SlideShare a Scribd company logo
Department of Computer Science & Engineering
MLR INSTITUTE OF TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043.
2016-17
A
TECHNICAL SEMINAR
on
“MOBILE JAMMER”
Submitted in partial fulfillment of the
Requirements for the award of the degree of
Bachelor of Technology
In
Computer Science & Engineering
By
N.DEEKSHITH -13R21A0529
UNDER THE GUIDANCE OF
Mr. P.DAYAKAR (Associate professor)
Department of Computer Science & Engineering
MLR INSTITUTE OF TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043.
CERTIFICATE
This is to certify that the project entitled “MOBILE JAMMER” by,
N.DEEKSHITH (13R21A0529) , has been submitted in the partial fulfillment of the
requirements for the award of degree of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results
embodied in this project have not been submitted to any other University or Institution for
the award of any degree or diploma.
Internal Guide Head of the Department
Mr. P.DAYAKAR Dr N.CHANDRA SEKHAR REDDY
Associate Professor Professor
DECLARATION
I hereby declare that the project entitled “MOBILE JAMMER” is the work done
during the period of March 2017 and is submitted in the partial fulfillment of the
requirements for the award of degree of Bachelor of technology in Computer Science and
Engineering from Jawaharlal Nehru Technology University, Hyderabad. The results
embodied in this project have not been submitted to any other university or Institution for
the award of any degree or diploma.
N.DEEKSHITH (13R21A0529)
ACKNOWLEDGEMENT
There are many people who helped me directly and indirectly to complete my project
successfully. I would like to take this opportunity to thank one and all.
First of all I would like to express my deep gratitude towards my internal
guide Mr. P.DAYAKAR, Associate Professor, Department of CSE for his support in the
completion of my dissertation. I wish to express my sincere thanks to
Dr.N.CHANDRASEKHAR REDDY, HOD, Dept. of CSE and also to our Principal Dr.
P BHASKARA REDDY for providing the facilities to complete the dissertation.
I would like to thank all our faculty and friends for their help and constructive
criticism during the project period. Finally, I am very much indebted to our parents for their
moral support and encouragement to achieve goals.
N.DEEKSHITH (13R21A0529)
ABSTRACT
A GSM Jammer or cell phone jammer is a device that transmit signal on the same
frequency at which the GSM system operates, the jamming success when the mobile
phones in the area where the jammer is located are disabled.
Communication jamming devices were first developed and used by military. Where
tactical commanders use RF communications to exercise control of their forces, an
enemy has interest in those communications. This interest comes from the
fundamental area of denying the successful transport of the information from the
sender to the receiver.
Nowadays the mobile jammer devices or cell phone jammer software are becoming
civilian products rather than electronic warfare devices, since with the increasing
number of the mobile phone users the need to disable mobile phones in specific
places where the ringing of cell phone would be disruptive has increased. These
places include worship places, university lecture rooms, libraries, concert halls,
meeting rooms, and other places where silence is appreciated
CONTENTS
Pg.
No
 Introduction to How Cell-phone Jammers Work
1
 Jamming Basics
1
 How it works
2
 Inside a Cell-Phone Jammer
3
 Where Are Cell-Phone Jammers Used
4
 The Legal Issues
4
 Alternatives To Jamming
5
 Lots More Information
 How Cell-Phone Works
6
 How Radio Waves Works
7
 How Lock-Picking Works
7
 How Radio Works
8
 Advantages for Cell-Phone Jamming
9
 Disadvantages for Cell-Phone Jamming
9
 Conclusion
10
 References
10
INTRODUCTION
Cell phones are everywhere these days. According to the
Cellular Telecommunications and Internet Association, almost 169
million people in the United States had cell-phone service in
January 2004. And cell phones are even more ubiquitous in
Europe.
It's great to be able to call anyone at anytime.
Unfortunately, restaurants, movie theaters, concerts, shopping
malls and churches all suffer from the spread of cell phones
because not all cell-phone users know when to stop talking. Who
hasn't seethed through one side of a conversation about an
incredibly personal situation as the talker shares intimate details
with his friend as well as everyone else in the area?
While most of us just grumble and move on, some people
are actually going to extremes to retaliate. Cell phones are
basically handheld two-way radios. And like any radio, the signal
can be disrupted, or jammed.
JAMMING BASICS
Disrupting a cell phone is the same as jamming any other
type of radio communication A cell phone works by
communicating with its service network through a cell tower or
