SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
1
Cell Phone Jammer
A Seminar Report
Submitted by
Mr. Ronson Calvin Fernandes
Register Number: 110919053
IV Semester M.C.A.
Manipal Institute of Technology, Manipal
2
ABSTRACT
The last few years have witnessed a dramatic boom in the wireless communications
industry, hence increasing the number of users of mobile communication devices. This
magnified the need for a more efficient and reliable signal scrambler. This paper deals with
the Mobile Jamming Technology. The concept of jamming technology is studied in a step-
by-step approach. The mobile jammer in the frequency range of 890MHz to 960MHz
(GSM) is developed. Its circuit analysis simulation is performed using Speace - spice
Software. Antenna simulation is done by using IE3D software. The jammer circuit is designed
with minimum cost and high efficiency. The jammer jams the signal within five meter
effective radius. Index terms– Antenna, Jammer, Wideband frequency.
3
CONTENTS
1. Abstract-----------------------------------------------------5
2. History------------------------------------------------------6
3. Introduction to cell phone jammer---------------------8
4. Cell phone jamming basics------------------------------8
5. Cell phone jammer device-------------------------------8
6. Design Parameters----------------------------------------9
7. Component cell phone jammer-------------------------11
7.1 Power supply--------------------------------------11
7.2 Circuitry--------------------------------------------12
7.3 Antenna---------------------------------------------12
8. How cell phone jammer work---------------------------12
9. Jamming techniques---------------------------------------13
10. Types of cell phone jammer device---------------------14
11. Cell phone jammer applications-------------------------19
12. Cell phone jammer legal issues--------------------------20
13. Alternatives to cell phone jamming---------------------21
14. Conclusion--------------------------------------------------22
15. Bibliography------------------------------------------------23
4
2. HISTORY
The rapid proliferation of cell phones at the beginning of 21st
century to near ubiquitous
status eventually raised problems such as their potential use of invade privacy or contribute to
rampant and egregious academic cheating. In addition public black lash privacy or contribute
to rampant
The rapid proliferation of cell phones at the beginning of the 21st century to
near ubiquitous status eventually raised problems such as their potential use to invade
privacy or contribute to rampant and egregious academic cheating. In addition public backlash
was growing against the intrusive disruption cell phones introduced in daily life. While
older analog cell phones often suffered from chronically poor reception and could even be
disconnected by simple interference such as high frequency noise, increasingly sophisticated
digital phones have led to more elaborate counters. Cell phone jamming devices are an
alternative to more expensive measures against cell phones, such as Faraday cages, which
are mostly suitable as built in protection for structures. They were originally developed for
law enforcement and the military to interrupt communications by criminals and terrorists.
Some were also designed to foil the use of certain remotely detonated explosives. The
civilian applications were apparent, so over time many companies originally contracted to
design jammers for government use switched over to sell these devices to private entities.
Since then, there has been a slow but steady increase in their purchase and use, especially in
major metropolitan areas.
5
3. INTRODUCTION
Cell phones are everywhere these days. According to the Cellular
Telecommunications and Internet Association, almost 195 million people in the United States
had cell-phone service in October 2005. And cell phones are even more ubiquitous in Europe.
It's great to be able to call anyone at any time. Unfortunately, restaurants, movie
theaters, concerts, shopping malls and churches all suffer from the spread of cell phones
because not all cell-phone users know when to stop talking. Who hasn't seethed through one
side of a conversation about an incredibly personal situation as the talker shares intimate
details with his friend as well as everyone else in the area?
While most of us just grumble and move on, some people are actually going to
extremes to retaliate. Cell phones are basically handheld two-way radios. And like any
radio, the signal can be disrupted, or jammed.
4. Cell Phone Jamming Basics
Disrupting a cell phone is the same as jamming any other type of radio
communication. A cell phone works by communicating with the service network through a
cell tower as base station. Cell towers divide a city into small areas or cells. As a cell phone
user drives down the street, the signal is handed from tower to tower. Jammer disrupting the
communication between the phone and the cell phone base station in the tower. It’s called
denial-of-service attack.
