- Saved searches
- Use saved searches to filter your results more quickly
- alamar808/TheBluetoothJammer
- Name already in use
- Sign In Required
- Launching GitHub Desktop
- Launching GitHub Desktop
- Launching Xcode
- Launching Visual Studio Code
- Latest commit
- Git stats
- Files
- README.md
- Saved searches
- Use saved searches to filter your results more quickly
- T-vK/alexa-jammer
- Name already in use
- Sign In Required
- Launching GitHub Desktop
- Launching GitHub Desktop
- Launching Xcode
- Launching Visual Studio Code
- Latest commit
- Git stats
- Files
- README.md
- About
- Amazon Echo (Alexa) and Google Home jammer for Arduinos and chips like the ESP8266 and ESP32
- Structure
- The «wifi-jammer»
- The «mic-jammer»
- How to use the «wifi-jammer»
- How to use the «mic-jammer»
- Software
- Hardware
- Any questions?
- Credits
Saved searches
Use saved searches to filter your results more quickly
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.
A jammer project done during the Science Hack Day Berlin 2018
alamar808/TheBluetoothJammer
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Sign In Required
Please sign in to use Codespaces.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching Xcode
If nothing happens, download Xcode and try again.
Launching Visual Studio Code
Your codespace will open once ready.
There was a problem preparing your codespace, please try again.
Latest commit
Git stats
Files
Failed to load latest commit information.
README.md
Our hack used five ESP-12E modules to disrupt the widest possible range of the 2.4GHz range. For this, the modules were configured as WLAN Access Point, each on a different channel. Since the WLAN within the event area is mostly operated on channels 1, 6 and 11, channels 2, 5, 7, 9 and 12 were used for the jammers.
The transmitter and receiver of the victim network were a Sony Experia Z3 mobile phone and a UE Boombox, which were paired via Bluetooth. A soundcloud music stream was used as data stream.
The WifiAcessPoint example code from the Arduino ESP8266 library, which configures an access point, served as the code base. Each AP was named after its Wifi channel, in the scheme «ESPapxx», where xx corresponds to the channel. To increase the amount of traffic generated by each module, the interval in which the access points call their own name (a so-called «beacon») has been reduced to 1 ms (preconfigured is 200 ms). For this the ESP8266WiFiAp.cpp file of the ESP library was edited and beacon_interval was set to 1ms.
To further reduce the signal-to-noise ratio, various Cantenna prototypes were tested on plastic parts and aluminum foil. The configured modules were placed inside the plastic housing and then wrapped in aluminum foil from the outside. Thus, a reflection and bundling of Wifi radiation can be achieved without generating short circuits on the pins of the modules.
Unfortunately, we discovered that Bluetooth music streaming is a very robust protocol. Neither encircling the sender’s smartphone with disturbing wireless channels nor the receiving Bluetooth speaker could significantly affect the quality of music playback. The maximum distance between transmitter and receiver for trouble-free music reproduction was 20m both with or without Jammer influence. An effective shielding of the loudspeaker from the data stream was only achieved by completely wrapping the loudspeaker in alumnium foil. Even then an almost interference-free operation could be detected up to 50cm away from transmitter and receiver.
The Bluetooth protocol has been extended with so-called Adaptive Frequency Hopping with version 1.2, which allows the data stream to change frequency in a predefined pattern up to 1600 times per second. Highly noisy regions (e.g. strongly used wifi channels) are excluded from the hopping pattern. Additionally, Bluetooth divides the 2.4GHz band into 79 more narrow channels instead of 14 like the Wifi protocol. This explains why five Wifi jammers in the immediate environment are not enough to disturb a music stream sufficiently. The Bluetooth participants thus bypass the interference areas we have generated.
An effective Bluetooth interference thus requires an even wider interference signal in the 2.4 GHz spectrum. The trivial solution would be to use a magnetron from a scrapped microwave. This approach is any health concern for all parties involved and requires a 220V connection, so it is not mobile.
A better alternative seems to us jamming by means of own operated Bluetooth networks, since these jammers then utilize the finer distribution of the 2,4GHz volume and the high-frequency channel hopping The basis for this can be ESP32 modules, which is the successor to the ESP8266 we used in this hack. Among other things, this chip generation is equipped with a Bluetooth module. We suggest to operate multiple device pairs (one master and one slave device each) each in their own bluetoothnetwork (a so-called piconet) while sending random generated data. With a sufficient number of these jammer pairs near a music stream, the chance of data collision increases, and thus the music stream interruption we have achieved. The chance of two small bluetooth networks collide in data is only 1,5%, so several networks in parallel are needed to effectively jam
Saved searches
Use saved searches to filter your results more quickly
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.
Jamming the Wifi connection and microphones of all Amazon Echo and Google Home devices surrounding you
T-vK/alexa-jammer
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Sign In Required
Please sign in to use Codespaces.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching Xcode
If nothing happens, download Xcode and try again.
Launching Visual Studio Code
Your codespace will open once ready.
There was a problem preparing your codespace, please try again.
Latest commit
Git stats
Files
Failed to load latest commit information.
README.md
Amazon Echo (Alexa) and Google Home jammer for Arduinos and chips like the ESP8266 and ESP32
This project is still under development and has not been tested very well yet.
This project consists of two parts. The first one we’re calling the mic-jammer and the second one we’re calling the wifi-jammer .
It constantly checks if there are any spy devices around you, such as an Amazon Echo or a Google Home device and blocks their WiFi access. (Other devices are left alone.)
