Mobile Jammer Seminar report







This report presents the design, implementation, and testing of a dual-band cell-phone jammer. This jammer works at GSM 900 and GSM 1800 simultaneously and thus jams the three well-known carriers in Jordan (Zain, Orange, and Umniah). This project went through two phases:

Phase one: studying the GSM-system to find the best jamming technique, establishing the system design and selecting suitable components.

Phase two: buying all the needed components, drawing the overall schematics, fabricating the PCB layout, assembling the devices, performing some measurements and finally testing the mobile jammer.

The designed jammer was successful in jamming the three carriers in Jordan as will be shown at the end of this report.


Communication jamming devices were first developed and used by military. This interest comes from the fundamental objective of denying the successful transport of information from the sender (tactical commanders) to the receiver (the army personnel), and vice-versa. Nowadays, mobile (or cell) phones are becoming essential tools in our daily life. Here in Jordan, for example, with a rather low population (around 5 million), three main cell phone carries are available; namely; Zain, Orange, and Umniah The first two use the GSM 900 system, while the third uses the GSM 1800 system. Needless to say, the wide use of mobile phones could create some problems as the sound of ringing becomes annoying or disrupting. This could happen in some places like conference rooms, law courts, libraries, lecture rooms and mosques. One way to stop these disrupting ringings is to install a device in such places which will inhibit the use of mobiles, i.e., make them obsolete. Such a device is known as cell phone jammer or "GSM jammer", which is basically some kind of electronic countermeasure device. The technology behind cell phone jamming is very simple. The jamming device broadcasts an RF signal in the frequency range reserved for cell phones that interferes with the cell phone signal, which results in a "no network available" display on the cell phone screen. All phones within the effective radius of the jammer are silenced. It should be mentioned that cell phone jammers are illegal devices in most countries. According to the Federal Communications Commission (FCC) in the USA: "The manufacture, importation, sale, or offer for sale, of devices designed to block or jam wireless transmissions is prohibited". However, recently, there has been an increasing demand for portable cell phone jammers. We should mention that this project, presented in this report, is solely done for educational purposes. There is no intention to manufacture or sell such devices in Jordan, or elsewhere. In this project, a device that will jam both GSM 900 and GSM 1800 services will be designed, built, and tested.










Download Link beloew :



Download PDF



Download PPT




SHARE THIS POST



Related Posts



26 page

GPRS Technology

22 page

Fuel Cell

22 page

Adaptive optics




comments powered by Disqus

Sponsor



Top Stories

nyc subway

Gesture Recognition Technology Seminar Report

Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand.

Read More »

danny antonucci

Smart Grid Seminar Report

A smart grid delivers electricity from suppliers to consumers using two-way digital technology to control appliances at consumers homes to save energy, reduce cost and increase reliability and transparency.

Read More »

watercolor paints

Blu-Ray Technology Seminar Report

Blu-ray is a new optical disc standard based on the use of a blue laser rather than the red laser of today’s DVD players. The standard, developed collaboratively by Hitachi, LG, Matsushita (Panasonic), Pioneer,etc

Read More »

apple ipod classic photo

Underwater Wireless Communication Seminar Report

Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.

Read More »

web design magazines

Java Ring Seminar Report

A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet

Read More »