Giri Seminar 2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

A Seminar Report

On

MOBILE PHONE JAMMER


Submitted in partial fulfillment of requirements for the award of the degree
of

BACHELOR OF TECHNOLOGY

IN

ELECTRONICS & COMMUNICATION ENGINEERING


Submitted By

TANDRA GIRI PRAKASH NAIDU (18F01A04K9)

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

ST. ANN’S COLLEGE OF ENGINEERING AND TECHNOLOGY, CHIRALA

(AUTONOMOUS)

(Approved by AICTE New Delhi, Permanently Affiliated to JNTUK,


Kakinada), (Accredited by NAAC with ‘A’ Grade, NBA(II) & IE)

2018 – 2022

1
ST. ANN’S COLLEGE OF ENGINEERING & TECHNOLOGY

CHIRALA

(Approved by AICTE New Delhi, Permanently Affiliated to JNTUK, Kakinada),


(Accredited by NAAC with ‘A’ Grade, NBA(II) & IE)

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

CERTIFICATE

This is to certify that the seminar report entitled, “MOBILE PHONE


JAMMER” is submitted by TANDRA GIRI PRAKSH NAIDU in partial
fulfillment of the requirements for the award of BACHELOR OF
TECHNOLOGY IN ELECTRONICS & COMMUNICATION ENGINEERING is
a record of bona fide work carried out by them under our supervision during
the academic year 2021-2022.

2
ACKNOWLEDGEMENTS

The successful completion of any task is not possible without proper


suggestions, guidance, and environment. The combination of these three
factors acts like backbone to seminar titled “MOBILE PHONE JAMMER”

I express my sincere thanks to my seminar supervisor for his valuable


suggestions during our course period, timely help, guidance, and for
providing me with the most essential materials required for the completion
of this work.

We express our sincere to the Head of the Department of Electronics and


Communication Engineering, Dr.K. JAGADEESH BABU M. TECH, SMIEEE,
Ph.D., for timely help, guidance, and for providing us with the most
essential materials required for the completion of this work, Dr. R. V S
HARISH M.TECH, Ph.D., his valuable moral support and guidance
throughout the seminar helped us to a greater extent. We are thankful for
his valuable suggestions and discussions during this seminar.

We would like to thank our principal, Dr. M. VENU GOPAL RAO M.TECH,
Ph.D., for providing support and a stimulating environment. We would like
to express our gratitude to the management of St. Ann’s College of
Engineering & Technology for providing us with a pleasant environment
and excellent laboratory facilities. We would be thankful to all teaching and
non-teaching staff of the Department of Electronics & Communication
Engineering for the successful completion of my seminar. Last but not least,
we express our hearts full thanks to our parents and all our friends for all
help and cooperation extended in bringing out this seminar successfully
time.

3
MOBILE PHONE JAMMER

4
CONTENTS PAGE NO

Abstract 6

Introduction 7

Relevant concepts and principles 8

Methodology 9

Working 11

Types of jammers 12

Jamming techniques 14

Design parameters 14

Cell phone-jamming legal-issues 15

Testing of the jammer with corresponding – 17

Recommendations

Applications 18

Advantages 18

Disadvantages 18

Future scope 18

Conclusion 19

References 19

5
ABSTRACT

Disrupting a cell phone is the same as jamming any type of radio


communication. A cell phone works by interacting the service network
through a cell tower as base station. Cell towers divide a city into small
areas or cells. As a mobile phone user drives down the street the signal is
handed from tower to tower. Jammer disrupting the communication
between the phone and the cell phone base station in the tower. It’s called
denial-of-service attack. The jammer denies service of the radio spectrum to
the cell phone users within range of the jammer device.

Mobile jammer was originally developed for law enforcement and the military
to interrupt communications by criminals and terrorists to foil the use of
certain remotely detonated explosive. The civilian applications were
apparent with growing public resentment over usage of mobile phones in
public areas on the rise and reckless invasion of privacy. Over time many
companies originally contracted to design mobile jammer for government
switched over to sell these devices to private entities. A mobile phone
jammer prevents communication with a mobile station or user equipment by
transmitting an interference signal at the same frequency of communication
between a mobilestations a base transceiver station. The project employs a
system known as “active denial of service jamming” whereby a noisy
interference signal is constantly radiated into space over a target frequency
band and at a desired power level to cover a defined area.This is mainly
intended to prevent the usage of mobile phones in places inside its coverage
without interfacing with the communication channels outside its range,
thus providing a cheap and reliable method for blocking mobile
communication in the required restricted a reasonably.In the future, this
work will serve as the basis for further research work in the related area.

