SlideShare a Scribd company logo
1 of 19
Cell Phone JammerCell Phone Jammer
presented by:-presented by:-
Saumya Ranjan BehuraSaumya Ranjan Behura
CONTENTSCONTENTS
1> what is a Jammer ?1> what is a Jammer ?
2> Size of Jammer .2> Size of Jammer .
3> Why are Jammers used ?3> Why are Jammers used ?
4> How Jammers work ?4> How Jammers work ?
5> Inside a Jammer .5> Inside a Jammer .
6> Range of Jammer .6> Range of Jammer .
7> Good or Bad ?7> Good or Bad ?
8>Legal Issues .8>Legal Issues .
9>Conclusion .9>Conclusion .
WHAT IS A "JAMMER"?WHAT IS A "JAMMER"?
 Cell phone jammers are devices that create a temporaryCell phone jammers are devices that create a temporary
"dead zone" to all cell phone traffic in their immediate"dead zone" to all cell phone traffic in their immediate
proximity.proximity.
 A cell phone jammer is an instrument used to preventA cell phone jammer is an instrument used to prevent
cellular phones from receiving and transmitting thecellular phones from receiving and transmitting the
mobile signals to a base station. When used, the jammermobile signals to a base station. When used, the jammer
effectively disables cellular phones in the areaeffectively disables cellular phones in the area..
 Other types of jammers include radar jammerOther types of jammers include radar jammer
and radio jammerand radio jammer
 Some cell-phone jammers are made to look like actualSome cell-phone jammers are made to look like actual
phones. Others are briefcase-sized or larger. Thephones. Others are briefcase-sized or larger. The
biggest jammers used by police and the military can bebiggest jammers used by police and the military can be
mounted in vehicles for convoy security.mounted in vehicles for convoy security.
SIZE OF ASIZE OF A JAMMERJAMMER
Digital, portable cellphone
jammer designed for
military and police use
Cont..Cont..
A big jammer A portable jammer
WHY ARE JAMMERS USED?WHY ARE JAMMERS USED?
 A phone jammer provides the ultimate solution in anyA phone jammer provides the ultimate solution in any
area where cellular communications frequently causearea where cellular communications frequently cause
nuisance either by loud incoming call rings or resultingnuisance either by loud incoming call rings or resulting
loud telephone conversations.loud telephone conversations.
 Cell phone jamming devices were originally developedCell phone jamming devices were originally developed
for law enforcement and the military to interruptfor law enforcement and the military to interrupt
communications by criminals and terrorists. Examplescommunications by criminals and terrorists. Examples
include:securityzonespublictransport,include:securityzonespublictransport,,,classrooms,,
temples,tv & radio stations,jails,govt.buildings,militarytemples,tv & radio stations,jails,govt.buildings,military
bases,industries etcbases,industries etc.   .   
 During a hostage situation, police can control when andDuring a hostage situation, police can control when and
where a captor can make a phone call. Police can blockwhere a captor can make a phone call. Police can block
phone calls during a drug raid so suspects can'tphone calls during a drug raid so suspects can't
communicate outside the area.communicate outside the area.
 Corporations use jammers to stop corporate espionageCorporations use jammers to stop corporate espionage
by blocking voice transmissions and photoby blocking voice transmissions and photo
transmissions from camera phones.transmissions from camera phones.
Cont..Cont..
HOW JAMMERS WORKHOW JAMMERS WORK
 Jammers block cell phone use by sending out radioJammers block cell phone use by sending out radio
waves along the same frequencies that cellular phoneswaves along the same frequencies that cellular phones
use at a high enough power that the two signals collideuse at a high enough power that the two signals collide
and cancel each other out.and cancel each other out.
 This causes interference with theThis causes interference with the
communication of cell phonescommunication of cell phones
and the towers to render.the phonesand the towers to render.the phones
unusableunusable.. On most phones, theOn most phones, the
network would appear out of range.network would appear out of range.
 SoSo Jammers work by either disruptingJammers work by either disrupting
phone to tower frequencies or towerphone to tower frequencies or tower
to phone frequenciesto phone frequencies..
