SlideShare ist ein Scribd-Unternehmen logo
1 von 22
MOBILE
PHONE
CLONING
TECHNOLOGY
Cloning refers to making an exact copy
of a substance.
Millions of mobile phones users, run at
threat of having their phones cloned.
INTRODUCTION
Cloning is the process of taking the programmed
information that is stored in a legitimate mobile phone
and illegally programming the identical information into
another mobile phone.
IMPORTANT TERMS
GSM : Global System for Mobile
Communications.
SIM : Subscriber Identity Module.
CDMA : Code Division Multiple Access.
IMEI : International Mobile Equipment
Identifier.
ESN : Electronic Serial Number.
MIN : Mobile Identification Number.
‱Each phone has an ESN and MIN
‱When placing a call, the phone transmits both the ESN and the
MIN to the network
‱Cellular thieves can capture ESN/MINs using devices such as cell
phone ESN reader or digital data interpreters (DDI).
‱ These codes would then be programmed into another phone,
effectively cloning the original subscription.
‱Any calls made on this cloned phone would be charged on the
original customer.
In CDMA system, your encoded voice is digitalized and divided
into packets.
In CDMA system, cloning is done by placing a
modified EEPROM into the target mobile telephone.
ESN and MIN numbers are then obtained from the target
telephone.
‱GSM phones do not have ESN or MIN but only IMEI
number.
‱Cloning is done by cloning the SIM card .
‱ Any GSM phone can be immediately programmed
after plugging in the SIM card.
?
‱Duplicate detection - The network sees the same phone in
several places at the same time.
‱Velocity trap - The mobile phone seems to be moving at
impossible, or most unlikely speed
‱Call counting - Both the phone and the network keep track
of calls made with the phone, and should they differ more
than the usually allowed one call, service is denied
‱Frequent wrong number phone calls to your phone, or
hang-up.
‱Incoming calls constantly receiving busy signals or wrong
numbers. Unusual calls appearing on your phone bills.
Many criminals use cloned cellular telephones for illegal
activities.
Each year, the mobile phone industry loses millions of
dollars in revenue
IMPACT OF CLONING
ADVANTAGES
1. If your phone has been lost , you can use
your cloned cell phone.
2. Track the suspect.
DISADVANTAGES
1. It can be used by the cloner for fraud calls.
2. It can be used by the terrorist for criminal
activities.
3. Cloned phones are not easily detectable.
4. It can be used for illegal money transfer
Blacklisting of stolen phones is a mechanism to prevent
unauthorized use. It disables the stolen cellular phones on networks
around the world.
User verification using Personal Identification Number (PIN) codes
is one method for customer protection against cellular phone fraud
.
HOW TO PREVENT CLONING
?
‱ A Home Office report in 2002 revealed that in London
around 3,000 mobile phones were stolen in one month
alone which were used for cell phone cloning.
‱ Recently the Delhi (India) police arrested a person with
20 cell- phones, a laptop, a SIM scanner, and a writer.
EXAMPLE
Resolving subscriber fraud can be a long and
difficult process for the victim. It may take
time to discover that subscriber fraud has
occurred and an even longer time to prove
that you did not incur the debts.
It is therefore mandatory to keep in mind that
a technique which is described as safe today
can be the most unsecured technique in the
future.
FUTURE THREATS
Existing cellular systems have a number of potential
weaknesses that were considered. It is crucial that businesses
and staff take mobile phone security seriously.
CONCLUSION
www.google.com
www.slideshare.com
www.wikipedia.com
www.seminarsonly.com
www.ijrest.com
www.1000seminars.com
QUESTIONS WELCOMED
Name : Rhithu Satheesh.
Roll. no : 24
GUIDE: JASNA B
CREATED BY:

Weitere Àhnliche Inhalte

Was ist angesagt?

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning Karteek Reddy
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning TechnologyVirendra Baviskar
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloningVIKASH MEWAL
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloningShishupal Nagar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning774474
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningShubham Sachan
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning reportShishupal Nagar
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paperadityanmurthi82
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone CloningDevyani Vaidya
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 

Was ist angesagt? (20)

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 

Andere mochten auch

Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloningManjunath Singh
 
Medical Devices: Technology, Emerging Sectors, Patent Trends and Roadblocks
Medical Devices: Technology, Emerging Sectors,  Patent Trends and RoadblocksMedical Devices: Technology, Emerging Sectors,  Patent Trends and Roadblocks
Medical Devices: Technology, Emerging Sectors, Patent Trends and RoadblocksRahul Dev
 
Nw biotech fundamentals day 2 session 4 medical devices and diagnostics
Nw biotech fundamentals day 2 session 4   medical devices and diagnosticsNw biotech fundamentals day 2 session 4   medical devices and diagnostics
Nw biotech fundamentals day 2 session 4 medical devices and diagnosticsNicholas Weston Lawyers
 
Fundamentals of Medical Device Connectivity
Fundamentals of Medical Device ConnectivityFundamentals of Medical Device Connectivity
Fundamentals of Medical Device ConnectivityNuvon, Inc.
 
