Accueil
Explorer
Soumettre la recherche
Mettre en ligne
S’identifier
S’inscrire
Publicité
Check these out next
Mobile cloning
VIKASH MEWAL
Mobile Cloning
Karteek Reddy
Mobile phone cloning
Saisharan Amaravadhi
Mobile cloning report
Shishupal Nagar
Mobile Phone Cloning
Devyani Vaidya
Mobile ph cloning
774474
Cell phone cloning
Jashir Chakkayil
Phone cloning
Subhrajit Paul
1
sur
16
Top clipped slide
Mobile phone cloning
17 Dec 2018
•
0 j'aime
1 j'aime
×
Soyez le premier à aimer ceci
afficher plus
•
214 vues
vues
×
Nombre de vues
0
Sur Slideshare
0
À partir des intégrations
0
Nombre d'intégrations
0
Télécharger maintenant
Télécharger pour lire hors ligne
Signaler
Ingénierie
Overview Of Mobile Phone Cloning
hcls
Suivre
Publicité
Publicité
Publicité
Recommandé
Mobile cloning
Pushkar Dutt
759 vues
•
12 diapositives
Mobile phone-cloning
Shishupal Nagar
111K vues
•
20 diapositives
Mobile phone technology
Rhithu
982 vues
•
22 diapositives
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
6.8K vues
•
30 diapositives
Mobile Cloning Technology
Virendra Baviskar
3.5K vues
•
35 diapositives
Mobile cloning
Abhishek Abhi
33.1K vues
•
26 diapositives
Contenu connexe
Présentations pour vous
(20)
Mobile cloning
VIKASH MEWAL
•
3.6K vues
Mobile Cloning
Karteek Reddy
•
489 vues
Mobile phone cloning
Saisharan Amaravadhi
•
10.1K vues
Mobile cloning report
Shishupal Nagar
•
2.3K vues
Mobile Phone Cloning
Devyani Vaidya
•
337 vues
Mobile ph cloning
774474
•
472 vues
Cell phone cloning
Jashir Chakkayil
•
13K vues
Phone cloning
Subhrajit Paul
•
706 vues
Mobile Cloning
sorabh2312
•
13.3K vues
Mobile cloning
Sai Srinivas Mittapalli
•
325 vues
52 mobile phone cloning
SALMAN SHAIKH
•
1.5K vues
Cell phone cloning
Shubham Sachan
•
1.9K vues
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
•
524 vues
Cse mobile phone cloning ppt
Hema Sharma
•
10.4K vues
52 mobile phone cloning
SALMAN SHAIKH
•
1.4K vues
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
•
12.9K vues
Cell phone cloning
Gudia Khan
•
394 vues
Mobile cloning paper
adityanmurthi82
•
8K vues
Mobile Cloning Technology Report
maham4569
•
1.3K vues
Mobile Cloning Technology
maham4569
•
1.7K vues
Similaire à Mobile phone cloning
(14)
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
•
6 vues
Cell phone cloning seminar
SreedevV
•
352 vues
mobile jammer ppt.pptx
ManojMudhiraj3
•
4 vues
14A81A05B5
Chaitanya Ram
•
138 vues
shubhadappt(3273)
RaniPatil11
•
23 vues
Clonning
okolodennis
•
318 vues
V4I5201553
krishan8018
•
208 vues
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
Anisha Mangalappilly
•
312 vues
Mobile Phone and SIM card cloning
Ankur Kumar
•
18.1K vues
Cataleya-Security-Feature_SAWC_April2016page-20-23
Jacqueline Fick
•
182 vues
Test
guest833bf3b
•
784 vues
BT's guide to MiFIDII for financial advisers and brokers
mParticle
•
308 vues
Frauds in telecom sector
sksahu099
•
11.9K vues
Security issues vs user awareness in mobile devices a survey
IAEME Publication
•
551 vues
Publicité
Dernier
(20)
Page Cache in Linux 2.6.pdf
ycelgemici1
•
0 vue
McDonell Douglas XFD-1 Pilot's Handbook.pdf
TahirSadikovi
•
0 vue
MICROWAVE ENGINEERING NOTES
Muntazer1
•
0 vue
ID725_Samuthirapandi_IoT_karuppu.pptx
DrSNAVANEETHAN
•
0 vue
Mechanical Design of Transmission lines.pptx
karthik prabhu
•
0 vue
Unit-III_External Memory.ppt
ShantanuDharekar
•
0 vue
Lecture-3 DBMS Architecture.pptx
HarshitSharma875238
•
0 vue
McDonell Douglas CF-15 Eagle Executive Brief.pdf
TahirSadikovi
•
0 vue
app.50809.pdf
abrhsh abadi
•
0 vue
chap6_advanced_association_analysis.pptx
GautamDematti1
•
0 vue
corrosion and environmental degradation.pptx
SAMEERSARWAR6
•
0 vue
0-Course Gas Lift Agenda.ppt
AymanOmar24
•
0 vue
review.pptx
VEDAMNT
•
0 vue
Navodita Bhatnagar_ Navodita Bhatnagar (editor) - Bio-based plastics _ materi...
