SlideShare a Scribd company logo
CELL PHONE JAMMER
Presented by:-
Name- Aditya Kumar Tripathy
Regd. No.- 1241019150
Section- A
CONTENTS
• Introduction
• Jamming Techniques.
• Design Parameters.
• Components of the Jammer device.
• How mobile Jammer works?
• Applications.
• Conclusion.
2
INTRODUCTION
• Cell phones are everywhere these days. According to the Cellular
Telecommunications and Internet Association, approx. 1000 million people in
India had cell-phone service.
• Due to wide use of mobile phones it creates some problems as the sound of
ringing becomes annoying or disrupting.
• A cell phone jammer is a device that blocks transmission or reception of
signals, usually by creating some form of interference at the same frequency
ranges that cell phones use.
• As a result, a cell phone user will either lose the signal or experience a
significant loss of signal quality.
3
IMAGE
Mobile jammer blocking signals in a meeting. Image courtesy: [1]
4
JAMMING TECHNIQUES
1. Spoofing.
2. Shielding Attacks.
3. Denial of Service .
5
DESIGN PARAMETERS
1. Distance to be Jammed(D).
2. Frequency Bands.
3. Jamming-to-signal ratio{J/S} :-
• Jamming is successful when the jamming signal denies the usability of the
communication transmission.
UPLINK DOWNLINK
GSM 900 890-915 MHz 935-960 MHz
GSM/DCS 1800 1710-1785 MHz 1805-1880 MHz
6
DESIGN PARAMETERS
(Continued)
• A successful jamming attack requires that the jammer power is
roughly equal to signal power at the receiver (mobile device).
• The general equation of the jamming-to-signal ratio is given as
follows:
𝐽
𝑆
=
𝑃𝑗 𝐺𝑗𝑟 𝐺 𝑟𝑗 𝑅𝑡𝑟
2
𝐿 𝑟 𝐵𝑟
𝑃𝑡 𝐺𝑡𝑟 𝐺 𝑟𝑡 𝑅𝑗𝑟
2
𝐿𝑗 𝐵𝑗
7
DESIGN PARAMETERS
(Continued)
4. Free space loss {F}:
The free-space loss (or path loss) is given by:
Path loss (db) = 32.44 + 20 log d (km) + 20 log f (MHz).
• The maximum free space loss (worst case F) happens when the maximum
frequency is used in the above equation.
8
COMPONENTS OF THE JAMMER
DEVICE
 The simplest just have an on/off switch and a light that indicates it's on.
 Complex devices have switches to activate jamming at different frequencies.
 Main Components :
 Power Supply
 Circuitry
 Antenna
9
COMPONENTS (Continued)
Jammer consists of 3 main blocks.
Power
Supply
IF- Section RF- Section
Jamming
Signal
10
COMPONENTS (Continued)
1. The IF-Section :-
i. Triangle wave generator.
ii. Noise generator.
iii. Mixer “Summer”.
2. The RF-Section :-
i. The voltage controlled oscillator(VCO).
ii. The power amplifier.
iii. The antenna.
11
HOW CELL PHONE JAMMER
WORK ?
• Cell phone jammers work in a similar way to radio jammers by sending out the same radio
frequencies that cell phones operate on.
• This creates enough interference so that a call cannot connect with a cellphone.
• 2 types of jammers. The first type are usually smaller devices that block the signals coming
from cell phone towers to individual cell phones.
• Can block signals within about a 30-foot radius. Cell phones within this range simply show no
signal.
• The second type of cell phone jammer is usually much larger in size and more powerful.
• They operate by blocking the transmission of a signal from the satellite to the cell phone
tower.
12
HOW JAMMER WORK ? (Continued)
Image courtesy: [1]
13
HOW JAMMER WORK ? (Continued)
Mobile phone intelligent jamming system block diagram
Triangular
wave Gen.
Noise Gen.
MIXER VCO
Mobile
Detector
PIC
16F84
Power Amp.
Power Amp
Synthesizer
RF
Switch
14
Image courtesy: [1]15
APPLICATIONS
1. To maintain the complete silence in library and lecture hall
2. To avoid fraud in examination hall.
3. To avoid disturbance in class room.
4. For providing security in business conference, board of directors rooms, seminars, etc.,
5. For providing calm and peaceful atmosphere in Hospitals
6. The jammer also stops Internet use through Wi-Fi network and even blocks Bluetooth
connections.
7. The cell phone signal jammer also puts an end to text messaging, so students cannot SMS
each other, while the teacher is trying to teach.
16
FUTURE SCOPE
•While the law clearly prohibits using a device to
actively disrupt a cell-phone signal, there are no rules
against passive cell-phone blocking.
•Companies are working on devices that control a cell
phone but do not "jam the signal.
17
CONCLUSION
• We can say every device is acts as good aspects as well as bad
aspects.
• Operating or even owning a cell phone jammer is illegal in most
countries.
• Jamming is seen as Property Theft, Safety Hazard.
• In many place cell phone jammer is useful but at many place it is a
problem .
• But it’s overall performance is very good and helpful in our life.
18
REFRENCES
[1] Ibrahim Patel, Ragha vedra Kulkarni, Junaid Ali Khan, “INTELLIGENT FM
SIGNAL JAMMING SYSTEM”,IEEE Third International Conference on
Computing, Communication and Networking Technologies (ICCCNT'12),26th -
28th July 2012.
19
20