base station. Cell towers divide a city into small areas, or cells. As
a cell-phone user drives down the street, the signal is handed from
tower to tower
1
A jamming device transmits on the same radio frequencies
as the cell phone, disrupting the communication between the
phone and the cell-phone base station in the tower.
It's a called a denial-of-service attack. The jammer denies
service of the radio spectrum to the cell-phone users within range
of the jamming device.
HOW IT WORKS
Jamming devices overpower the cell phone by transmitting
a signal on the same frequency and at a high enough power that the
two signals collide and cancel each other out. Cell phones are
designed to add power if they experience low-level interference, so
the jammer must recognize and match the power increase from the
phone.
Cell phones are full-duplex devices, which means they use
two separate frequencies, one for talking and one for listening
simultaneously. Some jammers block only one of the frequencies
used by cell phones, which has the effect of blocking both. The
phone is tricked into thinking there is no service because it can
receive only one of the frequencies.
Less complex devices block only one group of frequencies,
while sophisticated jammers can block several types of networks at
once to head off dual-mode or tri-mode phones that automatically
switch among different network types to find an open signal. Some
of the high-end devices block all frequencies at once, and others
can be tuned to specific frequencies.
To jam a cell phone, all you need is a device that
broadcasts on the correct frequencies. Although different cellular
systems process signals differently, all cell-phone networks use
radio signals that can be interrupted. GSM, used in digital cellular
and PCS-based systems, operates in the 900-MHz and 1800-MHz
bands in Europe and Asia and in the 1900-MHz (sometimes
referred to as 1.9-GHz) band in the United States. Jammers can
broadcast on any frequency and are effective against AMPS,
CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems.
Old-fashioned analog cell phones and today's digital devices are
equally susceptible to jamming.
2
The actual range of the jammer depends on its power and
the local environment, which may include hills or walls of a
building that block the jamming signal. Low-powered jammers
block calls in a range of about 30 feet (9 m). Higher-powered units
create a cell-free zone as large as a football field. Units used by
law enforcement can shut down service up to 1 mile (1.6 km) from
the device
INSIDE A CELL-PHONE
JAMMER
Electronically speaking, cell-phone jammers are very basic
devices. The simplest just have an on/off switch and a light that
indicates it's on. More complex devices have switches to activate
jamming at different frequencies. Components of a jammer
include:
Antenna:-
Every jamming device has an antenna to send the signal.
Some are contained within an electrical cabinet. On stronger
devices, antennas are external to provide longer range and may be
tuned for individual frequencies.
Circuitry :-
The main electronic components of a jammer are:
 Voltage-controlled oscillator - Generates the radio
signal that will interfere with the cell phone signal
 Tuning circuit - Controls the frequency at which the
jammer broadcasts its signal by sending a particular
voltage to the oscillator
 Noise generator - Produces random electronic output in a
specified frequency range to jam the cell-phone network
signal (part of the tuning circuit)
 RF amplification (gain stage) - Boosts the power of
the radio frequency output to high enough levels to jam
a signal
Power supply :-
Smaller jamming devices are battery operated. Some
look like cell phone and use cell-phone batteries. Stronger
devices can be plugged into a standard outlet or wired into a
vehicle's electrical system.
3
WHERE ARE CELL-PHONE
JAMMERS USED
Cell phone jamming devices were originally developed for
law enforcement and the military to interrupt communications by
criminals and terrorists. The bombs that blew up commuter trains
in Spain in March 2004, as well as blasts in Bali in October 2002
and Jakarta in August 2003, all relied on cell phones to trigger
explosives. It has been widely reported that a cell-phone jammer
thwarted an assassination attempt on Pakistani President
Musharraf in December 2003. When President Bush visited
London in November 2004, it was reported that British police
considered using jammers to protect the president's motorcade
through London.
During a hostage situation, police can control when and
where a captor can make a phone call. Police can block phone calls
during a drug raid so suspects can't communicate outside the area.
Cell-phone jammers can be used in areas where radio
transmissions are dangerous, such as areas with a potentially