JAMMING BASICSJAMMING BASICS
Cont..Cont..
 To jam a cell phone, all you need is a device thatTo jam a cell phone, all you need is a device that
broadcasts on the correct frequencies. Althoughbroadcasts on the correct frequencies. Although
different cellular systems process signals differently, alldifferent cellular systems process signals differently, all
cell-phone networks use radio signals that can becell-phone networks use radio signals that can be
interrupted. GSM, used in digital cellular and PCS-interrupted. GSM, used in digital cellular and PCS-
based systems, operates in the 900-MHz and 1800-based systems, operates in the 900-MHz and 1800-
MHz bands in Europe and Asia and in the 1900-MHzMHz bands in Europe and Asia and in the 1900-MHz
(sometimes referred to as 1.9-GHz) band in the United(sometimes referred to as 1.9-GHz) band in the United
States. Jammers can broadcast on any frequency and areStates. Jammers can broadcast on any frequency and are
effective against AMPS, CDMA, TDMA,GSM andeffective against AMPS, CDMA, TDMA,GSM and
Nextel systems.Nextel systems.
INSIDE A JAMMERINSIDE A JAMMER
ANTENNAANTENNA ::
Every jamming device has an antenna toEvery jamming device has an antenna to
send the signal. Some are contained withinsend the signal. Some are contained within
an electrical cabinet. On stronger devices,an electrical cabinet. On stronger devices,
antennas are external to provide longerantennas are external to provide longer
range and may be tuned for individualrange and may be tuned for individual
frequencies.frequencies.
Cont..Cont..
 Power supplyPower supply
Smaller jamming devices are battery operated. SomeSmaller jamming devices are battery operated. Some
look like cell phone and use cell-phone batteries.look like cell phone and use cell-phone batteries.
Stronger devices are plugged into a standard outlet orStronger devices are plugged into a standard outlet or
wired into a vehicle's electrical systemwired into a vehicle's electrical system..
 CircuitryCircuitry
The main electronic components of a jammer are:The main electronic components of a jammer are:
 Voltage-controlled oscillatorVoltage-controlled oscillator - Generates the radio- Generates the radio
signal that will interfere with the cell phone signalsignal that will interfere with the cell phone signal
 Tuning circuitTuning circuit - Controls the frequency at which the- Controls the frequency at which the
jammer broadcasts its signal by sending a particularjammer broadcasts its signal by sending a particular
voltage to the oscillator.voltage to the oscillator.
RANGE OF A JAMMERRANGE OF A JAMMER
 The actual range of the jammer depends on its powerThe actual range of the jammer depends on its power
and the local environment, which may include hills orand the local environment, which may include hills or
walls of a building that block the jamming signal.Thewalls of a building that block the jamming signal.The
power depends on proximity to towers, indoor andpower depends on proximity to towers, indoor and
outdoor settings, even temperature and humidity play aoutdoor settings, even temperature and humidity play a
role. Most cell phone jammers come in 2 versions, onerole. Most cell phone jammers come in 2 versions, one
for Europe, North Africa and the Gulf states GSMfor Europe, North Africa and the Gulf states GSM
networks (900 & 1800) and one for the Americas &networks (900 & 1800) and one for the Americas &
Canada (800 & 1900 mhz) networksCanada (800 & 1900 mhz) networks
 Most jammers only have a range of about 50 to 80 feetMost jammers only have a range of about 50 to 80 feet
and will only effectively jam your immediateand will only effectively jam your immediate
surroundings. Low-powered jammers block calls in asurroundings. Low-powered jammers block calls in a
range of about 30 feet (9 m).range of about 30 feet (9 m).
Cont..Cont..
 Higher-powered units create a cell-free zone as large asHigher-powered units create a cell-free zone as large as
a football field. Units used by law enforcement can shuta football field. Units used by law enforcement can shut
down service up to 1 mile (1.6 km)down service up to 1 mile (1.6 km)
from the device.They are availablefrom the device.They are available
to cover large structures like officeto cover large structures like office
buildings, theaters and churches.buildings, theaters and churches.
