SlideShare a Scribd company logo
MOBILE PHONE DETECTOR
byJitendra malav

(11bec0082)
Introduction
• This handy, pocket-size mobile transmission detector can
sense the presence of an activated mobile phone from
distance of one and- a-half metres. So it can be used to
prevent use of mobile phones in examination halls,
confidential rooms, etc. It is also useful for detecting the use
of mobile phone for spying and unauthorised video
transmission.
• The circuit can detect both the incoming and outgoing calls,
SMS and video transmission even if the mobile phone is kept
in the silent mode. The moment the bug detects RF
transmission signal from an activated mobile phone, it starts
sounding a beep alarm and the LED blinks. The alarm
continues until the signal transmission ceases.
• An ordinary RF detector using tuned LC
circuits is not suitable for detecting signals in
the GHz frequency band used in mobile
phones. The transmission frequency of mobile
phones ranges from 0.9 to 3 GHz with a
wavelength of 3.3 to 10 cm. So a circuit
detecting gigahertz signals required for a
mobile bug.
Circuit diagram
working
• the circuit uses a 0.22μF disk capacitor (C3) to capture the RF
signals from the mobile phone. The lead length of the capacitor is
fixed as 18 mm with a spacing of 8 mm between the leads to get
the desired frequency. The disk capacitor along with the leads acts
as a small gigahertz loop antenna to collect the RF signals from the
mobile phone.
• Op-amp IC CA3130 (IC1) is used in the circuit as a current-to-voltage
converter with capacitor C3 connected between its inverting and
non-inverting inputs. It is a CMOS version using gate-protected pchannel MOSFET transistors in the input to provide very high input
impedance, very low input current and very high speed of
performance . The output CMOS transistor is capable of swinging
the output voltage to within 10 mV of either supply voltage
terminal.
• Capacitor C3 in conjunction with the lead inductance acts as a
transmission line that intercepts the signals from the mobile phone.
This capacitor creates a field, stores energy and transfers the stored
energy in the form of minute current to the inputs of IC1.This will
upset the balanced input of IC1 and convert the current into the
corresponding out put voltage.
• Capacitor C4 along with high-value resistor R1 keeps the noninverting input stable for easy swing of the output to high state.
Resistor R2 provides the discharge path for capacitor C4.Feedback
resistor R3 makes the inverting input high when the output
becomes high. Capacitor C5 (47pF) is connected across ‘strobe’ (pin
8) and ‘null’ inputs (pin 1) of IC1 for phase compensation and gain
control to optimise the frequency response.
• When the mobile phone signal is detected by C3, the output of IC1
becomes high and low alternately according to the frequency of the
signal as indicated by LED1. This triggers monostable timer IC2
through capacitor C7. Capacitor C6 maintains the base bias of
transistor T1 for fast switching action. The low-value timing
components R6 and C9 produce very short time delay to avoid
audio nuisance.
• Assemble the circuit on PCB and enclose in a small box like junk
mobile case. As mentioned earlier, capacitor C3 should have a lead
length of 18 mm with lead spacing of 8 mm. Carefully solder the
capacitor in standing position with equal spacing of the leads. The
response can be optimised by trimming the lead length of C3 for
the desired frequency. You may use a short telescopic type antenna.
Use the miniature 12V battery of a remote control and a small
buzzer to make the gadget pocket-size. The unit will give the
warning indication if someone uses mobile phone within a radius of
1.5 metres
Application
• It can be used to prevent use of mobile phones in
examination halls, confidential rooms, etc.
• It is also useful for detecting the use of mobile
phone for spying and unauthorized video
transmission.
• It is useful where the use of mobile phone is
prohibited like petrol pumps and gas stations,
historical places, religious places and court of
laws.
CONCLUSION
• This pocket-size mobile transmission detector or sniffer can
sense the presence of an activated mobile cell phone from a
distance of one and-a-half meters. So it can be used to
prevent use of mobile phones in examination halls,
confidential rooms, etc. It is also useful for detecting the use
of mobile phone for spying and unauthorized video
transmission.

FUTURE SCOPE
• Trying to increase the detecting range of cell phone detector
to few more meters for observing wide range of area.

