the
mobile phones in the area where the
jammer is located are disabled.
3
 Mobile Jammer were originally developed
for law enforcement and the military to
interrupt communications by criminals and
terrorists.
 Some were also designed to foil the use of
certain remotely detonated explosives.
4
5
A jamming device transmits - same radio
frequencies of greater power as the cell phone,
disrupting the communication between the
phone and the cell-phone base station in the
tower. It's a called a denial-of-service attack.
How Mobile jammer works
 This causes interference with
communication of cell phones and towers to
render the phones unusable. On most
phones, the network would be out of range.
 So Jammers work by either disrupting phone
to tower freq.. or tower to phone
frequencies.
6
 Type "A" Device: JAMMERS
 Type “B” Device: INTELLIGENT CELLULAR DISABLERS
 Type “C” Device: INTELLIGENT BEACON DISABLERS
 Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
 Type “E” Device: EMI SHIELD - PASSIVE JAMMING
7
1. Type "A" Device: JAMMERS
This type of device comes equipped with
several independent oscillators transmitting
’jamming signals’ capable of blocking
frequencies used by paging devices as well as
those used by cellular systems control
channels for call establishment.
8
2.Type “B” Device: INTELLIGENT CELLULAR
DISABLERS
Unlike jammers, Type ”B” devices do not
transmit an interfering signal on the control
channels. The device, when located in a
designated ’quite’ area, functions as a
’detector’. It has a unique identification
number for communicating with the cellular
base station.
9
3. Type “C” Device (Intelligent Beacon
Disablers)
Unlike jammers, Type C devices do not
transmit an interfering signal on the control
channels. The device, when located in a
designated ’quiet’ area, functions as a
’beacon’ and any compatible terminal is
instructed to disable its ringer or disable its
operation, while within the coverage area of
beacon.
10
4. Type “D” Device (Direct Receive & Transmit
Jammers)
This jammer behaves like a small,
independent and portable base station, which
can directly interact intelligently or
unintelligently with the operation of the local
mobile phone. The jammer is predominantly in
receive mode and will intelligently choose to
interact and block the cell Phone directly if it is
within close proximity of the jammer.
11
5. Type E Device (EMI Shield - Passive
Jamming)
This technique is using EMI suppression
techniques to make a room into what is called
Faraday cage. Although labor intensive to
construct, the Faraday cage essentially Blocks
or greatly attenuates, virtually all
electromagnetic radiation from entering or
leaving the cage - or in this case a target
room.
12
Free space loss {F}= Path Loss (dB)= 32.44
+ 20 log D(km) + 20log f(MHz)
13
The frequency bands
Distance to be jammed (D)
Power calculations
14
If section Rf section
Jamming
signals
Power
supply
15
Transformer Rectifier Regulatorfilter
Amity university
rajasthan 16
Contd.
Mobile Jammer
Types of cell phone jammer device. There are many
types of cell phone jammer device which is used in our
daily life .as we take a example of class room, where we
does not want to use of cell phone than there we can
use cell phone jammer device. By this we can produce
the interface between the cell phone base station and
cell phone. resulting it disconnect the cell from base
station. and we can not receive the any calls from base
station.
For this there are many types of cell phone jammer
devices which is given as below:
17
 Remote Control Mobile jammer
 Adjustable Mobile Jammer
 School &Prison Mobile Jammer
 Explosion – Proof Mobile jammer
 Police & Military Mobile Jammer
 Portable Mobile Jammer
18
19
 To maintain the complete silence in library
and lecture hall
 To avoid fraud in examination hall
 To avoid disturbance in class room
 For providing security in business conference,
board of directors rooms, seminars, etc.,
 For providing calm and peaceful atmosphere
in Hospitals
 Church/Mosques/Cathedral/Temple/Religiou
s establishment
20
 While the law clearly prohibits using a device
to actively disrupt a cell-phone signal, there
are no rules against passive cell-phone
blocking.
 Companies are working on devices that
control a cell phone but do not "jam the
signal.
21
 Every technology has good aspect as well as
bad aspect the important thing is, how we are
using it.
 Cell phone jammers are very useful to the
society from the anti-social elements. We can
save our national leaders. we can restrict the
communication network between the anti-
social elements by using the Mobile jammers.
Cell phone jammers prevent the students from
carrying cell phones to the colleges.
22
 www.google.com
 www.wikipedia.org
 www.oeclib.in
23
Thanks