They look like a miscellaneous boxThey look like a miscellaneous box
with wires sticking out & are usuallywith wires sticking out & are usually
mounted on walls or ceilings.mounted on walls or ceilings.
GOOD OR BADGOOD OR BAD
Along with its advantages jammers can be equally usedAlong with its advantages jammers can be equally used
for the bad.for the bad.
 They can in theory interfere with emergencyThey can in theory interfere with emergency
communications between police and rescue personnelcommunications between police and rescue personnel
 It also represents aIt also represents a safety hazardsafety hazard because jammingbecause jamming
blocks all calls in the area, not just the annoying ones.blocks all calls in the area, not just the annoying ones.
 Jammers can be used by criminals who break intoJammers can be used by criminals who break into
houses.houses.
 There are concerns that crudely designed jammers mayThere are concerns that crudely designed jammers may
disrupt the functioning of medical devices such asdisrupt the functioning of medical devices such as
pacemakers .pacemakers .
LEGAL ISSUESLEGAL ISSUES
 With the exception of Asian countries blocking cell-With the exception of Asian countries blocking cell-
phone services by the general public is against the lawphone services by the general public is against the law
in most countries like The United States, Unitedin most countries like The United States, United
Kingdom, Australia.Kingdom, Australia.
 The FCC (Federal Communications Commission) inThe FCC (Federal Communications Commission) in
the United States fines for a first offense ranging verythe United States fines for a first offense ranging very
high for each violation or imprisonment and the devicehigh for each violation or imprisonment and the device
used may also be seized and forfeited to theused may also be seized and forfeited to the
government.government.
 Governments are trying to make the best possible useGovernments are trying to make the best possible use
of jammers and planning to relax their restrictions onof jammers and planning to relax their restrictions on
using them in standard places like churches, movieusing them in standard places like churches, movie
theaters and courthouses.theaters and courthouses.
CONCLUSIONCONCLUSION
 Every technology has good aspect as well as bad aspectEvery technology has good aspect as well as bad aspect
the important thing is ,how we are using it.the important thing is ,how we are using it.
 Maybe someday governments will relax theirMaybe someday governments will relax their
restrictions on jammers and they will become standardrestrictions on jammers and they will become standard
in places like churches, movie theaters and courthouses.in places like churches, movie theaters and courthouses.
Until then, only government personnel. and outlawUntil then, only government personnel. and outlaw
jammers will be able to enjoy some peace and quiet atjammers will be able to enjoy some peace and quiet at
the movie theater or the ride via public transportationthe movie theater or the ride via public transportation
to workto work
REFERENCESREFERENCES
 [1][1] Cell phones jammers answer prayers of some. 2004Cell phones jammers answer prayers of some. 2004
Associated Press.p. Appeared on Nov. 2, 2004, editions of theAssociated Press.p. Appeared on Nov. 2, 2004, editions of the
Milwaukee Journal Sentinel.Milwaukee Journal Sentinel.
 [2][2] New Solutions for Cell Phone DetectionNew Solutions for Cell Phone Detection Hong Du; DaliHong Du; Dali
Zhu; Degang Sun, Digital Society, 2007. ICDS apos;07. FirstZhu; Degang Sun, Digital Society, 2007. ICDS apos;07. First
International Conference on the Volume , Issue , Jan. 2007International Conference on the Volume , Issue , Jan. 2007
Page(s):31 - 31Page(s):31 - 31
 [3][3] Eyrolle, H. and J. Cellier, The effects of interruptions inEyrolle, H. and J. Cellier, The effects of interruptions in
work activity: Field and laboratory results. Applied Ergonomics,work activity: Field and laboratory results. Applied Ergonomics,
2000. 31: p. 537-543.2000. 31: p. 537-543.
 [4][4] Knock on wood [cell-phone jamming device] Bansal,Knock on wood [cell-phone jamming device] Bansal,
R.Microwave Magazine, IEEEVolume 5, Issue 1, Mar 2004R.Microwave Magazine, IEEEVolume 5, Issue 1, Mar 2004
Page(s): 38 - 40.Page(s): 38 - 40.
QUERIES ? ? ?QUERIES ? ? ?
Thank YouThank You