Gus Robots Project
Gus Robots ProjectGus Robots Project
Gus Robots Projecttechwork7
 
Boubou
BoubouBoubou
Bouboutechwork7
 
God Is Love
God Is LoveGod Is Love
God Is LoveL.D. Wilson
 
Robots -The Need Of The ERA
Robots -The Need Of The ERARobots -The Need Of The ERA
Robots -The Need Of The ERATasmia Asgher
 
Our business coaching services
Our business coaching servicesOur business coaching services
Our business coaching servicesCelia Couture
 
Global Warming
Global WarmingGlobal Warming
Global Warmingtechwork7
 
Genetechnologyandessays
GenetechnologyandessaysGenetechnologyandessays
Genetechnologyandessaysandymartin
 
Cloning presentation
Cloning presentationCloning presentation
Cloning presentationkittie889
 
Robotics and its Advancement
Robotics and its AdvancementRobotics and its Advancement
Robotics and its Advancementsourbhk6
 

Andere mochten auch (16)

Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Medical Devices: Technology, Emerging Sectors, Patent Trends and Roadblocks
Medical Devices: Technology, Emerging Sectors,  Patent Trends and RoadblocksMedical Devices: Technology, Emerging Sectors,  Patent Trends and Roadblocks
Medical Devices: Technology, Emerging Sectors, Patent Trends and Roadblocks
 
Nw biotech fundamentals day 2 session 4 medical devices and diagnostics
Nw biotech fundamentals day 2 session 4   medical devices and diagnosticsNw biotech fundamentals day 2 session 4   medical devices and diagnostics
Nw biotech fundamentals day 2 session 4 medical devices and diagnostics
 
Fundamentals of Medical Device Connectivity
Fundamentals of Medical Device ConnectivityFundamentals of Medical Device Connectivity
Fundamentals of Medical Device Connectivity
 
Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Gus Robots Project
Gus Robots ProjectGus Robots Project
Gus Robots Project
 
Boubou
BoubouBoubou
Boubou
 
God Is Love
God Is LoveGod Is Love
God Is Love
 
Robots -The Need Of The ERA
Robots -The Need Of The ERARobots -The Need Of The ERA
Robots -The Need Of The ERA
 
Our business coaching services
Our business coaching servicesOur business coaching services
Our business coaching services
 
Global Warming
Global WarmingGlobal Warming
Global Warming
 
Genetechnologyandessays
GenetechnologyandessaysGenetechnologyandessays
Genetechnologyandessays
 
Cloning presentation
Cloning presentationCloning presentation
Cloning presentation
 
Robotics and its Advancement
Robotics and its AdvancementRobotics and its Advancement
Robotics and its Advancement
 
Robots
RobotsRobots
Robots
 

Ähnlich wie Mobile phone technology

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsPaul Parke
 
V4I5201553
V4I5201553V4I5201553
V4I5201553krishan8018
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 

Ähnlich wie Mobile phone technology (12)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
Fdp
FdpFdp
Fdp
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 

KĂŒrzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

KĂŒrzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Mobile phone technology

  • 2. Cloning refers to making an exact copy of a substance. Millions of mobile phones users, run at threat of having their phones cloned. INTRODUCTION
  • 3. Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  • 4. IMPORTANT TERMS GSM : Global System for Mobile Communications. SIM : Subscriber Identity Module. CDMA : Code Division Multiple Access. IMEI : International Mobile Equipment Identifier. ESN : Electronic Serial Number. MIN : Mobile Identification Number.
  • 5. ‱Each phone has an ESN and MIN ‱When placing a call, the phone transmits both the ESN and the MIN to the network ‱Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).
  • 6. ‱ These codes would then be programmed into another phone, effectively cloning the original subscription. ‱Any calls made on this cloned phone would be charged on the original customer.
  • 7.
  • 8.
  • 9. In CDMA system, your encoded voice is digitalized and divided into packets. In CDMA system, cloning is done by placing a modified EEPROM into the target mobile telephone. ESN and MIN numbers are then obtained from the target telephone.
  • 10. ‱GSM phones do not have ESN or MIN but only IMEI number. ‱Cloning is done by cloning the SIM card . ‱ Any GSM phone can be immediately programmed after plugging in the SIM card.
  • 11. ?
  • 12. ‱Duplicate detection - The network sees the same phone in several places at the same time. ‱Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speed ‱Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied ‱Frequent wrong number phone calls to your phone, or hang-up. ‱Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.
  • 13. Many criminals use cloned cellular telephones for illegal activities. Each year, the mobile phone industry loses millions of dollars in revenue IMPACT OF CLONING
  • 14. ADVANTAGES 1. If your phone has been lost , you can use your cloned cell phone. 2. Track the suspect.
  • 15. DISADVANTAGES 1. It can be used by the cloner for fraud calls. 2. It can be used by the terrorist for criminal activities. 3. Cloned phones are not easily detectable. 4. It can be used for illegal money transfer
  • 16. Blacklisting of stolen phones is a mechanism to prevent unauthorized use. It disables the stolen cellular phones on networks around the world. User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud . HOW TO PREVENT CLONING ?
  • 17. ‱ A Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning. ‱ Recently the Delhi (India) police arrested a person with 20 cell- phones, a laptop, a SIM scanner, and a writer. EXAMPLE
  • 18. Resolving subscriber fraud can be a long and difficult process for the victim. It may take time to discover that subscriber fraud has occurred and an even longer time to prove that you did not incur the debts. It is therefore mandatory to keep in mind that a technique which is described as safe today can be the most unsecured technique in the future. FUTURE THREATS
  • 19. Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously. CONCLUSION
  • 22. Name : Rhithu Satheesh. Roll. no : 24 GUIDE: JASNA B CREATED BY: