SlideShare une entreprise Scribd logo
1  sur  14
CCeellll PPhhoonnee JJaammmmeerr 
PPrreesseenntteedd bbyy::-- 
AAbbhhiisshheekk GGuuppttaa 
0077//EECCEE//003344
CCoonntteennttss 
• What it is? 
• Is it useful? 
• How it can be destructive? 
• How do they work? 
• Some quick numbers? 
• Development over time 
• Can anyone have it for personal use? 
• Conclusion 
• References and bibliography
WWhhaatt iiss iitt?? 
Cell phone 
jamming is the use 
of an electronic 
device to prevent 
the transferring of 
data through a 
wireless phone
iiss JJaammmmiinngg uusseeffuull?? 
Jammers can be used practically 
anywhere 
Jammers are used primarily where silence 
is necessary or data transfer might be 
destructive 
Jammers are simple to build and use
Why might cell phone use 
be destructive? 
As wireless phones rapidly overtook society in the 21st 
century, many problems arose with the quick, easy 
option to transfer data either by voice or files through 
them such as : Espionage, Exposure of images, 
Recording conversation or video remotely, Cheating 
(Academically), etc.
hhooWW ddoo tthheeyy WWoorrkk?? 
Jammers simply overflow 
the frequency used by 
wireless phones with 
radio waves 
Enough interference 
caused by these waves 
will prevent 
communication between 
a wireless phone and a 
base tower
Some Jammers are small, 
hand-held sized devices 
while others can be very 
large 
Smaller Jammers interfere 
mostly with the wireless 
phones themselves while 
devices with larger radii may 
interfere with the towers 
directly
ssoommee QQuuiicckk nnuummbbeerrss…… 
WWiirreelleessss pphhoonnee nneettwwoorrkk rraannggeess 
ggeenneerraallllyy ffrroomm 880000--11990000MMhhzz 
SSmmaallll JJaammmmeerrss bblloocckk aallll 
ccoommmmuunniiccaattiioonn iinn tthhiiss rraannggee ffoorr aa 3300 
fftt rraaddiiuuss 
CCoommmmeerrcciiaall ssiizzee JJaammmmeerrss ccaann bblloocckk 
aallll ccoommmmuunniiccaattiioonn ffoorr 55 mmiilleess
 Originally much of the technology associated with jamming was 
developed for military purposes 
 A huge part of security in the military is data security; Jamming 
communications signals locally can prevent the loss of data 
 Some Law Enforcement agencies use Jammers to prevent 
criminals from communicating 
 Law Enforcement and Military both use Jammers for preventing 
signals from certain kinds of remote explosive detonation devices
DDeevveellooppmmeenntt oovveerr 
ttiimmee 
• Jammers originally worked on 
analog signals 
• Eventually Jamming was necessary 
on digital networks 
• Newer Jammers will block AMPS, 
iDEN, and GSM networks
CCaann ii hhaavvee oonnee?? 
• OOff ccoouurrssee nnoott ((lleeggaallllyy))!! JJaammmmeerrss aarree hhiigghhllyy iilllleeggaall 
ttoo cciivviilliiaannss 
• WWoorrllddwwiiddee tthheeyy aarree uusseedd iinn LLiibbrraarriieess,, BBaannkkss,, 
PPrriissoonnss,, HHoossppiittaallss,, CChhuurrcchheess,, MMoovviiee tthheeaatteerrss,, 
aanndd ootthheerr ppllaacceess wwhheerree llooccaallss oorr ggoovvtt.. hhaavvee 
ddeeeemmeedd wwiirreelleessss pphhoonnee uussee mmoorree ooff aa pprroobblleemm 
tthhaann aa pplluuss
CCoonnCClluussiioonnss 
A cell phone jammer can be very helpful in 
the reduction of crime rate cause by the 
misuse of cell phone. 
Government, Military, Multinational 
organization, institution etc., can check their 
information leakage through the use of 
jammers. 
Proper use of it have lots of benefits but 
misuse of jammer can have very destructive 
results.
References & Bibliography 
 http://electronics.howstuffworks.com 
/cell-phone-jammer.htm 
 www.phonejammer.com 
 http://en.wikipedia.org/wiki/Mobile_ 
phone_jammer 
 www.jammers.in
Cell phone jammer

Contenu connexe

Tendances (20)

MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 

Similaire à Cell phone jammer

Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Emerging nanotechnology share
Emerging nanotechnology share Emerging nanotechnology share
Emerging nanotechnology share kiritthakor
 
Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)3G4G
 
Digital literacy
Digital literacyDigital literacy
Digital literacyLuísa Lima
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALgeorgekurianpottackal
 
Electronic Surveillance by Kamal
Electronic Surveillance by KamalElectronic Surveillance by Kamal
Electronic Surveillance by KamalJotham Brad
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersEnergySec
 
silentsoundtechnology-131124090312-phpapp01.pptx
silentsoundtechnology-131124090312-phpapp01.pptxsilentsoundtechnology-131124090312-phpapp01.pptx
silentsoundtechnology-131124090312-phpapp01.pptx20269vinay
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad1122334411223344
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital eraRicardo de Almeida
 