explosive atmosphere, such as chemical storage facilities or grain
elevators. The TRJ-89 jammer from Antenna System & Supplies
Inc. carries its own electrical generator and can block cellular
communications in a 5-mile (8-km) radius.
Corporations use jammers to stop corporate espionage by
blocking voice transmissions and photo transmissions from camera
phones. On the more questionable end of the legitimacy spectrum,
there are rumors that hotel chains install jammers to block guests'
cell-phone usage and force them to use in-room phones at high
rates
LEGAL ISSUES
In the United States, United Kingdom, Australia and many
other countries, blocking cell-phone services (as well as any other
electronic transmissions) is against the law. In the United States,
cell-phone jamming is covered under the Communications Act of
1934, which prohibits people from "willfully or maliciously
interfering with the radio communications of any station licensed
or authorized" to operate. In fact, the "manufacture, importation,
sale or offer for sale, including advertising, of devices designed to
block or jam wireless transmissions is prohibited" as well.
4
Jamming is seen as property theft, because a private
company has purchased the rights to the radio spectrum, and
jamming the spectrum is akin to stealing the property the company
has purchased. It also represents a safety hazard because jamming
blocks all calls in the area, not just the annoying ones. Jamming a
signal could block the call of a babysitter frantically trying to
contact a parent or a some one trying to call for an ambulance.
The Federal Communications Commission is charged with
enforcing jamming laws. However, the agency has not yet
prosecuted anyone for cell-phone jamming. Under the U.S. rules,
fines for a first offense can range as high as $11,000 for each
violation or imprisonment for up to one year, and the device used
may also be seized and forfeited to the government.
In most countries, it is illegal for private citizens to jam
cell-phone transmission, but some countries are allowing
businesses and government organizations to install jammers in
areas where cell-phone use is seen as a public nuisance. In
December 2004, France legalized cell-phone jammers in movie
theaters, concert halls and other places with performances. France
is finalizing technology that will let calls to emergency services go
through. India has installed jammers in parliament and some
prisons. It has been reported that universities in Italy have adopted
the technology to prevent cheating. Students were taking photos of
tests with their camera phones and sending them to classmates.
ALTERNATIVES TO
JAMMING
While the law clearly prohibits using a device to actively
disrupt a cell-phone signal, there are no rules against passive cell-
phone blocking. That means using things like wallpaper or
building materials embedded with metal fragments to prevent cell-
phone signals from reaching inside or outside the room. Some
buildings have designs that block radio signals by accident due to
thick concrete walls or a steel skeleton.
Companies are working on devices that control a cell
phone but do not "jam the signal." One device sends incoming
calls to voicemail and blocks outgoing calls. The argument is that
the phone still works, so it is technically not being jammed. It is a
legal gray area that has not been ruled on by the FCC as of April
2005.
5
Cell-phone alerters are available that indicate the presence of a
cell-phone signal. These have been used in hospitals where cell-
phone signals could interfere with sensitive medical equipment.
When a signal is detected, users are asked to turn off their phones.
For a less technical solution, Coudal Partners, a design firm
in Chicago, has launched the SHHH, the Society for HandHeld
Hushing. At its Web site, you can download a note to hand to
people conducting annoying cell-phone conversations, expressing
your lack of interest in what they're talking about.
LOTS MORE INFORMATION
HOW CELL PHONE WORKS
Millions of people in the United States and around the
world use cellular phones. They are such great gadgets -- with a
cell phone, you can talk to anyone on the planet from just about
anywhere!
These days, cell phones provide an incredible array of
functions, and new ones are being added at a
breakneck pace. Depending on the cell-phone model, you can:
 Store contact information
 Make task or to-do lists
 Keep track of appointments and set reminders
 Use the built-in calculator for simple math
 Send or receive e-mail
 Get information (news, entertainment, stock quotes) from
the Internet
 Play simple games
• Integrate other devices such as PDAs, MP3 players and
GPS receivers
But have you ever wondered how a cell phone works? What makes
it different from a regular phone? What do all those confusing
terms like PCS, GSM, CDMA and TDMA mean? In this article,