6
INTRODUCTION
Cell phones are everywhere these days. According to the cellular
telecommunications and internet association, almost 195 million people in
the United States had cellphone service in October 2005.and cell phones are
even more ubiquitous in Europe. It’s great to be able to cell anyone at
anytime. Unfortunately, restaurant, movie theaters, concerts, shopping
malls and churches all suffer from the spread of cell phones because not all
cell phone users know when to stop talking. While most of us grumble and
move on. Some people are actually going to extremes to retaliate. Cell
phones are basically handled two-way ratio. And like any ratio the sign can
be disrupted.

Mobile jammer is used to prevent mobile phones from receiving or


transmitting signals with the base station. Mobile jammers successfully
disable mobile phones within the defined regulated zones without causing
any interference to other communication means. Mobile jammer can be used
in practically any location, but are used in places where a phone call would
be particularly disruptive like temples, libraries, hospitals, cinema hall,
school and colleges etc.

A mobile phone jammer prevents communication with a mobile station or


user equipment by transmitting an interference signal at the same
frequency of communication between a mobilestations a base transceiver

7
station. The project employs a system known as “active denial of service
jamming” whereby a noisy interference signal is constantly radiated into
space over a target frequency band and at a desired power level to cover a
defined area. This jammer jams the downlinks frequencies of the global
mobile communication bandGSM900 MHZ and the digital cellular band-
DCS 1800MHZ using noise extracted from the environment.

The jammer works dual-band and jams three well-known carriers of Nigeria
(MTN, AIRTEL, and TISALAT).The operational block of the jamming system
is divided into two section : intermediate frequency(IF) section and the radio
frequency transmitter module(RFT).the IF section comprises a noise circuit
which extracts noise from the environment by the use of microphone, this
noise is mixed with tuning(ramp) signal which tunes the radio frequency
transmitter to cover certain frequencies. The RFT comprises an in build
voltage controlled oscillator, power amplifier and antenna connectors.

An antenna radiates the jamming signal to space. Upon activation of the


mobile jammer, all mobile phones will indicate “no network, SOS or
searching for service and all phones within the effective radius are silenced.
Incoming calls are blocked as if the mobile phone were off. When the mobile
jammer is turned off, all mobile phones will automatically re-establish
communications and provide full service. A jammer working on man-made
(extrinsic) noise was constructed to interfere with mobile phone in place
where mobile phone usage is disliked, offensive or forbidden.

RELEVANT CONCEPTS AND PRINCIPLES:


The broadcast control channel (BCCH) is one of the logical channels of the
GSM system it continually broadcasts, on the downlink, information
including base station identity, frequency location, and frequency-hopping
sequences. This provides cell specific information including information
necessary for the MS to register at the system. One of the important sub-
channel on the BCCH channel includes: frequency correction channel
(FCCH) which is used to allow an MS to accurately tune to a BS. It is
required for the correct operation of radio system. This allows an MS to
accurately tune to a BS. Synchronization channel (SCH), which is used to
provide TDMA frameoriented synchronization data to a MS. this is also
required for the correct operation of the mobile. Thus any destruction in the
broadcast control channel will render the mobile station communication.

Communication system technology use a technique known as frequency


division duple Xing (FDD) to serve users with a frequency pair that carries
information at the uplink and downlink without interference. A break in

8
either uplink or downlink transmission result into failure of the
communication link. This break can be as a result of weak signals due to
proximity to the BTS, provided there is no hand over. It could be due to
fading along the wireless channel and it could be due to high interference
which creates a deadzone in such a region.

The common factors that affect cellular reception include: strength and
location of the cellular base station or tower, terrain and topology, weather
and climatic conditions, structures, building material and construction
methods. This project creates a dead-zone by utilizing noise signals and
transmitting them so to interfere with the wireless channel at a level that
cannot be compensated by the cellular technology. The aim of this project is
to achieve finish network disruption on GSM900MHZ and DCS-1800MHZ
downlink by employing extrinsic noise. The project is limited to limited to
operation at GSM-900MHZ and DCS-1800MHZ cellular band, with an
effective jamming radius of approximately 10 meters.

