MOBILE CLONING 1

Views:
 
     
 

Presentation Description

No description available.

Comments

By: singhdurgesh (6 month(s) ago)

hey i want this ppt. can you please send it to my mail durgeshsingh0104@gmail.com.

By: madhurimadhu3762 (19 month(s) ago)

hi i want this ppt can you please send it to my mail madhuri.nov18@gmail.com

By: rehanahmd37 (21 month(s) ago)

hai i want this ppt for seminor can u send me to my id rehan.ahmd37@gmail.com

By: raavimadhavi (21 month(s) ago)

i want ppt on mobile phone cloning please sent it to my mail id madhavi0487@gmail.com

By: ashwinishetty378 (23 month(s) ago)

hi sir pls will u send this ppt on my ID ashu.pinky16@gmail.com

See all

Presentation Transcript

Slide 1: 

A SEMINAR REPORT ON MOBILE CLONNING SUBMITTED BY: SORABH GUPTA EC-1

INTRODUCTION : 

INTRODUCTION TECHNICAL REVOLUTION TWO FACES OF TECHNOLOGY RISK FACTOR

WHAT IS MOBILE CLONING : 

WHAT IS MOBILE CLONING Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for making fraudulent telephone calls.

HOW IT IS DONE : 

HOW IT IS DONE Cloning involved modifying or replacing the EPROM in the phones with a new chip, which would allow you to configure ESN via software You would also have to change the MIN When you had successfully changed ESN/MIN pair, your phone was an effective clone of the other phone.

DIAGRAMATIC REPRESENTATION OF ACTUAL PROCESS : 

DIAGRAMATIC REPRESENTATION OF ACTUAL PROCESS

WHAT IS AN ESN/MIN PAIR : 

WHAT IS AN ESN/MIN PAIR The ESN is the serial number of your cellular telephone and a MIN is simply the phone number of cellular telephone . HOW THIEVES DETECT ESN/MIN PAIR Cellular thieves can capture ESN/MIN using devices such as cell phone reader or digital data interpreter(DDI). These devices specially manufactured to intercept ESN/MINs

FRAUD EXAMPLES : 

FRAUD EXAMPLES Roaming fraud Criminal users Technical method

IMPACT OF CLONING : 

IMPACT OF CLONING LOSS OF REVENUE ILLEGAL ACTIVITIES HOW CAN ORGANIZATIONS HELP THEMSELVES NEVER STORING CONFIDENTIAL INFORMATION ALWAYS SET PIN ALL DEVICES SHOULD BE COVERED BY A CORPORATE POLICY

TECHNOLOGY USED TO TO TACKLE THE MENCE : 

TECHNOLOGY USED TO TO TACKLE THE MENCE DUPLICATE DETECTION VELOCITY TRAP USER / USAGE PROFILING CALL COUNTING VOICE SAMPLING PIN CODES

Slide 10: 

KEEP IN TOUCH WITH YOUR BILL DETAILS ALWAYS USE SOME SECURITY CODE BEFORE CALL LIKE CALL BARRIER SERVICE