More Related Content

What's hot

Alcohol sensing alert with engine locking project
Alcohol sensing alert with engine locking projectAlcohol sensing alert with engine locking project
Alcohol sensing alert with engine locking project
hemanth prudhvi jidugu
 
Mobile detector
Mobile detectorMobile detector
132 kv g.s.s chambal jaipur
132 kv g.s.s chambal jaipur132 kv g.s.s chambal jaipur
132 kv g.s.s chambal jaipurmonga786
 
Cell Phone Detector Presentation
Cell Phone Detector Presentation Cell Phone Detector Presentation
Cell Phone Detector Presentation
Hitesh Kumar Singh
 
DESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORTDESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORT
Deshbandhu Kumar
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuitMoin Aman
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammerARYAN KUMAR
 
Cell Phone Detector ppt- IIEST, Shibpur
Cell Phone Detector ppt- IIEST, ShibpurCell Phone Detector ppt- IIEST, Shibpur
Cell Phone Detector ppt- IIEST, Shibpur
Ranapratap Majee
 
BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.
Shubham Singh
 
Bsnl best ppt
Bsnl best pptBsnl best ppt
Bsnl best ppt
rajat pundir
 
REPORT ON ADVANCED TELECOM
REPORT ON ADVANCED TELECOMREPORT ON ADVANCED TELECOM
Automatic street light control using LDR.
Automatic street light control using LDR.Automatic street light control using LDR.
Automatic street light control using LDR.
Fazlur Rahman
 
Electronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi ReportElectronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi Report
Vaibhav Pandey
 
Self Switching Power Supply
Self Switching Power SupplySelf Switching Power Supply
Self Switching Power Supply
Edgefxkits & Solutions
 
Home automation under wi fi through android apps from any smart phone
Home automation under wi fi through android apps from any smart phoneHome automation under wi fi through android apps from any smart phone
Home automation under wi fi through android apps from any smart phone
Edgefxkits & Solutions
 
BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
Subhash Chandra Tank
 
Telecommunication line training report Indian Railways
Telecommunication line training report Indian RailwaysTelecommunication line training report Indian Railways
Telecommunication line training report Indian Railways
SURAJKMAURYA
 
Relay interfacing with 8051
Relay interfacing with 8051Relay interfacing with 8051
Relay interfacing with 8051
Pratik Phadte
 
GSM Based Fault Monitoring System (Project)
GSM Based Fault Monitoring System (Project)GSM Based Fault Monitoring System (Project)
GSM Based Fault Monitoring System (Project)
Aishwary Verma
 

What's hot (20)

Alcohol sensing alert with engine locking project
Alcohol sensing alert with engine locking projectAlcohol sensing alert with engine locking project
Alcohol sensing alert with engine locking project
 
Mobile detector
Mobile detectorMobile detector
Mobile detector
 
132 kv g.s.s chambal jaipur
132 kv g.s.s chambal jaipur132 kv g.s.s chambal jaipur
132 kv g.s.s chambal jaipur
 
Cell Phone Detector Presentation
Cell Phone Detector Presentation Cell Phone Detector Presentation
Cell Phone Detector Presentation
 
DESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORTDESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORT
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuit
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Cell Phone Detector ppt- IIEST, Shibpur
Cell Phone Detector ppt- IIEST, ShibpurCell Phone Detector ppt- IIEST, Shibpur
Cell Phone Detector ppt- IIEST, Shibpur
 
BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.
 
Bsnl best ppt
Bsnl best pptBsnl best ppt
Bsnl best ppt
 
REPORT ON ADVANCED TELECOM
REPORT ON ADVANCED TELECOMREPORT ON ADVANCED TELECOM
REPORT ON ADVANCED TELECOM
 
Automatic street light control using LDR.
Automatic street light control using LDR.Automatic street light control using LDR.
Automatic street light control using LDR.
 
Electronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi ReportElectronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi Report
 
Self Switching Power Supply
Self Switching Power SupplySelf Switching Power Supply
Self Switching Power Supply
 
Home automation under wi fi through android apps from any smart phone
Home automation under wi fi through android apps from any smart phoneHome automation under wi fi through android apps from any smart phone
Home automation under wi fi through android apps from any smart phone
 
BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
 
Telecommunication line training report Indian Railways
Telecommunication line training report Indian RailwaysTelecommunication line training report Indian Railways
Telecommunication line training report Indian Railways
 
Relay interfacing with 8051
Relay interfacing with 8051Relay interfacing with 8051
Relay interfacing with 8051
 
GSM Based Fault Monitoring System (Project)
GSM Based Fault Monitoring System (Project)GSM Based Fault Monitoring System (Project)
GSM Based Fault Monitoring System (Project)
 