More Related Content

What's hot

Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
Taruni Kancharla
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
Amar Raj
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
akash roy
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
xiha tareen
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
Mukul Agarwal
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
Bhadra Gowdra
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
elprocus
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on JammingAbdul Haseeb
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 

What's hot (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 

Viewers also liked

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerAlok Gupta
 
How cell phone work?(mobile communication)
How cell phone work?(mobile communication)How cell phone work?(mobile communication)
How cell phone work?(mobile communication)
kgaurav113
 
Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...
Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...
Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...
Neha Kumar
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdfManu M
 
10 range and doppler measurements in radar systems
10 range and doppler measurements in radar systems10 range and doppler measurements in radar systems
10 range and doppler measurements in radar systems
Solo Hermelin
 
Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiation
Naveen Kumar
 
Publi2
Publi2Publi2
Publi2
HectorAbela
 
XXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSISXXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSIS
keshialavallsmith
 
Glosario
GlosarioGlosario
Glosario
paulamglez
 
Rabish kumar singh QA Engineer 3 years experience
Rabish kumar singh QA Engineer 3 years experienceRabish kumar singh QA Engineer 3 years experience
Rabish kumar singh QA Engineer 3 years experience
Ravish Singh
 
Постен Триод - 2-ра част
Постен Триод - 2-ра частПостен Триод - 2-ра част
Постен Триод - 2-ра част
Petar Vasilev
 
Newsletter 2 HISTORIC PORT OF WASHINGTON Mar 11.16.
Newsletter 2 HISTORIC PORT OF WASHINGTON  Mar 11.16.Newsletter 2 HISTORIC PORT OF WASHINGTON  Mar 11.16.
Newsletter 2 HISTORIC PORT OF WASHINGTON Mar 11.16.
Gillian H. Jones MBA MPH
 
Jeffrey minor resume
Jeffrey minor resumeJeffrey minor resume
Jeffrey minor resume
Jeff Minor
 
Molly Ryan interview EDITS
Molly Ryan interview EDITSMolly Ryan interview EDITS
Molly Ryan interview EDITSMalcolm Lenore
 
Presentacion
PresentacionPresentacion
Presentacion
javier_ot99
 
XXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSISXXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSIS
keshialavallsmith
 
Do mobiles devices assist learning?
Do mobiles devices assist learning?Do mobiles devices assist learning?
Do mobiles devices assist learning?
Assistive Technologies
 
bruno mars
bruno marsbruno mars
bruno mars
332245
 

Viewers also liked (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Simple cell phone jammer
Simple cell phone jammerSimple cell phone jammer
Simple cell phone jammer
 
How cell phone work?(mobile communication)
How cell phone work?(mobile communication)How cell phone work?(mobile communication)
How cell phone work?(mobile communication)
 
Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...
Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...
Cell Tower Radiation Danger and Solutions Proposed to Government - Prof. Giri...
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
10 range and doppler measurements in radar systems
10 range and doppler measurements in radar systems10 range and doppler measurements in radar systems
10 range and doppler measurements in radar systems
 
Mobile tower radiation
Mobile tower radiationMobile tower radiation
Mobile tower radiation
 
Publi2
Publi2Publi2
Publi2
 
XXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSISXXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSIS
 
Glosario
GlosarioGlosario
Glosario
 
Rabish kumar singh QA Engineer 3 years experience
Rabish kumar singh QA Engineer 3 years experienceRabish kumar singh QA Engineer 3 years experience
Rabish kumar singh QA Engineer 3 years experience
 
Постен Триод - 2-ра част
Постен Триод - 2-ра частПостен Триод - 2-ра част
Постен Триод - 2-ра част
 
Newsletter 2 HISTORIC PORT OF WASHINGTON Mar 11.16.
Newsletter 2 HISTORIC PORT OF WASHINGTON  Mar 11.16.Newsletter 2 HISTORIC PORT OF WASHINGTON  Mar 11.16.
Newsletter 2 HISTORIC PORT OF WASHINGTON Mar 11.16.
 
