Countering Contraband Cell Phone Use in Prisons A Technical Explanation of Available Technologies.

Slides:



Advertisements
Similar presentations
Mobile Phone Jamming A Brief Overview by Robert Maine and Robert Cochrane.
Advertisements

Cell Phone Jammer By:- Ganesh Pathak Pallavi Mantri Rohit Patil Pawan Kumar.
Listening from Terrys talkshow. Listen to three s from Terrys listeners then answer the questions.
Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
Energy Harvesting Technology and Applications
SPI Serial Peripheral Interface. SPI Serial Peripheral Interface is communication between two devices, one bit at a time sequential one bit at time over.
Amplifier in Wireless World Prepared by :Reem R. Hussein Prof. Issam Rashid Ashqer An-Najah National university Faculty of science Physics department.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
ESE – Andrew Rusek Applications of Computer Modeling in Electromagnetic Compatibility (EMC) Tests (Part1) P8. Field Pattern of Three Radiating.
Wireless, Cellular, Geolocation Harry Lewis April 14, 20111Harvard Bits.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Chapter 15 Emission Security. Introduction Emissions Security (Emsec) Tempest defenses Stray RF emitted by Electronics Power Analysis Set back Smart Card.
Indian Institute of Technology Hyderabad MOBILE PHONE DETECTOR BY- AKSHAY.A.JADHAV (es12b1004)
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
The Opportunity of WISP’s Mark Levetzow. Topics  WISP’s and how they work  IEEE standards and radio frequency.  Equipment  Good/Bad points about WISP’s.
 Defining the RF jamming system and showing the importance and need of using it in many places.  Giving a complete RF jamming system design based on.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
WLAN. A wireless LAN, or WLANLAN WLAN, is a local area network that does not have wired Ethernet connections. A WLAN can be either an extension to a current.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
The Communication Concepts Model: A Look into the Cellular Phone Voice Call By: Brianna Person.
1 Computer Maintenance Mobile Devices: How they Operate Copyright © Texas Education Agency, All rights reserved.
Chapter 5: Computer Networks
COMMUNICATION GADGETS
Cell Phone Jammer Sick of cell phones? Then jam them!
WHAT IS JAMMER ?  Jammer are the device by which we can creat a temporary “dead zone”in there immediate proxcimity.  There are three type of jammer.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Content: The deployment of modern, high precision weapon systems and their effectiveness depend to a large degree on a timely and accurate identification.
By M. Swapna 09J95a Contents Introduction Types of Jammer How Jammer Works What inside Jammer Applications of Jammer Future scope of Jamming Technology.
The Electromagnetic Spectrum. In this session we will, Review the electromagnetic spectrum Discuss the various forms of energy represented on the electromagnetic.
Cell Phone Jammer 1www.engineersportal.in. Contents Introduction How Cell Phone Jammer Works Types of Jamming techniques Design Parameters/ Specification.
Jesse Foster How does the internet work?  It is a common asked question, how does the internet work? It is hard to live life without internet.
NIS – PHYSICAL SCIENCE Lecture 65 Radio Communication Ozgur Unal 1.
Prison Solutions: RF Jamming Active & Reactive RF Jamming to combat Contraband Cellular Phones in Prisons and Government Facilities.
“ Getting to Know Networks”. What Is a Network? n A network is a collection of computers hooked up together, usually by cables or telephone wires, for.
 RADAR which stands for RAdio Detection And Ranging was developed by Britain in the late 1930’s, during WW2  Before the war, Radars were used to detect.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
Chapter 9.1 Notes Electromagnetic Waves Part 1. A changing electric field can produce a changing Magnetic Field.Magnetic Field. A changing magnetic field.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Phones A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device that can make and receive telephone calls over a radio.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
19.3 Detection of radioactivity
Technician License Course Chapter 3 Operating Station Equipment Power Supplies and Batteries Handheld Transceivers RF Interference (RFI)
TYPES OF CELL PHONE JAMMERS Pocket Cell phone Jammers – A 9 volt operated jammer which has a range of 30 feet. They block the signals coming from cell.
Sniffer for Detecting Lost Mobiles
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
PROJECT PRESENTATION ON FM JAMMER Electronics And Communication Department Bharat Institute Of Technology, Meerut Project guide: Presented By: Mr. Deepak.
Welcome To Cable Locators. We have very useful device for you according to your needs: NEW Exportable OSCOR Green Spectrum Analyzer. That was developed.
By, T.Aathmanesan.. Everybody knows about pollution, in fact is a part of our lives today. Definition : “Presence of contamination in the environment.
Acceptable Use Policy.
Jamming Taiga Kuroiwa.
Unit: Sound and Light Lesson 3: Wireless Communication
Wireless Technologies
Unit 3 Lesson 5 Light Technology
How Mobile Phone Jammer Works
COAXIAL CABLE.
Three types of wireless technology
Electromagnetic Spectrum
UNMANNED INTELLIGENT MILITARY ROBOT USING ZIGBEE
Light Waves and the Human Eye
Cell to tower.
Light Waves and the Human Eye
Electromagnetic Spectrum
Tri-Band RF Jamming System
Denial-of-Service Jammer Detector Training Course Worldsensing
Electromagnetic Spectrum Notes
Unit 3 Lesson 5 Light Technology
Presentation transcript:

Countering Contraband Cell Phone Use in Prisons A Technical Explanation of Available Technologies

Electronic Sniffers Sniffer emits low power radio signal and detects reflections from nearby electronics –Must be close to the cell phone to detect it –Detects cell phones whether they are on or off and does not depend on frequency band Sniffer Emits Signal Detects Response

Passive Detection Listens for cell phone signals –Only detects a cell phone when it is active –Calls can be connected –Network of sensors triangulate cell phones –Hand-held detectors are also available Detector System Provides Location Of Devices Prison Building Footprint

Jamming Jamming is the deliberate radiation for the purpose of disrupting use of electronic devices, equipment, or systems Cell Phone Jammers: –Are frequency band specific, transmit on same radio frequencies as the cell phone to overpower desired signals and disrupt link between phone & tower –Do not discriminate among cell phones within range of the jamming signal – both contraband and legitimate cell phones are disabled Jammer Radio Signal Generator Prison Building Footprint Can be a Network of Individual Jammers or Use “Leaky” Cable All Calls Blocked

Inmate Call Capture Technologies Effectively a mini-cell site Impermissible calls are not connected (blocked) Permissible calls are released and connected as usual Policies selectable by system administrator All 911 calls can be connected Prison Building Footprint Permitted Calls Connected to Cell Network As Usual Prison Managed Access Cell Site Blocks impermissible Calls Captured & Released