SlideShare a Scribd company logo
Submitted To: Submitted By:
AKANKSHA MA’AM HEMA SHARMA
(CSE DEPT.) 13EEBCSO30
CONTENT
• INTRODUCTION
• GSM & CDMA MOBILE SETS
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• WHAT ARE THE SYMPTOMS?
• METHODS TO DETECT CLONED PHONES
• HOW TO PREVENT CLONING?
• FACTS AND FIGURES
• ADVANTAGES
• DISADVANTAGES
• CONCLUSION
INTRODUCTION
CLONING: Cloning is the creation of an organism
that is an exact genetic copy of another. This
means that every single bit of DNA is the same
between the two!
MOBILE PHONE CLONING: Mobile phone cloning
is copying the identity of one mobile telephone to
another mobile telephone. The bills for the calls
go to the legitimate subscriber.
GSM & CDMA MOBILE
SETS
• CDMA( Code Division Multiple Access). A
method for transmitting simultaneous signals
over a shared portion of the spectrum.
• GSM (Global System for Mobile)
Communications. Any GSM phone becomes
immediately programmed after plugging in the
SIM card.
IMPORTANT TERMS
• IMEI stands for International Mobile Equipment Identifier.
• SIM, which stands for Subscriber Identification Module.
• ESN, which stands for Electronic Serial Number.
• MIN stands for Mobile Identification Number.
HOW IS A PHONE
CLONED?
What Are The Symptoms?
• Frequent wrong numbers
• Calls that hang up after you answer
• Problems making outgoing calls
• Incoming calls that constantly get the busy signal
• Large phone bills to numbers you’ve never heard of
• Problems accessing your voicemail
METHODS TO DETECT
CLONED PHONES
• Duplicate detection
• Velocity trap
• Usage profiling
• Call counting
• PIN codes
HOW TO PREVENT CLONING?
• Blacklisting of stolen phones is another mechanism to prevent
unauthorized use.
• User verification using Personal Identification Number
(PIN) codes.
• Tests conducted have proved that United States found that
having a PIN code reduced fraud by more than 80%.
• Traffic analysis
FACTS AND FIGURES:
• Southwestern Bell claims wireless fraud costs the
industry $650 million each year in the US.
• More than 1500 telephone calls were placed in a single
day.
• Estimated loss at $3000 to $4000 for each.
• Telecom regulatory authority of India should issue
directive, which holds the operators responsible for
duplications.
VICTIMS OF MOBILE
PHONE CLONING:
5
29
24
20
13
9
BELOW 18 18-29 30-39 40-49 50-59 60-69
PERCENTAGE OF VICTIMS BY AGESP
E
R
C
E
N
T
A
G
E
A G E
ADVANTAGES
• If your phone is been lost ,you can use your cloned cell
phone.
• If your phone get damaged, your cloned phone can be
helpful.
• Advancement itself of being able to clone an organism.
DISADVANTAGES
• Terrorist for criminal activities.
• Used by the cloner for a fraud calls.
• Used for illegal money transfer.
CONCLUSION
• Mobile Cloning Is in initial stages in India so
preventive steps should be taken by the
network provider and the Government the
enactment of legislation to prosecute crimes
related to cellular phones is not viewed as a
priority.
• It is crucial that businesses and staff take
mobile phone security seriously.
REFERENCE
• www.google.com
• www.wikipedia.com
THANK YOU
QUERIES
…??

More Related Content

What's hot

Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
vishal4799
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
kamesh0007
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Varna Shankar
 
Jini technology ppt
Jini technology pptJini technology ppt
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
Tarun tyagi
 
Sniffer for the mobile phones
Sniffer for the mobile phonesSniffer for the mobile phones
Sniffer for the mobile phones
Upender Upr
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
Chaitanya Ram
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
Bhadra Gowdra
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
Subhrajit Paul
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
xiha tareen
 

What's hot (20)

Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile security
Mobile securityMobile security
Mobile security
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Sniffer for the mobile phones
Sniffer for the mobile phonesSniffer for the mobile phones
Sniffer for the mobile phones
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 