Jeffrey minor resume
Jeffrey minor resumeJeffrey minor resume
Jeffrey minor resume
 
Neurafy_EN
Neurafy_ENNeurafy_EN
Neurafy_EN
 
Molly Ryan interview EDITS
Molly Ryan interview EDITSMolly Ryan interview EDITS
Molly Ryan interview EDITS
 
Presentacion
PresentacionPresentacion
Presentacion
 
XXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSISXXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSIS
 
Do mobiles devices assist learning?
Do mobiles devices assist learning?Do mobiles devices assist learning?
Do mobiles devices assist learning?
 
bruno mars
bruno marsbruno mars
bruno mars
 

Similar to Cell phone jammer

Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
LingaSwamy10
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
kishan alagiya
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd Iaetsd
 
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
Govind
GovindGovind
Govind
Garima Singh
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
Prejith Pavanan
 
Mobile Jammer.pptx
Mobile Jammer.pptxMobile Jammer.pptx
Mobile Jammer.pptx
FahisMohammed2
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
IRJET Journal
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
mgnboy
 
GSM Mobile Phone Jammer
GSM Mobile Phone JammerGSM Mobile Phone Jammer
GSM Mobile Phone Jammer
ijsrd.com
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
Amit sundaray
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
PREMKUMAR
 
Jammer final report
Jammer final reportJammer final report
Jammer final reportalullah
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
VinodDoddaka
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
HarshiniR23
 

Similar to Cell phone jammer (20)

Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Govind
GovindGovind
Govind
 
Ceplone
CeploneCeplone
Ceplone
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Mobile Jammer.pptx
Mobile Jammer.pptxMobile Jammer.pptx
Mobile Jammer.pptx
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
GSM Mobile Phone Jammer
GSM Mobile Phone JammerGSM Mobile Phone Jammer
GSM Mobile Phone Jammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
 

More from Aditya Kumar Tripathy

SQL for interview
SQL for interviewSQL for interview
SQL for interview
Aditya Kumar Tripathy
 
Remote control using 4 channel Relay
Remote control using 4 channel RelayRemote control using 4 channel Relay
Remote control using 4 channel Relay
Aditya Kumar Tripathy
 
Voice controlled Robot
Voice controlled RobotVoice controlled Robot
Voice controlled Robot
Aditya Kumar Tripathy
 
Protection of Converter Dense Power Systems
Protection of Converter Dense Power Systems Protection of Converter Dense Power Systems
Protection of Converter Dense Power Systems
Aditya Kumar Tripathy
 
SUPERCONDUCTING MAGNETIC ENERGY STORAGE SYSTEM (SMES)
SUPERCONDUCTING  MAGNETIC ENERGY  STORAGE  SYSTEM  (SMES)SUPERCONDUCTING  MAGNETIC ENERGY  STORAGE  SYSTEM  (SMES)
SUPERCONDUCTING MAGNETIC ENERGY STORAGE SYSTEM (SMES)
Aditya Kumar Tripathy
 
Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...
Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...
Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...
Aditya Kumar Tripathy
 
Plasma antenna
Plasma antennaPlasma antenna
Plasma antenna
Aditya Kumar Tripathy
 

More from Aditya Kumar Tripathy (7)

SQL for interview
SQL for interviewSQL for interview
SQL for interview
 
Remote control using 4 channel Relay
Remote control using 4 channel RelayRemote control using 4 channel Relay
Remote control using 4 channel Relay
 
Voice controlled Robot
Voice controlled RobotVoice controlled Robot
Voice controlled Robot
 
Protection of Converter Dense Power Systems
Protection of Converter Dense Power Systems Protection of Converter Dense Power Systems
Protection of Converter Dense Power Systems
 
SUPERCONDUCTING MAGNETIC ENERGY STORAGE SYSTEM (SMES)
SUPERCONDUCTING  MAGNETIC ENERGY  STORAGE  SYSTEM  (SMES)SUPERCONDUCTING  MAGNETIC ENERGY  STORAGE  SYSTEM  (SMES)
SUPERCONDUCTING MAGNETIC ENERGY STORAGE SYSTEM (SMES)
 
Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...
Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...
Design and Implementation of a Robotic Vehicle With Real-Time Video Feedback ...
 
