SlideShare una empresa de Scribd logo
1 de 14
Presented
By
Guided
By
1
CONTENTS……
2
INTRODUCTION
SOME IMPORTANT TERMS
HOW A PHONE IS CLONED?
MOTHODS TO DETECT CLONED PHONES
IMPACT OF CLONING
HOW TO PREVENT CLONING
CONCLUSION
INTRODUCTION
• Cloning is the creation of an organism that is an exact genetic
copy of another.
• Mobile phone cloning is copying the identity of one mobile
phone to another mobile phone.
• The purpose of mobile phone cloning is making fraudulent
telephone calls.
• The bills for calls go to legitimate subscriber.
3
SOME IMPORTANT TERMS
GSM stands for Global System for Mobile Communication. A
digital cellular phone technology based on TDMA GSM phones
which uses a Subscriber Identity Module(SIM) that contains user
account information.
Code Division Multiple Access. A method for transmitting
simultaneous signal over a shared portion of the spectrum.
There is no Subscriber Identity Module (SIM) card needed like in
GSM.
4
CONTD……
IMEI, stands for International Mobile Equipment Identifier. This
is a 10 digit universally unique number of our GSM handset.
There cannot be two mobile phones having the same IMEI
number.
ESN, it means Electronic Serial Number. Like IMEI number is
used for GSM handset, ESN is used in CDMA handset.
5
HOW A PHONE IS CLONED?
Cellular thieves can capture ESN/MINs using devices such as cell
phone ESN reader or Digital Data Interpreters(DDI).
The ESN/MIN pair can be cloned in number of ways without the
knowledge of carrier or subscriber through the use of electronics
scanning devices.
After the ESN/MIN pair is captured, the cloner reprograms or
alters the microchip of any wireless phone to create a clone of
the wireless phone from which the ESN/MIN pair is stolen.
6
7
METHODS TO DETECT CLONED
PHONE
Duplicate detection- The network detect the same phone in
several places at the same time. Reactions include shutting them
all off so that the real customer will contact the operator
because he lost the service he is paying for.
Velocity trap- The mobile phone seems to be moving at
impossible or most unlikely speed. For example if a call is first
made from Indore, but after five minutes from the same number
the call is made from Delhi.
8
CONTD….
Frequent wrong number incoming phone calls to your phone.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals, or receiving
phone bills higher than the calls you have made.
9
IMPACT OF CLONING
Each year the mobile phone industry loses millions of dollars in
revenue because of the criminal actions of the persons who are
able to reconfigure mobile phones so that their call are billed to
original phone owned by a person.
Many criminals use cloned cellular telephones for illegal
activities to hide their identity and therefore more difficult to
trace.
10
HOW TO PREVENT CLONING?
User verification using Personal Identification Number(PIN) code
is one method for customer protection against cellular phone
fraud.
Traffic analysis detects cellular fraud by using artificial
intelligence software.
Service providers use software which detects suspicious calling
patterns, such as sudden increase in call duration or sudden
increase in number of international calls.
11
CONTD….
BLACKLISTING of stolen phones is another mechanism to
prevent unauthorized use of it.
An Equipment Identity Register(EIR) enables network operators
to disable stolen cellular phones on network around the world.
12
CONCLUSION
Preventive steps should be taken by the network provider and
the Government the act of legislation to prosecute crimes
related to cellular phone is not viewed as a priority.
Existing cellular systems have a number of potential weakness
that were considered. It is crucial that business and staff take
mobile phone security seriously.
13
14

Más contenido relacionado

La actualidad más candente

5 g wireless system
5 g wireless system5 g wireless system
5 g wireless systemSanjit Shaw
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technologyzfhh01
 
5 g wireless technology FULL REPORT PDF
5 g wireless technology FULL REPORT PDF5 g wireless technology FULL REPORT PDF
5 g wireless technology FULL REPORT PDFRitesh Kumawat
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Have We Lost Ourselves To Technology?
Have We Lost Ourselves To Technology?Have We Lost Ourselves To Technology?
Have We Lost Ourselves To Technology?Elliot Moose
 
4G Mobile communication Technology
4G  Mobile communication Technology4G  Mobile communication Technology
4G Mobile communication TechnologyC.Vamsi Krishna
 
IOT-internet of thing
IOT-internet of thingIOT-internet of thing
IOT-internet of thingVISHALJAT3
 
5 g technology
5 g technology5 g technology
5 g technologyPGopinath3
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
 
Introduction to 6G Technology
Introduction to 6G Technology Introduction to 6G Technology
Introduction to 6G Technology JOSE T Y
 
Smart office networking system-1.pptx
Smart office networking system-1.pptxSmart office networking system-1.pptx
Smart office networking system-1.pptxFaisalLodhi7
 
ubicom-ch01-slides.ppt
ubicom-ch01-slides.pptubicom-ch01-slides.ppt
ubicom-ch01-slides.pptSattiBabu16
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart citysanalkumar k
 
Next generation wireless communication
Next generation wireless communicationNext generation wireless communication
Next generation wireless communicationEr.Abhishek Kushwaha
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHManshi Raj
 

La actualidad más candente (20)

5 g wireless system
5 g wireless system5 g wireless system
5 g wireless system
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 
5 g wireless technology FULL REPORT PDF
5 g wireless technology FULL REPORT PDF5 g wireless technology FULL REPORT PDF
5 g wireless technology FULL REPORT PDF
 
5G report
5G report5G report
5G report
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Have We Lost Ourselves To Technology?
Have We Lost Ourselves To Technology?Have We Lost Ourselves To Technology?
Have We Lost Ourselves To Technology?
 