6
5. Cell Phone Jamming Device
Jamming devices overpower the cell phone by transmitting a signal on the same
frequency and at a high enough power that the two signals collide and cancel each other out.
Cell phones are designed to add power if they experience low-level interference, so
the jammer must recognize and match the power increase from the phone.
Cell phones are full-duplex devices, which means they use two separate frequencies,
one for talking and one for listening simultaneously. Some jammers block only one of the
frequencies used by cell phones, which has the effect of blocking both. The phone is tricked
into thinking there is no service because it can receive only one of the frequencies.
Less complex devices block only one group of frequencies, while sophisticated
jammers can block several types of networks at once to head off dual-mode or tri-mode
phones that automatically switch among different network types to find an open signal. Some
of the high-end devices block all frequencies at once, and others can be tuned to specific
frequencies.
To jam a cell phone, all you need is a device that broadcasts on the correct
frequencies. Although different cellular systems process signals differently, all cell-phone
networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-
based systems, operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in
the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States. Jammers can
broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS,
DCS, iDEN and Nextel systems. Old- fashioned analog cell phones and today's digital devices
are equally susceptible to jamming.
The actual range of the jammer depends on its power and the local environment,
which may include hills or walls of a building that block the jamming signal. Low-powered
jammers block calls in a range of about 30 feet (9 m). Higher-powered units create a cell-
free zone as large as a football field. Units used by law enforcement can shut down service
up to 1 mile (1.6 km) from the device.
7
6. Design Parameters
Based on the above, our device which is related to the DOS technique is
transmitting noise on the same frequencies of the two bands GSM 900 MHz, and GSM
1.8 GHz (known also as DCS 1800 band). We focused on some design parameters to
establish the device specifications. These parameters are as follows
6.1 The distance to be jammed (D)
This parameter is very important in our design, since the amount of the output power of
the jammer depends on the area that we need to jam. Later on we will see the relationship
between the output power and the distance D. Our design is established upon D=10 meters
for DCS 1800 band and D=20 meters for GSM 900 band.
6.2 The frequenbands
UPLINK
(Handset
transmit)
DOWNLINK
(Handset
receive)
USED IN
JORDAN
BY:
GSM 900 890-915
MHz
935-960
MHz
Zain + Orange
DCS 1800 1710-1785
MHz
1805-1880
MHz
Umniah
8
7.Component of Cell Phone Jammers
Electronically speaking, cell-phone jammers are very basic devices. The simplest just
have an on/off switch and a light that indicates it's on. More complex devices have switches to
activate jamming at different frequencies. Components of a jammer include:
7.1 Power supply
Smaller jamming devices are battery operated. Some look like cell phone and use cell-
phone batteries. Stronger devices can be plugged into a standard outlet or wired into a
vehicle's electrical system.
7.2 Circuitry
The main electronic components of a jammer are:
7.2.1 Voltage-controlled oscillator – Generates the radio signal that will
interfere with the cell phone signal
7.2.2. Tuning circuit - Controls the frequency at which the jammer broadcasts
its signal by sending a particular voltage to the oscillator
7.2.3 Noise generator - Produces random electronic output in a
specified frequency range to jam the cell-phone network signal (part of
the tuning circuit)
7.2.4 RF amplification (gain stage) - Boosts the power of the radio
frequency output to high enough levels to jam a signal
7.2.5 Check your phone - If the battery on your phone is okay, and you'd like
to continue your conversation, try walking away from the area. You may
be able to get out of the jammer's range with just a few steps.
9
7.3 Antenna
Every jamming device has an antenna to send the signal. Some are contained rical cabinet.
On stronger devices, antennas are external to provide longer range and may be
tuned for individual frequencies.
8. How Cell Phone Jammers Work
Cell phone jammers work in a similar way to radio jammers by sending out the
same radio frequencies that cell phones operate on. Doing so creates enough interference so
that a call cannot connect with a cell phone. There are two types of cell phone jammers
currently available. The first type are usually smaller devices that block the signals coming
from cell phone towers to individual cell phones. The frequency blocked is somewhere
between 800MHz and 1900MHz. Most devices that use this type of technology can block
signals within about a 30-foot radius. Cell phones within this range simply show no signal.