Similaire à Cell phone jammer (20)

Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Emerging nanotechnology share
Emerging nanotechnology share Emerging nanotechnology share
Emerging nanotechnology share
 
Network security
Network securityNetwork security
Network security
 
Home automation
Home automationHome automation
Home automation
 
Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)
 
Police Proposal
Police ProposalPolice Proposal
Police Proposal
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
 
Electronic Surveillance by Kamal
Electronic Surveillance by KamalElectronic Surveillance by Kamal
Electronic Surveillance by Kamal
 
IT unit 1
IT unit 1IT unit 1
IT unit 1
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
silentsoundtechnology-131124090312-phpapp01.pptx
silentsoundtechnology-131124090312-phpapp01.pptxsilentsoundtechnology-131124090312-phpapp01.pptx
silentsoundtechnology-131124090312-phpapp01.pptx
 
Digital vs analogue
Digital vs analogueDigital vs analogue
Digital vs analogue
 
Home security
Home securityHome security
Home security
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 

Dernier

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Dernier (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

Cell phone jammer

  • 1. CCeellll PPhhoonnee JJaammmmeerr PPrreesseenntteedd bbyy::-- AAbbhhiisshheekk GGuuppttaa 0077//EECCEE//003344
  • 2. CCoonntteennttss • What it is? • Is it useful? • How it can be destructive? • How do they work? • Some quick numbers? • Development over time • Can anyone have it for personal use? • Conclusion • References and bibliography
  • 3. WWhhaatt iiss iitt?? Cell phone jamming is the use of an electronic device to prevent the transferring of data through a wireless phone
  • 4. iiss JJaammmmiinngg uusseeffuull?? Jammers can be used practically anywhere Jammers are used primarily where silence is necessary or data transfer might be destructive Jammers are simple to build and use
  • 5. Why might cell phone use be destructive? As wireless phones rapidly overtook society in the 21st century, many problems arose with the quick, easy option to transfer data either by voice or files through them such as : Espionage, Exposure of images, Recording conversation or video remotely, Cheating (Academically), etc.
  • 6. hhooWW ddoo tthheeyy WWoorrkk?? Jammers simply overflow the frequency used by wireless phones with radio waves Enough interference caused by these waves will prevent communication between a wireless phone and a base tower
  • 7. Some Jammers are small, hand-held sized devices while others can be very large Smaller Jammers interfere mostly with the wireless phones themselves while devices with larger radii may interfere with the towers directly
  • 8. ssoommee QQuuiicckk nnuummbbeerrss…… WWiirreelleessss pphhoonnee nneettwwoorrkk rraannggeess ggeenneerraallllyy ffrroomm 880000--11990000MMhhzz SSmmaallll JJaammmmeerrss bblloocckk aallll ccoommmmuunniiccaattiioonn iinn tthhiiss rraannggee ffoorr aa 3300 fftt rraaddiiuuss CCoommmmeerrcciiaall ssiizzee JJaammmmeerrss ccaann bblloocckk aallll ccoommmmuunniiccaattiioonn ffoorr 55 mmiilleess
  • 9.  Originally much of the technology associated with jamming was developed for military purposes  A huge part of security in the military is data security; Jamming communications signals locally can prevent the loss of data  Some Law Enforcement agencies use Jammers to prevent criminals from communicating  Law Enforcement and Military both use Jammers for preventing signals from certain kinds of remote explosive detonation devices
  • 10. DDeevveellooppmmeenntt oovveerr ttiimmee • Jammers originally worked on analog signals • Eventually Jamming was necessary on digital networks • Newer Jammers will block AMPS, iDEN, and GSM networks
  • 11. CCaann ii hhaavvee oonnee?? • OOff ccoouurrssee nnoott ((lleeggaallllyy))!! JJaammmmeerrss aarree hhiigghhllyy iilllleeggaall ttoo cciivviilliiaannss • WWoorrllddwwiiddee tthheeyy aarree uusseedd iinn LLiibbrraarriieess,, BBaannkkss,, PPrriissoonnss,, HHoossppiittaallss,, CChhuurrcchheess,, MMoovviiee tthheeaatteerrss,, aanndd ootthheerr ppllaacceess wwhheerree llooccaallss oorr ggoovvtt.. hhaavvee ddeeeemmeedd wwiirreelleessss pphhoonnee uussee mmoorree ooff aa pprroobblleemm tthhaann aa pplluuss
  • 12. CCoonnCClluussiioonnss A cell phone jammer can be very helpful in the reduction of crime rate cause by the misuse of cell phone. Government, Military, Multinational organization, institution etc., can check their information leakage through the use of jammers. Proper use of it have lots of benefits but misuse of jammer can have very destructive results.
  • 13. References & Bibliography  http://electronics.howstuffworks.com /cell-phone-jammer.htm  www.phonejammer.com  http://en.wikipedia.org/wiki/Mobile_ phone_jammer  www.jammers.in