METHODOLOGY:
A noise generator is a circuit that produces electrical noise (random, non-
deterministic signal). noise generator are used to test signals for measuring
noise figure, frequency response, and other parameters, it can also be used
for the generation of random numbers. Several noise generation methods
include: heated resistors, zener diodes and gas discharge tubes. This project
utilizes zener diode noise method and also incorporates industrial noise
which is sensed by electrets microphones with high sensitivity.

In common jammer designs such as GSM 900 jammer by Ahmad a zener


diode operating in avalanche mode served as the noise generator. When
zener diodes are operated in reverse bias at a particular voltage level, they
go into avalanche made which results into random current flow and hence a
noisy signal.

9
Fig : Mobile jammer circuit

When zener diodes are operated in reverse bias at a particular voltage level,
they go into avalanche made which results into random current flow and
hence a noisy signal. In this industrial (manmade) noise is mixed with such
noise to create signal with a higher noise signature. This industrial noise is
tapped from the environment with the use of high sensitivity microphone at
-40+-3dB,placed in front of the jammer for better exposure to noise. With
more microphones, a spatial diversity setting would be preferred. Although
industrial noise is random and unpredictable, the zener diode avalanche
serves the noise requirement.

With more microphones, a spatial diversity setting would be preferred.


Although industrial noise is random and unpredictable, the zener diode
avalanche serves the noise requirement when jammer is used in an
extremely silent environment. The RF cellular transmitter module with 0.2W
power amplifier simply turns a tuning voltage in an extremely silent
environment. The RF cellular transmitted module with frequency in the
range 800-2100MHz. This covers the covers the GSM and DCS.A mobile
phone might evade jamming due to the following reason: strength and
location of the cellular base station or tower, terrain and topology, weather
and climatic conditions, structures, building material and construction
methods, communication system technology, phone configuration, mobile
network type, act of good – jammer fault.

10
WOKING OF MOBILE JAMMER
Cell phone jammer work in a similar way to radio jammers by sending out
the same radio frequencies that cell phone operates on. Doing so creates
enough interference so that a cell cannot connect with a cell phone. Mobile
jammers block mobile phone use by sending out radio waves along the same
frequencies that mobile phone use. This causes enough interference with
the communication between mobile phones and communicating towers to
render the phones unusable. Upon activating mobile jammers, all mobile
phones will indicate “no network” incoming calls are blocked as if the mobile
phone were off. When the mobile jammers are turned off, all mobile phones
will automatically reestablish communications and provide full service.
Mobile jammers effect can vary widely based on factors such as proximity to
towers, indoors and outdoor setting, presence of buildings and landscape,
even temperature and humidity play a role.

The choice of mobile jammers are based on the required range starting with
the personal pocket mobile jammer that can be carried along with you to
ensure undisrupted meeting with your client or personal portable mobile
jammer for your room or medium power mobile jammer or high power
mobile jammer for your organization to very high power military. A cell
phone jammer is a device that blocks transmission or reception of signals,
usually by creating some form of interference at the same frequency ranges
that cell phones use. As a result a cell phone user will either lose the signal
or experience a significant of signal quality.

Cell phone jammers have both benign and malicious uses. Police and the
military often use them to limit destruct communications during hostage
situations, bomb threats or when military action is underway. Portable

11
personal jammers are available to unable their honors to stop others in their
immediate vicinity [up to 60-80feet away] from using cell phones.

The second type of cell phone jammer is usually much larger in size and
more powerful. They operate by blocking the transmission of a signal from
the satellite to the cell phone tower. Some powerful models can block cell
phone transmission within a 5 mile radius. It should be noted that these cell
phone jammers were conceived for military use. Once again, It should be
noted that operating or even owing a cell phone jammer is illegal in most
municipalities and specifically so in the United States. Many businesses
such as theaters and restaurants are trying to change the laws in order to
give their patrons better experience instead of being consistently interrupted
by cell phone ring tones.

TYPES OF JAMMERS:

Type “A” Device (Jammers): This


type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,

12
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
13
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as

14
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators

15
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
16
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.

17
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
18
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located

19
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within

20
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for

21
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used

22
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
23
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,

24
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
25
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as

26
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators

27
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
28
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.