The second type of cell phone jammer is usually much larger in size and more
powerful. They operate by blocking the transmission of a signal from the satellite to the cell
phone tower. Some powerful models can block cell phone transmissions within a 5 mile
radius. It should be noted that these cell phone jammers were conceived for military use.
Once again, it should be noted that operating or even owning a cell phone jammer
is illegal in most municipalities and specifically so in the United States. Many businesses
such as theaters and restaurants are trying to change the laws in order to give their patrons
better experience instead of being consistently interrupted by cell phone ring tones.
10
9. Jamming techniques
9.1 Type “A” Devi ce (JAMMERS):
This type of device comes equipped with several independent oscillators transmitting
’jamming signals’ capable of blocking frequencies used by paging devices as well as those
used by cellular systems control channels for call establishment.
9.2 Type “B” Dev ice (Intel lig ent Cel l ul ar Di sa blers ):
Unlike jammers, Type”B” devices do not transmit an interfering signal on the control
channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It
has a unique identification number for communicating with the cellular base station.
9.3 Type “C” Device (Intelligent Beacon
Disablers ):
Unlike jammers, Type C devices do not transmit an interfering signal on the control
channels. The device, when located in a designated ’quiet’ area, functions as a
’beacon’ and any compatible terminal is instructed to disable its ringer or disable its
operation, while within the coverage area of beacon.
9.4 Ty pe “ D” Devi ce (Di rect Receiv e & Trans mi t
Ja mmers ):
This jammer behaves like a small, independent and portable base station, which can
directly interact intelligently or unintelligently with the operation of the local mobile phone.
The jammer is predominantly in receive mode and will intelligently choose to interact and
11
block the cell Phone directly if it is within close proximity of the jammer.
9.5 Type E Device (EMI Shield - Passive
Jamming):
This technique is using EMI suppression techniques to make a room into what is called
Faraday cage. Although labor intensive to construct, the Faraday cage essentially Blocks
or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the
cage - or in this case a target room.
10. Types of cell phone jammer device
There are many types of cell phone jammer device which is used in our daily life
as we take a example of class room ,where we does not want to use of cell phone than
there we can use cell phone jammer device .by this we can produce the interface between
the cell phone..
For this there are many types of cell phone jammer devices which is given as below:
o cell phone jammer
o Portable cell phone jammer
o Remote control cell phone jammer
o Adjustable cell phone jammer
o School &prison phone jammer
o Explosion-proof cell phone jammer
o Police &military phone jammer
One of the cell phone jammer device is “single knight brand ultra-thin cell phone
jammer”
12
11. Cell Phone Jammer Applications
Cell phone jamming devices were originally developed for law enforcement and the
military to interrupt communications by criminals and terrorists. The bombs that blew up
commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta
in August 2003, all relied on cell phones to trigger explosives. It has been widely reported
that a cell-phone jammer thwarted an assassination attempt on Pakistani President
Musharraf in December 2003. When President Bush visited London in November 2004, it
was reported that British police considered using jammers to protect the president's motorcade
through London.
During a hostage situation, police can control when and where a captor can make a
phone call. Police can block phone calls during a drug raid so suspects can't communicate
outside the area. Cell-phone jammers can be used in areas where radio transmissions are
dangerous, (areas with a potentially explosive atmosphere), such as chemical storage
facilities or grain elevators. The TRJ-89 jammer from Antenna System & Supplies Inc.
carries its own electrical generator and can block cellular communications in a 5-mile (8-km)
radius.
Corporations use jammers to stop corporate espionage by blocking voice transmissions
and photo transmissions from camera phones. On the more questionable end of the legitimacy
spectrum, there are rumors that hotel chains install jammers to block guests' cell-phone
usage and force them to use in-room phones at high rates
13
12. Cell Phone Jamming Legal Issues
In the United States, United Kingdom, Australia and many other countries, blocking
cell- phone services (as well as any other electronic transmissions) is against the law. In the
United States, cell-phone jamming is covered under the Communications Act of 1934, which
prohibits people from "willfully or maliciously interfering with the radio communications of
any station licensed or authorized" to operate. In fact, the "manufacture, importation, sale or