Viewers also liked

Assignment on cultur of portugal
Assignment on cultur of portugalAssignment on cultur of portugal
Assignment on cultur of portugal
Malik Umar Hayat
 
Communication skill
Communication skillCommunication skill
Communication skill
Anand Raj
 
The Impact of Mobile Internet on Chinese Gen Y Identity
The Impact of Mobile Internet on Chinese Gen Y IdentityThe Impact of Mobile Internet on Chinese Gen Y Identity
The Impact of Mobile Internet on Chinese Gen Y Identity
Ray Poynter
 
Mobile phone
Mobile phoneMobile phone
Mobile phone
HKNESR
 
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention
 
Best Presentation of Mobile Phone
Best Presentation of Mobile PhoneBest Presentation of Mobile Phone
Best Presentation of Mobile Phone
Anand Raj
 
Mobille generations
Mobille generationsMobille generations
Mobille generations
Anand Raj
 
Daksya academy presentation made by anand raj mishra
Daksya academy presentation made by anand raj mishraDaksya academy presentation made by anand raj mishra
Daksya academy presentation made by anand raj mishra
Anand Raj
 
Internet History
Internet HistoryInternet History
Internet History
John Grace
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentationdgieseler1
 

Viewers also liked (10)

Assignment on cultur of portugal
Assignment on cultur of portugalAssignment on cultur of portugal
Assignment on cultur of portugal
 
Communication skill
Communication skillCommunication skill
Communication skill
 
The Impact of Mobile Internet on Chinese Gen Y Identity
The Impact of Mobile Internet on Chinese Gen Y IdentityThe Impact of Mobile Internet on Chinese Gen Y Identity
The Impact of Mobile Internet on Chinese Gen Y Identity
 
Mobile phone
Mobile phoneMobile phone
Mobile phone
 
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo Quaintance
 
Best Presentation of Mobile Phone
Best Presentation of Mobile PhoneBest Presentation of Mobile Phone
Best Presentation of Mobile Phone
 
Mobille generations
Mobille generationsMobille generations
Mobille generations
 
Daksya academy presentation made by anand raj mishra
Daksya academy presentation made by anand raj mishraDaksya academy presentation made by anand raj mishra
Daksya academy presentation made by anand raj mishra
 
Internet History
Internet HistoryInternet History
Internet History
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentation
 

Similar to Mobille phone detector

Synopsis for mobile bug mini project
Synopsis for mobile bug mini projectSynopsis for mobile bug mini project
Synopsis for mobile bug mini projectPadmakar Mangrule
 
cellphone detector
cellphone detectorcellphone detector
cellphone detector
venu13
 
mobile bug
mobile bugmobile bug
mobile bug
venu13
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector Robot
Punit Tiwari
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector Robot
Punit Tiwari
 
Mobile phone detector and jammer
Mobile phone detector and jammerMobile phone detector and jammer
Mobile phone detector and jammer
siva23143
 
Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detectorKundan Kumar
 
Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detector
Gaurav Sharma
 
Minibatch 5-130518000824-phpapp01
Minibatch 5-130518000824-phpapp01Minibatch 5-130518000824-phpapp01
Minibatch 5-130518000824-phpapp01Vidya Sree
 
Mobile sniffer
Mobile snifferMobile sniffer
Mobile sniffer
Rincy Ben
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
Amar Raj
 
Monika print ppt
Monika print pptMonika print ppt
Monika print pptMonika Raja
 
Wireless Flow Meter Solution M2M & IoT
Wireless Flow Meter Solution    M2M & IoTWireless Flow Meter Solution    M2M & IoT
Wireless Flow Meter Solution M2M & IoT
CASCADEMIC Solutions Pvt Ltd
 
Remote control regulator
Remote control regulatorRemote control regulator
Remote control regulator
ARUN S L
 
Mine detecting robot
Mine detecting robot Mine detecting robot
Mine detecting robot Rahul Singh
 

Similar to Mobille phone detector (20)

Synopsis for mobile bug mini project
Synopsis for mobile bug mini projectSynopsis for mobile bug mini project
Synopsis for mobile bug mini project
 
cellphone detector
cellphone detectorcellphone detector
cellphone detector
 
mobile bug
mobile bugmobile bug
mobile bug
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector Robot
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector Robot
 
Project electronics
Project electronicsProject electronics
Project electronics
 
Mobile detector grp9
Mobile detector grp9Mobile detector grp9
Mobile detector grp9
 
Project
ProjectProject
Project
 
Report on Mobile Bug
Report on Mobile BugReport on Mobile Bug
Report on Mobile Bug
 