we will discuss the technology behind cell phones so that you can
see how amazing they really are.
6
HOW RADIO SCANNERS
WORKS
The air around you is bursting with radio waves. You know
that you can flip on the AM/FM radio in your car and receive
dozens of stations. You can flip on a CB radio and receive 40
more. You can flip on a TV and receive numerous broadcast
channels. Cell phones can send and receive hundreds of
frequencies. And this is just the tip of the radio spectrum iceberg.
Literally tens of thousands of other radio broadcasts and
conversations are zipping past you as you read this article -- police
officers, firefighters, ambulance drivers, paramedics, sanitation
workers, space shuttle astronauts, race car drivers, and even babies
with their monitors are transmitting radio waves all around you at
this very moment!
To tap into this ocean of electromagnetic dialog and hear
what all of these people are talking about, all you need is a
scanner. A scanner is basically a radio receiver capable of
receiving multiple signals. Generally, scanners pick up signals in
the VHF to UHF range (see How the Radio Spectrum Works for
details on these frequency bands).
Radio scanners are very portable and affordable. In this
article, we will look at the basics of scanner operation, examine
radio scanning as a hobby, and show you how to get started
listening to public airwaves you may not have known existed!
HOW LOCK PICKING WORKS
Most people carry five to 10 keys with them whenever they
go out. On your key ring you might have several keys for the
house, one or two more for the car and a few for the office or a
friend's house. Your key ring is a clear demonstration of just how
ubiquitous lock technology is: You probably interact with locks
dozens of times every week.
The main reason we use locks everywhere is that they
provide us with a sense of security. But in movies and on
television, spies, detectives and burglars can open a lock very
easily, sometimes using only a couple of paper clips. This is a
sobering thought, to say the least: Is it really possible for someone
to open a lock so easily?
HOW RADIO WORKS
"Radio waves" transmit music, conversations, pictures and
data invisibly through the air, often over millions of miles -- it
happens every day in thousands of different ways! Even though
radio waves are invisible and completely undetectable to humans,
they have totally changed society. Whether we are talking about a
cell phone, a baby monitor, a cordless phone or any one of the
thousands of other wireless technologies, all of them use radio
waves to communicate.
Here are just a few of the everyday technologies that depend on
radio waves:
• AM and FM radio broadcasts
• Cordless phones
• Garage door openers
• Wireless networks
• Radio-controlled toys
• Television broadcasts
• Cell phones
• GPS receivers
• Ham radios
• Satellite communications
• Police radios
• Wireless clocks
The list goes on and on... Even things like radar and
microwave ovens depend on radio waves. Things like
communication and navigation satellites would be impossible
without radio waves, as would modern aviation -- an airplane
depends on a dozen different radio systems. The current trend
toward wireless Internet access uses radio as well, and that means
a lot more convenience in the future!
The funny thing is that, at its core, radio is an incredibly simple
technology. With just a couple of electronic components that cost
at most a dollar or two, you can build simple radio transmitters and
receivers. The story of how something so simple has become a
bedrock technology of the modern world is fascinating!
8
ADVANTAGES
 It is very necessary using cell phone jammers in the most
divine temples like Tirumala.
 We can provide security to V.I.P’s from the anti-social
elements.
 By using cell phone jammers we can maintain law and
order for maintaining peace.
 By cell phone jammers we can’t disturb other people in the
public places like restaurants, shopping places.
 It is very necessary to use cell phone jammers in naxal
feared places. This helps the authoritites to work
their duty softly.
 By using cell phone jammers in the vehicles, we can
overcome accidents problem which is very helpful to the
people.
DISADVANTAGES
 Cost oriented.
 Requires special hardware.
 People feel inconvenience.
 V.I.P.’s may loose some impartant calls.
9
CONCLUSION
Cell phone jammers are very usefull to the society from the
anti-social elements. We can save our national leaders. We can
restrict the communication network between the anti-social
elements by using the cell phone jammers. Cell phone jammers
prevent the students from carrying cell phones to the colleges. As
everything goes fine, it is very necessary to implement in all the
colleges.
Reference
• www.google.com
• www.wikipedia.org
• www.studymafia.org

