尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Department of Computer Science & Engineering
MLR INSTITUTE OF TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043.
2016-17
A
TECHNICAL SEMINAR
on
“MOBILE JAMMER”
Submitted in partial fulfillment of the
Requirements for the award of the degree of
Bachelor of Technology
In
Computer Science & Engineering
By
N.DEEKSHITH -13R21A0529
UNDER THE GUIDANCE OF
Mr. P.DAYAKAR (Associate professor)
Department of Computer Science & Engineering
MLR INSTITUTE OF TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043.
CERTIFICATE
This is to certify that the project entitled “MOBILE JAMMER” by,
N.DEEKSHITH (13R21A0529) , has been submitted in the partial fulfillment of the
requirements for the award of degree of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results
embodied in this project have not been submitted to any other University or Institution for
the award of any degree or diploma.
Internal Guide Head of the Department
Mr. P.DAYAKAR Dr N.CHANDRA SEKHAR REDDY
Associate Professor Professor
DECLARATION
I hereby declare that the project entitled “MOBILE JAMMER” is the work done
during the period of March 2017 and is submitted in the partial fulfillment of the
requirements for the award of degree of Bachelor of technology in Computer Science and
Engineering from Jawaharlal Nehru Technology University, Hyderabad. The results
embodied in this project have not been submitted to any other university or Institution for
the award of any degree or diploma.
N.DEEKSHITH (13R21A0529)
ACKNOWLEDGEMENT
There are many people who helped me directly and indirectly to complete my project
successfully. I would like to take this opportunity to thank one and all.
First of all I would like to express my deep gratitude towards my internal
guide Mr. P.DAYAKAR, Associate Professor, Department of CSE for his support in the
completion of my dissertation. I wish to express my sincere thanks to
Dr.N.CHANDRASEKHAR REDDY, HOD, Dept. of CSE and also to our Principal Dr.
P BHASKARA REDDY for providing the facilities to complete the dissertation.
I would like to thank all our faculty and friends for their help and constructive
criticism during the project period. Finally, I am very much indebted to our parents for their
moral support and encouragement to achieve goals.
N.DEEKSHITH (13R21A0529)
ABSTRACT
A GSM Jammer or cell phone jammer is a device that transmit signal on the same
frequency at which the GSM system operates, the jamming success when the mobile
phones in the area where the jammer is located are disabled.
Communication jamming devices were first developed and used by military. Where
tactical commanders use RF communications to exercise control of their forces, an
enemy has interest in those communications. This interest comes from the
fundamental area of denying the successful transport of the information from the
sender to the receiver.
Nowadays the mobile jammer devices or cell phone jammer software are becoming
civilian products rather than electronic warfare devices, since with the increasing
number of the mobile phone users the need to disable mobile phones in specific
places where the ringing of cell phone would be disruptive has increased. These
places include worship places, university lecture rooms, libraries, concert halls,
meeting rooms, and other places where silence is appreciated
CONTENTS
Pg.
No
 Introduction to How Cell-phone Jammers Work
1
 Jamming Basics
1
 How it works
2
 Inside a Cell-Phone Jammer
3
 Where Are Cell-Phone Jammers Used
4
 The Legal Issues
4
 Alternatives To Jamming
5
 Lots More Information
 How Cell-Phone Works
6
 How Radio Waves Works
7
 How Lock-Picking Works
7
 How Radio Works
8
 Advantages for Cell-Phone Jamming
9
 Disadvantages for Cell-Phone Jamming
9
 Conclusion
10
 References
10
INTRODUCTION
Cell phones are everywhere these days. According to the
Cellular Telecommunications and Internet Association, almost 169
million people in the United States had cell-phone service in
January 2004. And cell phones are even more ubiquitous in
Europe.
It's great to be able to call anyone at anytime.
Unfortunately, restaurants, movie theaters, concerts, shopping
malls and churches all suffer from the spread of cell phones
because not all cell-phone users know when to stop talking. Who
hasn't seethed through one side of a conversation about an
incredibly personal situation as the talker shares intimate details
with his friend as well as everyone else in the area?
While most of us just grumble and move on, some people
are actually going to extremes to retaliate. Cell phones are
basically handheld two-way radios. And like any radio, the signal
can be disrupted, or jammed.
JAMMING BASICS
Disrupting a cell phone is the same as jamming any other
type of radio communication A cell phone works by
