Mobile cloning report

1,962 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,962
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
110
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mobile cloning report

  1. 1. 1. ABSTRACT Mobile communication has been readily available for several years, and is majorbusiness today. It provides a valuable service to its users who are willing to pay aconsiderable premium over a fixed line phone, to be able to walk and talk freely.Because of its usefulness and the money involved in the business, it is subject to fraud.Unfortunately, the advance of security standards has not kept pace with thedissemination of mobile communication. Some of the features of mobilecommunication make it an alluring target for criminals. It is a relatively new invention,so not all people are quite familiar with its possibilities, in good or in bad. Its newnessalso means intense competition among mobile phone service providers as they areattracting customers. The major threat to mobile phone is from cloning. Today millions of mobile phones users, be it Global System for Mobilecommunication (GSM) or Code Division Multiple Access (CDMA), run the risk ofhaving their phones cloned. And the worst part is that there isn’t much that you can doto prevent this. Such crime first came to light in January 2005 when the Delhi policearrested a person with 20 cell phones, a laptop, a SIM scanner, and a writer. Theaccused was running an exchange illegally wherein he cloned CDMA-based mobilephones. He used software for the cloning and provided cheap international calls toIndian immigrants in West Asia. A similar racket came to light in Mumbai resulting inthe arrest of four mobile dealers. Cloning is the process of taking the programmed information that is storedin a legitimate mobile phone and illegally programming the identical informationinto another mobile phone. The result is that the "cloned" phone can make andreceive calls and the charges for those calls are billed to the legitimate subscriber.The service provider network does not have a way to differentiate between thelegitimate phone and the "cloned" phone. 1

×