SlideShare une entreprise Scribd logo
1  sur  14
Presented
By
Guided
By
1
CONTENTS……
2
INTRODUCTION
SOME IMPORTANT TERMS
HOW A PHONE IS CLONED?
MOTHODS TO DETECT CLONED PHONES
IMPACT OF CLONING
HOW TO PREVENT CLONING
CONCLUSION
INTRODUCTION
• Cloning is the creation of an organism that is an exact genetic
copy of another.
• Mobile phone cloning is copying the identity of one mobile
phone to another mobile phone.
• The purpose of mobile phone cloning is making fraudulent
telephone calls.
• The bills for calls go to legitimate subscriber.
3
SOME IMPORTANT TERMS
GSM stands for Global System for Mobile Communication. A
digital cellular phone technology based on TDMA GSM phones
which uses a Subscriber Identity Module(SIM) that contains user
account information.
Code Division Multiple Access. A method for transmitting
simultaneous signal over a shared portion of the spectrum.
There is no Subscriber Identity Module (SIM) card needed like in
GSM.
4
CONTD……
IMEI, stands for International Mobile Equipment Identifier. This
is a 10 digit universally unique number of our GSM handset.
There cannot be two mobile phones having the same IMEI
number.
ESN, it means Electronic Serial Number. Like IMEI number is
used for GSM handset, ESN is used in CDMA handset.
5
HOW A PHONE IS CLONED?
Cellular thieves can capture ESN/MINs using devices such as cell
phone ESN reader or Digital Data Interpreters(DDI).
The ESN/MIN pair can be cloned in number of ways without the
knowledge of carrier or subscriber through the use of electronics
scanning devices.
After the ESN/MIN pair is captured, the cloner reprograms or
alters the microchip of any wireless phone to create a clone of
the wireless phone from which the ESN/MIN pair is stolen.
6
7
METHODS TO DETECT CLONED
PHONE
Duplicate detection- The network detect the same phone in
several places at the same time. Reactions include shutting them
all off so that the real customer will contact the operator
because he lost the service he is paying for.
Velocity trap- The mobile phone seems to be moving at
impossible or most unlikely speed. For example if a call is first
made from Indore, but after five minutes from the same number
the call is made from Delhi.
8
CONTD….
Frequent wrong number incoming phone calls to your phone.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals, or receiving
phone bills higher than the calls you have made.
9
IMPACT OF CLONING
Each year the mobile phone industry loses millions of dollars in
revenue because of the criminal actions of the persons who are
able to reconfigure mobile phones so that their call are billed to
original phone owned by a person.
Many criminals use cloned cellular telephones for illegal
activities to hide their identity and therefore more difficult to
trace.
10
HOW TO PREVENT CLONING?
User verification using Personal Identification Number(PIN) code
is one method for customer protection against cellular phone
fraud.
Traffic analysis detects cellular fraud by using artificial
intelligence software.
Service providers use software which detects suspicious calling
patterns, such as sudden increase in call duration or sudden
increase in number of international calls.
11
CONTD….
BLACKLISTING of stolen phones is another mechanism to
prevent unauthorized use of it.
An Equipment Identity Register(EIR) enables network operators
to disable stolen cellular phones on network around the world.
12
CONCLUSION
Preventive steps should be taken by the network provider and
the Government the act of legislation to prosecute crimes
related to cellular phone is not viewed as a priority.
Existing cellular systems have a number of potential weakness
that were considered. It is crucial that business and staff take
mobile phone security seriously.
13
14

Contenu connexe

Tendances

Presentation on modern smart watch
Presentation on modern smart watchPresentation on modern smart watch
Presentation on modern smart watch
gaurav_tayal
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
guestaec424
 

Tendances (20)

Social Network Service
Social Network ServiceSocial Network Service
Social Network Service
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Presentation on modern smart watch
Presentation on modern smart watchPresentation on modern smart watch
Presentation on modern smart watch
 
Mobile security
Mobile securityMobile security
Mobile security
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Contoh Analisa JSA.pdf
Contoh Analisa JSA.pdfContoh Analisa JSA.pdf
Contoh Analisa JSA.pdf
 
