SlideShare a Scribd company logo
1 of 20
Seminar Presentation
                on
       Mobile Phone Cloning
                By
   Shishupal Nagar 8CSB-1(95)




DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING
     Jaipur Engineering College & Research Centre
              Sitapura Tonk, Road Jaipur
CONTENTS
 INTRODUCTION
 GSM & CDMA MOBILE PHONES
 SOME IMPORTANT TERMS
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 IMPACT OF CLONING
 HOW TO PREVENT CLONING?
 CONCLUSION
 REFERENCES
INTRODUCTION
CLONING:
 Cloning is the creation of an organism that is an exact
  genetic copy of another. This means that every single bit
  of DNA is the same between the two!

WHAT IS MOBILE PHONE CLONING?
 Mobile phone cloning is copying the identity of one
  mobile telephone to another mobile telephone.

 The purpose of mobile phone cloning is making
  fraudulent telephone calls.
 The bills for the calls go to the legitimate subscriber.
GSM
 Global System for Mobile Communications. A
  digital cellular phone technology based on TDMA.
 GSM phones use a Subscriber Identity Module
  (SIM) card that contains user account information.
 Any GSM phone becomes immediately programmed
  after plugging in the SIM card.
 Operators who provide GSM service are Airtel ,
  Vodafone ,Idea etc.
CDMA
 It stands for Code Division Multiple Access.
 In a CDMA system, your encoded voice is digitized and
  divided into packets.
 These packets are tagged with "codes." The packets
  then mix with all of the other packets of traffic in the
  local CDMA network as they are routed towards their
  destination. The receiving system only accepts the
  packets with the codes destined for it.
 Operators who provide CDMA service in India are
  Reliance , Tata Indicom etc.
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
  Identifier, this is a 10 digit universally unique number
  of our GSM handset. I use the term Universally
  Unique because there cannot be 2 mobile phones
  having the same IMEI no. This is a very valuable
  number and used in tracking mobile phones.
 SIM, which stands for Subscriber Identification
  Module. Basically the SIM provides storage of
  subscriber related information.
CONTD……
 ESN, which stands for Electronic Serial Number. It is
  same as the IMEI but is used in CDMA handsets
 MIN stands for Mobile Identification Number, which
  is the same as the SIM of GSM.
HOW IS A PHONE CLONED?
 Cellular thieves can capture ESN/MINs using devices
  such as cell phone ESN reader or digital data interpreters
  (DDI).
 The ESN/MIN pair can be cloned in a number of ways
  without the knowledge of the carrier or subscriber through
  the use of electronic scanning devices.
 After the ESN/MIN pair is captured, the cloner
  reprograms or alters the microchip of any wireless phone
  to create a clone of the wireless phone from which the
  ESN/MIN pair was stolen.
METHODS TO DETECT
      CLONED PHONES
 Duplicate detection - The network sees the same phone
  in several places at the same time. Reactions include
  shutting them all off so that the real customer will contact
  the operator because he lost the service he is paying for, or
  tearing down connections so that the clone users will
  switch to another clone but the real user will contact the
  operator.
 Velocity trap - The mobile phone seems to be moving at
  impossible, or most unlikely speeds. For example, if a call
  is first made in Helsinki, and five minutes later, another
  call is made but this time in Tampere, there must be two
  phones with the same identity on the network.
CONTD……
 Call counting - Both the phone and the network keep
  track of calls made with the phone, and should they differ
  more than the usually allowed one call, service is denied.

 PIN codes - Prior to placing a call, the caller unlocks the
  phone by entering a PIN code and then calls as usual.
  After the call has been completed, the user locks the
  phone by entering the PIN code again. Operators may
  share PIN information to enable safer roaming.
CONTD….
 Frequent wrong number phone calls to your phone, or
  hang-ups.

 Difficulty in placing outgoing calls.


 Difficulty in retrieving voice mail messages.