4G Mobile communication Technology
4G  Mobile communication Technology4G  Mobile communication Technology
4G Mobile communication Technology
 
IOT-internet of thing
IOT-internet of thingIOT-internet of thing
IOT-internet of thing
 
5 g technology
5 g technology5 g technology
5 g technology
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
 
Introduction to 6G Technology
Introduction to 6G Technology Introduction to 6G Technology
Introduction to 6G Technology
 
Smart office networking system-1.pptx
Smart office networking system-1.pptxSmart office networking system-1.pptx
Smart office networking system-1.pptx
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
ubicom-ch01-slides.ppt
ubicom-ch01-slides.pptubicom-ch01-slides.ppt
ubicom-ch01-slides.ppt
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
Why esim required for ais 140
Why esim required for ais 140 Why esim required for ais 140
Why esim required for ais 140
 
Next generation wireless communication
Next generation wireless communicationNext generation wireless communication
Next generation wireless communication
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTH
 
Smart City
Smart CitySmart City
Smart City
 
Smart home
Smart homeSmart home
Smart home
 

Destacado

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Icloud seminar report
Icloud seminar reportIcloud seminar report
Icloud seminar reportRicha Dewani
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple TechnologyAsmita Kalena
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 

Destacado (20)

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Anti-Phishing
Anti-PhishingAnti-Phishing
Anti-Phishing
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mba mca+colleges+list
Mba mca+colleges+listMba mca+colleges+list
Mba mca+colleges+list
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Icloud seminar report
Icloud seminar reportIcloud seminar report
Icloud seminar report
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Railway signal
Railway signalRailway signal
Railway signal
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple Technology
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
HUMANOID ROBOT
HUMANOID ROBOTHUMANOID ROBOT
HUMANOID ROBOT
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
E Waste
E WasteE Waste
E Waste
 

Similar a Mobile Phone Cloning

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Contemporary Frauds.pptx
Contemporary Frauds.pptxContemporary Frauds.pptx
Contemporary Frauds.pptxZiaullahShah9
 

Similar a Mobile Phone Cloning (20)

Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Contemporary Frauds.pptx
Contemporary Frauds.pptxContemporary Frauds.pptx
Contemporary Frauds.pptx
 

Último

Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 

Último (20)

Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 

Mobile Phone Cloning

  • 2. CONTENTS…… 2 INTRODUCTION SOME IMPORTANT TERMS HOW A PHONE IS CLONED? MOTHODS TO DETECT CLONED PHONES IMPACT OF CLONING HOW TO PREVENT CLONING CONCLUSION
  • 3. INTRODUCTION • Cloning is the creation of an organism that is an exact genetic copy of another. • Mobile phone cloning is copying the identity of one mobile phone to another mobile phone. • The purpose of mobile phone cloning is making fraudulent telephone calls. • The bills for calls go to legitimate subscriber. 3
  • 4. SOME IMPORTANT TERMS GSM stands for Global System for Mobile Communication. A digital cellular phone technology based on TDMA GSM phones which uses a Subscriber Identity Module(SIM) that contains user account information. Code Division Multiple Access. A method for transmitting simultaneous signal over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card needed like in GSM. 4
  • 5. CONTD…… IMEI, stands for International Mobile Equipment Identifier. This is a 10 digit universally unique number of our GSM handset. There cannot be two mobile phones having the same IMEI number. ESN, it means Electronic Serial Number. Like IMEI number is used for GSM handset, ESN is used in CDMA handset. 5
  • 6. HOW A PHONE IS CLONED? Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or Digital Data Interpreters(DDI). The ESN/MIN pair can be cloned in number of ways without the knowledge of carrier or subscriber through the use of electronics scanning devices. After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair is stolen. 6
  • 7. 7
  • 8. METHODS TO DETECT CLONED PHONE Duplicate detection- The network detect the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. Velocity trap- The mobile phone seems to be moving at impossible or most unlikely speed. For example if a call is first made from Indore, but after five minutes from the same number the call is made from Delhi. 8
  • 9. CONTD…. Frequent wrong number incoming phone calls to your phone. Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming calls constantly receiving busy signals, or receiving phone bills higher than the calls you have made. 9
  • 10. IMPACT OF CLONING Each year the mobile phone industry loses millions of dollars in revenue because of the criminal actions of the persons who are able to reconfigure mobile phones so that their call are billed to original phone owned by a person. Many criminals use cloned cellular telephones for illegal activities to hide their identity and therefore more difficult to trace. 10
  • 11. HOW TO PREVENT CLONING? User verification using Personal Identification Number(PIN) code is one method for customer protection against cellular phone fraud. Traffic analysis detects cellular fraud by using artificial intelligence software. Service providers use software which detects suspicious calling patterns, such as sudden increase in call duration or sudden increase in number of international calls. 11
  • 12. CONTD…. BLACKLISTING of stolen phones is another mechanism to prevent unauthorized use of it. An Equipment Identity Register(EIR) enables network operators to disable stolen cellular phones on network around the world. 12
  • 13. CONCLUSION Preventive steps should be taken by the network provider and the Government the act of legislation to prosecute crimes related to cellular phone is not viewed as a priority. Existing cellular systems have a number of potential weakness that were considered. It is crucial that business and staff take mobile phone security seriously. 13
  • 14. 14