Frequency Jamming Fundamentals
Frequency Jamming Fundamentals
As the great scientist Albert Einstein said, "Everything should be made as simple as possible, but not simpler."
Now, understand that this article will have a lot of lame content in it… Anyways, let's start!
Wireless signal transferring has turned into a crucial and applicable technology in governments, businesses, and homes worldwide. These signals are transferred in form of waves over the air and carried by a modulator/carrier, and are thus de-moldulated once arrived at their destination(s). These signals can be cut jammed by, logically, using a frequency jammer, which somewhat works like an EMP (ElectroMagnetic Pulse), but NOT really.
Mobile (cell) phones, Walkie Talkies, Wireless Cameras, Satellite Communications, Radio (AM/FM) Broadcasting, Bluetooth, and Wireless Internet (WiFi) Connectivity depend on these signals for uninterrupted and successful data transmission and reception. This is where frequency jamming comes in play for a hacker, and the possibilities are almost unlimited when it comes to tampering with the connectivity between two nodes.
So if you were ever curious to see what frequencies are operating around you, then use a spectrum analyzer to look at all of the frequencies, and see the operating frequency's number, ie: seeing 1Ghz waves on the screen.
Thus, logically, all that is needed to hinder with the connectivity of one or more devices relying on wireless connectivity to send/receive data is to use a RF (Radio Frequency) Jammer. But you might be asking what frequency should be pursued for jamming.
As a consequence, it is critical to know what technological device you are going after and at what frequency it operates. If we know that information and a have frequency jammer (which can either be constructed/homebrewed), as opposed to being bought for about $300 to $400. RF Jammers usage is illegal in the US (by the FCC) and in most European countries. You will get in deep trouble if caught using such a device, so be VERY careful, wisely (and legally) chose your targets.
The jamming signal is usually pure signal, or random noise. What it does is output that generated signal or noise at the same frequency that the targetted device is operating at, but it sends that signal at a higher power that the targetted device is using. So, if the target is using 10mW, the jammer will strive to overpower it by, say, 20mW.
In any case, once you've obtained the jammer, proceed onto using it against your target. For all of you wardrivers, know that most routers operate at (or about) the 2.4Ghz frequency. If you have a wireless router, then test this out on your own connection(s) and observe whether or not you're still connected to the internet.
Place a cell phone somewhere close to you and have a friend in the next room simply talk loud and obnoxiously on it. The cell phone will most likely use the GSM, TDMA, CDMA, or PCS digital cellular system for communications in the US, Canada, and Europe. Now, all you need to do is point and prees a button on your frequency jammer at the cellie and start laughing as his conversation is abruptly ended.
I don't think the laughing part is necessary, but it is definately a good way to help celebrate your success! Make it a habit to (maniacally) laugh whenever you hack something so easy like this. You're in control of data transmission and reception!
Remember Newton's first law of motion that, “Every object in a state of uniform motion tends to remain in that state of motion unless an external force is applied to it.†Do you want objects to remain untampered with, intact, and unchanged? If so, then ask yourself if you truly are a hacker.
I will NOT show you the circuity for the jammer, it is for you to construct one for yourself. If you're looking for a great summer project, then check out:
Cell Phones >> http://www.cs.utah.edu/~chrisb/writing/jammer/circuit%20drawings/celljam5.pdf GPS System >> http://www.qsl.net/n9zia/wireless/gps_jam-pics.html TV Remote >> http://www.electronic-circuits-diagrams.com/funimages/funckt4.shtml WiFi >> http://www.ladyada.net/make/wavebubble/index.html
ghost 17 years ago
wtf? Is this about lol? you dont need 20mW to jam 10mW. I doubt random noise at the same freq as your wireless will effect it. you could just use deauth and make all the client s attempt to re-auth
ghost 17 years ago
enjoy :) crappy little jammer, if you strap an audio transformer to the input you get a small transmitter.
ghost 17 years ago
lol, wolfie, I'm just using an example … exxageration is a good prop sometimes :)
bahpomet1105 9 years ago
Cool article you guys should look into the HackRF I'm hoping to get one for X-mas.