Mobile Phone Cloning

14
Presented By Guided By Mobile Phone Cloning 1

description

don't forget to share ur thoughts about this ppt...!!!

Transcript of Mobile Phone Cloning

Page 1: Mobile Phone Cloning

1

PresentedByGuided

By

Mobile Phone Cloning

Page 2: Mobile Phone Cloning

2

CONTENTS……INTRODUCTION SOME IMPORTANT TERMSHOW A PHONE IS CLONED?MOTHODS TO DETECT CLONED PHONESIMPACT OF CLONINGHOW TO PREVENT CLONINGCONCLUSION

Page 3: Mobile Phone Cloning

3

INTRODUCTION• Cloning is the creation of an organism that is an exact genetic

copy of another.

• Mobile phone cloning is copying the identity of one mobile phone to another mobile phone.

• The purpose of mobile phone cloning is making fraudulent telephone calls.

• The bills for calls go to legitimate subscriber.

Page 4: Mobile Phone Cloning

4

SOME IMPORTANT TERMSGSM stands for Global System for Mobile Communication. A

digital cellular phone technology based on TDMA GSM phones which uses a Subscriber Identity Module(SIM) that contains user account information.

Code Division Multiple Access. A method for transmitting simultaneous signal over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card needed like in GSM.

Page 5: Mobile Phone Cloning

5

CONTD……IMEI, stands for International Mobile Equipment Identifier. This

is a 10 digit universally unique number of our GSM handset. There cannot be two mobile phones having the same IMEI number.

ESN, it means Electronic Serial Number. Like IMEI number is used for GSM handset, ESN is used in CDMA handset.

Page 6: Mobile Phone Cloning

6

HOW A PHONE IS CLONED?Cellular thieves can capture ESN/MINs using devices such as

cell phone ESN reader or Digital Data Interpreters(DDI).The ESN/MIN pair can be cloned in number of ways without the

knowledge of carrier or subscriber through the use of electronics scanning devices.

After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair is stolen.

Page 7: Mobile Phone Cloning

7

Page 8: Mobile Phone Cloning

8

METHODS TO DETECT CLONED PHONEDuplicate detection- The network detect the same phone in

several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for.

Velocity trap- The mobile phone seems to be moving at impossible or most unlikely speed. For example if a call is first made from Indore, but after five minutes from the same number the call is made from Delhi.

Page 9: Mobile Phone Cloning

9

CONTD….Frequent wrong number incoming phone calls to your phone.

Difficulty in placing outgoing calls.

Difficulty in retrieving voice mail messages.

Incoming calls constantly receiving busy signals, or receiving phone bills higher than the calls you have made.

Page 10: Mobile Phone Cloning

10

IMPACT OF CLONINGEach year the mobile phone industry loses millions of dollars in

revenue because of the criminal actions of the persons who are able to reconfigure mobile phones so that their call are billed to original phone owned by a person.

Many criminals use cloned cellular telephones for illegal activities to hide their identity and therefore more difficult to trace.

Page 11: Mobile Phone Cloning

11

HOW TO PREVENT CLONING?User verification using Personal Identification Number(PIN) code

is one method for customer protection against cellular phone fraud.

Traffic analysis detects cellular fraud by using artificial intelligence software.

Service providers use software which detects suspicious calling patterns, such as sudden increase in call duration or sudden increase in number of international calls.

Page 12: Mobile Phone Cloning

12

CONTD….BLACKLISTING of stolen phones is another mechanism to

prevent unauthorized use of it.

An Equipment Identity Register(EIR) enables network operators to disable stolen cellular phones on network around the world.

Page 13: Mobile Phone Cloning

13

CONCLUSIONPreventive steps should be taken by the network provider and

the Government the act of legislation to prosecute crimes related to cellular phone is not viewed as a priority.

Existing cellular systems have a number of potential weakness that were considered. It is crucial that business and staff take mobile phone security seriously.

Page 14: Mobile Phone Cloning

14

THANK YOU……!!!!!