offer for sale, including advertising, of devices designed to block or jam wireless
transmissions is prohibited" as well.
Jamming is seen as property theft, because a private company has purchased the rights to
the radio spectrum, and jamming the spectrum is akin to stealing the property the company has
purchased. It also represents a safety hazard because jamming blocks all calls in the area,
not just the annoying ones. Jamming a signal could block the call of a babysitter frantically
trying to contact a parent or a someone trying to call for an ambulance.
The Federal Communications Commission is charged with enforcing jamming
laws. However, the agency has not yet prosecuted anyone for cell-phone jamming. Under
the U.S. rules, fines for a first offense can range as high as $11,000 for each violation or
imprisonment for up to one year, and the device used may also be seized and forfeited to the
government.
In most countries, it is illegal for private citizens to jam cell-phone transmission,
but some countries are allowing businesses and government organizations to install jammers in
areas where cell-phone use is seen as a public nuisance. In December 2004, France
legalized cell- phone jammers in movie theaters, concert halls and other places with
performances. France is finalizing technology that will let calls to emergency services go
through. India has installed jammers in parliament and some prisons. It has been reported
that universities in Italy have adopted the technology to prevent cheating. Students were
taking photos of tests with their camera phones and sending them to classmates.
14
With phones ringing in movies, weddings and classrooms, it's no wonder people want
to tone down the intrusion. So what legally can be done to stop annoying cell-phone use?
13. Alternatives to Cell Phone Jamming
While the law clearly prohibits using a device to actively disrupt a cell-phone signal,
there are no rules against passive cell-phone blocking. That means using things like
wallpaper or building materials embedded with metal fragments to prevent cell-phone
signals from reaching inside or outside the room. Some buildings have designs that block
radio signals by accident due to thick concrete walls or a steel skeleton.
Companies are working on devices that control a cell phone but do not "jam the
signal." One device sends incoming calls to voicemail and blocks outgoing calls. The
argument is that the phone still works, so it is technically not being jammed. It is a legal
gray area that has not been ruled on by the FCC as of April 2005.
Cell-phone alerts are available that indicate the presence of a cell-phone signal. These
have been used in hospitals where cell-phone signals could interfere with sensitive
medical equipment. When a signal is detected, users are asked to turn off their phones.
For a less technical solution, Coudal Partners, a design firm in Chicago, has launched
the SHHH, the Society for HandHeld Hushing. At its Web site, you can download a note to
hand to people conducting annoying cell-phone conversations, expressing your lack of interest
in what they're talking about.
15
Conclusion
On observing the output of the frequency spectrum the VCO output is varies from 890MHz
to 960MHz. This output is fed to MMG3001 and it is found that the mobile jammer blocks
the mobile signal in 8-meter effective radius. All the circuit output are constructed and
observed using the Electronic work bench. The simulation result and practical result are
found to be approbatory equal. The gain of the project is that we are able to block
communication coming into and going out from a GSM phone operating on the 890MHz to
960MHz frequency band. We are also able to reach 8-meter effective blocking radius and keep
the cost less.
At last we can say every device is acts as good aspects as well as bad aspects. In
many place cell phone jammer is useful but at many place it is a problem .for this we can
take a example that if at any place cell phone jammer is on than anybody wants to use
than there creates some problems.
But it’s overall performance is very good and helpful in our life.
16
15. Bibliography
 www.HowStuffWork.com
 "Zone of silence [cell phone jammer]," Spectrum, IEEE ,vol.42, no.5,
18, May 2005
 Sami Azzam, Ahmad Hijazi, Ali Mahmoudy. ”Smart Jammer for mobile phone
systems”
 Mobile & Personal Communications Committee of the Radio Advisory Board of
Canada, “Use of jammer and disabler Devices for blocking PCS, Cellular & Related
Services”
 "Zone of silence [cell phone jammer]," Spectrum, IEEE , vol.42, no.5, 18, May 2005
 G. K. H. Lui and R. D. Murch, Compact dual frequency PIFA designs using LC
resonators, IEEE Trans Antennas Propagat., vol. 49, pp. 10161019, July 2001.
 M. T. Huynh and W. L. Stutzman, Ground plane effects on PIFA antennas, USNC/URSI
Radio Science.Meeting Digest, p. 223, 2000.
 IE3D, Zeland Software. IE3D , users manual Release 8, Zeland Software Incorporated.
 M. Ali, S. S. Stuchly, and K. Caputa, A wide band dual meander sleeve antenna, J.
Electromagnetic Waves

