SlideShare a Scribd company logo
Seminar
On
MOBILE
JAMMER
V.Rakesh kumar
195D1A0587
Content
• What is Mobile Jammer?
• History.
• How Mobile Jammer works?
• Jamming Techniques.
• Types of Jammer Device.
• Application.
• Advantages.
• Disadvantages.
• Future scope of Jamming Technology.
• Conclusion.
2
What is Mobile Jammer?
•A mobile phone jammer is an instrument used to
prevent cellular phones from receiving signals
from base stations.
•It is a device that transmit signal on the same
frequency at which the GSM system operates, the
jamming success when the mobile phones in the
area where the jammer is located are disabled.
3
History
•Mobile Jammer were originally developed for law
enforcement and the military to interrupt
communications by criminals and terrorists.
•Some were also designed to foil the use of certain
remotely detonated explosives.
4
5
A jamming device transmits - same radio frequencies of
greater power as the cell phone, disrupting the
communication between the phone and the cell-phone
base station in the tower. It's a called a denial-of-service
attack.
How Mobile jammer works
•This causes interference with communication of cell
phones and towers to render the phones unusable.
On most phones, the network would be out of range.
•So Jammers work by either disrupting phone to tower
freq.. or tower to phone frequencies.
6
Jamming Techniques
• Type "A" Device: JAMMERS
• Type “B” Device: INTELLIGENT CELLULAR DISABLERS
• Type “C” Device: INTELLIGENT BEACON DISABLERS
• Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
• Type “E” Device: EMI SHIELD - PASSIVE JAMMING
7
Jamming Techniques
1. Type "A" Device: JAMMERS
This type of device comes equipped with several
independent oscillators transmitting ’jamming signals’
capable of blocking frequencies used by paging devices as
well as those used by cellular systems control channels
for call establishment.
8
Jamming Techniques
2.Type “B” Device: INTELLIGENT CELLULAR
DISABLERS
Unlike jammers, Type ”B” devices do not transmit
an interfering signal on the control channels. The
device, when located in a designated ’quite’ area,
functions as a ’detector’. It has a unique
identification number for communicating with the
cellular base station.
9
Jamming Techniques
3. Type “C” Device (Intelligent Beacon Disablers)
Unlike jammers, Type C devices do not transmit an
interfering signal on the control channels. The
device, when located in a designated ’quiet’ area,
functions as a ’beacon’ and any compatible terminal
is instructed to disable its ringer or disable its
operation, while within the coverage area of
beacon.
10
Jamming Techniques
4. Type “D” Device (Direct Receive & Transmit Jammers)
This jammer behaves like a small, independent and
portable base station, which can directly interact
intelligently or unintelligently with the operation of the
local mobile phone. The jammer is predominantly in
receive mode and will intelligently choose to interact and
block the cell Phone directly if it is within close proximity
of the jammer.
11
Jamming Techniques
5. Type E Device (EMI Shield - Passive Jamming)
This technique is using EMI suppression techniques to
make a room into what is called Faraday cage. Although
labor intensive to construct, the Faraday cage essentially
Blocks or greatly attenuates, virtually all electromagnetic
radiation from entering or leaving the cage - or in this
case a target room.
12
Amity university rajasthan 13
Contd.
Mobile Jammer
Types of Jammer Device
Types of cell phone jammer device. There are many types of cell
phone jammer device which is used in our daily life .as we take a
example of class room, where we does not want to use of cell
phone than there we can use cell phone jammer device. By this we
can produce the interface between the cell phone base station and
cell phone. resulting it disconnect the cell from base station. and
we can not receive the any calls from base station.
For this there are many types of cell phone jammer devices which is
given as below:
17
. Remote Control Mobile jammer
. Adjustable Mobile Jammer
. School &Prison Mobile Jammer
. Explosion – Proof Mobile jammer
. Police & Military Mobile Jammer
. Portable Mobile Jammer
18
19
Application
• To maintain the complete silence in library and lecture hall
• To avoid fraud in examination hall
• To avoid disturbance in class room
• For providing security in business conference, board of directors
rooms, seminars, etc.,
• For providing calm and peaceful atmosphere in Hospitals
• Church/Mosques/Cathedral/Temple/Religious establishment
17
Advantages
• Easy to operate.
• Low power consumption.
• Efficient design.
• No need for training.
• Fast response.
• Simple and Reliable Desing.
Disadvantages
• Radiation harmful for humans.
• We may lose some important calls.
Future scope of Jamming Technology
• While the law clearly prohibits using a device to actively disrupt a
cell-phone signal, there are no rules against passive cell-phone
blocking.
• Companies are working on devices that control a cell phone but
do not "jam the signal.
20
Conclusion
•Every technology has good aspect as well as bad
aspect the important thing is, how we are using it.
•Cell phone jammers are very useful to the society
from the anti-social elements. We can save our
national leaders. we can restrict the communication
network between the anti-social elements by using
the Mobile jammers. Cell phone jammers prevent the
students from carrying cell phones to the colleges.
21
ANY QUERIES ?
•
Thank YOU