More Related Content

What's hot (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Signal jammer
Mobile Signal jammerMobile Signal jammer
Mobile Signal jammer
 

Similar to Cell Phone Jammer Guide

Similar to Cell Phone Jammer Guide (20)

Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Govind
GovindGovind
Govind
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 

More from Saumya Ranjan Behura (20)

Gsm
GsmGsm
Gsm
 
Quadcopters
QuadcoptersQuadcopters
Quadcopters
 
Nano technology
Nano technologyNano technology
Nano technology
 
Miling machine
Miling machineMiling machine
Miling machine
 
Manglev train
Manglev trainManglev train
Manglev train
 
E nose
E noseE nose
E nose
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
 
Night vision
Night visionNight vision
Night vision
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
 
Sensors
SensorsSensors
Sensors
 
Smart card
Smart cardSmart card
Smart card
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Cell Phone Jammer Guide

  • 1. Cell Phone JammerCell Phone Jammer presented by:-presented by:- Saumya Ranjan BehuraSaumya Ranjan Behura
  • 2. CONTENTSCONTENTS 1> what is a Jammer ?1> what is a Jammer ? 2> Size of Jammer .2> Size of Jammer . 3> Why are Jammers used ?3> Why are Jammers used ? 4> How Jammers work ?4> How Jammers work ? 5> Inside a Jammer .5> Inside a Jammer . 6> Range of Jammer .6> Range of Jammer . 7> Good or Bad ?7> Good or Bad ? 8>Legal Issues .8>Legal Issues . 9>Conclusion .9>Conclusion .
  • 3. WHAT IS A "JAMMER"?WHAT IS A "JAMMER"?  Cell phone jammers are devices that create a temporaryCell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate"dead zone" to all cell phone traffic in their immediate proximity.proximity.  A cell phone jammer is an instrument used to preventA cell phone jammer is an instrument used to prevent cellular phones from receiving and transmitting thecellular phones from receiving and transmitting the mobile signals to a base station. When used, the jammermobile signals to a base station. When used, the jammer effectively disables cellular phones in the areaeffectively disables cellular phones in the area..  Other types of jammers include radar jammerOther types of jammers include radar jammer and radio jammerand radio jammer
  • 4.  Some cell-phone jammers are made to look like actualSome cell-phone jammers are made to look like actual phones. Others are briefcase-sized or larger. Thephones. Others are briefcase-sized or larger. The biggest jammers used by police and the military can bebiggest jammers used by police and the military can be mounted in vehicles for convoy security.mounted in vehicles for convoy security. SIZE OF ASIZE OF A JAMMERJAMMER Digital, portable cellphone jammer designed for military and police use
  • 5. Cont..Cont.. A big jammer A portable jammer
  • 6. WHY ARE JAMMERS USED?WHY ARE JAMMERS USED?  A phone jammer provides the ultimate solution in anyA phone jammer provides the ultimate solution in any area where cellular communications frequently causearea where cellular communications frequently cause nuisance either by loud incoming call rings or resultingnuisance either by loud incoming call rings or resulting loud telephone conversations.loud telephone conversations.  Cell phone jamming devices were originally developedCell phone jamming devices were originally developed for law enforcement and the military to interruptfor law enforcement and the military to interrupt communications by criminals and terrorists. Examplescommunications by criminals and terrorists. Examples include:securityzonespublictransport,include:securityzonespublictransport,,,classrooms,, temples,tv & radio stations,jails,govt.buildings,militarytemples,tv & radio stations,jails,govt.buildings,military bases,industries etcbases,industries etc.   .   
  • 7.  During a hostage situation, police can control when andDuring a hostage situation, police can control when and where a captor can make a phone call. Police can blockwhere a captor can make a phone call. Police can block phone calls during a drug raid so suspects can'tphone calls during a drug raid so suspects can't communicate outside the area.communicate outside the area.  Corporations use jammers to stop corporate espionageCorporations use jammers to stop corporate espionage by blocking voice transmissions and photoby blocking voice transmissions and photo transmissions from camera phones.transmissions from camera phones. Cont..Cont..