More Related Content

What's hot

What's hot (20)

Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
CELL PHONE JAMMER
CELL PHONE JAMMERCELL PHONE JAMMER
CELL PHONE JAMMER
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdf
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Mobile detector
Mobile detectorMobile detector
Mobile detector
 

Similar to Mobile Jammer ppt

Similar to Mobile Jammer ppt (20)

mobilejammer
mobilejammermobilejammer
mobilejammer
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Ceplone
CeploneCeplone
Ceplone
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Govind
GovindGovind
Govind
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 

More from OECLIB Odisha Electronics Control Library

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Mobile Jammer ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On MOBILE JAMMER
  • 2.  What is Mobile Jammer?  History.  How Mobile Jammer works?  Jamming Techniques.  Design Parameters/Specification.  Block Diagram.  Power Supply.  Types of Jammer Device.  Application.  Future scope of Jamming Technology.  Conclusion.  Bibliography. 2
  • 3.  A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations.  It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. 3
  • 4.  Mobile Jammer were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists.  Some were also designed to foil the use of certain remotely detonated explosives. 4
  • 5. 5 A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack. How Mobile jammer works
  • 6.  This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range.  So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. 6
  • 7.  Type "A" Device: JAMMERS  Type “B” Device: INTELLIGENT CELLULAR DISABLERS  Type “C” Device: INTELLIGENT BEACON DISABLERS  Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS  Type “E” Device: EMI SHIELD - PASSIVE JAMMING 7
  • 8. 1. Type "A" Device: JAMMERS This type of device comes equipped with several independent oscillators transmitting ’jamming signals’ capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. 8
  • 9. 2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS Unlike jammers, Type ”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It has a unique identification number for communicating with the cellular base station. 9
  • 10. 3. Type “C” Device (Intelligent Beacon Disablers) Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 10
  • 11. 4. Type “D” Device (Direct Receive & Transmit Jammers) This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and block the cell Phone directly if it is within close proximity of the jammer. 11
  • 12. 5. Type E Device (EMI Shield - Passive Jamming) This technique is using EMI suppression techniques to make a room into what is called Faraday cage. Although labor intensive to construct, the Faraday cage essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage - or in this case a target room. 12
  • 13. Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) 13 The frequency bands Distance to be jammed (D) Power calculations
  • 14. 14 If section Rf section Jamming signals Power supply
  • 17. Types of cell phone jammer device. There are many types of cell phone jammer device which is used in our daily life .as we take a example of class room, where we does not want to use of cell phone than there we can use cell phone jammer device. By this we can produce the interface between the cell phone base station and cell phone. resulting it disconnect the cell from base station. and we can not receive the any calls from base station. For this there are many types of cell phone jammer devices which is given as below: 17
  • 18.  Remote Control Mobile jammer  Adjustable Mobile Jammer  School &Prison Mobile Jammer  Explosion – Proof Mobile jammer  Police & Military Mobile Jammer  Portable Mobile Jammer 18
  • 19. 19
  • 20.  To maintain the complete silence in library and lecture hall  To avoid fraud in examination hall  To avoid disturbance in class room  For providing security in business conference, board of directors rooms, seminars, etc.,  For providing calm and peaceful atmosphere in Hospitals  Church/Mosques/Cathedral/Temple/Religiou s establishment 20
  • 21.  While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking.  Companies are working on devices that control a cell phone but do not "jam the signal. 21
  • 22.  Every technology has good aspect as well as bad aspect the important thing is, how we are using it.  Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti- social elements by using the Mobile jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. 22