Mobile phone detector and jammer
Mobile phone detector and jammerMobile phone detector and jammer
Mobile phone detector and jammer
 
Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detector
 
Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detector
 
Minibatch 5-130518000824-phpapp01
Minibatch 5-130518000824-phpapp01Minibatch 5-130518000824-phpapp01
Minibatch 5-130518000824-phpapp01
 
Mobile sniffer
Mobile snifferMobile sniffer
Mobile sniffer
 
Mobile bug
Mobile bugMobile bug
Mobile bug
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Monika print ppt
Monika print pptMonika print ppt
Monika print ppt
 
Wireless Flow Meter Solution M2M & IoT
Wireless Flow Meter Solution    M2M & IoTWireless Flow Meter Solution    M2M & IoT
Wireless Flow Meter Solution M2M & IoT
 
Remote control regulator
Remote control regulatorRemote control regulator
Remote control regulator
 
Mine detecting robot
Mine detecting robot Mine detecting robot
Mine detecting robot
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Mobille phone detector

  • 2. Introduction • This handy, pocket-size mobile transmission detector can sense the presence of an activated mobile phone from distance of one and- a-half metres. So it can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for spying and unauthorised video transmission. • The circuit can detect both the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the bug detects RF transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases.
  • 3. • An ordinary RF detector using tuned LC circuits is not suitable for detecting signals in the GHz frequency band used in mobile phones. The transmission frequency of mobile phones ranges from 0.9 to 3 GHz with a wavelength of 3.3 to 10 cm. So a circuit detecting gigahertz signals required for a mobile bug.
  • 5. working • the circuit uses a 0.22μF disk capacitor (C3) to capture the RF signals from the mobile phone. The lead length of the capacitor is fixed as 18 mm with a spacing of 8 mm between the leads to get the desired frequency. The disk capacitor along with the leads acts as a small gigahertz loop antenna to collect the RF signals from the mobile phone. • Op-amp IC CA3130 (IC1) is used in the circuit as a current-to-voltage converter with capacitor C3 connected between its inverting and non-inverting inputs. It is a CMOS version using gate-protected pchannel MOSFET transistors in the input to provide very high input impedance, very low input current and very high speed of performance . The output CMOS transistor is capable of swinging the output voltage to within 10 mV of either supply voltage terminal.
  • 6. • Capacitor C3 in conjunction with the lead inductance acts as a transmission line that intercepts the signals from the mobile phone. This capacitor creates a field, stores energy and transfers the stored energy in the form of minute current to the inputs of IC1.This will upset the balanced input of IC1 and convert the current into the corresponding out put voltage. • Capacitor C4 along with high-value resistor R1 keeps the noninverting input stable for easy swing of the output to high state. Resistor R2 provides the discharge path for capacitor C4.Feedback resistor R3 makes the inverting input high when the output becomes high. Capacitor C5 (47pF) is connected across ‘strobe’ (pin 8) and ‘null’ inputs (pin 1) of IC1 for phase compensation and gain control to optimise the frequency response.
  • 7. • When the mobile phone signal is detected by C3, the output of IC1 becomes high and low alternately according to the frequency of the signal as indicated by LED1. This triggers monostable timer IC2 through capacitor C7. Capacitor C6 maintains the base bias of transistor T1 for fast switching action. The low-value timing components R6 and C9 produce very short time delay to avoid audio nuisance. • Assemble the circuit on PCB and enclose in a small box like junk mobile case. As mentioned earlier, capacitor C3 should have a lead length of 18 mm with lead spacing of 8 mm. Carefully solder the capacitor in standing position with equal spacing of the leads. The response can be optimised by trimming the lead length of C3 for the desired frequency. You may use a short telescopic type antenna. Use the miniature 12V battery of a remote control and a small buzzer to make the gadget pocket-size. The unit will give the warning indication if someone uses mobile phone within a radius of 1.5 metres
  • 8. Application • It can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. • It is also useful for detecting the use of mobile phone for spying and unauthorized video transmission. • It is useful where the use of mobile phone is prohibited like petrol pumps and gas stations, historical places, religious places and court of laws.
  • 9. CONCLUSION • This pocket-size mobile transmission detector or sniffer can sense the presence of an activated mobile cell phone from a distance of one and-a-half meters. So it can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for spying and unauthorized video transmission. FUTURE SCOPE • Trying to increase the detecting range of cell phone detector to few more meters for observing wide range of area.