29
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
30
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
Type “A” Device (Jammers): This
type of device comes equipped
with several independent-oscillators
transmitting ’jamming signals’
capable of blocking frequencies used
by paging devices as well as those
used by
cellular-systems-control-channels for
call-establishment.
2.Type “B” Device (Intelligent-
Cellular-Disablers):Unlike jammers,
Type “B” devices do not transmit
an
interfering-signal on the control-
channels. The device, when located

31
in a designated ’quite’ area,
functions as
a ’detector’. It has a unique-
identification-number for
communicating with the cellular-
base-station.
3. Type “C” Device (Intelligent-
Beacon-Disablers):Unlike jammers,
Type C devices do not transmit
an
interfering-signal on the control
channels. The device, when located
in a designated ’quiet’ area,
functions as
a ’beacon’ and any compatible-
terminal is instructed to disable its
ringer or disable its operation,
while within
1.Type “A” Device (Jammers): This type of device comes equipped with
several independent-oscillators transmitting ’jamming signals’ capable of
blocking frequencies used by paging devices as well as those used by
cellular-systems-control-channels for call-establishment.

32
2 Type “B” Device (Intelligent-Cellular-Disablers): Unlike jammers, Type “B”
devices do not transmit an interfering-signal on the control-channels. The
device, when located in a designated ’quite’ area, functions as a ’detector’. It
has a unique-identification-number for communicating with the cellular-
base-station.

3. Type “C” Device (Intelligent-Beacon-Disablers): Unlike jammers, Type C


devices do not transmit an interfering-signal on the control channels. The
device, when located in a designated ’quiet’ area, functions as a ’beacon’ and
any compatible-terminal is instructed to disable its ringer or disable its
operation, while within the area of beacon.

4. Type “D” Device (Direct Receive & Transmit Jammers): This jammer
behaves like a small, independent and portable base station, which can
directly interact intelligently with the operation of the local-mobile-phone.
The jammer is predominantly in receiving-mode and will intelligently-choose
to interact and block the cell-phone directly if it is within close-proximity of
the jammer.

5. Type “E” Device (EMI Shield - Passive Jamming): This technique is using
EMI suppression techniques to make a room into what is called Faraday-
cage. Although labour - intensive to construct, the Faraday-cage essentially
blocks or greatly attenuates, virtually all electromagnetic-radiation from
entering or leaving the cage.

To jam a cell-phone, one need, is a device that broadcasts on the correct


frequencies. Although different-cellular- systems process signals differently,
all cell-phone-networks use radio-signals that can be interrupted. GSM,
used in digital-cellular and PCS-based systems, operates in the 900-MHz
and 1800-MHzbands in Europe, Asia and Africa in the 1900-MHz
(sometimes referred to as 1.9-GHz)-band in the United States of America.
Jammers can broadcast on any frequency and are effective against AMPS,
CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel-systems. The actual-range
of the jammer depends on its power and the local environment, which may
include hills or walls of a building that block the jamming-signal. Low-
powered jammers block calls in a range of about 30 feet (9 m). Higher-
powered units create a cell-free-zone as large as a football-field (around
120mx90m). Units used by law-enforcement can shut-down service up to 1
mile (1.6 km) from the jammer-device. A portable mobile-phone- jammers
featured by the Universal and Handheld Design, could block worldwide cell
phone networks within 0.5-10 meters, including GSM900MHz,
GSM1800MHz, GSM850MHz/CDMA800MHz and also 3G networks (UMTS /
WCDMA) (Zorn, 2011).

33
There are, basically, two types of jammers: The-first-type is usually smaller-
devices that block the signals coming from cell- phone-towers to individual-
cell-phones, and it can block signals within about a 30-foot (9m) radius.
Cell-phones within this range simply show no signal. The- second- type of
cell phone-jammer is usually much-larger in size and more-powerful. They
operate by blocking the transmission of a signal from the satellite to the cell-
phone-tower (Mahato & Vimala, 2015). The-first-type jammer will be the
subject of this design.

Mobile-phone-jammers can be also customized, depending on the area of


application and the reason behind the jamming. They can be grouped as
follows: cell-phone-jammer-for leisure and general-purpose-work; Portable-
cell-phone- jammer; Remote-control-cell-phone-jammer – where jamming
does not necessary have to be from the area where the device is located;
Adjustable-cell-phone-jammer; School & prison-phone-jammer - to prevent
cheating in examinations and destructions during lectures as well as illegal
use in prisons; Explosionproof cell- phone- jammer - to curb RF-triggered
bombs; and Police & military phone-jammer -to prevent illegal-activities like
by kidnappers trying to extort money from citizens or criminals planning an
illegal activity (Gopal, 2013). This-design is focused on the School& prison-
cell-phone-jammer.