Beware, this automatically works on ALL Wifi networks in your range (even hidden ones) without even knowing the wifi passwords. Make sure you’re not breaking any laws in whatever country you want to operate such a jamming device!
The wifi-jammer requires a an ESP8266 or ESP32.
The «mic-jammer» generates ultrasonic noise that is inaudible to humans. Microphones however get jammed by the noise making any recordings useless. Filtering out the noise in software does not appear to be possible as the noise completely overpowers anything else and the microphone actually picks it up as humanly audible noise (20hz-20khz) instead of 20khz+.
Beware, the mic-jammer will jam all microphones in range. Make sure you’re not breaking any laws in whatever country you want to operate such a jamming device!
The «mic-jammer» requires an Arduino.
How to use the «wifi-jammer»
- If you haven’t already, Install the Arduino IDE, add the ESP8266 board to your Arduino IDE and restart the IDE.
- Open the wifi-jammer.ino file with your Arduino IDE.
- Connect your ESP8266 to your computer.
- Select your ESP8266 board unter Tools->Board and Tools->Port
- Click the upload button.
If you want to make it portable, ESP8266 boards like this one are nice because you can simply pop in an 18650 battery to make it portable. But a Wemos D1 with a power bank works just as well.
- If you haven’t already, Install the Arduino IDE
- Open the mic-jammer.ino file with your Arduino IDE.
- Connect your Arduino to your computer.
- Select your board unter Tools->Board and Tools->Port
- You might also want to adjust the FREQUENCY_MIN and FREQUENCY_MAX variables in the code. For example if you use a 25khz transducer, you would probably want to set them to 24000 and 26000.
- Click the upload button.
- TCT40-16T (40khz, range is pretty poor ~1 meter) You might be better off buying 25khz transmitters (I haven’t received my 25khz ones yet, so I couldn’t test it so far.)
- PAM8403 Mini Power Amplifier Board 3Wx2 (3-5.5V 4Ω) (You can probably use way cheaper ones like this, but I ahven’t tested that yet.)
- Arduino Pro Micro 5V
- 500mAh 3.7V LiPo (Any LiPo with 2 wires will do. More mAh = longer run time.)
- Charging board with integrated 5v step up converter
Stationary setup: Portable setup:
Feel free to open an issue on this GitHub repo
The «wifi-jammer» of this project is heavily based on RandDruid’s esp8266-deauth.
The «mic-jammer» of this project is heavily based on y-x-c’s wearable-microphone-jamming.
About
Jamming the Wifi connection and microphones of all Amazon Echo and Google Home devices surrounding you
Amazon Echo (Alexa) and Google Home jammer for Arduinos and chips like the ESP8266 and ESP32
This project is still under development and has not been tested very well yet.
Structure
This project consists of two parts. The first one we’re calling the mic-jammer and the second one we’re calling the wifi-jammer .
The «wifi-jammer»
It constantly checks if there are any spy devices around you, such as an Amazon Echo or a Google Home device and blocks their WiFi access. (Other devices are left alone.)
Beware, this automatically works on ALL Wifi networks in your range (even hidden ones) without even knowing the wifi passwords. Make sure you’re not breaking any laws in whatever country you want to operate such a jamming device!
The wifi-jammer requires a an ESP8266 or ESP32.
The «mic-jammer»
The «mic-jammer» generates ultrasonic noise that is inaudible to humans. Microphones however get jammed by the noise making any recordings useless. Filtering out the noise in software does not appear to be possible as the noise completely overpowers anything else and the microphone actually picks it up as humanly audible noise (20hz-20khz) instead of 20khz+.
Beware, the mic-jammer will jam all microphones in range. Make sure you’re not breaking any laws in whatever country you want to operate such a jamming device!
The «mic-jammer» requires an Arduino.
How to use the «wifi-jammer»
- If you haven’t already, Install the Arduino IDE, add the ESP8266 board to your Arduino IDE and restart the IDE.
- Open the wifi-jammer.ino file with your Arduino IDE.
- Connect your ESP8266 to your computer.
- Select your ESP8266 board unter Tools->Board and Tools->Port
- Click the upload button.
If you want to make it portable, ESP8266 boards like this one are nice because you can simply pop in an 18650 battery to make it portable. But a Wemos D1 with a power bank works just as well.
How to use the «mic-jammer»
Software
- If you haven’t already, Install the Arduino IDE
- Open the mic-jammer.ino file with your Arduino IDE.
- Connect your Arduino to your computer.
- Select your board unter Tools->Board and Tools->Port
- You might also want to adjust the FREQUENCY_MIN and FREQUENCY_MAX variables in the code. For example if you use a 25khz transducer, you would probably want to set them to 24000 and 26000.
- Click the upload button.
Hardware
- TCT40-16T (40khz, range is pretty poor ~1 meter) You might be better off buying 25khz transmitters (I haven’t received my 25khz ones yet, so I couldn’t test it so far.)
- PAM8403 Mini Power Amplifier Board 3Wx2 (3-5.5V 4Ω) (You can probably use way cheaper ones like this, but I ahven’t tested that yet.)
- Arduino Pro Micro 5V
- 500mAh 3.7V LiPo (Any LiPo with 2 wires will do. More mAh = longer run time.)
- Charging board with integrated 5v step up converter
Stationary setup: Portable setup:
Photo of portable setup:
Any questions?
Feel free to open an issue on this GitHub repo
Credits
The «wifi-jammer» of this project is heavily based on RandDruid’s esp8266-deauth.
The «mic-jammer» of this project is heavily based on y-x-c’s wearable-microphone-jamming.