  • 8. HOW JAMMERS WORKHOW JAMMERS WORK  Jammers block cell phone use by sending out radioJammers block cell phone use by sending out radio waves along the same frequencies that cellular phoneswaves along the same frequencies that cellular phones use at a high enough power that the two signals collideuse at a high enough power that the two signals collide and cancel each other out.and cancel each other out.  This causes interference with theThis causes interference with the communication of cell phonescommunication of cell phones and the towers to render.the phonesand the towers to render.the phones unusableunusable.. On most phones, theOn most phones, the network would appear out of range.network would appear out of range.  SoSo Jammers work by either disruptingJammers work by either disrupting phone to tower frequencies or towerphone to tower frequencies or tower to phone frequenciesto phone frequencies..
  • 10. Cont..Cont..  To jam a cell phone, all you need is a device thatTo jam a cell phone, all you need is a device that broadcasts on the correct frequencies. Althoughbroadcasts on the correct frequencies. Although different cellular systems process signals differently, alldifferent cellular systems process signals differently, all cell-phone networks use radio signals that can becell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-interrupted. GSM, used in digital cellular and PCS- based systems, operates in the 900-MHz and 1800-based systems, operates in the 900-MHz and 1800- MHz bands in Europe and Asia and in the 1900-MHzMHz bands in Europe and Asia and in the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United(sometimes referred to as 1.9-GHz) band in the United States. Jammers can broadcast on any frequency and areStates. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA,GSM andeffective against AMPS, CDMA, TDMA,GSM and Nextel systems.Nextel systems.
  • 11. INSIDE A JAMMERINSIDE A JAMMER ANTENNAANTENNA :: Every jamming device has an antenna toEvery jamming device has an antenna to send the signal. Some are contained withinsend the signal. Some are contained within an electrical cabinet. On stronger devices,an electrical cabinet. On stronger devices, antennas are external to provide longerantennas are external to provide longer range and may be tuned for individualrange and may be tuned for individual frequencies.frequencies.
  • 12. Cont..Cont..  Power supplyPower supply Smaller jamming devices are battery operated. SomeSmaller jamming devices are battery operated. Some look like cell phone and use cell-phone batteries.look like cell phone and use cell-phone batteries. Stronger devices are plugged into a standard outlet orStronger devices are plugged into a standard outlet or wired into a vehicle's electrical systemwired into a vehicle's electrical system..  CircuitryCircuitry The main electronic components of a jammer are:The main electronic components of a jammer are:  Voltage-controlled oscillatorVoltage-controlled oscillator - Generates the radio- Generates the radio signal that will interfere with the cell phone signalsignal that will interfere with the cell phone signal  Tuning circuitTuning circuit - Controls the frequency at which the- Controls the frequency at which the jammer broadcasts its signal by sending a particularjammer broadcasts its signal by sending a particular voltage to the oscillator.voltage to the oscillator.
  • 13. RANGE OF A JAMMERRANGE OF A JAMMER  The actual range of the jammer depends on its powerThe actual range of the jammer depends on its power and the local environment, which may include hills orand the local environment, which may include hills or walls of a building that block the jamming signal.Thewalls of a building that block the jamming signal.The power depends on proximity to towers, indoor andpower depends on proximity to towers, indoor and outdoor settings, even temperature and humidity play aoutdoor settings, even temperature and humidity play a role. Most cell phone jammers come in 2 versions, onerole. Most cell phone jammers come in 2 versions, one for Europe, North Africa and the Gulf states GSMfor Europe, North Africa and the Gulf states GSM networks (900 & 1800) and one for the Americas &networks (900 & 1800) and one for the Americas & Canada (800 & 1900 mhz) networksCanada (800 & 1900 mhz) networks  Most jammers only have a range of about 50 to 80 feetMost jammers only have a range of about 50 to 80 feet and will only effectively jam your immediateand will only effectively jam your immediate surroundings. Low-powered jammers block calls in asurroundings. Low-powered jammers block calls in a range of about 30 feet (9 m).range of about 30 feet (9 m).