JAMMING TECHNIQUES:
The three-common-ways of jamming a radio-frequency are: Denial of
Service, Shielding Attacks, and Spoofing.

DENIAL OF SERVICE:

The device transmits a noise-signal at the same-operating-frequency of the


mobile phone in order to decrease the signal-to-noise-ratio (SNR) of the
mobile under its minimum-value, thereby disrupting the communication
between the phone and the cell-phone-base-station. This kind of jamming
technique is the simplest one since the device is always on.

SCHIELDING OF ATTACKS:

This is known as TEMPEST or EMF-shielding. This kind requires closing an


area in a Faraday-cage so that any-device inside this cage cannot transmit
or receive RF-signals from the outside of the cage. This area can be as large
as buildings or a football pitch.

SPOOFING:

The device forces the mobile to perform a self-shut down. It very- difficult to
be implemented since the jamming-device should first detects any mobile-

34
phone in a specific area, and then the device sends the signal to disable the
mobile-phone. Some types of this technique can detect if a nearby-
mobilephone is there and sends a message to tell the user to switch the
phone to the silent-mode.

DESIGN-PARAMETERS:

Based on the design-considerations, the device is transmitting signal (noise)


on the same frequencies of the two bands GSM 900 MHz, and GSM 1.8 GHz
(known also as DCS 1800 band). Selected design- parameters have to be
determined first to establish the device-specifications. These parameters are
as follows: The distance to be jammed (D): This parameter is very-important
in this-design, since the amount of the output power of the jammer depends
on the area that needed to be jammed.

The design is established upon D=10 meters for DCS 1800-band and D=20
meters for GSM 900-band. The frequency bands: In Kenya, the mobile-
network operates on the 900 MHz, 1800 MHz (2G), and 2 GHz (3G) GSM-
bands like most- European-carriers. Since 2014, 4G is available in limited
areas in Nairobi and Mombasa (CCK (2015). GSM900 (Uplink: 890-915 MHz;
Down link: 935-960 MHz); DCS 1800 (Uplink: 1710-1785MHz1785 MHz;
Downlink: 1805-1880 MHz). In this-design, the jamming-frequency must be
the-same as the downlink, because it needs lower-power to do jamming than
the uplink-range and there is no need to jam the base station itself. Thus,
the design-frequency will be as follows: GSM 900 935-960 MHz and GSM
1800 1805- 1880 MHz.

CELL PHONE-JAMMING LEGAL-ISSUES:

The review-recorded-below do not claim to be fully-comprehensive-account


of every-instance associated with the Legal-Issues related to RF-signals-
jamming, however, the assessment does give a fairly-good-picture of the
order of magnitude of activities, achievements, and problems encountered,
and probably include the most significant ones identified for which
information was available at the time this study was carried out.

Cell-phone-jammers are illegal in most-countries, except to the military,


law-enforcement and certaingovernmental- agencies (ACA, 2003), as it is
considered a “Property Theft” because a private-service-providercompany
has purchased the rights to the radio-spectrum, and jamming the spectrum
is a kind of stealing the property the company has purchased. It also
represents a “Safety Hazard” because jamming blocks all the calls in the
area, not just the illegal or annoying ones. Jamming a signal could block the
emergency-calls, where there is a life and death situation. In addition, there
could be some innovative misuse or even abuse of the mobilephone-

35
jamming-technology, for example, there has been an extensive-recent-
chitchat on Twitter, that 5-starhotel-chains installed mobile-phone-jammers
to block guests’ cell-phone-usage and force them to use in-roomphones at
much-higher-rates.

According to the ACA’s Declaration Prohibiting mobile-phone-jammers


(2003), currently, the mostserious and severe-legal-elimination of mobile-
phone-jammers is in Australia, where, for example Section 189 of the Act
makes it an offence to operate or supply, or possess for the purposes of
operation or supply, a prohibited device, without reasonable excuse. Section
189 also details the penalties that apply if a person is found guilty: if the
offender is an individual – imprisonment for two years; or otherwise – 1,500
penalty units (currently $165,000).

