SlideShare ist ein Scribd-Unternehmen logo
1 von 16
CONTENTS
 INTRODUCTION
 IMPORTANT TERMS
 HOW A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 IMPACT OF CLONING
 HOW TO PREVENT CLONING
 FACTS AND FIGURES

INTRODUCTION
 CLONING :
 Cloning is the creation of an organism that is an exact
genetic copy of other.
 This means that every single bit of DNA is the same
between the two!
 CELL PHONE CLONING:
 Cell phone cloning is copying the identity of one mobile
telephone to another mobile telephone.

 Fixed data stored before the subscription is sold.
 Temporary network data
 Service related data
 ESN
 Which stands for Electronic Serial Number . It is same
as the IMEI but it is used in the CDMA handset.
 MIN
 Stands for Mobile Identification Number ,which is the
same as the SIM of GSM .
SOFTWARES AVAILABLE FOR CLONING
 FOR CDMA. If PIN and ESN are known, a mobile
phone can be cloned in seconds using some software’s
like Patagonia which is used to clone CDMA
phones.
 FOR GSM. However, if the accused manages to also
clone the IMEI number of the handset, for which
software’s are available, there is no way he can be
traced.
 BLUETOOTH HACK is the software available in the
market which is used to hack/clone GSM phone.
 CALL COUNTING :Both the phone and the network
keep track of calls made with the phone, and should
they differ more than the usually allowed one call ,
service is denied.
 PIN CODES : Prior to placing a call , the caller unlocks
the phone by entering a PIN code and then calls as
usual . After the call has been completed , the user
locks the phone by PIN code again. Operators may
share PIN information to enable safer roaming .
IMPACT OF CLONING
 Each year , the mobile phone industry loses millions of
dollars in revenue because of the criminal actions of
persons who are able to reconfigure mobile phones so
that their calls are billed to other phones owned by
innocent third persons.

 The best way to prevent you SIM card or mobile phone from
being cloned is to use Authentication feature.
Authentication is a mathematical process by which identical
calculations are performed in both the network and the
mobile phone.
• These calculations use secret information (known as a “key”)
pre-programmed into both the mobile phone and the network
before service is activated.
 Cloners typically have no access to this secret information
(i.e., the key), and therefore cannot obtain the same results to
the calculations.
 A legitimate mobile phone will produce the same calculated
result as the network.
 The mobile phone’s result is sent to the network and
compared with the network’s results.
If they match, the phone is not a ”cloned”
PRESENTATION BY :

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

Ähnlich wie shubhadappt(3273)

Ähnlich wie shubhadappt(3273) (14)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Clonning
ClonningClonning
Clonning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Test
TestTest
Test
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Kürzlich hochgeladen (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

shubhadappt(3273)

  • 1.
  • 2. CONTENTS  INTRODUCTION  IMPORTANT TERMS  HOW A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO PREVENT CLONING  FACTS AND FIGURES 
  • 3. INTRODUCTION  CLONING :  Cloning is the creation of an organism that is an exact genetic copy of other.  This means that every single bit of DNA is the same between the two!  CELL PHONE CLONING:  Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. 
  • 4.
  • 5.
  • 6.  Fixed data stored before the subscription is sold.  Temporary network data  Service related data  ESN  Which stands for Electronic Serial Number . It is same as the IMEI but it is used in the CDMA handset.  MIN  Stands for Mobile Identification Number ,which is the same as the SIM of GSM .
  • 7. SOFTWARES AVAILABLE FOR CLONING  FOR CDMA. If PIN and ESN are known, a mobile phone can be cloned in seconds using some software’s like Patagonia which is used to clone CDMA phones.  FOR GSM. However, if the accused manages to also clone the IMEI number of the handset, for which software’s are available, there is no way he can be traced.  BLUETOOTH HACK is the software available in the market which is used to hack/clone GSM phone.
  • 8.
  • 9.
  • 10.  CALL COUNTING :Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call , service is denied.  PIN CODES : Prior to placing a call , the caller unlocks the phone by entering a PIN code and then calls as usual . After the call has been completed , the user locks the phone by PIN code again. Operators may share PIN information to enable safer roaming .
  • 11.
  • 12. IMPACT OF CLONING  Each year , the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. 
  • 13.
  • 14.  The best way to prevent you SIM card or mobile phone from being cloned is to use Authentication feature. Authentication is a mathematical process by which identical calculations are performed in both the network and the mobile phone. • These calculations use secret information (known as a “key”) pre-programmed into both the mobile phone and the network before service is activated.  Cloners typically have no access to this secret information (i.e., the key), and therefore cannot obtain the same results to the calculations.  A legitimate mobile phone will produce the same calculated result as the network.  The mobile phone’s result is sent to the network and compared with the network’s results. If they match, the phone is not a ”cloned”
  • 15.