SlideShare a Scribd company logo
welcome
Jamer
almost 5 Billion people in the World had cell-phone service in January 2011. And cell phones are even more ubiquitous in Europe.It's great to be able to call anyone at anytime.Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. introduction
A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attackJAMMING BASICS
JAMMING BASICS
Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other outCell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously.HOW IT WORKS
Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both.
The phone is tricked into thinking there is no service because it can receive only one of the frequencies.
jammers can block several types of networks
dual-mode or tri-mode phones that automatically switch among different network types to find an open signal.
. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming. The actual range of the jammer depends on its power and the local environment, which may include hills or walls of a building that block the jamming signal.
Low-powered jammers block calls in a range of about 30 feet (9 m).
Higher-powered units create a cell-free zone as large as a football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km) from the deviceBLOCK DIAGRAM     VCOMicro ControllerIntegrator MLCD      Noise    GeneratorBand pass            filterRF antennaAmplifierPower Module
All the electronic components starting from diode to Intel IC’s only work with a DC supply ranging from +5V to +12V. We are utilizing for the same, the cheapest and commonly available energy source of 230v-50Hz and stepping down, rectifying, filtering and regulating the voltage.POWER SUPPLY
Before using the circuit, a mobile in switched ON condition is consideredTESTING AND RESULTS
Then the circuit of the cell phone jammer is turned ON and after few seconds the signal in the cell goes off as shown in fig
Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terroristsThe bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London.WHERE ARE CELL-PHONE JAMMERS USED
In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the lawIn the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the lawLEGAL ISSUES 
It is very necessary using cell phone jammers in the most divine temples like Tirumala.We can provide security to V.I.P’s from the anti-social elementsBy using cell phone jammers we can maintain law and order for maintaining peace.By cell phone jammers we can’t disturb other people in the public places like restaurants, shopping placesADVANTAGES
Cost oriented.Requires special hardware.People feel inconvenience.V.I.P.’s may loose some important callsDISADVANTAGES
Images for jammers
CONCLUSION

More Related Content

PPTX
Telecom revolution a boom or
PPTX
Evolution of cell phone
PPT
Presentation telephone, waired and wireless communication
PPTX
THE CELL PHONES or TELEFONOS CELULARES
PPT
The Evolution of the Cell Phone
PPTX
The cell phones
PPT
Mobile Phone History
PPTX
History of mobile phones
Telecom revolution a boom or
Evolution of cell phone
Presentation telephone, waired and wireless communication
THE CELL PHONES or TELEFONOS CELULARES
The Evolution of the Cell Phone
The cell phones
Mobile Phone History
History of mobile phones

What's hot (20)

PPT
Evolution of Cell Phones
PPTX
History of mobile
PPTX
History of the cell phone
PPT
History Of Cell Phone
PPTX
History of the Telephone
PPT
The history of mobile phone
PPTX
The evolution of the cell phone A2B
PPTX
The history of mobile phones
PPT
History Of Cell Phones
PPTX
CELL PHONES
PPT
Cell phone Technology
PPTX
Timeline of the development of radio and telecommunications
PPTX
Mobile industry presentation by kiran kumar
PPTX
History on cell phones
PPTX
The Evolution oF mobile phones - Sheik Nowheed
PDF
Evolution of Cell Phone and Tedrad Model
PPTX
Evolution of-mobile-phone
PPT
EXT 505 - Overview of the Telephone
PPTX
The evolution of the mobile phone
PPTX
The evolution and future of cellphone
Evolution of Cell Phones
History of mobile
History of the cell phone
History Of Cell Phone
History of the Telephone
The history of mobile phone
The evolution of the cell phone A2B
The history of mobile phones
History Of Cell Phones
CELL PHONES
Cell phone Technology
Timeline of the development of radio and telecommunications
Mobile industry presentation by kiran kumar
History on cell phones
The Evolution oF mobile phones - Sheik Nowheed
Evolution of Cell Phone and Tedrad Model
Evolution of-mobile-phone
EXT 505 - Overview of the Telephone
The evolution of the mobile phone
The evolution and future of cellphone
Ad

Similar to Jamer (20)