The reasons for the prohibition included: mobile-phone-jammers cause


deliberate-interference to licensed-services and may cause interference to
other-services operating in adjacent-spectrum-bands; All mobile phones
being used within a radius of up to four kilometers from the jamming-device
could be ‘jammed’; Concern that radiation-levels of high-powered-devices
may result in human-exposure to levels of EMR, that exceed the maximum
permittedunderAustralian-health-exposure-standards. This has implications
for public health and safety, especially in confined areas; Jamming would be
likely, among other things, to substantially interfere with, or disrupt or
disturb public-mobile-phone-services and have serious-adverse-
consequences for public-mobile-phone-users by jeopardizing the quality and
extent of carrier-services, preventing access to emergency-services and
causing inconvenience to or loss of business for mobile-phone-users.

Other services likely to be affected by jammers: Examples of the types of


radio-communications services operating in bands near those used by
mobile-phones and potentially-affected by mobile-phone-jammers are:
trunked-land-mobile-systems; fixed point-to-point links which carry
anything from data to multi-channel voice communications; sound-outside-
broadcast and studio-to-transmitter links; cordless-telephones; interference
with electromagnetic- wave sensitive-devices such as life-support-equipment
in hospitals (such as the apnea-monitor) and those in airplanes, and the
large-number of devices authorized to operate under ACA class-licenses
(such as garage-door-openers and wireless LANs), emergency organizations
(such as poison information-centres and other-medical-services) or to the
normal-phone-numbers for police, fire and ambulance. Mobile-phones are
increasingly being used to request emergency-assistance from the police, fire
or ambulance services in life-threatening or time-critical situations, for
example during 2002-03, 29% (or 1,128,339) of the 3,953,564 genuine-calls
to emergency-call-service originated from mobile-phones. There is some-

36
evidence of a potential for mobile-phone-jammers to cause mobile phones to
“lock up” and to remain-so after leaving the jammed-area until the phone is
“reset” (e.g. by turning-it-off and on-again). The user may be unaware that
this has occurred and of the need to reset the phone (ACA, 2003).

TESTING OF THE JAMMER WITH CORRESPONDING-


RECOMMENDATIONS:

The jammer was able to destroy a signal-receiving-condition for all-the-


specified cell-phones (separately) and cut-off the connection between cell-
phone and the base-station by producing intercepting-signal (noise), which
can make jammer receive the same frequency with cell-phones. Satisfactory-
jamming of a mobile-signal was confirmed by the blocking of the signals
generated by mobile-phones in 2G and 3G-networks operated via Safaricom,
Airtell, Orange, and YU local-service-providers, when the phone indicated
“no network”, thereby allowing no call to go through; with no-interference to
other communication- means observed.

When the mobile-jammer was turned-off, however, the mobile-phones were


not automatically reestablished their communications and provided full-
service, as expected. Therefore, to resume communication afterwards, the
mobiles should be “re-set”- turned off and on-again again.

The range of jamming was also smaller than expected. This could be
explained that mobile-jammer’s effect can vary-widely based on factors such
as proximity to towers, indoor and outdoor-settings, presence of buildings
and landscape, even temperature and humidity play a role. A higher-
powered-RF-amp can be possibly used to improve the range of the jammer
and, therefore further-research is needed to ascertain this option.

This jamming-device only transmitted a jamming-signal and had poor-


frequency-selectivity. This is a type “A” small-interference-jammer. Hence, in
order to simultaneously-block signals with different-frequencies falling
within the relevant-band, a chain of similar such-devices is required.

Calibration of the tuner-circuit to coincide with the jammed-frequency was


also a concern. Also, it was difficult to block all-frequencies within the
applicable-bandwidth. Obtaining components such as a VCO-chip proved
difficult, as well as the transistor BF 494 was not available in the Kenyan-

37
market; hence an alternative BC 548 was used which, probably, never
provided the desired results.