More Related Content

What's hot

Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
Mukul Agarwal
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdfManu M
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
xiha tareen
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
Farhanullah khan
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
elprocus
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammerARYAN KUMAR
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
akash roy
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Antenna
AntennaAntenna
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on JammingAbdul Haseeb
 

What's hot (20)

Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Wireless charging
Wireless chargingWireless charging
Wireless charging
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Antenna
AntennaAntenna
Antenna
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
CELL PHONE JAMMER
CELL PHONE JAMMERCELL PHONE JAMMER
CELL PHONE JAMMER
 

Viewers also liked

I locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPTI locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPT
Bhadra Gowdra
 
plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
Bhadra Gowdra
 
BTech Resume
BTech Resume BTech Resume
BTech Resume
Bhadra Gowdra
 
The htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual AnalysisThe htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual Analysis
Gerrit Dreher
 
Content of thunderbolt by amit
Content of thunderbolt by amitContent of thunderbolt by amit
Content of thunderbolt by amit
Amit Sinha
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
Bhadra Gowdra
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
Bhadra Gowdra
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
Bhadra Gowdra
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
Bhadra Gowdra
 
Distributed Control System (Presentation)
Distributed Control System (Presentation)Distributed Control System (Presentation)
Distributed Control System (Presentation)
Thunder Bolt
 
Smart card
Smart cardSmart card
Smart card
Bhadra Gowdra
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
Bhadra Gowdra
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
Bhadra Gowdra
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
patna
 
Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
Bhadra Gowdra
 

Viewers also liked (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
I locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPTI locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPT
 
plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
 
BTech Resume
BTech Resume BTech Resume
BTech Resume
 
The htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual AnalysisThe htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual Analysis
 
Content of thunderbolt by amit
Content of thunderbolt by amitContent of thunderbolt by amit
Content of thunderbolt by amit
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
 
Distributed Control System (Presentation)
Distributed Control System (Presentation)Distributed Control System (Presentation)
Distributed Control System (Presentation)
 
Smart card
Smart cardSmart card
Smart card
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
 
ep
epep
ep
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
 
DEva Report
DEva ReportDEva Report
DEva Report
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
OLED report 2014
OLED report 2014OLED report 2014
OLED report 2014
 
Thunderbolt
ThunderboltThunderbolt
Thunderbolt
 
Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
 

Similar to mobile-jammer

Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
Amit sundaray
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
ijtsrd
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
IJMER
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd Iaetsd
 
Presentation1
Presentation1Presentation1
Presentation1
poojithakannikanti
 
Violent gesture
Violent gestureViolent gesture
Violent gesture
Hazi Roshan
 
Cell phone detector
Cell phone detectorCell phone detector
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
Prejith Pavanan
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copy
Pranoosh T
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerAlok Gupta
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
DyarAbubakr
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
Prejith Pavanan
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
Hasnain Yaseen
 
Mobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsMobile Tower Radiations & its effects
Mobile Tower Radiations & its effects
Nishu Vora
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
Nishu Vora
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
Nishu Vora
 

Similar to mobile-jammer (20)

Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Presentation1
Presentation1Presentation1
Presentation1
 
Violent gesture
Violent gestureViolent gesture
Violent gesture
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
4g
4g4g
4g
 
Jamer
JamerJamer
Jamer
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copy
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
 
wireless_technologies
wireless_technologieswireless_technologies
wireless_technologies
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
 
Mobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsMobile Tower Radiations & its effects
Mobile Tower Radiations & its effects
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
 

More from Bhadra Gowdra

Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
Bhadra Gowdra
 
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Bhadra Gowdra
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
Bhadra Gowdra
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
Bhadra Gowdra
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
Bhadra Gowdra
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
Bhadra Gowdra
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
Bhadra Gowdra
 
Fun Food
Fun FoodFun Food
Fun Food
Bhadra Gowdra
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
Bhadra Gowdra
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
Bhadra Gowdra
 

More from Bhadra Gowdra (10)

Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
 
Fun Food
Fun FoodFun Food
Fun Food
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