  • 14. Cont..Cont..  Higher-powered units create a cell-free zone as large asHigher-powered units create a cell-free zone as large as a football field. Units used by law enforcement can shuta football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km)down service up to 1 mile (1.6 km) from the device.They are availablefrom the device.They are available to cover large structures like officeto cover large structures like office buildings, theaters and churches.buildings, theaters and churches. They look like a miscellaneous boxThey look like a miscellaneous box with wires sticking out & are usuallywith wires sticking out & are usually mounted on walls or ceilings.mounted on walls or ceilings.
  • 15. GOOD OR BADGOOD OR BAD Along with its advantages jammers can be equally usedAlong with its advantages jammers can be equally used for the bad.for the bad.  They can in theory interfere with emergencyThey can in theory interfere with emergency communications between police and rescue personnelcommunications between police and rescue personnel  It also represents aIt also represents a safety hazardsafety hazard because jammingbecause jamming blocks all calls in the area, not just the annoying ones.blocks all calls in the area, not just the annoying ones.  Jammers can be used by criminals who break intoJammers can be used by criminals who break into houses.houses.  There are concerns that crudely designed jammers mayThere are concerns that crudely designed jammers may disrupt the functioning of medical devices such asdisrupt the functioning of medical devices such as pacemakers .pacemakers .
  • 16. LEGAL ISSUESLEGAL ISSUES  With the exception of Asian countries blocking cell-With the exception of Asian countries blocking cell- phone services by the general public is against the lawphone services by the general public is against the law in most countries like The United States, Unitedin most countries like The United States, United Kingdom, Australia.Kingdom, Australia.  The FCC (Federal Communications Commission) inThe FCC (Federal Communications Commission) in the United States fines for a first offense ranging verythe United States fines for a first offense ranging very high for each violation or imprisonment and the devicehigh for each violation or imprisonment and the device used may also be seized and forfeited to theused may also be seized and forfeited to the government.government.  Governments are trying to make the best possible useGovernments are trying to make the best possible use of jammers and planning to relax their restrictions onof jammers and planning to relax their restrictions on using them in standard places like churches, movieusing them in standard places like churches, movie theaters and courthouses.theaters and courthouses.
  • 17. CONCLUSIONCONCLUSION  Every technology has good aspect as well as bad aspectEvery technology has good aspect as well as bad aspect the important thing is ,how we are using it.the important thing is ,how we are using it.  Maybe someday governments will relax theirMaybe someday governments will relax their restrictions on jammers and they will become standardrestrictions on jammers and they will become standard in places like churches, movie theaters and courthouses.in places like churches, movie theaters and courthouses. Until then, only government personnel. and outlawUntil then, only government personnel. and outlaw jammers will be able to enjoy some peace and quiet atjammers will be able to enjoy some peace and quiet at the movie theater or the ride via public transportationthe movie theater or the ride via public transportation to workto work
  • 18. REFERENCESREFERENCES  [1][1] Cell phones jammers answer prayers of some. 2004Cell phones jammers answer prayers of some. 2004 Associated Press.p. Appeared on Nov. 2, 2004, editions of theAssociated Press.p. Appeared on Nov. 2, 2004, editions of the Milwaukee Journal Sentinel.Milwaukee Journal Sentinel.  [2][2] New Solutions for Cell Phone DetectionNew Solutions for Cell Phone Detection Hong Du; DaliHong Du; Dali Zhu; Degang Sun, Digital Society, 2007. ICDS apos;07. FirstZhu; Degang Sun, Digital Society, 2007. ICDS apos;07. First International Conference on the Volume , Issue , Jan. 2007International Conference on the Volume , Issue , Jan. 2007 Page(s):31 - 31Page(s):31 - 31  [3][3] Eyrolle, H. and J. Cellier, The effects of interruptions inEyrolle, H. and J. Cellier, The effects of interruptions in work activity: Field and laboratory results. Applied Ergonomics,work activity: Field and laboratory results. Applied Ergonomics, 2000. 31: p. 537-543.2000. 31: p. 537-543.  [4][4] Knock on wood [cell-phone jamming device] Bansal,Knock on wood [cell-phone jamming device] Bansal, R.Microwave Magazine, IEEEVolume 5, Issue 1, Mar 2004R.Microwave Magazine, IEEEVolume 5, Issue 1, Mar 2004 Page(s): 38 - 40.Page(s): 38 - 40.
  • 19. QUERIES ? ? ?QUERIES ? ? ? Thank YouThank You