SlideShare a Scribd company logo
MOBILE JAMMER
PRESENTED
BY
POOJITHA.K
Content
o Introduction
o Operation
o Block diagram
o Range of jammer
o Applications
 A GSM jammer is a device that transmit signals on the same
frequency at which the GSM jammer system operates , this is
success when the mobile phones in the area where the jammer is
located is disabled.
 Communication jamming were first developed and used by military.
 Nowadays the mobile jammer or cell phone jammer software were
becoming civilian products rather than electronic warfare devices
since with increasing the number of mobile phone users the need
to disable mobile phones in specific places where the ringing of cell
phones is disruptive has increased.
• These places include worship places , university lecture
rooms, libraries , concrete halls ,meeting rooms and other
places where silence is appreciated.
• Less complex devices block only one group of frequencies, while
sophisticated jammers can block several types of networks at once
to head off dual-mode or tri-mode phones that automatically switch
among different network types to find an open signal. Some of the
high-end devices block all frequencies at once and others can be
tuned to specific frequencies.
• To jam a cell phone, all you need is a device that broadcasts on the
correct frequencies . Although different cellular systems process
signals differently, all cell-phone networks use radio signals that can
be interrupted.
OPERATION
• Jamming devices overpower the cell phones by transmitting a
signal on the same frequency as the cell phone and at a high
enough power that the two signals collide and cancel each other
out.
• Cell phones are full-duplex devices, which mean they use two
separate frequencies, one for talking and one for listening
simultaneously. Some jammers block only one of the frequencies
used by cell phones , which has the effect of blocking both.
 Old-fashioned analog cell phones and today's digital devices are
equally susceptible to jamming . Disrupting a cell phone is the
same as jamming any other type of radio communication.
 A cell phone works by communicating with its service network
through a cell tower or base station. Cell towers divide a city into
small areas, or cells. As a cell phone user drives down the street,
the signal is handed from tower to tower
 A jamming device transmits on the same radio frequencies as
the cell phone, disrupting the communication between the
phone and the cell-phone base station in the town.
 It's a called a denial-of-service attack . The jammer denies
service of the radio spectrum to the cell-phone users within range
of the jamming device. Older jammers sometimes were limited to
working on phones using only analog or older digital mobile
phone standards.
 The power of the jammer's effect can vary widely
based on factors such as proximity to towers,
indoor and outdoor settings, presence of
buildings and landscape, even temperature and
humidity play a role.
 There are concerns that crudely designed
jammers may disrupt the functioning of medical
devices such as pacemakers.
Jamming Techniques
There are several ways to jam an RF device. The three most
common techniques can be categorized as follows:
1. Spoofing:
In this kind of jamming, the device forces the mobile to turn
off itself. This type is very difficult to be implemented since the
jamming device first detects any mobile phone in a specific area,
then the device sends the signal to disable the mobile phone.
2. Shielding Attacks :
This is known as TEMPEST or EMF shielding. This kind
requires closing an area in a faraday cage so that any device
inside this cage can not transmit or receive RF signal from
outside of the cage. This area can be as large as buildings, for
example.
3. Denial of Service :
This technique is referred to DOS. In this technique, the
device transmits a noise signal at the same operating
frequency of the mobile phone in order to decrease the signal-
to-noise ratio (SNR) of the mobile under its minimum value.
This kind of jamming technique is the simplest one since the
device is always on.
Block diagram of GSM jammer
 Size of the cell phone jammers are made to
look like actual cell phone . others are briefcase
sized or larger . the biggest jammers are used by
police and military
Range of Jammer
 Most jammers have only a range of 50 to80 feet
and will effectively jam only our immediate
surroundings low level jammers will effectively jam
only 30 feet(9m).
 Higher powered units create a cell free zone like
football field . It can shutdown service up to 1.6 km.
Applications of jammer
 A phone jammer provides the ultimate solution in any
area where cellular communications frequently cause
nuisance either by loud incoming call rings or resulting in
loud telephone conversations.
 Cell phone jamming devices were originally developed
for military to interrupt communication between criminal
and terrorists.
Conclusion
Every technology has GOOD aspect as well as BAD
aspect
the important thing is, how we use it.
Presentation1

More Related Content

What's hot

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Deepak Bhojwani
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
akash roy
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
Swarna Gautam
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
Abdul Haseeb
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
Farhanullah khan
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Alok Gupta
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
elprocus
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Suraj Prajapati
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
Sudhanshu kumar Sah
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd Iaetsd
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
xiha tareen
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
Taruni Kancharla
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
kishan alagiya
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
Mehul Ranavasiya
 