Más contenido relacionado

La actualidad más candente

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
harrynik
 

La actualidad más candente (20)

Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
How Mobile Phone Works
How Mobile Phone WorksHow Mobile Phone Works
How Mobile Phone Works
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 

Destacado

Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
Manu M
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
Sameer Gupta
 
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ASHOKKUMAR RAMAR
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technology
Pragati Garg
 
Lifi technology documentation
Lifi technology documentationLifi technology documentation
Lifi technology documentation
Sowjanya Jajaila
 

Destacado (17)

Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
 
Dg
DgDg
Dg
 
защита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
защита от перехЗащита от перехвата GSM сигналавата Gsm сигналазащита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
защита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
Distributed Control System (Presentation)
Distributed Control System (Presentation)Distributed Control System (Presentation)
Distributed Control System (Presentation)
 
DEva Report
DEva ReportDEva Report
DEva Report
 
Thunderbolt
ThunderboltThunderbolt
Thunderbolt
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technology
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
Lifi TECHNOLOGY REPORT
Lifi TECHNOLOGY REPORTLifi TECHNOLOGY REPORT
Lifi TECHNOLOGY REPORT
 
Thunderbolt
ThunderboltThunderbolt
Thunderbolt
 
Report on Li-Fi technology
Report on Li-Fi technologyReport on Li-Fi technology
Report on Li-Fi technology
 
Seminar Report On O.L.E.D.
Seminar Report On O.L.E.D.Seminar Report On O.L.E.D.
Seminar Report On O.L.E.D.
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdf
 
Lifi technology documentation
Lifi technology documentationLifi technology documentation
Lifi technology documentation
 

Similar a Cellphone Jammer

Jammer final report
Jammer final reportJammer final report
Jammer final report
alullah
 
Lecture 1 wireless
Lecture 1 wirelessLecture 1 wireless
Lecture 1 wireless
Faiza Saher
 

Similar a Cellphone Jammer (20)

Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Presentation1
Presentation1Presentation1
Presentation1
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Mobile Phone Signal Jammer
Mobile Phone Signal Jammer Mobile Phone Signal Jammer
Mobile Phone Signal Jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libre
 
4g
4g4g
4g
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copy
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
 
Lecture 1 wireless
Lecture 1 wirelessLecture 1 wireless
Lecture 1 wireless
 
PCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESPCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIES
 
mobile phones
mobile phonesmobile phones
mobile phones
 
C0373013023
C0373013023C0373013023
C0373013023
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Cdma Vs Gsm1
Cdma Vs Gsm1Cdma Vs Gsm1
Cdma Vs Gsm1
 
C D M A Vs Gsm1
C D M A Vs  Gsm1C D M A Vs  Gsm1
C D M A Vs Gsm1
 
wireless_technologies
wireless_technologieswireless_technologies
wireless_technologies
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 
Pxc3871282
Pxc3871282Pxc3871282
Pxc3871282
 
mobile technology documentation
mobile technology documentationmobile technology documentation
mobile technology documentation
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Cellphone Jammer