More Related Content

Similar to mobile jammer.ppt_082549-2(1).pptx

Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
Amit sundaray
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
Prejith Pavanan
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
RamaBoya2
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
VinodDoddaka
 
Govind
GovindGovind
Govind
Garima Singh
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
Mukul Agarwal
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
HarshiniR23
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
mgnboy
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
DyarAbubakr
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
Presentation1
Presentation1Presentation1
Presentation1
poojithakannikanti
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
IJMER
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Aditya Kumar Tripathy
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 

Similar to mobile jammer.ppt_082549-2(1).pptx (20)

Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Ceplone
CeploneCeplone
Ceplone
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Govind
GovindGovind
Govind
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Presentation1
Presentation1Presentation1
Presentation1
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

mobile jammer.ppt_082549-2(1).pptx

  • 2. Content • What is Mobile Jammer? • History. • How Mobile Jammer works? • Jamming Techniques. • Types of Jammer Device. • Application. • Advantages. • Disadvantages. • Future scope of Jamming Technology. • Conclusion. 2
  • 3. What is Mobile Jammer? •A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. •It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. 3
  • 4. History •Mobile Jammer were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. •Some were also designed to foil the use of certain remotely detonated explosives. 4
  • 5. 5 A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack. How Mobile jammer works
  • 6. •This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range. •So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. 6
  • 7. Jamming Techniques • Type "A" Device: JAMMERS • Type “B” Device: INTELLIGENT CELLULAR DISABLERS • Type “C” Device: INTELLIGENT BEACON DISABLERS • Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS • Type “E” Device: EMI SHIELD - PASSIVE JAMMING 7
  • 8. Jamming Techniques 1. Type "A" Device: JAMMERS This type of device comes equipped with several independent oscillators transmitting ’jamming signals’ capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. 8
  • 9. Jamming Techniques 2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS Unlike jammers, Type ”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It has a unique identification number for communicating with the cellular base station. 9
  • 10. Jamming Techniques 3. Type “C” Device (Intelligent Beacon Disablers) Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 10
  • 11. Jamming Techniques 4. Type “D” Device (Direct Receive & Transmit Jammers) This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and block the cell Phone directly if it is within close proximity of the jammer. 11
  • 12. Jamming Techniques 5. Type E Device (EMI Shield - Passive Jamming) This technique is using EMI suppression techniques to make a room into what is called Faraday cage. Although labor intensive to construct, the Faraday cage essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage - or in this case a target room. 12
  • 13. Amity university rajasthan 13 Contd. Mobile Jammer
  • 14. Types of Jammer Device Types of cell phone jammer device. There are many types of cell phone jammer device which is used in our daily life .as we take a example of class room, where we does not want to use of cell phone than there we can use cell phone jammer device. By this we can produce the interface between the cell phone base station and cell phone. resulting it disconnect the cell from base station. and we can not receive the any calls from base station. For this there are many types of cell phone jammer devices which is given as below: 17
  • 15. . Remote Control Mobile jammer . Adjustable Mobile Jammer . School &Prison Mobile Jammer . Explosion – Proof Mobile jammer . Police & Military Mobile Jammer . Portable Mobile Jammer 18
  • 16. 19
  • 17. Application • To maintain the complete silence in library and lecture hall • To avoid fraud in examination hall • To avoid disturbance in class room • For providing security in business conference, board of directors rooms, seminars, etc., • For providing calm and peaceful atmosphere in Hospitals • Church/Mosques/Cathedral/Temple/Religious establishment 17
  • 18. Advantages • Easy to operate. • Low power consumption. • Efficient design. • No need for training. • Fast response. • Simple and Reliable Desing.
  • 19. Disadvantages • Radiation harmful for humans. • We may lose some important calls.
  • 20. Future scope of Jamming Technology • While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. • Companies are working on devices that control a cell phone but do not "jam the signal. 20
  • 21. Conclusion •Every technology has good aspect as well as bad aspect the important thing is, how we are using it. •Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti-social elements by using the Mobile jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. 21