Publicité
Publicité

Contenu connexe

Publicité
Publicité

Mobile phone technology

  1. MOBILE PHONE CLONING TECHNOLOGY
  2. Cloning refers to making an exact copy of a substance. Millions of mobile phones users, run at threat of having their phones cloned. INTRODUCTION
  3. Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  4. IMPORTANT TERMS GSM : Global System for Mobile Communications. SIM : Subscriber Identity Module. CDMA : Code Division Multiple Access. IMEI : International Mobile Equipment Identifier. ESN : Electronic Serial Number. MIN : Mobile Identification Number.
  5. •Each phone has an ESN and MIN •When placing a call, the phone transmits both the ESN and the MIN to the network •Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).
  6. • These codes would then be programmed into another phone, effectively cloning the original subscription. •Any calls made on this cloned phone would be charged on the original customer.
  7. In CDMA system, your encoded voice is digitalized and divided into packets. In CDMA system, cloning is done by placing a modified EEPROM into the target mobile telephone. ESN and MIN numbers are then obtained from the target telephone.
  8. •GSM phones do not have ESN or MIN but only IMEI number. •Cloning is done by cloning the SIM card . • Any GSM phone can be immediately programmed after plugging in the SIM card.
  9. ?
  10. •Duplicate detection - The network sees the same phone in several places at the same time. •Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speed •Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied •Frequent wrong number phone calls to your phone, or hang-up. •Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.
  11. Many criminals use cloned cellular telephones for illegal activities. Each year, the mobile phone industry loses millions of dollars in revenue IMPACT OF CLONING
  12. ADVANTAGES 1. If your phone has been lost , you can use your cloned cell phone. 2. Track the suspect.
  13. DISADVANTAGES 1. It can be used by the cloner for fraud calls. 2. It can be used by the terrorist for criminal activities. 3. Cloned phones are not easily detectable. 4. It can be used for illegal money transfer
  14. Blacklisting of stolen phones is a mechanism to prevent unauthorized use. It disables the stolen cellular phones on networks around the world. User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud . HOW TO PREVENT CLONING ?
  15. • A Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning. • Recently the Delhi (India) police arrested a person with 20 cell- phones, a laptop, a SIM scanner, and a writer. EXAMPLE
  16. Resolving subscriber fraud can be a long and difficult process for the victim. It may take time to discover that subscriber fraud has occurred and an even longer time to prove that you did not incur the debts. It is therefore mandatory to keep in mind that a technique which is described as safe today can be the most unsecured technique in the future. FUTURE THREATS
  17. Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously. CONCLUSION
  18. www.google.com www.slideshare.com www.wikipedia.com www.seminarsonly.com www.ijrest.com www.1000seminars.com
  19. QUESTIONS WELCOMED
  20. Name : Rhithu Satheesh. Roll. no : 24 GUIDE: JASNA B CREATED BY:
Publicité