After blocking GSM 900, DCS (Digital Cellular Systems) 1800, PSC (Personal
Communications Services) 1900 and WCDMA 2100 MHZ the next target is
blocking of 4G system that is 2400 MHZ. To prevent over-jamming, proper
RF site engineering and extensive testing will be required. Although the law
(in some-counties) clearly prohibits using a device to actively disrupt a cell-
phone signal, there are no rules against passive cell-phone blocking. Many-
Electronics-design-companies are now working on devices that control a
cell-phone, but do not “jam the signal”, so called” hybrid systems”. In our
busy-life most of people do use their mobile-phone while driving, which arise
accidental-possibility, thus in future to reduce accidents the jamming
system will operate whenever the driver turns on the ignition. The jamming-
device receives radiation emitted by the phone and also will be able to tell
whether the mobile-phone is being used by the driver or the passenger.

APPLICATIONS:

 Police can block phone-calls during a drug-raid, so the suspects will


be unable to communicate.
 Cell-phonejammer can be used in areas where radio-transmissions
are dangerous (areas with a potentially-explosive atmosphere), such
as chemical-storage-facilities, fertilizer-factories, petrol-stations or
grain-elevators.
 Corporations can use jammers to stop corporate-espionage by
blocking voice-transmissions and photo transmissions from camera-
phones.
 They can also be used in the areas like schools or academic areas,
exam centers, medical facilities, public libraries, governmental-offices
and high-security-areas like prisons, courts, scientific-research-
laboratories and military-facilities among others.
 Jammers could offer an impressive-array of applications, indeed. But
in practice, every device has its advantages and its limitations. As
such, the legitimacyspectrum of mobile-jammers must be discussed,
at this-juncture, to give a full-picture.

ADVANTAGES:

38
 Jammers can be used to prevent terrorist attacks and improve the
security situation of an area.
 It prevents illegal communication between visitors and inmates.
 It has become a compulsory addition to high security areas like
detention centers and prisons.
 Signal jammers are not designed to harm or hurt general public. They
give calm and peace to people.

DISADVANTAGES:

Like every other thing related to technology, cellphone jammers also have
their own disadvantages. Here are some of their disadvantages.

 If you block the Cell phone signals, someone might miss an emergency
call.
 Security officials can’t be contacted in case of an emergency.
 Some countries ban the usage of jammers in public places, so, you
might face a penalty.

FUTURE SCOPE:

While the law clearly prohibits using a device to actively disrupt a cell-phone
signal, there are no rules against passive cell-phone blocking. Companies
are working on devices that control a cell-phone but not jam the signal.

CONCLUSION:

Jamming-technique is potentially very-useful to disable cell-phone in a


particular-range, but it should-not affect the other base station
transmission-systems. Mobile-jammer can be used in any-location (subject
to particular legal-restrictions), but, practically, in places where a mobile-
phone-use would-be, on the whole, harmful, disruptive, and even
dangerous, like in prisons. Overall-recommendation is that, further and
more deeper-research is needed to produce more-sophisticated and better-
jamming-devices, as to not affect the other base station transmission
systems.

REFERENCES:

39
 Akaiwa, Y. (2008) Introduction to Digital Mobile Communication, 2nd
Edition. ISBN: 978-1-119-04110-8 [Online] Available:
http://eu.wiley.com/WileyCDA/WileyTitle/productCd-
1119041104.html (June 12, 2016).

 Campbell, S. & Park, Y. (2008). Social implications of mobile


telephony: The rise of personal communication society. Sociology
Compass, 2(2), 371-387.

 Mahato, S. and Vimala, C. (2015) Cellular Signals Jamming System in


2G And 3G. International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, ISSN (Print): 2320 –
3765 ISSN. Miao, G; Zander, J.; K-W Sung, and Slimane, B. (2016)
Fundamentals of Mobile Data Networks, Cambridge University Press,
ISBN 1107143217.

 Zorn,S.; Maser,M.; Goetz,A.; Rose, R. and Weigel, L. (2011) “A power


saving jamming system for e-GSM900 and DCS1800 cellular phone
networks for search & rescue applications, Published in: Wireless
Sensors and Sensor Networks (WiSNet), IEEE Topical Conference,
1619 Jan. 2011, Page(s): 33 – 36, E-ISBN: 978-1-4244-8413-3, Print
ISBN: 978-1-4244-8414-0

 MPCC (2003)Mobile& Personal Communications Committee of the


Radio Advisory Board of Canada “Use of Jammer and Disabler Devices
for blocking PCS, Cellular and Related Services”. [Online] Available:
http://www.rabc.ottawa.on.ca/e/Files/01pub3.pdf (May 27, 2016).

40

You might also like