SlideShare a Scribd company logo
1 of 23
Presented
By
Shivam Jaiswal
(0832cs121096)
1
• What is Mobile Jammer?
• History.
• How Mobile Jammer works?
• Jamming Techniques.
• Design Parameters/Specification.
• Block Diagram.
• Power Supply.
• Types of Jammer Device.
• Application.
• Future scope of Jamming Technology.
• Conclusion.
• Bibliography.
2
• A mobile phone jammer is an instrument used
to prevent cellular phones from receiving signals
from base stations.
• It is a device that transmit signal on the same
frequency at which the GSM system operates,
the jamming success when the mobile phones in
the area where the jammer is located are
disabled.
3
• Mobile Jammer were originally developed for law
enforcement and the military to interrupt
communications by criminals and terrorists.
• Some were also designed to foil the use of
certain remotely detonated explosives.
4
5
A jamming device transmits - same radio
frequencies of greater power as the cell
phone, disrupting the communication
between the phone and the cell-phone base
station in the tower. It's a called a denial-of-
service attack.
How Mobile jammer works
• This causes interference with
communication of cell phones and towers to
render the phones unusable. On most
phones, the network would be out of range.
• So Jammers work by either disrupting phone
to tower freq.. or tower to phone
frequencies.
6
• Type "A" Device: JAMMERS
• Type “B” Device: INTELLIGENT CELLULAR DISABLERS
• Type “C” Device: INTELLIGENT BEACON DISABLERS
• Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
• Type “E” Device: EMI SHIELD - PASSIVE JAMMING
7
1. Type "A" Device: JAMMERS
This type of device comes equipped with
several independent oscillators transmitting
’jamming signals’ capable of blocking
frequencies used by paging devices as well
as those used by cellular systems control
channels for call establishment.
8
2.Type “B” Device: INTELLIGENT CELLULAR
DISABLERS
Unlike jammers, Type ”B” devices do not
transmit an interfering signal on the control
channels. The device, when located in a
designated ’quite’ area, functions as a ’detector’.
It has a unique identification number for
communicating with the cellular base station.
9
3. Type “C” Device (Intelligent Beacon Disablers)
Unlike jammers, Type C devices do not transmit
an interfering signal on the control channels. The
device, when located in a designated ’quiet’
area, functions as a ’beacon’ and any compatible
terminal is instructed to disable its ringer or
disable its operation, while within the coverage
area of beacon.
10
4. Type “D” Device (Direct Receive &
Transmit Jammers)
This jammer behaves like a small,
independent and portable base station, which
can directly interact intelligently or
unintelligently with the operation of the local
mobile phone. The jammer is predominantly
in receive mode and will intelligently choose
to interact and block the cell Phone directly if
it is within close proximity of the jammer.
11
5. Type E Device (EMI Shield - Passive
Jamming)
This technique is using EMI suppression
techniques to make a room into what is called
Faraday cage. Although labor intensive to
construct, the Faraday cage essentially
Blocks or greatly attenuates, virtually all
electromagnetic radiation from entering or
leaving the cage - or in this case a target
room. 12
Free space loss {F}= Path Loss (dB)= 32.44 + 20
log D(km) + 20log f(MHz)
13
The frequency bands
Distance to be jammed (D)
Power calculations
14
If section Rf section
Jamming
signals
Power
supply
15
Transformer Rectifier Regulatorfilter
Amity university rajasthan 16
Contd.
Mobile Jammer
Types of cell phone jammer device. There
are many types of cell phone jammer device
which is used in our daily life .as we take a
example of class room, where we does not
want to use of cell phone than there we can use
cell phone jammer device. By this we can
produce the interface between the cell phone
base station and cell phone. resulting it
disconnect the cell from base station. and we
can not receive the any calls from base station.
For this there are many types of cell phone
jammer devices which is given as below:
17
• Remote Control Mobile jammer
• Adjustable Mobile Jammer
• School &Prison Mobile Jammer
• Explosion – Proof Mobile jammer
• Police & Military Mobile Jammer
• Portable Mobile Jammer
18
• To maintain the complete silence in library and lecture
hall
• To avoid fraud in examination hall
• To avoid disturbance in class room
• For providing security in business conference, board of
directors rooms, seminars, etc.,
• For providing calm and peaceful atmosphere in Hospitals
• Church/Mosques/Cathedral/Temple/Religious
establishment
19
• While the law clearly prohibits using a
device to actively disrupt a cell-phone
signal, there are no rules against passive
cell-phone blocking.
• Companies are working on devices that
control a cell phone but do not "jam the
signal.
20
• Every technology has good aspect as well as
bad aspect the important thing is, how we are
using it.
• Cell phone jammers are very useful to the
society from the anti-social elements. We can
save our national leaders. we can restrict the
communication network between the anti-
social elements by using the Mobile jammers.
Cell phone jammers prevent the students from
carrying cell phones to the colleges. 21
• Google
• Wikipedia
23
Mobile jammer