Viewers also liked

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
sorabh2312
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
Favorite sports
Favorite sportsFavorite sports
Favorite sports
Hema Sharma
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
Manjunath Singh
 
Wi DI
Wi DIWi DI
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
Jitendra Sirohiya
 
Jedlanka roksana sajdak
Jedlanka roksana sajdakJedlanka roksana sajdak
Jedlanka roksana sajdak
Roksana Sajdak
 
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMOCARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
Bruno Ferreira
 
Asp avia eng
Asp avia engAsp avia eng
Asp avia eng
fessclr
 

Viewers also liked (17)

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Favorite sports
Favorite sportsFavorite sports
Favorite sports
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Wi DI
Wi DIWi DI
Wi DI
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Transmileniowilfor
TransmileniowilforTransmileniowilfor
Transmileniowilfor
 
Jedlanka roksana sajdak
Jedlanka roksana sajdakJedlanka roksana sajdak
Jedlanka roksana sajdak
 
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMOCARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
 
Asp avia eng
Asp avia engAsp avia eng
Asp avia eng
 

Similar to Cse mobile phone cloning ppt

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
RohithKumarKishtam
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
hcls
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Sai Srinivas Mittapalli
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
Fdp
FdpFdp
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Pushkar Dutt
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
HimanshuKansal22
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 

Similar to Cse mobile phone cloning ppt (20)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
Fdp
FdpFdp
Fdp
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Gsm1
Gsm1Gsm1
Gsm1
 

Recently uploaded

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Cse mobile phone cloning ppt

  • 1. Submitted To: Submitted By: AKANKSHA MA’AM HEMA SHARMA (CSE DEPT.) 13EEBCSO30
  • 2. CONTENT • INTRODUCTION • GSM & CDMA MOBILE SETS • IMPORTANT TERMS • HOW IS A PHONE CLONED? • WHAT ARE THE SYMPTOMS? • METHODS TO DETECT CLONED PHONES • HOW TO PREVENT CLONING? • FACTS AND FIGURES • ADVANTAGES • DISADVANTAGES • CONCLUSION
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. The bills for the calls go to the legitimate subscriber.
  • 4. GSM & CDMA MOBILE SETS • CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. • GSM (Global System for Mobile) Communications. Any GSM phone becomes immediately programmed after plugging in the SIM card.
  • 5. IMPORTANT TERMS • IMEI stands for International Mobile Equipment Identifier. • SIM, which stands for Subscriber Identification Module. • ESN, which stands for Electronic Serial Number. • MIN stands for Mobile Identification Number.
  • 6. HOW IS A PHONE CLONED?
  • 7.
  • 8. What Are The Symptoms? • Frequent wrong numbers • Calls that hang up after you answer • Problems making outgoing calls • Incoming calls that constantly get the busy signal • Large phone bills to numbers you’ve never heard of • Problems accessing your voicemail
  • 9. METHODS TO DETECT CLONED PHONES • Duplicate detection • Velocity trap • Usage profiling • Call counting • PIN codes
  • 10. HOW TO PREVENT CLONING? • Blacklisting of stolen phones is another mechanism to prevent unauthorized use. • User verification using Personal Identification Number (PIN) codes. • Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%. • Traffic analysis
  • 11. FACTS AND FIGURES: • Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. • More than 1500 telephone calls were placed in a single day. • Estimated loss at $3000 to $4000 for each. • Telecom regulatory authority of India should issue directive, which holds the operators responsible for duplications.
  • 12. VICTIMS OF MOBILE PHONE CLONING: 5 29 24 20 13 9 BELOW 18 18-29 30-39 40-49 50-59 60-69 PERCENTAGE OF VICTIMS BY AGESP E R C E N T A G E A G E
  • 13. ADVANTAGES • If your phone is been lost ,you can use your cloned cell phone. • If your phone get damaged, your cloned phone can be helpful. • Advancement itself of being able to clone an organism.
  • 14. DISADVANTAGES • Terrorist for criminal activities. • Used by the cloner for a fraud calls. • Used for illegal money transfer.
  • 15. CONCLUSION • Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. • It is crucial that businesses and staff take mobile phone security seriously.