HRM PPT on placement , induction and socialization
Cell phone cloning
1. WELCOME TO THE SEMINAR
ON
CELL PHONE CLONING
BY:
SHUBHAM SACHAN
ROLL NO:
1209732901
2. OVERVIEW:
INTRODUCTION
WHAT IS CELL PHONE CLONING?
TYPES OF CELLPHONES
CLONING CDMA CELL PHONES
CLONING GSM CELL PHONES
HOW IS CELL CLONING DONE?
HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
SOME FACTS AND FIGURES
3. INTRODUCTION
Cloning is the creation of an organism that is an exact genetic
copy of another. This means that every single bit of DNA is the
same between the two!
Millions of cell phones users, be it GSM or CDMA, run at risk of
having their phones cloned. As a cell phone user if you have
been receiving exorbitantly high bills for calls that were never
placed, chances are that your cell phone could be cloned.
Unfortunately, there is no way the subscriber can detect
cloning. Events like call dropping or anomalies in monthly bills
can act as tickers.
4. WHAT IS CELL PHONE CLONING?
Cell phone cloning is copying the identity of one mobile
telephone to another mobile telephone.
Usually this is done for the purpose of making fraudulent
telephone calls. The bills for the calls go to the legitimate
subscriber. The cloner is also able to make effectively
anonymous calls, which attracts another group of interested
users.
Cloning is the process of taking the programmed
information that is stored in a legitimate mobile phone and
illegally programming the identical information into another
mobile phone.
6. TYPES OF CELLPHONES:
GSM: – Global System for Mobile Communications. A
digital cellular phone technology based on TDMA GSM
phones use a Subscriber Identity Module (SIM) card that
contains user account information.
CDMA:- Code Division Multiple Access. A method for
transmitting simultaneous signals over a shared portion of
the spectrum. There is no Subscriber Identity Module (SIM)
card unlike in GSM.Operators who provides CDMA service
in India are Reliance and Tata Indicom.
7. CLONING CDMA CELL PHONES:
Cellular telephone thieves monitor the radio frequency
spectrum and steal the cell phone pair as it is being
anonymously registered with a cell site. The technology uses
spread-spectrum techniques to share bands with multiple
conversations.
8. CLONING GSM CELL PHONES:
GSM handsets, on the contrary, are safer, according to
experts. Every GSM phone has a 15 digit electronic serial
number (referred to as the IMEI). It is not a particularly secret
bit of information and you don't need to take any care to keep
it private. The important information is the IMSI, which is
stored on the removable SIM card that carries all your
subscriber information, roaming database and so on.
9. HOW IS CELL CLONING DONE?
Cloning involved modifying or replacing the EPROM in the
phone with a new chip which would allow you to configure an
ESN (Electronic serial number) via software.
Cloning required access to ESN and MIN pairs. ESN/MIN
pairs were discovered in several ways:
Sniffing the cellular
Trashing cellular companies or cellular resellers
Hacking cellular companies or cellular resellers
11. HOW TO KNOW THAT THE CELL HAS BEEN
CLONED?
Frequent wrong number phone calls to your phone, or
hang-ups.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals or wrong
numbers. Unusual calls appearing on your phone bills
12. SOME FACTS AND FIGURES:
A Home Office report in 2002 revealed that in London
around 3,000 mobile phones were stolen in one month
alone which were used for cell phone cloning.
Authorities, in the case, estimated the loss at $3,000 to
$4,000 for each number used in cell phone cloning.