communicating with its service network through a cell tower or
base station. Cell towers divide a city into small areas, or cells. As
a cell-phone user drives down the street, the signal is handed from
tower to tower
1
A jamming device transmits on the same radio frequencies
as the cell phone, disrupting the communication between the
phone and the cell-phone base station in the tower.
It's a called a denial-of-service attack. The jammer denies
service of the radio spectrum to the cell-phone users within range
of the jamming device.
HOW IT WORKS
Jamming devices overpower the cell phone by transmitting
a signal on the same frequency and at a high enough power that the
two signals collide and cancel each other out. Cell phones are
designed to add power if they experience low-level interference, so
the jammer must recognize and match the power increase from the
phone.
Cell phones are full-duplex devices, which means they use
two separate frequencies, one for talking and one for listening
simultaneously. Some jammers block only one of the frequencies
used by cell phones, which has the effect of blocking both. The
phone is tricked into thinking there is no service because it can
receive only one of the frequencies.
Less complex devices block only one group of frequencies,
while sophisticated jammers can block several types of networks at
once to head off dual-mode or tri-mode phones that automatically
switch among different network types to find an open signal. Some
of the high-end devices block all frequencies at once, and others
can be tuned to specific frequencies.
To jam a cell phone, all you need is a device that
broadcasts on the correct frequencies. Although different cellular
systems process signals differently, all cell-phone networks use
radio signals that can be interrupted. GSM, used in digital cellular
and PCS-based systems, operates in the 900-MHz and 1800-MHz
bands in Europe and Asia and in the 1900-MHz (sometimes
referred to as 1.9-GHz) band in the United States. Jammers can
broadcast on any frequency and are effective against AMPS,
CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems.
Old-fashioned analog cell phones and today's digital devices are
equally susceptible to jamming.
2
The actual range of the jammer depends on its power and
the local environment, which may include hills or walls of a
building that block the jamming signal. Low-powered jammers
block calls in a range of about 30 feet (9 m). Higher-powered units
create a cell-free zone as large as a football field. Units used by
law enforcement can shut down service up to 1 mile (1.6 km) from
the device
INSIDE A CELL-PHONE
JAMMER
Electronically speaking, cell-phone jammers are very basic
devices. The simplest just have an on/off switch and a light that
indicates it's on. More complex devices have switches to activate
jamming at different frequencies. Components of a jammer
include:
Antenna:-
Every jamming device has an antenna to send the signal.
Some are contained within an electrical cabinet. On stronger
devices, antennas are external to provide longer range and may be
tuned for individual frequencies.
Circuitry :-
The main electronic components of a jammer are:
 Voltage-controlled oscillator - Generates the radio
signal that will interfere with the cell phone signal
 Tuning circuit - Controls the frequency at which the
jammer broadcasts its signal by sending a particular
voltage to the oscillator
 Noise generator - Produces random electronic output in a
specified frequency range to jam the cell-phone network
signal (part of the tuning circuit)
 RF amplification (gain stage) - Boosts the power of
the radio frequency output to high enough levels to jam
a signal
Power supply :-
Smaller jamming devices are battery operated. Some
look like cell phone and use cell-phone batteries. Stronger
devices can be plugged into a standard outlet or wired into a
vehicle's electrical system.
3
WHERE ARE CELL-PHONE
JAMMERS USED
Cell phone jamming devices were originally developed for
law enforcement and the military to interrupt communications by
criminals and terrorists. The bombs that blew up commuter trains
in Spain in March 2004, as well as blasts in Bali in October 2002
and Jakarta in August 2003, all relied on cell phones to trigger
explosives. It has been widely reported that a cell-phone jammer
thwarted an assassination attempt on Pakistani President
Musharraf in December 2003. When President Bush visited
London in November 2004, it was reported that British police
considered using jammers to protect the president's motorcade
through London.
During a hostage situation, police can control when and
where a captor can make a phone call. Police can block phone calls
during a drug raid so suspects can't communicate outside the area.
Cell-phone jammers can be used in areas where radio
transmissions are dangerous, such as areas with a potentially