  • 1. 1 Cell Phone Jammer A Seminar Report Submitted by Mr. Ronson Calvin Fernandes Register Number: 110919053 IV Semester M.C.A. Manipal Institute of Technology, Manipal
  • 2. 2 ABSTRACT The last few years have witnessed a dramatic boom in the wireless communications industry, hence increasing the number of users of mobile communication devices. This magnified the need for a more efficient and reliable signal scrambler. This paper deals with the Mobile Jamming Technology. The concept of jamming technology is studied in a step- by-step approach. The mobile jammer in the frequency range of 890MHz to 960MHz (GSM) is developed. Its circuit analysis simulation is performed using Speace - spice Software. Antenna simulation is done by using IE3D software. The jammer circuit is designed with minimum cost and high efficiency. The jammer jams the signal within five meter effective radius. Index terms– Antenna, Jammer, Wideband frequency.
  • 3. 3 CONTENTS 1. Abstract-----------------------------------------------------5 2. History------------------------------------------------------6 3. Introduction to cell phone jammer---------------------8 4. Cell phone jamming basics------------------------------8 5. Cell phone jammer device-------------------------------8 6. Design Parameters----------------------------------------9 7. Component cell phone jammer-------------------------11 7.1 Power supply--------------------------------------11 7.2 Circuitry--------------------------------------------12 7.3 Antenna---------------------------------------------12 8. How cell phone jammer work---------------------------12 9. Jamming techniques---------------------------------------13 10. Types of cell phone jammer device---------------------14 11. Cell phone jammer applications-------------------------19 12. Cell phone jammer legal issues--------------------------20 13. Alternatives to cell phone jamming---------------------21 14. Conclusion--------------------------------------------------22 15. Bibliography------------------------------------------------23
  • 4. 4 2. HISTORY The rapid proliferation of cell phones at the beginning of 21st century to near ubiquitous status eventually raised problems such as their potential use of invade privacy or contribute to rampant and egregious academic cheating. In addition public black lash privacy or contribute to rampant The rapid proliferation of cell phones at the beginning of the 21st century to near ubiquitous status eventually raised problems such as their potential use to invade privacy or contribute to rampant and egregious academic cheating. In addition public backlash was growing against the intrusive disruption cell phones introduced in daily life. While older analog cell phones often suffered from chronically poor reception and could even be disconnected by simple interference such as high frequency noise, increasingly sophisticated digital phones have led to more elaborate counters. Cell phone jamming devices are an alternative to more expensive measures against cell phones, such as Faraday cages, which are mostly suitable as built in protection for structures. They were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. Some were also designed to foil the use of certain remotely detonated explosives. The civilian applications were apparent, so over time many companies originally contracted to design jammers for government use switched over to sell these devices to private entities. Since then, there has been a slow but steady increase in their purchase and use, especially in major metropolitan areas.
  • 5. 5 3. INTRODUCTION Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, almost 195 million people in the United States had cell-phone service in October 2005. And cell phones are even more ubiquitous in Europe. It's great to be able to call anyone at any time. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. Who hasn't seethed through one side of a conversation about an incredibly personal situation as the talker shares intimate details with his friend as well as everyone else in the area? While most of us just grumble and move on, some people are actually going to extremes to retaliate. Cell phones are basically handheld two-way radios. And like any radio, the signal can be disrupted, or jammed. 4. Cell Phone Jamming Basics Disrupting a cell phone is the same as jamming any other type of radio communication. A cell phone works by communicating with the service network through a cell tower as base station. Cell towers divide a city into small areas or cells. As a cell phone user drives down the street, the signal is handed from tower to tower. Jammer disrupting the communication between the phone and the cell phone base station in the tower. It’s called denial-of-service attack.
  • 6. 6 5. Cell Phone Jamming Device Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Cell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both. The phone is tricked into thinking there is no service because it can receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high-end devices block all frequencies at once, and others can be tuned to specific frequencies. To jam a cell phone, all you need is a device that broadcasts on the correct frequencies. Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS- based systems, operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old- fashioned analog cell phones and today's digital devices are equally susceptible to jamming. The actual range of the jammer depends on its power and the local environment, which may include hills or walls of a building that block the jamming signal. Low-powered jammers block calls in a range of about 30 feet (9 m). Higher-powered units create a cell- free zone as large as a football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km) from the device.
