SlideShare uma empresa Scribd logo
1 de 22
welcome
almost 5 Billion people in the World had cell-phone service in January 2011.  And cell phones are even more ubiquitous in Europe. It's great to be able to call anyone at anytime. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking.  introduction
A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower.   It's a called a denial-of-service attack JAMMING BASICS
JAMMING BASICS
Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other out Cell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously. HOW IT WORKS
[object Object]
The phone is tricked into thinking there is no service because it can receive only one of the frequencies.
jammers can block several types of networks
dual-mode or tri-mode phones that automatically switch among different network types to find an open signal.
. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming. ,[object Object]
Low-powered jammers block calls in a range of about 30 feet (9 m).
Higher-powered units create a cell-free zone as large as a football field. Units used by law enforcement can shut down service up to 1 mile (1.6 km) from the device,[object Object]
All the electronic components starting from diode to Intel IC’s only work with a DC supply ranging from +5V to +12V. We are utilizing for the same, the cheapest and commonly available energy source of 230v-50Hz and stepping down, rectifying, filtering and regulating the voltage. POWER SUPPLY
Before using the circuit, a mobile in switched ON condition is considered TESTING AND RESULTS
Then the circuit of the cell phone jammer is turned ON and after few seconds the signal in the cell goes off as shown in fig
Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists The bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives.  When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London. WHERE ARE CELL-PHONE JAMMERS USED
In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the law In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the law LEGAL ISSUES 
It is very necessary using cell phone jammers in the most divine temples like Tirumala. We can provide security to V.I.P’s from the anti-social elements By using cell phone jammers we can maintain law and order for maintaining peace. By cell phone jammers we can’t disturb other people in the public places like restaurants, shopping places ADVANTAGES
Cost oriented. Requires special hardware. People feel inconvenience. V.I.P.’s may loose some important calls DISADVANTAGES
Images for jammers
CONCLUSION

Mais conteúdo relacionado

Mais procurados

History of mobile
History of mobileHistory of mobile
History of mobileGaditek
 
History of the cell phone
History of the cell phoneHistory of the cell phone
History of the cell phone100668898
 
History Of Cell Phone
History Of Cell PhoneHistory Of Cell Phone
History Of Cell Phonegueste29c218
 
History of the Telephone
History of the TelephoneHistory of the Telephone
History of the TelephoneNYanisse
 
The history of mobile phone
The history of mobile phoneThe history of mobile phone
The history of mobile phoneOo Gii
 
The evolution of the cell phone A2B
The evolution of the cell phone A2BThe evolution of the cell phone A2B
The evolution of the cell phone A2BAhmad Borham
 
The history of mobile phones
The history of mobile phonesThe history of mobile phones
The history of mobile phonesSlides4Victor
 
History Of Cell Phones
History Of Cell PhonesHistory Of Cell Phones
History Of Cell Phoneskendra.puckett
 
Cell phone Technology
Cell phone TechnologyCell phone Technology
Cell phone Technologykay2
 
Timeline of the development of radio and telecommunications
Timeline of the development of radio and telecommunicationsTimeline of the development of radio and telecommunications
Timeline of the development of radio and telecommunicationsJose Emmanuel Maningas
 
Mobile industry presentation by kiran kumar
Mobile industry presentation by kiran kumarMobile industry presentation by kiran kumar
Mobile industry presentation by kiran kumarkiran2703
 
History on cell phones
History on cell phonesHistory on cell phones
History on cell phonescatlovaa
 
The Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik NowheedThe Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik NowheedSheik Mohammed Nowheed
 
Evolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad ModelEvolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad ModelSadettin Demirel
 
Evolution of-mobile-phone
Evolution of-mobile-phoneEvolution of-mobile-phone
Evolution of-mobile-phoneShipat Bhuiya
 
EXT 505 - Overview of the Telephone
EXT 505 - Overview of the TelephoneEXT 505 - Overview of the Telephone
EXT 505 - Overview of the TelephoneJoanna Wiebe
 
The evolution of the mobile phone
The evolution of the mobile phoneThe evolution of the mobile phone
The evolution of the mobile phoneJonathan Peters
 
The evolution and future of cellphone
The evolution and future of cellphoneThe evolution and future of cellphone
The evolution and future of cellphoneramya ramyasekar95
 

Mais procurados (20)

Evolution of Cell Phones
Evolution of Cell PhonesEvolution of Cell Phones
Evolution of Cell Phones
 
History of mobile
History of mobileHistory of mobile
History of mobile
 
History of the cell phone
History of the cell phoneHistory of the cell phone
History of the cell phone
 
History Of Cell Phone
History Of Cell PhoneHistory Of Cell Phone
History Of Cell Phone
 
History of the Telephone
History of the TelephoneHistory of the Telephone
History of the Telephone
 
The history of mobile phone
The history of mobile phoneThe history of mobile phone
The history of mobile phone
 
The evolution of the cell phone A2B
The evolution of the cell phone A2BThe evolution of the cell phone A2B
The evolution of the cell phone A2B
 
The history of mobile phones
The history of mobile phonesThe history of mobile phones
The history of mobile phones
 
History Of Cell Phones
History Of Cell PhonesHistory Of Cell Phones
History Of Cell Phones
 