explosive atmosphere, such as chemical storage facilities or grain
elevators. The TRJ-89 jammer from Antenna System & Supplies
Inc. carries its own electrical generator and can block cellular
communications in a 5-mile (8-km) radius.
Corporations use jammers to stop corporate espionage by
blocking voice transmissions and photo transmissions from camera
phones. On the more questionable end of the legitimacy spectrum,
there are rumors that hotel chains install jammers to block guests'
cell-phone usage and force them to use in-room phones at high
rates
LEGAL ISSUES
In the United States, United Kingdom, Australia and many
other countries, blocking cell-phone services (as well as any other
electronic transmissions) is against the law. In the United States,
cell-phone jamming is covered under the Communications Act of
1934, which prohibits people from "willfully or maliciously
interfering with the radio communications of any station licensed
or authorized" to operate. In fact, the "manufacture, importation,
sale or offer for sale, including advertising, of devices designed to
block or jam wireless transmissions is prohibited" as well.
4
Jamming is seen as property theft, because a private
company has purchased the rights to the radio spectrum, and
jamming the spectrum is akin to stealing the property the company
has purchased. It also represents a safety hazard because jamming
blocks all calls in the area, not just the annoying ones. Jamming a
signal could block the call of a babysitter frantically trying to
contact a parent or a some one trying to call for an ambulance.
The Federal Communications Commission is charged with
enforcing jamming laws. However, the agency has not yet
prosecuted anyone for cell-phone jamming. Under the U.S. rules,
fines for a first offense can range as high as $11,000 for each
violation or imprisonment for up to one year, and the device used
may also be seized and forfeited to the government.
In most countries, it is illegal for private citizens to jam
cell-phone transmission, but some countries are allowing
businesses and government organizations to install jammers in
areas where cell-phone use is seen as a public nuisance. In
December 2004, France legalized cell-phone jammers in movie
theaters, concert halls and other places with performances. France
is finalizing technology that will let calls to emergency services go
through. India has installed jammers in parliament and some
prisons. It has been reported that universities in Italy have adopted
the technology to prevent cheating. Students were taking photos of
tests with their camera phones and sending them to classmates.
ALTERNATIVES TO
JAMMING
While the law clearly prohibits using a device to actively
disrupt a cell-phone signal, there are no rules against passive cell-
phone blocking. That means using things like wallpaper or
building materials embedded with metal fragments to prevent cell-
phone signals from reaching inside or outside the room. Some
buildings have designs that block radio signals by accident due to
thick concrete walls or a steel skeleton.
Companies are working on devices that control a cell
phone but do not "jam the signal." One device sends incoming
calls to voicemail and blocks outgoing calls. The argument is that
the phone still works, so it is technically not being jammed. It is a
legal gray area that has not been ruled on by the FCC as of April
2005.
5
Cell-phone alerters are available that indicate the presence of a
cell-phone signal. These have been used in hospitals where cell-
phone signals could interfere with sensitive medical equipment.
When a signal is detected, users are asked to turn off their phones.
For a less technical solution, Coudal Partners, a design firm
in Chicago, has launched the SHHH, the Society for HandHeld
Hushing. At its Web site, you can download a note to hand to
people conducting annoying cell-phone conversations, expressing
your lack of interest in what they're talking about.
LOTS MORE INFORMATION
HOW CELL PHONE WORKS
Millions of people in the United States and around the
world use cellular phones. They are such great gadgets -- with a
cell phone, you can talk to anyone on the planet from just about
anywhere!
These days, cell phones provide an incredible array of
functions, and new ones are being added at a
breakneck pace. Depending on the cell-phone model, you can:
 Store contact information
 Make task or to-do lists
 Keep track of appointments and set reminders
 Use the built-in calculator for simple math
 Send or receive e-mail
 Get information (news, entertainment, stock quotes) from
the Internet
 Play simple games
• Integrate other devices such as PDAs, MP3 players and
GPS receivers
But have you ever wondered how a cell phone works? What makes
it different from a regular phone? What do all those confusing