  • 7. 7 6. Design Parameters Based on the above, our device which is related to the DOS technique is transmitting noise on the same frequencies of the two bands GSM 900 MHz, and GSM 1.8 GHz (known also as DCS 1800 band). We focused on some design parameters to establish the device specifications. These parameters are as follows 6.1 The distance to be jammed (D) This parameter is very important in our design, since the amount of the output power of the jammer depends on the area that we need to jam. Later on we will see the relationship between the output power and the distance D. Our design is established upon D=10 meters for DCS 1800 band and D=20 meters for GSM 900 band. 6.2 The frequenbands UPLINK (Handset transmit) DOWNLINK (Handset receive) USED IN JORDAN BY: GSM 900 890-915 MHz 935-960 MHz Zain + Orange DCS 1800 1710-1785 MHz 1805-1880 MHz Umniah
  • 8. 8 7.Component of Cell Phone Jammers Electronically speaking, cell-phone jammers are very basic devices. The simplest just have an on/off switch and a light that indicates it's on. More complex devices have switches to activate jamming at different frequencies. Components of a jammer include: 7.1 Power supply Smaller jamming devices are battery operated. Some look like cell phone and use cell- phone batteries. Stronger devices can be plugged into a standard outlet or wired into a vehicle's electrical system. 7.2 Circuitry The main electronic components of a jammer are: 7.2.1 Voltage-controlled oscillator – Generates the radio signal that will interfere with the cell phone signal 7.2.2. Tuning circuit - Controls the frequency at which the jammer broadcasts its signal by sending a particular voltage to the oscillator 7.2.3 Noise generator - Produces random electronic output in a specified frequency range to jam the cell-phone network signal (part of the tuning circuit) 7.2.4 RF amplification (gain stage) - Boosts the power of the radio frequency output to high enough levels to jam a signal 7.2.5 Check your phone - If the battery on your phone is okay, and you'd like to continue your conversation, try walking away from the area. You may be able to get out of the jammer's range with just a few steps.
  • 9. 9 7.3 Antenna Every jamming device has an antenna to send the signal. Some are contained rical cabinet. On stronger devices, antennas are external to provide longer range and may be tuned for individual frequencies. 8. How Cell Phone Jammers Work Cell phone jammers work in a similar way to radio jammers by sending out the same radio frequencies that cell phones operate on. Doing so creates enough interference so that a call cannot connect with a cell phone. There are two types of cell phone jammers currently available. The first type are usually smaller devices that block the signals coming from cell phone towers to individual cell phones. The frequency blocked is somewhere between 800MHz and 1900MHz. Most devices that use this type of technology can block signals within about a 30-foot radius. Cell phones within this range simply show no signal. The second type of cell phone jammer is usually much larger in size and more powerful. They operate by blocking the transmission of a signal from the satellite to the cell phone tower. Some powerful models can block cell phone transmissions within a 5 mile radius. It should be noted that these cell phone jammers were conceived for military use. Once again, it should be noted that operating or even owning a cell phone jammer is illegal in most municipalities and specifically so in the United States. Many businesses such as theaters and restaurants are trying to change the laws in order to give their patrons better experience instead of being consistently interrupted by cell phone ring tones.
  • 10. 10 9. Jamming techniques 9.1 Type “A” Devi ce (JAMMERS): This type of device comes equipped with several independent oscillators transmitting ’jamming signals’ capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. 9.2 Type “B” Dev ice (Intel lig ent Cel l ul ar Di sa blers ): Unlike jammers, Type”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’. It has a unique identification number for communicating with the cellular base station. 9.3 Type “C” Device (Intelligent Beacon Disablers ): Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 9.4 Ty pe “ D” Devi ce (Di rect Receiv e & Trans mi t Ja mmers ): This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and
  • 11. 11 block the cell Phone directly if it is within close proximity of the jammer. 9.5 Type E Device (EMI Shield - Passive Jamming): This technique is using EMI suppression techniques to make a room into what is called Faraday cage. Although labor intensive to construct, the Faraday cage essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage - or in this case a target room. 10. Types of cell phone jammer device There are many types of cell phone jammer device which is used in our daily life as we take a example of class room ,where we does not want to use of cell phone than there we can use cell phone jammer device .by this we can produce the interface between the cell phone.. For this there are many types of cell phone jammer devices which is given as below: o cell phone jammer o Portable cell phone jammer o Remote control cell phone jammer o Adjustable cell phone jammer o School &prison phone jammer o Explosion-proof cell phone jammer o Police &military phone jammer One of the cell phone jammer device is “single knight brand ultra-thin cell phone jammer”
  • 12. 12 11. Cell Phone Jammer Applications Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. The bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. It has been widely reported that a cell-phone jammer thwarted an assassination attempt on Pakistani President Musharraf in December 2003. When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London. During a hostage situation, police can control when and where a captor can make a phone call. Police can block phone calls during a drug raid so suspects can't communicate outside the area. Cell-phone jammers can be used in areas where radio transmissions are dangerous, (areas with a potentially explosive atmosphere), such as chemical storage facilities or grain elevators. The TRJ-89 jammer from Antenna System & Supplies Inc. carries its own electrical generator and can block cellular communications in a 5-mile (8-km) radius. Corporations use jammers to stop corporate espionage by blocking voice transmissions and photo transmissions from camera phones. On the more questionable end of the legitimacy spectrum, there are rumors that hotel chains install jammers to block guests' cell-phone usage and force them to use in-room phones at high rates