PDF
Mobile jammer report
DOC
mobile-jammer
PDF
Cellphone Jammer
PPTX
Signal.pptx
PPT
Cell phone jammers
PPTX
Mobile jammer
PPTX
Cell phone jammer ppt
PDF
FPGA Based Wireless Jamming Networks
PPTX
Presentation1
PDF
Wireless Jamming Networks
PPTX
Mobile phone jammer
PDF
28602126-SEMINAR REPORT - Mobile-Jammer.pdf
PDF
cell phone jammer report
PPTX
Cell phone jammer
PPTX
Mobile jammer
PPTX
Mobile jammer
PPTX
Mobile jammer
PPTX
Mobile jammer ppt
PDF
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
PPTX
MOBILE SIGNAL JAMMER
Mobile jammer report
mobile-jammer
Cellphone Jammer
Signal.pptx
Cell phone jammers
Mobile jammer
Cell phone jammer ppt
FPGA Based Wireless Jamming Networks
Presentation1
Wireless Jamming Networks
Mobile phone jammer
28602126-SEMINAR REPORT - Mobile-Jammer.pdf
cell phone jammer report
Cell phone jammer
Mobile jammer
Mobile jammer
Mobile jammer
Mobile jammer ppt
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
MOBILE SIGNAL JAMMER
Ad

More from kondalarao7 (20)

PPT
Brain ppt
PPT
surface copmputer
PPT
Google earth
PPT
PPT
Wireless usb
PPT
PPT
Web spoofing
PPT
Telephony
PPTX
Google chrome operating system
PPT
Srikanth
PPT
PPTX
Smart card ppt
PPT
Robotics
PPT
Presentation virtual keybord_2
PPTX
Money pad ppt
PPTX
Intel core presentation mnk
PPT
I mode ppt
PPTX
PPTX
Google chrome operating system
PPT
Generations of mobile
Brain ppt
surface copmputer
Google earth
Wireless usb
Web spoofing
Telephony
Google chrome operating system
Srikanth
Smart card ppt
Robotics
Presentation virtual keybord_2
Money pad ppt
Intel core presentation mnk
I mode ppt
Google chrome operating system
Generations of mobile

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
STKI Israel Market Study 2025 version august
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
August Patch Tuesday
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Modernising the Digital Integration Hub
PPT
What is a Computer? Input Devices /output devices
NewMind AI Weekly Chronicles – August ’25 Week III
STKI Israel Market Study 2025 version august
1 - Historical Antecedents, Social Consideration.pdf
Tartificialntelligence_presentation.pptx
A novel scalable deep ensemble learning framework for big data classification...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Geologic Time for studying geology for geologist
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
O2C Customer Invoices to Receipt V15A.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
DP Operators-handbook-extract for the Mautical Institute
August Patch Tuesday
Assigned Numbers - 2025 - Bluetooth® Document
CloudStack 4.21: First Look Webinar slides
Hindi spoken digit analysis for native and non-native speakers
A comparative study of natural language inference in Swahili using monolingua...
Modernising the Digital Integration Hub
What is a Computer? Input Devices /output devices

Jamer

  • 3. almost 5 Billion people in the World had cell-phone service in January 2011. And cell phones are even more ubiquitous in Europe.It's great to be able to call anyone at anytime.Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. introduction
  • 4. A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attackJAMMING BASICS
  • 6. Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other outCell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously.HOW IT WORKS
  • 7. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both.
  • 8. The phone is tricked into thinking there is no service because it can receive only one of the frequencies.
  • 9. jammers can block several types of networks
  • 10. dual-mode or tri-mode phones that automatically switch among different network types to find an open signal.
  • 11. . Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming. The actual range of the jammer depends on its power and the local environment, which may include hills or walls of a building that block the jamming signal.
  • 12. Low-powered jammers block calls in a range of about 30 feet (9 m).
  • 13. Higher-powered units create a cell-free zone as large as a football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km) from the deviceBLOCK DIAGRAM VCOMicro ControllerIntegrator MLCD Noise GeneratorBand pass filterRF antennaAmplifierPower Module
  • 14. All the electronic components starting from diode to Intel IC’s only work with a DC supply ranging from +5V to +12V. We are utilizing for the same, the cheapest and commonly available energy source of 230v-50Hz and stepping down, rectifying, filtering and regulating the voltage.POWER SUPPLY
  • 15. Before using the circuit, a mobile in switched ON condition is consideredTESTING AND RESULTS
  • 16. Then the circuit of the cell phone jammer is turned ON and after few seconds the signal in the cell goes off as shown in fig
  • 17. Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terroristsThe bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London.WHERE ARE CELL-PHONE JAMMERS USED
  • 18. In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the lawIn the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the lawLEGAL ISSUES 
  • 19. It is very necessary using cell phone jammers in the most divine temples like Tirumala.We can provide security to V.I.P’s from the anti-social elementsBy using cell phone jammers we can maintain law and order for maintaining peace.By cell phone jammers we can’t disturb other people in the public places like restaurants, shopping placesADVANTAGES
  • 20. Cost oriented.Requires special hardware.People feel inconvenience.V.I.P.’s may loose some important callsDISADVANTAGES
  • 23. Cell phone jammers are very useful to the society from the anti-social elements. . Cell phone jammers prevent the students from carrying cell phones to the colleges. As everything goes fine, it is very necessary to implement in all the colleges, temples, peaceful places.