terms like PCS, GSM, CDMA and TDMA mean? In this article,
we will discuss the technology behind cell phones so that you can
see how amazing they really are.
6
HOW RADIO SCANNERS
WORKS
The air around you is bursting with radio waves. You know
that you can flip on the AM/FM radio in your car and receive
dozens of stations. You can flip on a CB radio and receive 40
more. You can flip on a TV and receive numerous broadcast
channels. Cell phones can send and receive hundreds of
frequencies. And this is just the tip of the radio spectrum iceberg.
Literally tens of thousands of other radio broadcasts and
conversations are zipping past you as you read this article -- police
officers, firefighters, ambulance drivers, paramedics, sanitation
workers, space shuttle astronauts, race car drivers, and even babies
with their monitors are transmitting radio waves all around you at
this very moment!
To tap into this ocean of electromagnetic dialog and hear
what all of these people are talking about, all you need is a
scanner. A scanner is basically a radio receiver capable of
receiving multiple signals. Generally, scanners pick up signals in
the VHF to UHF range (see How the Radio Spectrum Works for
details on these frequency bands).
Radio scanners are very portable and affordable. In this
article, we will look at the basics of scanner operation, examine
radio scanning as a hobby, and show you how to get started
listening to public airwaves you may not have known existed!
HOW LOCK PICKING WORKS
Most people carry five to 10 keys with them whenever they
go out. On your key ring you might have several keys for the
house, one or two more for the car and a few for the office or a
friend's house. Your key ring is a clear demonstration of just how
ubiquitous lock technology is: You probably interact with locks
dozens of times every week.
The main reason we use locks everywhere is that they
provide us with a sense of security. But in movies and on
television, spies, detectives and burglars can open a lock very
easily, sometimes using only a couple of paper clips. This is a
sobering thought, to say the least: Is it really possible for someone
to open a lock so easily?
HOW RADIO WORKS
"Radio waves" transmit music, conversations, pictures and
data invisibly through the air, often over millions of miles -- it
happens every day in thousands of different ways! Even though
radio waves are invisible and completely undetectable to humans,
they have totally changed society. Whether we are talking about a
cell phone, a baby monitor, a cordless phone or any one of the
thousands of other wireless technologies, all of them use radio
waves to communicate.
Here are just a few of the everyday technologies that depend on
radio waves:
• AM and FM radio broadcasts
• Cordless phones
• Garage door openers
• Wireless networks
• Radio-controlled toys
• Television broadcasts
• Cell phones
• GPS receivers
• Ham radios
• Satellite communications
• Police radios
• Wireless clocks
The list goes on and on... Even things like radar and
microwave ovens depend on radio waves. Things like
communication and navigation satellites would be impossible
without radio waves, as would modern aviation -- an airplane
depends on a dozen different radio systems. The current trend
toward wireless Internet access uses radio as well, and that means
a lot more convenience in the future!
The funny thing is that, at its core, radio is an incredibly simple
technology. With just a couple of electronic components that cost
at most a dollar or two, you can build simple radio transmitters and
receivers. The story of how something so simple has become a
bedrock technology of the modern world is fascinating!
8
ADVANTAGES
 It is very necessary using cell phone jammers in the most
divine temples like Tirumala.
 We can provide security to V.I.P’s from the anti-social
elements.
 By using cell phone jammers we can maintain law and
order for maintaining peace.
 By cell phone jammers we can’t disturb other people in the
public places like restaurants, shopping places.
 It is very necessary to use cell phone jammers in naxal
feared places. This helps the authoritites to work
their duty softly.
 By using cell phone jammers in the vehicles, we can
overcome accidents problem which is very helpful to the
people.
DISADVANTAGES
 Cost oriented.
 Requires special hardware.
 People feel inconvenience.
 V.I.P.’s may loose some impartant calls.
9
CONCLUSION
Cell phone jammers are very usefull to the society from the
anti-social elements. We can save our national leaders. We can
restrict the communication network between the anti-social
elements by using the cell phone jammers. Cell phone jammers
prevent the students from carrying cell phones to the colleges. As
everything goes fine, it is very necessary to implement in all the
colleges.
Reference
• www.google.com
• www.wikipedia.org
• www.studymafia.org

