SlideShare una empresa de Scribd logo
1 de 18
Submitted To: Submitted By:
AKANKSHA MA’AM HEMA SHARMA
(CSE DEPT.) 13EEBCSO30
CONTENT
• INTRODUCTION
• GSM & CDMA MOBILE SETS
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• WHAT ARE THE SYMPTOMS?
• METHODS TO DETECT CLONED PHONES
• HOW TO PREVENT CLONING?
• FACTS AND FIGURES
• ADVANTAGES
• DISADVANTAGES
• CONCLUSION
INTRODUCTION
CLONING: Cloning is the creation of an organism
that is an exact genetic copy of another. This
means that every single bit of DNA is the same
between the two!
MOBILE PHONE CLONING: Mobile phone cloning
is copying the identity of one mobile telephone to
another mobile telephone. The bills for the calls
go to the legitimate subscriber.
GSM & CDMA MOBILE
SETS
• CDMA( Code Division Multiple Access). A
method for transmitting simultaneous signals
over a shared portion of the spectrum.
• GSM (Global System for Mobile)
Communications. Any GSM phone becomes
immediately programmed after plugging in the
SIM card.
IMPORTANT TERMS
• IMEI stands for International Mobile Equipment Identifier.
• SIM, which stands for Subscriber Identification Module.
• ESN, which stands for Electronic Serial Number.
• MIN stands for Mobile Identification Number.
HOW IS A PHONE
CLONED?
What Are The Symptoms?
• Frequent wrong numbers
• Calls that hang up after you answer
• Problems making outgoing calls
• Incoming calls that constantly get the busy signal
• Large phone bills to numbers you’ve never heard of
• Problems accessing your voicemail
METHODS TO DETECT
CLONED PHONES
• Duplicate detection
• Velocity trap
• Usage profiling
• Call counting
• PIN codes
HOW TO PREVENT CLONING?
• Blacklisting of stolen phones is another mechanism to prevent
unauthorized use.
• User verification using Personal Identification Number
(PIN) codes.
• Tests conducted have proved that United States found that
having a PIN code reduced fraud by more than 80%.
• Traffic analysis
FACTS AND FIGURES:
• Southwestern Bell claims wireless fraud costs the
industry $650 million each year in the US.
• More than 1500 telephone calls were placed in a single
day.
• Estimated loss at $3000 to $4000 for each.
• Telecom regulatory authority of India should issue
directive, which holds the operators responsible for
duplications.
VICTIMS OF MOBILE
PHONE CLONING:
5
29
24
20
13
9
BELOW 18 18-29 30-39 40-49 50-59 60-69
PERCENTAGE OF VICTIMS BY AGESP
E
R
C
E
N
T
A
G
E
A G E
ADVANTAGES
• If your phone is been lost ,you can use your cloned cell
phone.
• If your phone get damaged, your cloned phone can be
helpful.
• Advancement itself of being able to clone an organism.
DISADVANTAGES
• Terrorist for criminal activities.
• Used by the cloner for a fraud calls.
• Used for illegal money transfer.
CONCLUSION
• Mobile Cloning Is in initial stages in India so
preventive steps should be taken by the
network provider and the Government the
enactment of legislation to prosecute crimes
related to cellular phones is not viewed as a
priority.
• It is crucial that businesses and staff take
mobile phone security seriously.
REFERENCE
• www.google.com
• www.wikipedia.com
THANK YOU
QUERIES
…??

Más contenido relacionado

La actualidad más candente

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 

La actualidad más candente (20)

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Mobile security
Mobile securityMobile security
Mobile security
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 

Destacado (14)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Favorite sports
Favorite sportsFavorite sports
Favorite sports
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Wi DI
Wi DIWi DI
Wi DI
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Transmileniowilfor
TransmileniowilforTransmileniowilfor
Transmileniowilfor
 
Jedlanka roksana sajdak
Jedlanka roksana sajdakJedlanka roksana sajdak
Jedlanka roksana sajdak
 
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMOCARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
 
Asp avia eng
Asp avia engAsp avia eng
Asp avia eng
 

Similar a Cse mobile phone cloning ppt

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
Jihad Dib
 

Similar a Cse mobile phone cloning ppt (20)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
Fdp
FdpFdp
Fdp
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Gsm1
Gsm1Gsm1
Gsm1
 
Industrial presentation(Summer Training) On GSM at BSNL
Industrial presentation(Summer Training) On GSM at BSNLIndustrial presentation(Summer Training) On GSM at BSNL
Industrial presentation(Summer Training) On GSM at BSNL
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Cse mobile phone cloning ppt

  • 1. Submitted To: Submitted By: AKANKSHA MA’AM HEMA SHARMA (CSE DEPT.) 13EEBCSO30
  • 2. CONTENT • INTRODUCTION • GSM & CDMA MOBILE SETS • IMPORTANT TERMS • HOW IS A PHONE CLONED? • WHAT ARE THE SYMPTOMS? • METHODS TO DETECT CLONED PHONES • HOW TO PREVENT CLONING? • FACTS AND FIGURES • ADVANTAGES • DISADVANTAGES • CONCLUSION
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. The bills for the calls go to the legitimate subscriber.
  • 4. GSM & CDMA MOBILE SETS • CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. • GSM (Global System for Mobile) Communications. Any GSM phone becomes immediately programmed after plugging in the SIM card.
  • 5. IMPORTANT TERMS • IMEI stands for International Mobile Equipment Identifier. • SIM, which stands for Subscriber Identification Module. • ESN, which stands for Electronic Serial Number. • MIN stands for Mobile Identification Number.
  • 6. HOW IS A PHONE CLONED?
  • 7.
  • 8. What Are The Symptoms? • Frequent wrong numbers • Calls that hang up after you answer • Problems making outgoing calls • Incoming calls that constantly get the busy signal • Large phone bills to numbers you’ve never heard of • Problems accessing your voicemail
  • 9. METHODS TO DETECT CLONED PHONES • Duplicate detection • Velocity trap • Usage profiling • Call counting • PIN codes
  • 10. HOW TO PREVENT CLONING? • Blacklisting of stolen phones is another mechanism to prevent unauthorized use. • User verification using Personal Identification Number (PIN) codes. • Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%. • Traffic analysis
  • 11. FACTS AND FIGURES: • Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. • More than 1500 telephone calls were placed in a single day. • Estimated loss at $3000 to $4000 for each. • Telecom regulatory authority of India should issue directive, which holds the operators responsible for duplications.
  • 12. VICTIMS OF MOBILE PHONE CLONING: 5 29 24 20 13 9 BELOW 18 18-29 30-39 40-49 50-59 60-69 PERCENTAGE OF VICTIMS BY AGESP E R C E N T A G E A G E
  • 13. ADVANTAGES • If your phone is been lost ,you can use your cloned cell phone. • If your phone get damaged, your cloned phone can be helpful. • Advancement itself of being able to clone an organism.
  • 14. DISADVANTAGES • Terrorist for criminal activities. • Used by the cloner for a fraud calls. • Used for illegal money transfer.
  • 15. CONCLUSION • Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. • It is crucial that businesses and staff take mobile phone security seriously.