mobile-jammer

  • 1. Department of Computer Science & Engineering MLR INSTITUTE OF TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University, Hyderabad) DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043. 2016-17 A TECHNICAL SEMINAR on “MOBILE JAMMER” Submitted in partial fulfillment of the Requirements for the award of the degree of Bachelor of Technology In Computer Science & Engineering By N.DEEKSHITH -13R21A0529 UNDER THE GUIDANCE OF Mr. P.DAYAKAR (Associate professor)
  • 2. Department of Computer Science & Engineering MLR INSTITUTE OF TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University, Hyderabad) DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043. CERTIFICATE This is to certify that the project entitled “MOBILE JAMMER” by, N.DEEKSHITH (13R21A0529) , has been submitted in the partial fulfillment of the requirements for the award of degree of Bachelor of Technology in Computer Science and Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results embodied in this project have not been submitted to any other University or Institution for the award of any degree or diploma. Internal Guide Head of the Department Mr. P.DAYAKAR Dr N.CHANDRA SEKHAR REDDY Associate Professor Professor
  • 3. DECLARATION I hereby declare that the project entitled “MOBILE JAMMER” is the work done during the period of March 2017 and is submitted in the partial fulfillment of the requirements for the award of degree of Bachelor of technology in Computer Science and Engineering from Jawaharlal Nehru Technology University, Hyderabad. The results embodied in this project have not been submitted to any other university or Institution for the award of any degree or diploma. N.DEEKSHITH (13R21A0529)
  • 4. ACKNOWLEDGEMENT There are many people who helped me directly and indirectly to complete my project successfully. I would like to take this opportunity to thank one and all. First of all I would like to express my deep gratitude towards my internal guide Mr. P.DAYAKAR, Associate Professor, Department of CSE for his support in the completion of my dissertation. I wish to express my sincere thanks to Dr.N.CHANDRASEKHAR REDDY, HOD, Dept. of CSE and also to our Principal Dr. P BHASKARA REDDY for providing the facilities to complete the dissertation. I would like to thank all our faculty and friends for their help and constructive criticism during the project period. Finally, I am very much indebted to our parents for their moral support and encouragement to achieve goals. N.DEEKSHITH (13R21A0529)
  • 5. ABSTRACT A GSM Jammer or cell phone jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. Communication jamming devices were first developed and used by military. Where tactical commanders use RF communications to exercise control of their forces, an enemy has interest in those communications. This interest comes from the fundamental area of denying the successful transport of the information from the sender to the receiver. Nowadays the mobile jammer devices or cell phone jammer software are becoming civilian products rather than electronic warfare devices, since with the increasing number of the mobile phone users the need to disable mobile phones in specific places where the ringing of cell phone would be disruptive has increased. These places include worship places, university lecture rooms, libraries, concert halls, meeting rooms, and other places where silence is appreciated
  • 6. CONTENTS Pg. No  Introduction to How Cell-phone Jammers Work 1  Jamming Basics 1  How it works 2  Inside a Cell-Phone Jammer 3  Where Are Cell-Phone Jammers Used 4  The Legal Issues 4  Alternatives To Jamming 5  Lots More Information  How Cell-Phone Works 6  How Radio Waves Works 7  How Lock-Picking Works
  • 7. 7  How Radio Works 8  Advantages for Cell-Phone Jamming 9  Disadvantages for Cell-Phone Jamming 9  Conclusion 10  References 10 INTRODUCTION Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, almost 169 million people in the United States had cell-phone service in January 2004. And cell phones are even more ubiquitous in
  • 8. Europe. It's great to be able to call anyone at anytime. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. Who hasn't seethed through one side of a conversation about an incredibly personal situation as the talker shares intimate details with his friend as well as everyone else in the area? While most of us just grumble and move on, some people are actually going to extremes to retaliate. Cell phones are basically handheld two-way radios. And like any radio, the signal can be disrupted, or jammed. JAMMING BASICS Disrupting a cell phone is the same as jamming any other type of radio communication A cell phone works by communicating with its service network through a cell tower or base station. Cell towers divide a city into small areas, or cells. As a cell-phone user drives down the street, the signal is handed from tower to tower
  • 9. 1 A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack. The jammer denies service of the radio spectrum to the cell-phone users within range of the jamming device. HOW IT WORKS Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Cell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both. The phone is tricked into thinking there is no service because it can
  • 10. receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high-end devices block all frequencies at once, and others can be tuned to specific frequencies. To jam a cell phone, all you need is a device that broadcasts on the correct frequencies. Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-based systems, operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming. 2 The actual range of the jammer depends on its power and the local environment, which may include hills or walls of a building that block the jamming signal. Low-powered jammers block calls in a range of about 30 feet (9 m). Higher-powered units create a cell-free zone as large as a football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km) from the device INSIDE A CELL-PHONE JAMMER Electronically speaking, cell-phone jammers are very basic