Plasma antenna
Plasma antennaPlasma antenna
Plasma antenna
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Cell phone jammer

  • 1. CELL PHONE JAMMER Presented by:- Name- Aditya Kumar Tripathy Regd. No.- 1241019150 Section- A
  • 2. CONTENTS • Introduction • Jamming Techniques. • Design Parameters. • Components of the Jammer device. • How mobile Jammer works? • Applications. • Conclusion. 2
  • 3. INTRODUCTION • Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, approx. 1000 million people in India had cell-phone service. • Due to wide use of mobile phones it creates some problems as the sound of ringing becomes annoying or disrupting. • A cell phone jammer is a device that blocks transmission or reception of signals, usually by creating some form of interference at the same frequency ranges that cell phones use. • As a result, a cell phone user will either lose the signal or experience a significant loss of signal quality. 3
  • 4. IMAGE Mobile jammer blocking signals in a meeting. Image courtesy: [1] 4
  • 5. JAMMING TECHNIQUES 1. Spoofing. 2. Shielding Attacks. 3. Denial of Service . 5
  • 6. DESIGN PARAMETERS 1. Distance to be Jammed(D). 2. Frequency Bands. 3. Jamming-to-signal ratio{J/S} :- • Jamming is successful when the jamming signal denies the usability of the communication transmission. UPLINK DOWNLINK GSM 900 890-915 MHz 935-960 MHz GSM/DCS 1800 1710-1785 MHz 1805-1880 MHz 6
  • 7. DESIGN PARAMETERS (Continued) • A successful jamming attack requires that the jammer power is roughly equal to signal power at the receiver (mobile device). • The general equation of the jamming-to-signal ratio is given as follows: 𝐽 𝑆 = 𝑃𝑗 𝐺𝑗𝑟 𝐺 𝑟𝑗 𝑅𝑡𝑟 2 𝐿 𝑟 𝐵𝑟 𝑃𝑡 𝐺𝑡𝑟 𝐺 𝑟𝑡 𝑅𝑗𝑟 2 𝐿𝑗 𝐵𝑗 7
  • 8. DESIGN PARAMETERS (Continued) 4. Free space loss {F}: The free-space loss (or path loss) is given by: Path loss (db) = 32.44 + 20 log d (km) + 20 log f (MHz). • The maximum free space loss (worst case F) happens when the maximum frequency is used in the above equation. 8
  • 9. COMPONENTS OF THE JAMMER DEVICE  The simplest just have an on/off switch and a light that indicates it's on.  Complex devices have switches to activate jamming at different frequencies.  Main Components :  Power Supply  Circuitry  Antenna 9
  • 10. COMPONENTS (Continued) Jammer consists of 3 main blocks. Power Supply IF- Section RF- Section Jamming Signal 10
  • 11. COMPONENTS (Continued) 1. The IF-Section :- i. Triangle wave generator. ii. Noise generator. iii. Mixer “Summer”. 2. The RF-Section :- i. The voltage controlled oscillator(VCO). ii. The power amplifier. iii. The antenna. 11
  • 12. HOW CELL PHONE JAMMER WORK ? • Cell phone jammers work in a similar way to radio jammers by sending out the same radio frequencies that cell phones operate on. • This creates enough interference so that a call cannot connect with a cellphone. • 2 types of jammers. The first type are usually smaller devices that block the signals coming from cell phone towers to individual cell phones. • Can block signals within about a 30-foot radius. Cell phones within this range simply show no signal. • The second type of cell phone jammer is usually much larger in size and more powerful. • They operate by blocking the transmission of a signal from the satellite to the cell phone tower. 12
  • 13. HOW JAMMER WORK ? (Continued) Image courtesy: [1] 13
  • 14. HOW JAMMER WORK ? (Continued) Mobile phone intelligent jamming system block diagram Triangular wave Gen. Noise Gen. MIXER VCO Mobile Detector PIC 16F84 Power Amp. Power Amp Synthesizer RF Switch 14
  • 16. APPLICATIONS 1. To maintain the complete silence in library and lecture hall 2. To avoid fraud in examination hall. 3. To avoid disturbance in class room. 4. For providing security in business conference, board of directors rooms, seminars, etc., 5. For providing calm and peaceful atmosphere in Hospitals 6. The jammer also stops Internet use through Wi-Fi network and even blocks Bluetooth connections. 7. The cell phone signal jammer also puts an end to text messaging, so students cannot SMS each other, while the teacher is trying to teach. 16
  • 17. FUTURE SCOPE •While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. •Companies are working on devices that control a cell phone but do not "jam the signal. 17
  • 18. CONCLUSION • We can say every device is acts as good aspects as well as bad aspects. • Operating or even owning a cell phone jammer is illegal in most countries. • Jamming is seen as Property Theft, Safety Hazard. • In many place cell phone jammer is useful but at many place it is a problem . • But it’s overall performance is very good and helpful in our life. 18
  • 19. REFRENCES [1] Ibrahim Patel, Ragha vedra Kulkarni, Junaid Ali Khan, “INTELLIGENT FM SIGNAL JAMMING SYSTEM”,IEEE Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12),26th - 28th July 2012. 19
  • 20. 20