abrhsh abadi
•
0 vue
PPTSEM3.pptx
VEDAMNT
•
0 vue
SMRP Best Practices 6th Edition
VictorMarcos18
•
0 vue
Transmission and Distribution - Line parameters.pptx
karthik prabhu
•
0 vue
Mechanical Engineering: An International Journal (MEIJ)
meijjournal
•
0 vue
HOSPITAL MANAGEMENT PPT.pptx
Vasanth151
•
0 vue
PHASE DAIGRAM 1.pptx
SAMEERSARWAR6
•
0 vue
Mobile phone cloning
MOBILE PHONE CLONING
Copyright © 2015
Accenture All rights reserved. 2 INTRODUCTION CLONING:Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls,
Copyright © 2015
Accenture All rights reserved. 3 GSM & CDMA MOBILE SETS CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card. Operators who provides CDMA service in India are Reliance and Tata Indicom. CDMA use a Mobile Identification Number (MIN) card that contains user account information. GSM (Global System for Mobile) Communications. A digital cellular phone technology based on TDMA GSM phones MHz frequency band. There is a Subscriber Identity Module (SIM) card. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM service are Airtel,Hutch etc
Copyright © 2015
Accenture All rights reserved. 4 IMPORTANT TERMS IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones. SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold 2. Temporary network data 3. Service related data.
Copyright © 2015
Accenture All rights reserved. 5 ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
Copyright © 2015
Accenture All rights reserved. 6 HOW IS A PHONE CLONED? Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI). The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices. After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
Copyright © 2015
Accenture All rights reserved. 7
Copyright © 2015
Accenture All rights reserved. 8 CLONING GSM PHONES Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI). It is not a particularly secret bit of information and you don't need to take any care to keep it private. The important information is the IMSI, which is stored on the removable SIM card that carries all your subscriber information GSM networks which are considered to be impregnable can also be hacked. The process is simple: a SIM card is inserted into a reader. After connecting it to the computer using data cables, the card details were transferred into the PC. Then, using freely available encryption software on the Net, the card details can be encrypted on to a blank smart card. The result: A cloned cell phone is ready for misuse.
Copyright © 2015
Accenture All rights reserved. 9 METHODS TO DETECT CLONED PHONES Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator. Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Srilanka, and five minutes later, another call is made but this time in China, there must be two phones with the same identity on the network.
Copyright © 2015
Accenture All rights reserved. 10 Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied. PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
Copyright © 2015
Accenture All rights reserved. 11 IMPACT OF CLONING Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace.
Copyright © 2015
Accenture All rights reserved. 12 HOW TO PREVENT CLONING? Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis: Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register (EIR) enables network operators to disable stolen cellular phones on networks around the world. User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
Copyright © 2015
Accenture All rights reserved. 13 Analysis Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%. Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls. The software also determines whether it is physically possible for the subscriber to be making a call from a current location,based on the location and time of the previous call.
Copyright © 2015
Accenture All rights reserved. 14 FACTS & FIGURES Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. Some federal agents in the US have called phone cloning an especially `popular' crime because it is hard to trace. In one case, more than 1,500 telephone calls were placed in a single day by cellular phone thieves using the number of a single unsuspecting owner. A Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning
Copyright © 2015
Accenture All rights reserved. 15 CONCLUSION Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime. Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
Publicité