Phone Addiction: The new drug that is killing an entire generation
Phone Addiction: The new drug that is killing an entire generationPhone Addiction: The new drug that is killing an entire generation
Phone Addiction: The new drug that is killing an entire generation
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Place reminder
Place reminderPlace reminder
Place reminder
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Evolution of-mobile-phone
Evolution of-mobile-phoneEvolution of-mobile-phone
Evolution of-mobile-phone
 
Your Cell Phone is my Drug
Your Cell Phone is my DrugYour Cell Phone is my Drug
Your Cell Phone is my Drug
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
The smartphone addiction
The smartphone addictionThe smartphone addiction
The smartphone addiction
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

En vedette

Icloud seminar report
Icloud seminar reportIcloud seminar report
Icloud seminar report
Richa Dewani
 

En vedette (20)

Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Anti-Phishing
Anti-PhishingAnti-Phishing
Anti-Phishing
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mba mca+colleges+list
Mba mca+colleges+listMba mca+colleges+list
Mba mca+colleges+list
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Icloud seminar report
Icloud seminar reportIcloud seminar report
Icloud seminar report
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Railway signal
Railway signalRailway signal
Railway signal
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple Technology
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
HUMANOID ROBOT
HUMANOID ROBOTHUMANOID ROBOT
HUMANOID ROBOT
 

Similaire à Mobile Phone Cloning

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

Similaire à Mobile Phone Cloning (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Dernier (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Mobile Phone Cloning

  • 2. CONTENTS…… 2 INTRODUCTION SOME IMPORTANT TERMS HOW A PHONE IS CLONED? MOTHODS TO DETECT CLONED PHONES IMPACT OF CLONING HOW TO PREVENT CLONING CONCLUSION
  • 3. INTRODUCTION • Cloning is the creation of an organism that is an exact genetic copy of another. • Mobile phone cloning is copying the identity of one mobile phone to another mobile phone. • The purpose of mobile phone cloning is making fraudulent telephone calls. • The bills for calls go to legitimate subscriber. 3
  • 4. SOME IMPORTANT TERMS GSM stands for Global System for Mobile Communication. A digital cellular phone technology based on TDMA GSM phones which uses a Subscriber Identity Module(SIM) that contains user account information. Code Division Multiple Access. A method for transmitting simultaneous signal over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card needed like in GSM. 4
  • 5. CONTD…… IMEI, stands for International Mobile Equipment Identifier. This is a 10 digit universally unique number of our GSM handset. There cannot be two mobile phones having the same IMEI number. ESN, it means Electronic Serial Number. Like IMEI number is used for GSM handset, ESN is used in CDMA handset. 5
  • 6. HOW A PHONE IS CLONED? Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or Digital Data Interpreters(DDI). The ESN/MIN pair can be cloned in number of ways without the knowledge of carrier or subscriber through the use of electronics scanning devices. After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair is stolen. 6
  • 7. 7
  • 8. METHODS TO DETECT CLONED PHONE Duplicate detection- The network detect the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. Velocity trap- The mobile phone seems to be moving at impossible or most unlikely speed. For example if a call is first made from Indore, but after five minutes from the same number the call is made from Delhi. 8
  • 9. CONTD…. Frequent wrong number incoming phone calls to your phone. Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming calls constantly receiving busy signals, or receiving phone bills higher than the calls you have made. 9
  • 10. IMPACT OF CLONING Each year the mobile phone industry loses millions of dollars in revenue because of the criminal actions of the persons who are able to reconfigure mobile phones so that their call are billed to original phone owned by a person. Many criminals use cloned cellular telephones for illegal activities to hide their identity and therefore more difficult to trace. 10
  • 11. HOW TO PREVENT CLONING? User verification using Personal Identification Number(PIN) code is one method for customer protection against cellular phone fraud. Traffic analysis detects cellular fraud by using artificial intelligence software. Service providers use software which detects suspicious calling patterns, such as sudden increase in call duration or sudden increase in number of international calls. 11
  • 12. CONTD…. BLACKLISTING of stolen phones is another mechanism to prevent unauthorized use of it. An Equipment Identity Register(EIR) enables network operators to disable stolen cellular phones on network around the world. 12
  • 13. CONCLUSION Preventive steps should be taken by the network provider and the Government the act of legislation to prosecute crimes related to cellular phone is not viewed as a priority. Existing cellular systems have a number of potential weakness that were considered. It is crucial that business and staff take mobile phone security seriously. 13
  • 14. 14