More Related Content

What's hot

Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
Mukul Agarwal
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
Farhanullah khan
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
Amar Raj
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
Manu M
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
ARYAN KUMAR
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
Ronson Calvin Fernandes
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
Mehul Ranavasiya
 
Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detector
Sumedh Vartak
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
Mahmoud Abdeen
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
How cell phone work?
How cell phone work?How cell phone work?
How cell phone work?
kgaurav113
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Shivam Jaiswal
 
Seminar report
Seminar reportSeminar report
Seminar report
Ankit Gupta
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
Taruni Kancharla
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
Sudhanshu kumar Sah
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
Abdul Haseeb
 
wireless mobile charging using microwaves
wireless mobile charging using microwaveswireless mobile charging using microwaves
wireless mobile charging using microwaves
Kaushlendra Singh
 

What's hot (20)

Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detector
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
How cell phone work?
How cell phone work?How cell phone work?
How cell phone work?
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
wireless mobile charging using microwaves
wireless mobile charging using microwaveswireless mobile charging using microwaves
wireless mobile charging using microwaves
 

Viewers also liked

I locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPTI locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPT
Bhadra Gowdra
 
plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
Bhadra Gowdra
 
BTech Resume
BTech Resume BTech Resume
BTech Resume
Bhadra Gowdra
 
The htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual AnalysisThe htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual Analysis
Gerrit Dreher
 
Content of thunderbolt by amit
Content of thunderbolt by amitContent of thunderbolt by amit
Content of thunderbolt by amit
Amit Sinha
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
Bhadra Gowdra
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
Bhadra Gowdra
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
Bhadra Gowdra
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
Bhadra Gowdra
 
Distributed Control System (Presentation)
Distributed Control System (Presentation)Distributed Control System (Presentation)
Distributed Control System (Presentation)
Thunder Bolt
 
Smart card
Smart cardSmart card
Smart card
Bhadra Gowdra
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
Bhadra Gowdra
 
ep
epep
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
Bhadra Gowdra
 
DEva Report
DEva ReportDEva Report
DEva Report
DEVENDRA BORASE
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
patna
 
OLED report 2014
OLED report 2014OLED report 2014
OLED report 2014
Ananthkrishn
 
Thunderbolt
ThunderboltThunderbolt
Thunderbolt
raghav aggarwal
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
harrynik
 
Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
Bhadra Gowdra
 

Viewers also liked (20)

I locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPTI locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPT
 
plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
 
BTech Resume
BTech Resume BTech Resume
BTech Resume
 
The htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual AnalysisThe htc thunder bolt™ inspired by you - A Visual Analysis
The htc thunder bolt™ inspired by you - A Visual Analysis
 
Content of thunderbolt by amit
Content of thunderbolt by amitContent of thunderbolt by amit
Content of thunderbolt by amit
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
 
Distributed Control System (Presentation)
Distributed Control System (Presentation)Distributed Control System (Presentation)
Distributed Control System (Presentation)
 
Smart card
Smart cardSmart card
Smart card
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
 
ep
epep
ep
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
 
DEva Report
DEva ReportDEva Report
DEva Report
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
OLED report 2014
OLED report 2014OLED report 2014
OLED report 2014
 
Thunderbolt
ThunderboltThunderbolt
Thunderbolt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
 

Similar to mobile-jammer

Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
Amit sundaray
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
ijtsrd
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
IJMER
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd Iaetsd
 
Presentation1
Presentation1Presentation1
Presentation1
poojithakannikanti
 
Violent gesture
Violent gestureViolent gesture
Violent gesture
Hazi Roshan
 
Cell phone detector
Cell phone detectorCell phone detector
4g
4g4g
Jamer
JamerJamer
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
Prejith Pavanan
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copy
Pranoosh T
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Alok Gupta
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
DyarAbubakr
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
Prejith Pavanan
 
wireless_technologies
wireless_technologieswireless_technologies
wireless_technologies
Nikhil Bhardwaj
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
Hasnain Yaseen
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
Nishu Vora
 
Mobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsMobile Tower Radiations & its effects
Mobile Tower Radiations & its effects
Nishu Vora
 

Similar to mobile-jammer (20)

Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Presentation1
Presentation1Presentation1
Presentation1
 
Violent gesture
Violent gestureViolent gesture
Violent gesture
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
4g
4g4g
4g
 
Jamer
JamerJamer
Jamer
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copy
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
 
wireless_technologies
wireless_technologieswireless_technologies
wireless_technologies
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
 
Mobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsMobile Tower Radiations & its effects
Mobile Tower Radiations & its effects
 

More from Bhadra Gowdra

Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
Bhadra Gowdra
 
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Bhadra Gowdra
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
Bhadra Gowdra
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
Bhadra Gowdra
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
Bhadra Gowdra
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
Bhadra Gowdra
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
Bhadra Gowdra
 
Fun Food
Fun FoodFun Food
Fun Food
Bhadra Gowdra
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
Bhadra Gowdra
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
Bhadra Gowdra
 

More from Bhadra Gowdra (10)

Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
 
Fun Food
Fun FoodFun Food
Fun Food
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
 

Recently uploaded

So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 

Recently uploaded (20)