  • 11. devices. The simplest just have an on/off switch and a light that indicates it's on. More complex devices have switches to activate jamming at different frequencies. Components of a jammer include: Antenna:- Every jamming device has an antenna to send the signal. Some are contained within an electrical cabinet. On stronger devices, antennas are external to provide longer range and may be tuned for individual frequencies. Circuitry :- The main electronic components of a jammer are:  Voltage-controlled oscillator - Generates the radio signal that will interfere with the cell phone signal  Tuning circuit - Controls the frequency at which the jammer broadcasts its signal by sending a particular voltage to the oscillator  Noise generator - Produces random electronic output in a specified frequency range to jam the cell-phone network signal (part of the tuning circuit)  RF amplification (gain stage) - Boosts the power of the radio frequency output to high enough levels to jam a signal Power supply :- Smaller jamming devices are battery operated. Some look like cell phone and use cell-phone batteries. Stronger devices can be plugged into a standard outlet or wired into a vehicle's electrical system. 3 WHERE ARE CELL-PHONE JAMMERS USED
  • 12. Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. The bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. It has been widely reported that a cell-phone jammer thwarted an assassination attempt on Pakistani President Musharraf in December 2003. When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London. During a hostage situation, police can control when and where a captor can make a phone call. Police can block phone calls during a drug raid so suspects can't communicate outside the area. Cell-phone jammers can be used in areas where radio transmissions are dangerous, such as areas with a potentially explosive atmosphere, such as chemical storage facilities or grain elevators. The TRJ-89 jammer from Antenna System & Supplies Inc. carries its own electrical generator and can block cellular communications in a 5-mile (8-km) radius. Corporations use jammers to stop corporate espionage by blocking voice transmissions and photo transmissions from camera phones. On the more questionable end of the legitimacy spectrum, there are rumors that hotel chains install jammers to block guests' cell-phone usage and force them to use in-room phones at high rates LEGAL ISSUES In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the law. In the United States,
  • 13. cell-phone jamming is covered under the Communications Act of 1934, which prohibits people from "willfully or maliciously interfering with the radio communications of any station licensed or authorized" to operate. In fact, the "manufacture, importation, sale or offer for sale, including advertising, of devices designed to block or jam wireless transmissions is prohibited" as well. 4 Jamming is seen as property theft, because a private company has purchased the rights to the radio spectrum, and jamming the spectrum is akin to stealing the property the company has purchased. It also represents a safety hazard because jamming blocks all calls in the area, not just the annoying ones. Jamming a signal could block the call of a babysitter frantically trying to contact a parent or a some one trying to call for an ambulance. The Federal Communications Commission is charged with enforcing jamming laws. However, the agency has not yet prosecuted anyone for cell-phone jamming. Under the U.S. rules, fines for a first offense can range as high as $11,000 for each violation or imprisonment for up to one year, and the device used may also be seized and forfeited to the government. In most countries, it is illegal for private citizens to jam cell-phone transmission, but some countries are allowing businesses and government organizations to install jammers in areas where cell-phone use is seen as a public nuisance. In December 2004, France legalized cell-phone jammers in movie theaters, concert halls and other places with performances. France is finalizing technology that will let calls to emergency services go through. India has installed jammers in parliament and some prisons. It has been reported that universities in Italy have adopted the technology to prevent cheating. Students were taking photos of tests with their camera phones and sending them to classmates.
  • 14. ALTERNATIVES TO JAMMING While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell- phone blocking. That means using things like wallpaper or building materials embedded with metal fragments to prevent cell- phone signals from reaching inside or outside the room. Some buildings have designs that block radio signals by accident due to thick concrete walls or a steel skeleton. Companies are working on devices that control a cell phone but do not "jam the signal." One device sends incoming calls to voicemail and blocks outgoing calls. The argument is that the phone still works, so it is technically not being jammed. It is a legal gray area that has not been ruled on by the FCC as of April 2005. 5 Cell-phone alerters are available that indicate the presence of a cell-phone signal. These have been used in hospitals where cell- phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones. For a less technical solution, Coudal Partners, a design firm in Chicago, has launched the SHHH, the Society for HandHeld Hushing. At its Web site, you can download a note to hand to people conducting annoying cell-phone conversations, expressing your lack of interest in what they're talking about. LOTS MORE INFORMATION HOW CELL PHONE WORKS