  • 13. 13 12. Cell Phone Jamming Legal Issues In the United States, United Kingdom, Australia and many other countries, blocking cell- phone services (as well as any other electronic transmissions) is against the law. In the United States, cell-phone jamming is covered under the Communications Act of 1934, which prohibits people from "willfully or maliciously interfering with the radio communications of any station licensed or authorized" to operate. In fact, the "manufacture, importation, sale or offer for sale, including advertising, of devices designed to block or jam wireless transmissions is prohibited" as well. Jamming is seen as property theft, because a private company has purchased the rights to the radio spectrum, and jamming the spectrum is akin to stealing the property the company has purchased. It also represents a safety hazard because jamming blocks all calls in the area, not just the annoying ones. Jamming a signal could block the call of a babysitter frantically trying to contact a parent or a someone trying to call for an ambulance. The Federal Communications Commission is charged with enforcing jamming laws. However, the agency has not yet prosecuted anyone for cell-phone jamming. Under the U.S. rules, fines for a first offense can range as high as $11,000 for each violation or imprisonment for up to one year, and the device used may also be seized and forfeited to the government. In most countries, it is illegal for private citizens to jam cell-phone transmission, but some countries are allowing businesses and government organizations to install jammers in areas where cell-phone use is seen as a public nuisance. In December 2004, France legalized cell- phone jammers in movie theaters, concert halls and other places with performances. France is finalizing technology that will let calls to emergency services go through. India has installed jammers in parliament and some prisons. It has been reported that universities in Italy have adopted the technology to prevent cheating. Students were taking photos of tests with their camera phones and sending them to classmates.
  • 14. 14 With phones ringing in movies, weddings and classrooms, it's no wonder people want to tone down the intrusion. So what legally can be done to stop annoying cell-phone use? 13. Alternatives to Cell Phone Jamming While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. That means using things like wallpaper or building materials embedded with metal fragments to prevent cell-phone signals from reaching inside or outside the room. Some buildings have designs that block radio signals by accident due to thick concrete walls or a steel skeleton. Companies are working on devices that control a cell phone but do not "jam the signal." One device sends incoming calls to voicemail and blocks outgoing calls. The argument is that the phone still works, so it is technically not being jammed. It is a legal gray area that has not been ruled on by the FCC as of April 2005. Cell-phone alerts are available that indicate the presence of a cell-phone signal. These have been used in hospitals where cell-phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones. For a less technical solution, Coudal Partners, a design firm in Chicago, has launched the SHHH, the Society for HandHeld Hushing. At its Web site, you can download a note to hand to people conducting annoying cell-phone conversations, expressing your lack of interest in what they're talking about.
  • 15. 15 Conclusion On observing the output of the frequency spectrum the VCO output is varies from 890MHz to 960MHz. This output is fed to MMG3001 and it is found that the mobile jammer blocks the mobile signal in 8-meter effective radius. All the circuit output are constructed and observed using the Electronic work bench. The simulation result and practical result are found to be approbatory equal. The gain of the project is that we are able to block communication coming into and going out from a GSM phone operating on the 890MHz to 960MHz frequency band. We are also able to reach 8-meter effective blocking radius and keep the cost less. At last we can say every device is acts as good aspects as well as bad aspects. In many place cell phone jammer is useful but at many place it is a problem .for this we can take a example that if at any place cell phone jammer is on than anybody wants to use than there creates some problems. But it’s overall performance is very good and helpful in our life.
  • 16. 16 15. Bibliography  www.HowStuffWork.com  "Zone of silence [cell phone jammer]," Spectrum, IEEE ,vol.42, no.5, 18, May 2005  Sami Azzam, Ahmad Hijazi, Ali Mahmoudy. ”Smart Jammer for mobile phone systems”  Mobile & Personal Communications Committee of the Radio Advisory Board of Canada, “Use of jammer and disabler Devices for blocking PCS, Cellular & Related Services”  "Zone of silence [cell phone jammer]," Spectrum, IEEE , vol.42, no.5, 18, May 2005  G. K. H. Lui and R. D. Murch, Compact dual frequency PIFA designs using LC resonators, IEEE Trans Antennas Propagat., vol. 49, pp. 10161019, July 2001.  M. T. Huynh and W. L. Stutzman, Ground plane effects on PIFA antennas, USNC/URSI Radio Science.Meeting Digest, p. 223, 2000.  IE3D, Zeland Software. IE3D , users manual Release 8, Zeland Software Incorporated.  M. Ali, S. S. Stuchly, and K. Caputa, A wide band dual meander sleeve antenna, J. Electromagnetic Waves