SlideShare une entreprise Scribd logo
1  sur  18
Submitted To: Submitted By:
AKANKSHA MA’AM HEMA SHARMA
(CSE DEPT.) 13EEBCSO30
CONTENT
• INTRODUCTION
• GSM & CDMA MOBILE SETS
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• WHAT ARE THE SYMPTOMS?
• METHODS TO DETECT CLONED PHONES
• HOW TO PREVENT CLONING?
• FACTS AND FIGURES
• ADVANTAGES
• DISADVANTAGES
• CONCLUSION
INTRODUCTION
CLONING: Cloning is the creation of an organism
that is an exact genetic copy of another. This
means that every single bit of DNA is the same
between the two!
MOBILE PHONE CLONING: Mobile phone cloning
is copying the identity of one mobile telephone to
another mobile telephone. The bills for the calls
go to the legitimate subscriber.
GSM & CDMA MOBILE
SETS
• CDMA( Code Division Multiple Access). A
method for transmitting simultaneous signals
over a shared portion of the spectrum.
• GSM (Global System for Mobile)
Communications. Any GSM phone becomes
immediately programmed after plugging in the
SIM card.
IMPORTANT TERMS
• IMEI stands for International Mobile Equipment Identifier.
• SIM, which stands for Subscriber Identification Module.
• ESN, which stands for Electronic Serial Number.
• MIN stands for Mobile Identification Number.
HOW IS A PHONE
CLONED?
What Are The Symptoms?
• Frequent wrong numbers
• Calls that hang up after you answer
• Problems making outgoing calls
• Incoming calls that constantly get the busy signal
• Large phone bills to numbers you’ve never heard of
• Problems accessing your voicemail
METHODS TO DETECT
CLONED PHONES
• Duplicate detection
• Velocity trap
• Usage profiling
• Call counting
• PIN codes
HOW TO PREVENT CLONING?
• Blacklisting of stolen phones is another mechanism to prevent
unauthorized use.
• User verification using Personal Identification Number
(PIN) codes.
• Tests conducted have proved that United States found that
having a PIN code reduced fraud by more than 80%.
• Traffic analysis
FACTS AND FIGURES:
• Southwestern Bell claims wireless fraud costs the
industry $650 million each year in the US.
• More than 1500 telephone calls were placed in a single
day.
• Estimated loss at $3000 to $4000 for each.
• Telecom regulatory authority of India should issue
directive, which holds the operators responsible for
duplications.
VICTIMS OF MOBILE
PHONE CLONING:
5
29
24
20
13
9
BELOW 18 18-29 30-39 40-49 50-59 60-69
PERCENTAGE OF VICTIMS BY AGESP
E
R
C
E
N
T
A
G
E
A G E
ADVANTAGES
• If your phone is been lost ,you can use your cloned cell
phone.
• If your phone get damaged, your cloned phone can be
helpful.
• Advancement itself of being able to clone an organism.
DISADVANTAGES
• Terrorist for criminal activities.
• Used by the cloner for a fraud calls.
• Used for illegal money transfer.
CONCLUSION
• Mobile Cloning Is in initial stages in India so
preventive steps should be taken by the
network provider and the Government the
enactment of legislation to prosecute crimes
related to cellular phones is not viewed as a
priority.
• It is crucial that businesses and staff take
mobile phone security seriously.
REFERENCE
• www.google.com
• www.wikipedia.com
THANK YOU
QUERIES
…??

Contenu connexe

Tendances

SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESChaitanya Ram
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategiesAJAL A J
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking systemVISHAL NAGAR
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 

Tendances (20)

eSIM Overview
eSIM OvervieweSIM Overview
eSIM Overview
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Z wave
Z waveZ wave
Z wave
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
eSIM
eSIMeSIM
eSIM
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Smart card
Smart cardSmart card
Smart card
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 

En vedette

Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Jedlanka roksana sajdak
Jedlanka roksana sajdakJedlanka roksana sajdak
Jedlanka roksana sajdakRoksana Sajdak
 
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMOCARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMOBruno Ferreira
 
Asp avia eng
Asp avia engAsp avia eng
Asp avia engfessclr
 

En vedette (18)

Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Favorite sports
Favorite sportsFavorite sports
Favorite sports
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Wi DI
Wi DIWi DI
Wi DI
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Transmileniowilfor
TransmileniowilforTransmileniowilfor
Transmileniowilfor
 
Jedlanka roksana sajdak
Jedlanka roksana sajdakJedlanka roksana sajdak
Jedlanka roksana sajdak
 
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMOCARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
 
Asp avia eng
Asp avia engAsp avia eng
Asp avia eng
 

Similaire à Mobile Phone Cloning Report

Similaire à Mobile Phone Cloning Report (20)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
Fdp
FdpFdp
Fdp
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Gsm1
Gsm1Gsm1
Gsm1
 

Dernier

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 

Dernier (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 

Mobile Phone Cloning Report

  • 1. Submitted To: Submitted By: AKANKSHA MA’AM HEMA SHARMA (CSE DEPT.) 13EEBCSO30
  • 2. CONTENT • INTRODUCTION • GSM & CDMA MOBILE SETS • IMPORTANT TERMS • HOW IS A PHONE CLONED? • WHAT ARE THE SYMPTOMS? • METHODS TO DETECT CLONED PHONES • HOW TO PREVENT CLONING? • FACTS AND FIGURES • ADVANTAGES • DISADVANTAGES • CONCLUSION
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. The bills for the calls go to the legitimate subscriber.
  • 4. GSM & CDMA MOBILE SETS • CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. • GSM (Global System for Mobile) Communications. Any GSM phone becomes immediately programmed after plugging in the SIM card.
  • 5. IMPORTANT TERMS • IMEI stands for International Mobile Equipment Identifier. • SIM, which stands for Subscriber Identification Module. • ESN, which stands for Electronic Serial Number. • MIN stands for Mobile Identification Number.
  • 6. HOW IS A PHONE CLONED?
  • 7.
  • 8. What Are The Symptoms? • Frequent wrong numbers • Calls that hang up after you answer • Problems making outgoing calls • Incoming calls that constantly get the busy signal • Large phone bills to numbers you’ve never heard of • Problems accessing your voicemail
  • 9. METHODS TO DETECT CLONED PHONES • Duplicate detection • Velocity trap • Usage profiling • Call counting • PIN codes
  • 10. HOW TO PREVENT CLONING? • Blacklisting of stolen phones is another mechanism to prevent unauthorized use. • User verification using Personal Identification Number (PIN) codes. • Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%. • Traffic analysis
  • 11. FACTS AND FIGURES: • Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. • More than 1500 telephone calls were placed in a single day. • Estimated loss at $3000 to $4000 for each. • Telecom regulatory authority of India should issue directive, which holds the operators responsible for duplications.
  • 12. VICTIMS OF MOBILE PHONE CLONING: 5 29 24 20 13 9 BELOW 18 18-29 30-39 40-49 50-59 60-69 PERCENTAGE OF VICTIMS BY AGESP E R C E N T A G E A G E
  • 13. ADVANTAGES • If your phone is been lost ,you can use your cloned cell phone. • If your phone get damaged, your cloned phone can be helpful. • Advancement itself of being able to clone an organism.
  • 14. DISADVANTAGES • Terrorist for criminal activities. • Used by the cloner for a fraud calls. • Used for illegal money transfer.
  • 15. CONCLUSION • Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. • It is crucial that businesses and staff take mobile phone security seriously.