So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 

mobile-jammer

  • 1. Department of Computer Science & Engineering MLR INSTITUTE OF TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University, Hyderabad) DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043. 2016-17 A TECHNICAL SEMINAR on “MOBILE JAMMER” Submitted in partial fulfillment of the Requirements for the award of the degree of Bachelor of Technology In Computer Science & Engineering By N.DEEKSHITH -13R21A0529 UNDER THE GUIDANCE OF Mr. P.DAYAKAR (Associate professor)
  • 2. Department of Computer Science & Engineering MLR INSTITUTE OF TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University, Hyderabad) DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043. CERTIFICATE This is to certify that the project entitled “MOBILE JAMMER” by, N.DEEKSHITH (13R21A0529) , has been submitted in the partial fulfillment of the requirements for the award of degree of Bachelor of Technology in Computer Science and Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results embodied in this project have not been submitted to any other University or Institution for the award of any degree or diploma. Internal Guide Head of the Department Mr. P.DAYAKAR Dr N.CHANDRA SEKHAR REDDY Associate Professor Professor
  • 3. DECLARATION I hereby declare that the project entitled “MOBILE JAMMER” is the work done during the period of March 2017 and is submitted in the partial fulfillment of the requirements for the award of degree of Bachelor of technology in Computer Science and Engineering from Jawaharlal Nehru Technology University, Hyderabad. The results embodied in this project have not been submitted to any other university or Institution for the award of any degree or diploma. N.DEEKSHITH (13R21A0529)
  • 4. ACKNOWLEDGEMENT There are many people who helped me directly and indirectly to complete my project successfully. I would like to take this opportunity to thank one and all. First of all I would like to express my deep gratitude towards my internal guide Mr. P.DAYAKAR, Associate Professor, Department of CSE for his support in the completion of my dissertation. I wish to express my sincere thanks to Dr.N.CHANDRASEKHAR REDDY, HOD, Dept. of CSE and also to our Principal Dr. P BHASKARA REDDY for providing the facilities to complete the dissertation. I would like to thank all our faculty and friends for their help and constructive criticism during the project period. Finally, I am very much indebted to our parents for their moral support and encouragement to achieve goals. N.DEEKSHITH (13R21A0529)
  • 5. ABSTRACT A GSM Jammer or cell phone jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. Communication jamming devices were first developed and used by military. Where tactical commanders use RF communications to exercise control of their forces, an enemy has interest in those communications. This interest comes from the fundamental area of denying the successful transport of the information from the sender to the receiver. Nowadays the mobile jammer devices or cell phone jammer software are becoming civilian products rather than electronic warfare devices, since with the increasing number of the mobile phone users the need to disable mobile phones in specific places where the ringing of cell phone would be disruptive has increased. These places include worship places, university lecture rooms, libraries, concert halls, meeting rooms, and other places where silence is appreciated
  • 6. CONTENTS Pg. No  Introduction to How Cell-phone Jammers Work 1  Jamming Basics 1  How it works 2  Inside a Cell-Phone Jammer 3  Where Are Cell-Phone Jammers Used 4  The Legal Issues 4  Alternatives To Jamming 5  Lots More Information  How Cell-Phone Works 6  How Radio Waves Works 7  How Lock-Picking Works
  • 7. 7  How Radio Works 8  Advantages for Cell-Phone Jamming 9  Disadvantages for Cell-Phone Jamming 9  Conclusion 10  References 10 INTRODUCTION Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, almost 169 million people in the United States had cell-phone service in January 2004. And cell phones are even more ubiquitous in
  • 8. Europe. It's great to be able to call anyone at anytime. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. Who hasn't seethed through one side of a conversation about an incredibly personal situation as the talker shares intimate details with his friend as well as everyone else in the area? While most of us just grumble and move on, some people are actually going to extremes to retaliate. Cell phones are basically handheld two-way radios. And like any radio, the signal can be disrupted, or jammed. JAMMING BASICS Disrupting a cell phone is the same as jamming any other type of radio communication A cell phone works by communicating with its service network through a cell tower or base station. Cell towers divide a city into small areas, or cells. As a cell-phone user drives down the street, the signal is handed from tower to tower
  • 9. 1 A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack. The jammer denies service of the radio spectrum to the cell-phone users within range of the jamming device. HOW IT WORKS Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Cell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both. The phone is tricked into thinking there is no service because it can
  • 10. receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high-end devices block all frequencies at once, and others can be tuned to specific frequencies. To jam a cell phone, all you need is a device that broadcasts on the correct frequencies. Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-based systems, operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming. 2 The actual range of the jammer depends on its power and the local environment, which may include hills or walls of a building that block the jamming signal. Low-powered jammers block calls in a range of about 30 feet (9 m). Higher-powered units create a cell-free zone as large as a football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km) from the device INSIDE A CELL-PHONE JAMMER Electronically speaking, cell-phone jammers are very basic