  • 15. Millions of people in the United States and around the world use cellular phones. They are such great gadgets -- with a cell phone, you can talk to anyone on the planet from just about anywhere! These days, cell phones provide an incredible array of functions, and new ones are being added at a breakneck pace. Depending on the cell-phone model, you can:  Store contact information  Make task or to-do lists  Keep track of appointments and set reminders  Use the built-in calculator for simple math  Send or receive e-mail  Get information (news, entertainment, stock quotes) from the Internet  Play simple games • Integrate other devices such as PDAs, MP3 players and GPS receivers But have you ever wondered how a cell phone works? What makes it different from a regular phone? What do all those confusing terms like PCS, GSM, CDMA and TDMA mean? In this article, we will discuss the technology behind cell phones so that you can see how amazing they really are. 6 HOW RADIO SCANNERS WORKS The air around you is bursting with radio waves. You know that you can flip on the AM/FM radio in your car and receive dozens of stations. You can flip on a CB radio and receive 40 more. You can flip on a TV and receive numerous broadcast channels. Cell phones can send and receive hundreds of
  • 16. frequencies. And this is just the tip of the radio spectrum iceberg. Literally tens of thousands of other radio broadcasts and conversations are zipping past you as you read this article -- police officers, firefighters, ambulance drivers, paramedics, sanitation workers, space shuttle astronauts, race car drivers, and even babies with their monitors are transmitting radio waves all around you at this very moment! To tap into this ocean of electromagnetic dialog and hear what all of these people are talking about, all you need is a scanner. A scanner is basically a radio receiver capable of receiving multiple signals. Generally, scanners pick up signals in the VHF to UHF range (see How the Radio Spectrum Works for details on these frequency bands). Radio scanners are very portable and affordable. In this article, we will look at the basics of scanner operation, examine radio scanning as a hobby, and show you how to get started listening to public airwaves you may not have known existed! HOW LOCK PICKING WORKS Most people carry five to 10 keys with them whenever they go out. On your key ring you might have several keys for the house, one or two more for the car and a few for the office or a friend's house. Your key ring is a clear demonstration of just how ubiquitous lock technology is: You probably interact with locks dozens of times every week. The main reason we use locks everywhere is that they provide us with a sense of security. But in movies and on television, spies, detectives and burglars can open a lock very easily, sometimes using only a couple of paper clips. This is a sobering thought, to say the least: Is it really possible for someone to open a lock so easily?
  • 17. HOW RADIO WORKS "Radio waves" transmit music, conversations, pictures and data invisibly through the air, often over millions of miles -- it happens every day in thousands of different ways! Even though radio waves are invisible and completely undetectable to humans, they have totally changed society. Whether we are talking about a cell phone, a baby monitor, a cordless phone or any one of the thousands of other wireless technologies, all of them use radio waves to communicate. Here are just a few of the everyday technologies that depend on radio waves: • AM and FM radio broadcasts • Cordless phones • Garage door openers • Wireless networks • Radio-controlled toys • Television broadcasts • Cell phones • GPS receivers • Ham radios • Satellite communications • Police radios • Wireless clocks The list goes on and on... Even things like radar and microwave ovens depend on radio waves. Things like communication and navigation satellites would be impossible
  • 18. without radio waves, as would modern aviation -- an airplane depends on a dozen different radio systems. The current trend toward wireless Internet access uses radio as well, and that means a lot more convenience in the future! The funny thing is that, at its core, radio is an incredibly simple technology. With just a couple of electronic components that cost at most a dollar or two, you can build simple radio transmitters and receivers. The story of how something so simple has become a bedrock technology of the modern world is fascinating! 8 ADVANTAGES  It is very necessary using cell phone jammers in the most divine temples like Tirumala.  We can provide security to V.I.P’s from the anti-social elements.  By using cell phone jammers we can maintain law and order for maintaining peace.  By cell phone jammers we can’t disturb other people in the public places like restaurants, shopping places.  It is very necessary to use cell phone jammers in naxal feared places. This helps the authoritites to work their duty softly.  By using cell phone jammers in the vehicles, we can overcome accidents problem which is very helpful to the people. DISADVANTAGES  Cost oriented.  Requires special hardware.  People feel inconvenience.
  • 19.  V.I.P.’s may loose some impartant calls. 9 CONCLUSION Cell phone jammers are very usefull to the society from the anti-social elements. We can save our national leaders. We can restrict the communication network between the anti-social elements by using the cell phone jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. As everything goes fine, it is very necessary to implement in all the colleges. Reference