how to detect GSM Jammers?

Posted on 2009-12-22
Last Modified: 2013-12-09
Dear experts

i want to detect GSM mobile phone jammers when being around or activated.
any product or schematics ?

Thanks a lot.
Question by:adaheem
    LVL 17

    Accepted Solution

    LVL 17

    Assisted Solution

    Here is a huge product with ALOT of more features, goto Page 245 for Jammer detection part:
    LVL 17

    Assisted Solution

    LVL 8

    Expert Comment

    Phone jammer detector

               What is a Phone Jammer?            
    A phone jammer totally paralyses, rendering inoperative, all kinds of mobile                  and portable phones working in the GSM bands.             The solution: Phone jammer detector            
    The unique, embedded Jamming Detect & Report feature allows all our GSM modules to detect the presence of a disturbing device such as a phone jammer and gives a hardware and software indication of the event.            

    How does the phone jammer detection work?            
    Any GSM module / phone registers to one base station but will also "see" a lot of other neighbouring cells as well. With our embedded detector you can detect a jammer by noise level and the number of disturbed neighbouring cells. If the GSM module detects a jammer then it will set the GPIO hardware output pin from LOW to HIGH and also send the message "JAMMED" to the serial port. This is all controlled by inbuilt AT commands. The micro controller on PCB can detect the output pin or the message ”Jammed” on UART and then switch on the horn and/or lights of the car.

    This type of jamming detection is supported by all GSM modules listed here:

    I wish you a fast start with your wireless application.


    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Join & Write a Comment

    This article is a step by step guide on how to create a basic PTP link using Ubiquiti airOS devices. This guide can be used on the following Ubiquiti AirMAX devices. Nanostation, Bullets, AirBridge, Nanobeam, NanoBridge to name a few. Please review …
    For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now