DIY GSM jammers: scheme

Today it has become much easier to communicate with each other, thanks to the advent and widespread distribution of mobile phones. But, on the other hand, such a development entails many unpleasant moments. And in order to avoid all sorts of surprises, they came up with special devices that are now available not only to scouts, but also to ordinary people. These are the so-called suppressors or jammers. With their help, you can not be afraid of hidden cameras, wiretapping, "bugs" and similar "things" that are available today to everyone.

Suppressors can be purchased, for example, over the Internet. And radio amateurs make them themselves. How these devices work, what they are capable of, and how to make a GSM jammer with your own hands, we will talk in the next article.

How do jammers work on phones?

gsm jammers

Some of them are devices of this type that when the devices fall into their coverage area, all around the phones catch only interference, and people can’t talk on them.

Other GSM jammers are aimed at scanning frequencies and are looking for a specific signal. The moment it appears, they begin to generate interference. Thus, significantly saved electrical energy.

Cell-like suppressor

Devices can have a different range. Some of them do not extend more than ten meters. They are perfect for a small office or car.

More serious models have a range of about fifty meters. They can be used, for example, in conference rooms or meeting rooms.

do-it-yourself gsm jammer

But there is also a device with a huge range. It can spread interference to entire areas. Of course, only the special services have access to such a GSM jammer.

The diagram below will help you design your device yourself.

gsm jammer

Suppressors and the Law

Nevertheless, it must be borne in mind that, according to the Russian federal law “On Communications”, all communications blockers are subject to mandatory registration and certification. The certificate is issued by the device manufacturers themselves upon purchase, but the owners of the devices are responsible for the registration procedure. If it is not passed, then the operation of the device is an illegal action, for which you will have to bear responsibility.

But thanks to such devices, you can protect yourself from various prying devices that have the goal of invading your personal life. It is sometimes unrealistic to find them because of their miniature size, but GSM jammers can quite cope with the task.

Installation and operation of a suppressor

Installation of the device is completely simple. The antenna is screwed into the connector, and the jammer suppresses the signals within ten seconds after switching on. The blocker is able to work both offline and through the network. Also, if necessary, you can use the cigarette lighter car.

But we should not forget that illegal use of the device is against the law.

do-it-yourself gsm jammer

Fine tuning

It happens that after the GSM jammers are charged by turning on the devices, they detect weak work, the extension of the effect only to a certain telecom operator or something else like that. This happens if operators use slightly different frequencies.

But in order for the device to work with them, it is necessary to perform the following actions:

  • remove the switch;
  • unscrew the antenna;
  • remove the cover;
  • pull out the chip;
  • turn a tuning resistor on it with a screwdriver to increase or decrease the frequency.

Who needs to invade someone else's life

Similar actions are taken to configure on WiFi.

Probably everyone knows today what "bugs" are. Various means for wiretapping are currently used not only by special services. They can be set by a student and even a schoolboy.

jammer gsm circuit

However, most often jealousy, business competitors, and others are interested in such devices. Spyware can harm anyone. Therefore, many are interested in information protection today. And the GSM jammer suppressor acts precisely as a device that fights against such phenomena.

Well, many people have long known about GSM 900-1800 cell phones that without a jammer they easily turn into a means of information leakage.

Jammer Bluetooth, 3G, Wi-Fi

Such a device is usually imperceptible and operates at certain frequencies. At the same time, something like “network not found”, “no signal” and so on is usually displayed on the cell phone when the device is operating. And if it was installed with some kind of device, then after a few seconds it is interrupted. Then no spyware can eavesdrop and catch signals.

Jammers of GSM phones or Wi-Fi do not emit powerful noise, radio signal. Therefore, household devices both worked and continue to work.

Highly sensitive spyware can be installed anywhere: in offices, cars, apartments, saunas and so on. Communication occurs at certain frequencies. Conventional detectors often do not cope with the task and are not able to "calculate" modern espionage techniques. But jammers designed to meet the increased conditions and requirements can "neutralize" the space.

Suppressor and anti GPS tracker

In recent years, another type of espionage technique has become widespread - GPS trackers. They are far from being intended only to control cargo transportation, as manufacturers often say. They are often used by law enforcement agencies, private detectives, and the same envious competitors, even criminal structures.

These are absolutely tiny devices, which are easy to hide and hide. And in the end, a certain person will be under such automated surveillance. That's why the GSM signal jammer, a kind of anti-tracker, began to be developed.

These are certain modules that do not allow to calculate the coordinates of a person or vehicle. Anyone who follows using the tracker will only see “no data”, or the data will not be received at all.

Thanks to the suppressors of the vehicle, anonymity is ensured, and the collection of personal information via GPS channels is not allowed.

Devices are able to successfully deal with all kinds of espionage technology, which can harm anyone in their personal lives, and in the business sphere, as well as the whole organization. Therefore, in our realities, such things cannot be neglected, and you must try to protect yourself, your loved ones and employees from spy gadgets.

jammer jammer gsm

DIY GSM jammer

On the Internet you can find instructions for self-assembly of devices.

One of them is given below.

The suppressor is able to withstand a signal at a frequency of 800 megahertz - most mobile devices are configured specifically for it. The control generator here is the oscillating wave generator. The device works perfectly, but for its assembly, of course, certain skills are needed.

The generator of synchronous signals at forty-five megahertz is taken. The local oscillator port responds to it. The result is interference. The resistance in both the port of the local oscillator and in the generator is equal by directing the signal from the generator of the oscillations of the receiver.

At the port of the last generator, an antenna of 800 megahertz is configured. The RF output is connected to the amplifier, increasing the power of the device to sixteen dBm. After that, the increased signal hits the antenna.

Then they come up with a case, install a battery, which is protected from other parts. A switch is attached to the housing.

how to make gsm jammer

Do-it-yourself GSM jammer inside is made of:

  • VCO;
  • training circuitry;
  • antennas;
  • amplifier stage;
  • source of interference.

Jammers operate at different frequencies, depending on the need to interfere with certain communications devices.

VCO can be considered the "heart" of the whole device. It produces an RF signal. An RF amplification unit is needed to expand the coverage of the device. The tuning circuit happens with feedback and open. Cascade amplifiers are sold in a wide range of capacities. But it should be understood that with more power, the operating time will decrease. The antenna transmits the signals generated by the suppressor. The power supply supports the life of the device. As it can be used lithium-ion battery. But if you will use a conventional power source, be sure to purchase a network adapter.

These are the means that today have to deal with the side effects of those inventions that may have been intended for completely different, good and useful purposes.

Source: https://habr.com/ru/post/G23139/


All Articles