CELL PHONES
CELL PHONES CELL PHONES
CELL PHONES
 
Cell phone Technology
Cell phone TechnologyCell phone Technology
Cell phone Technology
 
Timeline of the development of radio and telecommunications
Timeline of the development of radio and telecommunicationsTimeline of the development of radio and telecommunications
Timeline of the development of radio and telecommunications
 
Mobile industry presentation by kiran kumar
Mobile industry presentation by kiran kumarMobile industry presentation by kiran kumar
Mobile industry presentation by kiran kumar
 
History on cell phones
History on cell phonesHistory on cell phones
History on cell phones
 
The Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik NowheedThe Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik Nowheed
 
Evolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad ModelEvolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad Model
 
Evolution of-mobile-phone
Evolution of-mobile-phoneEvolution of-mobile-phone
Evolution of-mobile-phone
 
EXT 505 - Overview of the Telephone
EXT 505 - Overview of the TelephoneEXT 505 - Overview of the Telephone
EXT 505 - Overview of the Telephone
 
The evolution of the mobile phone
The evolution of the mobile phoneThe evolution of the mobile phone
The evolution of the mobile phone
 
The evolution and future of cellphone
The evolution and future of cellphoneThe evolution and future of cellphone
The evolution and future of cellphone
 

Semelhante a Cell Phone Jamming Basics and Uses

Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer reportAmit sundaray
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networksijtsrd
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerAlok Gupta
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerAlok Gupta
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammerakash roy
 
Mobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionMobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionAmanShaikh45
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksIJMER
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?xiha tareen
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxVinodDoddaka
 

Semelhante a Cell Phone Jamming Basics and Uses (20)

Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionMobile phone: Evolution to Revolution
Mobile phone: Evolution to Revolution
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Presentation1
Presentation1Presentation1
Presentation1
 

Mais de kondalarao7

Mais de kondalarao7 (20)

Brain ppt
Brain pptBrain ppt
Brain ppt
 
surface copmputer
surface copmputersurface copmputer
surface copmputer
 
Google earth
Google earthGoogle earth
Google earth
 
Ppt
PptPpt
Ppt
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 
Wi fi
Wi fiWi fi
Wi fi
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
Telephony
TelephonyTelephony
Telephony
 
Google chrome operating system
Google chrome operating systemGoogle chrome operating system
Google chrome operating system
 
Srikanth
SrikanthSrikanth
Srikanth
 
Sms2
Sms2Sms2
Sms2
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Robotics
RoboticsRobotics
Robotics
 
Presentation virtual keybord_2
Presentation virtual keybord_2Presentation virtual keybord_2
Presentation virtual keybord_2
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Intel core presentation mnk
Intel core presentation mnkIntel core presentation mnk
Intel core presentation mnk
 
I mode ppt
I mode pptI mode ppt
I mode ppt
 
Gps
GpsGps
Gps
 
Google chrome operating system
Google chrome operating systemGoogle chrome operating system
Google chrome operating system
 
Generations of mobile
Generations of mobileGenerations of mobile
Generations of mobile
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Cell Phone Jamming Basics and Uses

  • 2.
  • 3. almost 5 Billion people in the World had cell-phone service in January 2011. And cell phones are even more ubiquitous in Europe. It's great to be able to call anyone at anytime. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. introduction
  • 4. A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower.   It's a called a denial-of-service attack JAMMING BASICS
  • 6. Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other out Cell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously. HOW IT WORKS
  • 7.
  • 8. The phone is tricked into thinking there is no service because it can receive only one of the frequencies.
  • 9. jammers can block several types of networks
  • 10. dual-mode or tri-mode phones that automatically switch among different network types to find an open signal.
  • 11.
  • 12. Low-powered jammers block calls in a range of about 30 feet (9 m).
  • 13.
  • 14. All the electronic components starting from diode to Intel IC’s only work with a DC supply ranging from +5V to +12V. We are utilizing for the same, the cheapest and commonly available energy source of 230v-50Hz and stepping down, rectifying, filtering and regulating the voltage. POWER SUPPLY
  • 15. Before using the circuit, a mobile in switched ON condition is considered TESTING AND RESULTS
  • 16. Then the circuit of the cell phone jammer is turned ON and after few seconds the signal in the cell goes off as shown in fig
  • 17. Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists The bombs that blew up commuter trains in Spain in March 2004, as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. When President Bush visited London in November 2004, it was reported that British police considered using jammers to protect the president's motorcade through London. WHERE ARE CELL-PHONE JAMMERS USED
  • 18. In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the law In the United States, United Kingdom, Australia and many other countries, blocking cell-phone services (as well as any other electronic transmissions) is against the law LEGAL ISSUES 
  • 19. It is very necessary using cell phone jammers in the most divine temples like Tirumala. We can provide security to V.I.P’s from the anti-social elements By using cell phone jammers we can maintain law and order for maintaining peace. By cell phone jammers we can’t disturb other people in the public places like restaurants, shopping places ADVANTAGES
  • 20. Cost oriented. Requires special hardware. People feel inconvenience. V.I.P.’s may loose some important calls DISADVANTAGES
  • 23. Cell phone jammers are very useful to the society from the anti-social elements. . Cell phone jammers prevent the students from carrying cell phones to the colleges. As everything goes fine, it is very necessary to implement in all the colleges, temples, peaceful places.
  • 25.
  • 26.