  • 11. devices. The simplest just have an on/off switch and a light that indicates it's on. More complex devices have switches to activate jamming at different frequencies. Components of a jammer include: Antenna:- Every jamming device has an antenna to send the signal. Some are contained within an electrical cabinet. On stronger devices, antennas are external to provide longer range and may be tuned for individual frequencies. Circuitry :- The main electronic components of a jammer are:  Voltage-controlled oscillator - Generates the radio signal that will interfere with the cell phone signal  Tuning circuit - Controls the frequency at which the jammer broadcasts its signal by sending a particular voltage to the oscillator  Noise generator - Produces random electronic output in a specified frequency range to jam the cell-phone network signal (part of the tuning circuit)  RF amplification (gain stage) - Boosts the power of the radio frequency output to high enough levels to jam a signal Power supply :- Smaller jamming devices are battery operated. Some look like cell phone and use cell-phone batteries. Stronger devices can be plugged into a standard outlet or wired into a vehicle's electrical system. 3 WHERE ARE CELL-PHONE JAMMERS USED
  • 12. Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. The bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. It has been widely reported that a cell-phone jammer thwarted an assassination attempt on Pakistani President Musharraf in December 2003. When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London. During a hostage situation, police can control when and where a captor can make a phone call. Police can block phone calls during a drug raid so suspects can't communicate outside the area. Cell-phone jammers can be used in areas where radio transmissions are dangerous, such as areas with a potentially explosive atmosphere, such as chemical storage facilities or grain elevators. The TRJ-89 jammer from Antenna System & Supplies Inc. carries its own electrical generator and can block cellular communications in a 5-mile (8-km) radius. Corporations use jammers to stop corporate espionage by blocking voice transmissions and photo transmissions from camera phones. On the more questionable end of the legitimacy spectrum, there are rumors that hotel chains install jammers to block guests' cell-phone usage and force them to use in-room phones at high rates LEGAL ISSUES In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the law. In the United States,
  • 13. cell-phone jamming is covered under the Communications Act of 1934, which prohibits people from "willfully or maliciously interfering with the radio communications of any station licensed or authorized" to operate. In fact, the "manufacture, importation, sale or offer for sale, including advertising, of devices designed to block or jam wireless transmissions is prohibited" as well. 4 Jamming is seen as property theft, because a private company has purchased the rights to the radio spectrum, and jamming the spectrum is akin to stealing the property the company has purchased. It also represents a safety hazard because jamming blocks all calls in the area, not just the annoying ones. Jamming a signal could block the call of a babysitter frantically trying to contact a parent or a some one trying to call for an ambulance. The Federal Communications Commission is charged with enforcing jamming laws. However, the agency has not yet prosecuted anyone for cell-phone jamming. Under the U.S. rules, fines for a first offense can range as high as $11,000 for each violation or imprisonment for up to one year, and the device used may also be seized and forfeited to the government. In most countries, it is illegal for private citizens to jam cell-phone transmission, but some countries are allowing businesses and government organizations to install jammers in areas where cell-phone use is seen as a public nuisance. In December 2004, France legalized cell-phone jammers in movie theaters, concert halls and other places with performances. France is finalizing technology that will let calls to emergency services go through. India has installed jammers in parliament and some prisons. It has been reported that universities in Italy have adopted the technology to prevent cheating. Students were taking photos of tests with their camera phones and sending them to classmates.
  • 14. ALTERNATIVES TO JAMMING While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell- phone blocking. That means using things like wallpaper or building materials embedded with metal fragments to prevent cell- phone signals from reaching inside or outside the room. Some buildings have designs that block radio signals by accident due to thick concrete walls or a steel skeleton. Companies are working on devices that control a cell phone but do not "jam the signal." One device sends incoming calls to voicemail and blocks outgoing calls. The argument is that the phone still works, so it is technically not being jammed. It is a legal gray area that has not been ruled on by the FCC as of April 2005. 5 Cell-phone alerters are available that indicate the presence of a cell-phone signal. These have been used in hospitals where cell- phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones. For a less technical solution, Coudal Partners, a design firm in Chicago, has launched the SHHH, the Society for HandHeld Hushing. At its Web site, you can download a note to hand to people conducting annoying cell-phone conversations, expressing your lack of interest in what they're talking about. LOTS MORE INFORMATION HOW CELL PHONE WORKS