More Related Content

What's hot (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
CELL PHONE JAMMER
CELL PHONE JAMMERCELL PHONE JAMMER
CELL PHONE JAMMER
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming system
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
 

Viewers also liked

Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammerAmar Raj
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerMohamed Atef
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on JammingAbdul Haseeb
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portabilityamitachouliger
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyVenky Venkatesh
 
Big data by samiran parui
Big data by samiran paruiBig data by samiran parui
Big data by samiran paruiSamiran Parui
 
49540326 electronic-eye
49540326 electronic-eye49540326 electronic-eye
49540326 electronic-eyePavan Kumar
 

Viewers also liked (13)

Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Simple cell phone jammer
Simple cell phone jammerSimple cell phone jammer
Simple cell phone jammer
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portability
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Big data by samiran parui
Big data by samiran paruiBig data by samiran parui
Big data by samiran parui
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
49540326 electronic-eye
49540326 electronic-eye49540326 electronic-eye
49540326 electronic-eye
 

Similar to Mobile jammer

Similar to Mobile jammer (20)

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Ceplone
CeploneCeplone
Ceplone
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
 
Govind
GovindGovind
Govind
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Mobile jammer

  • 2. • What is Mobile Jammer? • History. • How Mobile Jammer works? • Jamming Techniques. • Design Parameters/Specification. • Block Diagram. • Power Supply. • Types of Jammer Device. • Application. • Future scope of Jamming Technology. • Conclusion. • Bibliography. 2
  • 3. • A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. • It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. 3
  • 4. • Mobile Jammer were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. • Some were also designed to foil the use of certain remotely detonated explosives. 4
  • 5. 5 A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of- service attack. How Mobile jammer works
  • 6. • This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range. • So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. 6
  • 7. • Type "A" Device: JAMMERS • Type “B” Device: INTELLIGENT CELLULAR DISABLERS • Type “C” Device: INTELLIGENT BEACON DISABLERS • Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS • Type “E” Device: EMI SHIELD - PASSIVE JAMMING 7
  • 8. 1. Type "A" Device: JAMMERS This type of device comes equipped with several independent oscillators transmitting ’jamming signals’ capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. 8
  • 9. 2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS Unlike jammers, Type ”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It has a unique identification number for communicating with the cellular base station. 9
  • 10. 3. Type “C” Device (Intelligent Beacon Disablers) Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 10
  • 11. 4. Type “D” Device (Direct Receive & Transmit Jammers) This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and block the cell Phone directly if it is within close proximity of the jammer. 11
  • 12. 5. Type E Device (EMI Shield - Passive Jamming) This technique is using EMI suppression techniques to make a room into what is called Faraday cage. Although labor intensive to construct, the Faraday cage essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage - or in this case a target room. 12
  • 13. Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) 13 The frequency bands Distance to be jammed (D) Power calculations
  • 14. 14 If section Rf section Jamming signals Power supply
  • 16. Amity university rajasthan 16 Contd. Mobile Jammer
  • 17. Types of cell phone jammer device. There are many types of cell phone jammer device which is used in our daily life .as we take a example of class room, where we does not want to use of cell phone than there we can use cell phone jammer device. By this we can produce the interface between the cell phone base station and cell phone. resulting it disconnect the cell from base station. and we can not receive the any calls from base station. For this there are many types of cell phone jammer devices which is given as below: 17
  • 18. • Remote Control Mobile jammer • Adjustable Mobile Jammer • School &Prison Mobile Jammer • Explosion – Proof Mobile jammer • Police & Military Mobile Jammer • Portable Mobile Jammer 18
  • 19. • To maintain the complete silence in library and lecture hall • To avoid fraud in examination hall • To avoid disturbance in class room • For providing security in business conference, board of directors rooms, seminars, etc., • For providing calm and peaceful atmosphere in Hospitals • Church/Mosques/Cathedral/Temple/Religious establishment 19
  • 20. • While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. • Companies are working on devices that control a cell phone but do not "jam the signal. 20
  • 21. • Every technology has good aspect as well as bad aspect the important thing is, how we are using it. • Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti- social elements by using the Mobile jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. 21