SlideShare a Scribd company logo
1 of 17
Presented by,
B. Rama
Software Engineer
CONTENTS
 What is MOBILE JAMMER?
 History
 Working of MOBILE JAMMER
 Techniques
 Applications
 Future scope
 Conclusion
What is MOBILE JAMMER?
• MOBILE JAMMER is used to prevent mobile phones from
receiving or transmitting signals with the base station .
• Mobile Jammer can be used in practically any location but are
used in places where a phone call would be particularly disruptive
like Temples,Hospitals,Libraries,Cinemahalls,Schools and
Colleges etc.
HISTORY:
MOBILE JAMMER were originally developed for law enforcement
and the military to interrupt communication by criminals and
terrorists.
Some were also designed to foil the use of certain remotely
detonated explosives .
Working of MOBILE JAMMER :
A Jamming device
transmits on the same radio
frequencies as the cellphone,
disrupting the communication
between the phone and
cellphone base station in the
tower.
It is called Denial of
Service Attack.
JAMMING TECHNIQUES:
1.Type “A” Device : JAMMERS
2.Type “B” Device : INTELLIGENT CELLULAR DISABLERS
3.Type “C” Device : INTELLIGENT BEACON DISABLERS
4.Type “D” Device : DIRECT RECEIVE AND TRANSMIT
JAMMERS
5.Type “E” Device : EMI SHIELD-PASSIVE JAMMING
Jamming Techniques
1. Type “A” Device: Jammers :-
This type of device comes equipped with several
independent oscilators transmitting ‘jamming signals’ capable of
blocking frequiencies used by paging devices as well as those used by
cellular systems control channels for call establishment.
Jamming Techniques
2. Type “B” Device: Intelligent Cellular Disablers :-
Unlike Jammers,type ‘B’ devices do not transmit and interfering
signal on the control channels.The device when located in a
designated ‘quiet’ area functions such as ‘detector’. It has a unique
identification number for communicating with the cellular base
station.
Jamming Techniques
3. Type “C” Device :Intelligent Beacon Disablers :-
Unlike Jammers , type “C” devices do not transmit an
interfering signal on the control channels .The device when located
in a designated ‘quiet’ area, functions such as ‘Beacon’ and any
compatible terminal is instructed to disable its ringer or disable its
operation , while within the coverage area of beacon.
Jamming Techniques
4. Type “D” Device : Direct Receive And Transmit
Jammers :-
This jammer behaves like a small, independent and
portable base station , which can directly interact intelligently or
unintelligently with the operation of the local mobile phone.
Jamming Techniques
5. Type “E” Device : EMI Shield-Passive Jamming :-
This technique is using EMI suppression technique to make a
room into what is called faraday cage. Although labor intensive to
construct , the faraday cage essentially blocks or greatly attenuates,
virtually all electromagnetic radiation from entering or leaving the
cage or in this cage a target room.
APPLICATIONS
Jammers can be used in areas where transmissions are dangerous
such as chemical storage facilities or grain elevators.
Corporations use jammers to stop corporate espionage by blocking
voice transmissions and photo transmissions from camera phones .
For providing calm and peaceful atmosphere in hospitals.
To maintain the complete silence in library and lecture hall .
To avoid the fraud in examination hall .
Applications
FUTURE SCOPE
While the law clearly prohibits using a device to actively disrupt a
cell-phone signal , there are no rules against passive cell phone
blocking .
Companies are working on devices that control a cell phone but do
not “jam the signal” .
GOOD ASPECT
CONCLUSION
Every device is acts as good aspect as well as bad aspects .
Jamming is seen as property theft ,safety hazard .
But it’s overall performance is very good and helpful in our life .
Mobile Jammers

More Related Content

Similar to Mobile Jammers (20)

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Ceplone
CeploneCeplone
Ceplone
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Govind
GovindGovind
Govind
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Mobile Jammers

  • 2. CONTENTS  What is MOBILE JAMMER?  History  Working of MOBILE JAMMER  Techniques  Applications  Future scope  Conclusion
  • 3. What is MOBILE JAMMER? • MOBILE JAMMER is used to prevent mobile phones from receiving or transmitting signals with the base station . • Mobile Jammer can be used in practically any location but are used in places where a phone call would be particularly disruptive like Temples,Hospitals,Libraries,Cinemahalls,Schools and Colleges etc.
  • 4. HISTORY: MOBILE JAMMER were originally developed for law enforcement and the military to interrupt communication by criminals and terrorists. Some were also designed to foil the use of certain remotely detonated explosives .
  • 5. Working of MOBILE JAMMER : A Jamming device transmits on the same radio frequencies as the cellphone, disrupting the communication between the phone and cellphone base station in the tower. It is called Denial of Service Attack.
  • 6. JAMMING TECHNIQUES: 1.Type “A” Device : JAMMERS 2.Type “B” Device : INTELLIGENT CELLULAR DISABLERS 3.Type “C” Device : INTELLIGENT BEACON DISABLERS 4.Type “D” Device : DIRECT RECEIVE AND TRANSMIT JAMMERS 5.Type “E” Device : EMI SHIELD-PASSIVE JAMMING
  • 7. Jamming Techniques 1. Type “A” Device: Jammers :- This type of device comes equipped with several independent oscilators transmitting ‘jamming signals’ capable of blocking frequiencies used by paging devices as well as those used by cellular systems control channels for call establishment.
  • 8. Jamming Techniques 2. Type “B” Device: Intelligent Cellular Disablers :- Unlike Jammers,type ‘B’ devices do not transmit and interfering signal on the control channels.The device when located in a designated ‘quiet’ area functions such as ‘detector’. It has a unique identification number for communicating with the cellular base station.
  • 9. Jamming Techniques 3. Type “C” Device :Intelligent Beacon Disablers :- Unlike Jammers , type “C” devices do not transmit an interfering signal on the control channels .The device when located in a designated ‘quiet’ area, functions such as ‘Beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation , while within the coverage area of beacon.
  • 10. Jamming Techniques 4. Type “D” Device : Direct Receive And Transmit Jammers :- This jammer behaves like a small, independent and portable base station , which can directly interact intelligently or unintelligently with the operation of the local mobile phone.
  • 11. Jamming Techniques 5. Type “E” Device : EMI Shield-Passive Jamming :- This technique is using EMI suppression technique to make a room into what is called faraday cage. Although labor intensive to construct , the faraday cage essentially blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage or in this cage a target room.
  • 12. APPLICATIONS Jammers can be used in areas where transmissions are dangerous such as chemical storage facilities or grain elevators. Corporations use jammers to stop corporate espionage by blocking voice transmissions and photo transmissions from camera phones . For providing calm and peaceful atmosphere in hospitals. To maintain the complete silence in library and lecture hall . To avoid the fraud in examination hall .
  • 14. FUTURE SCOPE While the law clearly prohibits using a device to actively disrupt a cell-phone signal , there are no rules against passive cell phone blocking . Companies are working on devices that control a cell phone but do not “jam the signal” .
  • 16. CONCLUSION Every device is acts as good aspect as well as bad aspects . Jamming is seen as property theft ,safety hazard . But it’s overall performance is very good and helpful in our life .