  • 15. Millions of people in the United States and around the world use cellular phones. They are such great gadgets -- with a cell phone, you can talk to anyone on the planet from just about anywhere! These days, cell phones provide an incredible array of functions, and new ones are being added at a breakneck pace. Depending on the cell-phone model, you can:  Store contact information  Make task or to-do lists  Keep track of appointments and set reminders  Use the built-in calculator for simple math  Send or receive e-mail  Get information (news, entertainment, stock quotes) from the Internet  Play simple games • Integrate other devices such as PDAs, MP3 players and GPS receivers But have you ever wondered how a cell phone works? What makes it different from a regular phone? What do all those confusing terms like PCS, GSM, CDMA and TDMA mean? In this article, we will discuss the technology behind cell phones so that you can see how amazing they really are. 6 HOW RADIO SCANNERS WORKS The air around you is bursting with radio waves. You know that you can flip on the AM/FM radio in your car and receive dozens of stations. You can flip on a CB radio and receive 40 more. You can flip on a TV and receive numerous broadcast channels. Cell phones can send and receive hundreds of
  • 16. frequencies. And this is just the tip of the radio spectrum iceberg. Literally tens of thousands of other radio broadcasts and conversations are zipping past you as you read this article -- police officers, firefighters, ambulance drivers, paramedics, sanitation workers, space shuttle astronauts, race car drivers, and even babies with their monitors are transmitting radio waves all around you at this very moment! To tap into this ocean of electromagnetic dialog and hear what all of these people are talking about, all you need is a scanner. A scanner is basically a radio receiver capable of receiving multiple signals. Generally, scanners pick up signals in the VHF to UHF range (see How the Radio Spectrum Works for details on these frequency bands). Radio scanners are very portable and affordable. In this article, we will look at the basics of scanner operation, examine radio scanning as a hobby, and show you how to get started listening to public airwaves you may not have known existed! HOW LOCK PICKING WORKS Most people carry five to 10 keys with them whenever they go out. On your key ring you might have several keys for the house, one or two more for the car and a few for the office or a friend's house. Your key ring is a clear demonstration of just how ubiquitous lock technology is: You probably interact with locks dozens of times every week. The main reason we use locks everywhere is that they provide us with a sense of security. But in movies and on television, spies, detectives and burglars can open a lock very easily, sometimes using only a couple of paper clips. This is a sobering thought, to say the least: Is it really possible for someone to open a lock so easily?
  • 17. HOW RADIO WORKS "Radio waves" transmit music, conversations, pictures and data invisibly through the air, often over millions of miles -- it happens every day in thousands of different ways! Even though radio waves are invisible and completely undetectable to humans, they have totally changed society. Whether we are talking about a cell phone, a baby monitor, a cordless phone or any one of the thousands of other wireless technologies, all of them use radio waves to communicate. Here are just a few of the everyday technologies that depend on radio waves: • AM and FM radio broadcasts • Cordless phones • Garage door openers • Wireless networks • Radio-controlled toys • Television broadcasts • Cell phones • GPS receivers • Ham radios • Satellite communications • Police radios • Wireless clocks The list goes on and on... Even things like radar and microwave ovens depend on radio waves. Things like communication and navigation satellites would be impossible
  • 18. without radio waves, as would modern aviation -- an airplane depends on a dozen different radio systems. The current trend toward wireless Internet access uses radio as well, and that means a lot more convenience in the future! The funny thing is that, at its core, radio is an incredibly simple technology. With just a couple of electronic components that cost at most a dollar or two, you can build simple radio transmitters and receivers. The story of how something so simple has become a bedrock technology of the modern world is fascinating! 8 ADVANTAGES  It is very necessary using cell phone jammers in the most divine temples like Tirumala.  We can provide security to V.I.P’s from the anti-social elements.  By using cell phone jammers we can maintain law and order for maintaining peace.  By cell phone jammers we can’t disturb other people in the public places like restaurants, shopping places.  It is very necessary to use cell phone jammers in naxal feared places. This helps the authoritites to work their duty softly.  By using cell phone jammers in the vehicles, we can overcome accidents problem which is very helpful to the people. DISADVANTAGES  Cost oriented.  Requires special hardware.  People feel inconvenience.
  • 19.  V.I.P.’s may loose some impartant calls. 9 CONCLUSION Cell phone jammers are very usefull to the society from the anti-social elements. We can save our national leaders. We can restrict the communication network between the anti-social elements by using the cell phone jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. As everything goes fine, it is very necessary to implement in all the colleges. Reference
  翻译: