SlideShare a Scribd company logo
Presented by,
B. Rama
Software Engineer
CONTENTS
 What is MOBILE JAMMER?
 History
 Working of MOBILE JAMMER
 Techniques
 Applications
 Future scope
 Conclusion
What is MOBILE JAMMER?
• MOBILE JAMMER is used to prevent mobile phones from
receiving or transmitting signals with the base station .
• Mobile Jammer can be used in practically any location but are
used in places where a phone call would be particularly disruptive
like Temples,Hospitals,Libraries,Cinemahalls,Schools and
Colleges etc.
HISTORY:
MOBILE JAMMER were originally developed for law enforcement
and the military to interrupt communication by criminals and
terrorists.
Some were also designed to foil the use of certain remotely
detonated explosives .
Working of MOBILE JAMMER :
A Jamming device
transmits on the same radio
frequencies as the cellphone,
disrupting the communication
between the phone and
cellphone base station in the
tower.
It is called Denial of
Service Attack.
JAMMING TECHNIQUES:
1.Type “A” Device : JAMMERS
2.Type “B” Device : INTELLIGENT CELLULAR DISABLERS
3.Type “C” Device : INTELLIGENT BEACON DISABLERS
4.Type “D” Device : DIRECT RECEIVE AND TRANSMIT
JAMMERS
5.Type “E” Device : EMI SHIELD-PASSIVE JAMMING
Jamming Techniques
1. Type “A” Device: Jammers :-
This type of device comes equipped with several
independent oscilators transmitting ‘jamming signals’ capable of
blocking frequiencies used by paging devices as well as those used by
cellular systems control channels for call establishment.
Jamming Techniques
2. Type “B” Device: Intelligent Cellular Disablers :-
Unlike Jammers,type ‘B’ devices do not transmit and interfering
signal on the control channels.The device when located in a
designated ‘quiet’ area functions such as ‘detector’. It has a unique
identification number for communicating with the cellular base
station.
Jamming Techniques
3. Type “C” Device :Intelligent Beacon Disablers :-
Unlike Jammers , type “C” devices do not transmit an
interfering signal on the control channels .The device when located
in a designated ‘quiet’ area, functions such as ‘Beacon’ and any
compatible terminal is instructed to disable its ringer or disable its
operation , while within the coverage area of beacon.
Jamming Techniques
4. Type “D” Device : Direct Receive And Transmit
Jammers :-
This jammer behaves like a small, independent and
portable base station , which can directly interact intelligently or
unintelligently with the operation of the local mobile phone.
Jamming Techniques
5. Type “E” Device : EMI Shield-Passive Jamming :-
This technique is using EMI suppression technique to make a
room into what is called faraday cage. Although labor intensive to
construct , the faraday cage essentially blocks or greatly attenuates,
virtually all electromagnetic radiation from entering or leaving the
cage or in this cage a target room.
APPLICATIONS
Jammers can be used in areas where transmissions are dangerous
such as chemical storage facilities or grain elevators.
Corporations use jammers to stop corporate espionage by blocking
voice transmissions and photo transmissions from camera phones .
For providing calm and peaceful atmosphere in hospitals.
To maintain the complete silence in library and lecture hall .
To avoid the fraud in examination hall .
Applications
FUTURE SCOPE
While the law clearly prohibits using a device to actively disrupt a
cell-phone signal , there are no rules against passive cell phone
blocking .
Companies are working on devices that control a cell phone but do
not “jam the signal” .
GOOD ASPECT
CONCLUSION
Every device is acts as good aspect as well as bad aspects .
Jamming is seen as property theft ,safety hazard .
But it’s overall performance is very good and helpful in our life .
Mobile Jammers

More Related Content

Similar to Mobile Jammers

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
LingaSwamy10
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
Sudhanshu kumar Sah
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
akash roy
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
kishan alagiya
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
Amit sundaray
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
Govind
GovindGovind
Govind
Garima Singh
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
VinodDoddaka
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
Mukul Agarwal
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 

Similar to Mobile Jammers (20)

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Ceplone
CeploneCeplone
Ceplone
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Govind
GovindGovind
Govind
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Mobile Jammers

  • 2. CONTENTS  What is MOBILE JAMMER?  History  Working of MOBILE JAMMER  Techniques  Applications  Future scope  Conclusion
  • 3. What is MOBILE JAMMER? • MOBILE JAMMER is used to prevent mobile phones from receiving or transmitting signals with the base station . • Mobile Jammer can be used in practically any location but are used in places where a phone call would be particularly disruptive like Temples,Hospitals,Libraries,Cinemahalls,Schools and Colleges etc.
  • 4. HISTORY: MOBILE JAMMER were originally developed for law enforcement and the military to interrupt communication by criminals and terrorists. Some were also designed to foil the use of certain remotely detonated explosives .
  • 5. Working of MOBILE JAMMER : A Jamming device transmits on the same radio frequencies as the cellphone, disrupting the communication between the phone and cellphone base station in the tower. It is called Denial of Service Attack.
  • 6. JAMMING TECHNIQUES: 1.Type “A” Device : JAMMERS 2.Type “B” Device : INTELLIGENT CELLULAR DISABLERS 3.Type “C” Device : INTELLIGENT BEACON DISABLERS 4.Type “D” Device : DIRECT RECEIVE AND TRANSMIT JAMMERS 5.Type “E” Device : EMI SHIELD-PASSIVE JAMMING
  • 7. Jamming Techniques 1. Type “A” Device: Jammers :- This type of device comes equipped with several independent oscilators transmitting ‘jamming signals’ capable of blocking frequiencies used by paging devices as well as those used by cellular systems control channels for call establishment.
  • 8. Jamming Techniques 2. Type “B” Device: Intelligent Cellular Disablers :- Unlike Jammers,type ‘B’ devices do not transmit and interfering signal on the control channels.The device when located in a designated ‘quiet’ area functions such as ‘detector’. It has a unique identification number for communicating with the cellular base station.
  • 9. Jamming Techniques 3. Type “C” Device :Intelligent Beacon Disablers :- Unlike Jammers , type “C” devices do not transmit an interfering signal on the control channels .The device when located in a designated ‘quiet’ area, functions such as ‘Beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation , while within the coverage area of beacon.
  • 10. Jamming Techniques 4. Type “D” Device : Direct Receive And Transmit Jammers :- This jammer behaves like a small, independent and portable base station , which can directly interact intelligently or unintelligently with the operation of the local mobile phone.
  • 11. Jamming Techniques 5. Type “E” Device : EMI Shield-Passive Jamming :- This technique is using EMI suppression technique to make a room into what is called faraday cage. Although labor intensive to construct , the faraday cage essentially blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage or in this cage a target room.
  • 12. APPLICATIONS Jammers can be used in areas where transmissions are dangerous such as chemical storage facilities or grain elevators. Corporations use jammers to stop corporate espionage by blocking voice transmissions and photo transmissions from camera phones . For providing calm and peaceful atmosphere in hospitals. To maintain the complete silence in library and lecture hall . To avoid the fraud in examination hall .
  • 14. FUTURE SCOPE While the law clearly prohibits using a device to actively disrupt a cell-phone signal , there are no rules against passive cell phone blocking . Companies are working on devices that control a cell phone but do not “jam the signal” .
  • 16. CONCLUSION Every device is acts as good aspect as well as bad aspects . Jamming is seen as property theft ,safety hazard . But it’s overall performance is very good and helpful in our life .