What's hot (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 

Similar to Presentation1

Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
IJMER
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
DyarAbubakr
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
Sameer Gupta
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
ijtsrd
 
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
LingaSwamy10
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
Amit sundaray
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Shivam Jaiswal
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
Saumya Ranjan Behura
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
Prejith Pavanan
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
mgnboy
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
alullah
 
mobile phones
mobile phonesmobile phones
mobile phones
gabriela-technoteacher
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
Dr-Ahmed Elkorany
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libre
Navin Mishra
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
Hasnain Yaseen
 

Similar to Presentation1 (20)

Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
 
mobile phones
mobile phonesmobile phones
mobile phones
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libre
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
 

Recently uploaded

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 

Recently uploaded (20)

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 

Presentation1

  • 2. Content o Introduction o Operation o Block diagram o Range of jammer o Applications
  • 3.
  • 4.  A GSM jammer is a device that transmit signals on the same frequency at which the GSM jammer system operates , this is success when the mobile phones in the area where the jammer is located is disabled.  Communication jamming were first developed and used by military.  Nowadays the mobile jammer or cell phone jammer software were becoming civilian products rather than electronic warfare devices since with increasing the number of mobile phone users the need to disable mobile phones in specific places where the ringing of cell phones is disruptive has increased.
  • 5. • These places include worship places , university lecture rooms, libraries , concrete halls ,meeting rooms and other places where silence is appreciated.
  • 6. • Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high-end devices block all frequencies at once and others can be tuned to specific frequencies. • To jam a cell phone, all you need is a device that broadcasts on the correct frequencies . Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted.
  • 7. OPERATION • Jamming devices overpower the cell phones by transmitting a signal on the same frequency as the cell phone and at a high enough power that the two signals collide and cancel each other out. • Cell phones are full-duplex devices, which mean they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones , which has the effect of blocking both.
  • 8.  Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming . Disrupting a cell phone is the same as jamming any other type of radio communication.  A cell phone works by communicating with its service network through a cell tower or base station. Cell towers divide a city into small areas, or cells. As a cell phone user drives down the street, the signal is handed from tower to tower
  • 9.  A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the town.
  • 10.  It's a called a denial-of-service attack . The jammer denies service of the radio spectrum to the cell-phone users within range of the jamming device. Older jammers sometimes were limited to working on phones using only analog or older digital mobile phone standards.
  • 11.  The power of the jammer's effect can vary widely based on factors such as proximity to towers, indoor and outdoor settings, presence of buildings and landscape, even temperature and humidity play a role.  There are concerns that crudely designed jammers may disrupt the functioning of medical devices such as pacemakers.
  • 12. Jamming Techniques There are several ways to jam an RF device. The three most common techniques can be categorized as follows: 1. Spoofing: In this kind of jamming, the device forces the mobile to turn off itself. This type is very difficult to be implemented since the jamming device first detects any mobile phone in a specific area, then the device sends the signal to disable the mobile phone.
  • 13. 2. Shielding Attacks : This is known as TEMPEST or EMF shielding. This kind requires closing an area in a faraday cage so that any device inside this cage can not transmit or receive RF signal from outside of the cage. This area can be as large as buildings, for example. 3. Denial of Service : This technique is referred to DOS. In this technique, the device transmits a noise signal at the same operating frequency of the mobile phone in order to decrease the signal- to-noise ratio (SNR) of the mobile under its minimum value. This kind of jamming technique is the simplest one since the device is always on.
  • 14. Block diagram of GSM jammer  Size of the cell phone jammers are made to look like actual cell phone . others are briefcase sized or larger . the biggest jammers are used by police and military
  • 15. Range of Jammer  Most jammers have only a range of 50 to80 feet and will effectively jam only our immediate surroundings low level jammers will effectively jam only 30 feet(9m).  Higher powered units create a cell free zone like football field . It can shutdown service up to 1.6 km.
  • 16. Applications of jammer  A phone jammer provides the ultimate solution in any area where cellular communications frequently cause nuisance either by loud incoming call rings or resulting in loud telephone conversations.  Cell phone jamming devices were originally developed for military to interrupt communication between criminal and terrorists.
  • 17. Conclusion Every technology has GOOD aspect as well as BAD aspect the important thing is, how we use it.