 Incoming calls constantly receiving busy signals or
  wrong numbers. Unusual calls appearing on your
  phone bills.
IMPACT OF CLONING
 Each year, the mobile phone industry loses millions of
  dollars in revenue because of the criminal actions of
  persons who are able to reconfigure mobile phones so that
  their calls are billed to other phones owned by innocent
  third persons.
 Many criminals use cloned cellular telephones for illegal
  activities, because their calls are not billed to them, and
  are therefore much more difficult to trace.
CONTD….
 This phenomenon is especially prevalent in drug crimes.
  Drug dealers need to be in constant contact with their
  sources of supply and their confederates on the streets.
  Traffickers acquire cloned phones at a minimum cost,
  make dozens of calls, and then throw the phone away after
  as little as a days' use. In the same way, criminals who
  pose a threat to our national security, such as terrorists,
  have been known to use cloned phones to thwart law
  enforcement efforts aimed at tracking their whereabouts.
HOW TO PREVENT CLONING?
 Service providers have adopted certain measures to
  prevent cellular fraud. These include encryption, blocking,
  blacklisting, user verification and traffic analysis:
 Blacklisting of stolen phones is another mechanism to
  prevent unauthorized use. An Equipment Identity Register
  enables network operators to disable stolen cellular
  phones on networks around the world.
 User verification using Personal Identification Number
  (PIN) codes is one method for customer protection against
  cellular phone fraud.
CONTD….
 Tests conducted have proved that United States found that
  having a PIN code reduced fraud by more than 80%.
 Traffic analysis detects cellular fraud by using artificial
  intelligence software to detect suspicious calling patterns,
  such as a sudden increase in the length of calls or a sudden
  increase in the number of international calls.
 The software also determines whether it is physically
  possible for the subscriber to be making a call from a
  current location, based on the location and time of the
  previous call.
CONCLUSION
 Mobile Cloning Is in initial stages in India so preventive
  steps should be taken by the network provider and the
  Government the enactment of legislation to prosecute
  crimes related to cellular phones is not viewed as a
  priority, however. It is essential that intended mobile crime
  legislation be comprehensive enough to incorporate
  cellular phone fraud, in particular "cloning fraud" as a
  specific crime.
 Existing cellular systems have a number of potential
  weaknesses that were considered. It is crucial that
  businesses and staff take mobile phone security seriously.
REFERENCES
 www.google.co.in
 www.wikipedia.org
 www.1000projects.org/
 www.seminarsonly.com/
Mobile phone-cloning
Mobile phone-cloning

More Related Content

What's hot

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSeminar Links
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 

What's hot (20)

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Voice browser
Voice browserVoice browser
Voice browser
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost Mobile
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Manet
ManetManet
Manet
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 

Viewers also liked

Viewers also liked (7)

E contracts
E contractsE contracts
E contracts
 
E contract
E contractE contract
E contract
 
E contract
E  contractE  contract
E contract
 
GSM Network
GSM NetworkGSM Network
GSM Network
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Toorcamp 2016
Toorcamp 2016Toorcamp 2016
Toorcamp 2016
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Mobile phone-cloning

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 

Similar to Mobile phone-cloning (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Clonning
ClonningClonning
Clonning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Mobile phone-cloning

  • 1. Seminar Presentation on Mobile Phone Cloning By Shishupal Nagar 8CSB-1(95) DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura Tonk, Road Jaipur
  • 2. CONTENTS  INTRODUCTION  GSM & CDMA MOBILE PHONES  SOME IMPORTANT TERMS  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO PREVENT CLONING?  CONCLUSION  REFERENCES
  • 3. INTRODUCTION CLONING:  Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! WHAT IS MOBILE PHONE CLONING?  Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone.  The purpose of mobile phone cloning is making fraudulent telephone calls.  The bills for the calls go to the legitimate subscriber.
  • 4. GSM  Global System for Mobile Communications. A digital cellular phone technology based on TDMA.  GSM phones use a Subscriber Identity Module (SIM) card that contains user account information.  Any GSM phone becomes immediately programmed after plugging in the SIM card.  Operators who provide GSM service are Airtel , Vodafone ,Idea etc.
  • 5. CDMA  It stands for Code Division Multiple Access.  In a CDMA system, your encoded voice is digitized and divided into packets.  These packets are tagged with "codes." The packets then mix with all of the other packets of traffic in the local CDMA network as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.  Operators who provide CDMA service in India are Reliance , Tata Indicom etc.
  • 6. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information.
  • 7. CONTD……  ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets  MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
  • 8. HOW IS A PHONE CLONED?  Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).  The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices.  After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
  • 9.
  • 10. METHODS TO DETECT CLONED PHONES  Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network.
  • 11. CONTD……  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 12. CONTD….  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.
  • 13. IMPACT OF CLONING  Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons.  Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace.
  • 14. CONTD….  This phenomenon is especially prevalent in drug crimes. Drug dealers need to be in constant contact with their sources of supply and their confederates on the streets. Traffickers acquire cloned phones at a minimum cost, make dozens of calls, and then throw the phone away after as little as a days' use. In the same way, criminals who pose a threat to our national security, such as terrorists, have been known to use cloned phones to thwart law enforcement efforts aimed at tracking their whereabouts.
  • 15. HOW TO PREVENT CLONING?  Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register enables network operators to disable stolen cellular phones on networks around the world.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
  • 16. CONTD….  Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call.
  • 17. CONCLUSION  Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime.  Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
  • 18. REFERENCES  www.google.co.in  www.wikipedia.org  www.1000projects.org/  www.seminarsonly.com/