logging in or signing up MOBILE CLONING 1 sorabh2312 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 13715 Category: Science & Tech.. License: All Rights Reserved Like it (20) Dislike it (1) Added: March 23, 2010 This Presentation is Public Favorites: 16 Presentation Description No description available. Comments Posting comment... By: madhurimadhu3762 (2 month(s) ago) hi i want this ppt can you please send it to my mail firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: rehanahmd37 (5 month(s) ago) hai i want this ppt for seminor can u send me to my id email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: raavimadhavi (5 month(s) ago) i want ppt on mobile phone cloning please sent it to my mail id firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: ashwinishetty378 (7 month(s) ago) hi sir pls will u send this ppt on my ID email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: pratima.sharma (10 month(s) ago) hello sir...will u please send this ppt on my id...firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript Slide 1: A SEMINAR REPORT ON MOBILE CLONNING SUBMITTED BY: SORABH GUPTA EC-1 INTRODUCTION : INTRODUCTION TECHNICAL REVOLUTION TWO FACES OF TECHNOLOGY RISK FACTOR WHAT IS MOBILE CLONING : WHAT IS MOBILE CLONING Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for making fraudulent telephone calls. HOW IT IS DONE : HOW IT IS DONE Cloning involved modifying or replacing the EPROM in the phones with a new chip, which would allow you to configure ESN via software You would also have to change the MIN When you had successfully changed ESN/MIN pair, your phone was an effective clone of the other phone. DIAGRAMATIC REPRESENTATION OF ACTUAL PROCESS : DIAGRAMATIC REPRESENTATION OF ACTUAL PROCESS WHAT IS AN ESN/MIN PAIR : WHAT IS AN ESN/MIN PAIR The ESN is the serial number of your cellular telephone and a MIN is simply the phone number of cellular telephone . HOW THIEVES DETECT ESN/MIN PAIR Cellular thieves can capture ESN/MIN using devices such as cell phone reader or digital data interpreter(DDI). These devices specially manufactured to intercept ESN/MINs FRAUD EXAMPLES : FRAUD EXAMPLES Roaming fraud Criminal users Technical method IMPACT OF CLONING : IMPACT OF CLONING LOSS OF REVENUE ILLEGAL ACTIVITIES HOW CAN ORGANIZATIONS HELP THEMSELVES NEVER STORING CONFIDENTIAL INFORMATION ALWAYS SET PIN ALL DEVICES SHOULD BE COVERED BY A CORPORATE POLICY TECHNOLOGY USED TO TO TACKLE THE MENCE : TECHNOLOGY USED TO TO TACKLE THE MENCE DUPLICATE DETECTION VELOCITY TRAP USER / USAGE PROFILING CALL COUNTING VOICE SAMPLING PIN CODES Slide 10: KEEP IN TOUCH WITH YOUR BILL DETAILS ALWAYS USE SOME SECURITY CODE BEFORE CALL LIKE CALL BARRIER SERVICE You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.