PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.

Slides:



Advertisements
Similar presentations
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Advertisements

GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
BY, ARITRA GAUTAM (05-275) & G.PAVANI (05-272).. OVERVIEW OF GSM GSM (group special mobile or general system for mobile communications) is the Pan-European.
CELL PHONE CLONING Presented by: NAVRATNA OJHA EC IIIrd YEAR
British Computer Society Presents Mobile Telecommunication By Nadine Mouali Technical Presentation Monday 17 June, 2002.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
20101 The Physical Layer Chapter Bandwidth-Limited Signals.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
SEMINAR ON GSM & CDMA PREPARED BY: ROKAD RAJESH V ROLL NO(6545) GUIDED BY:K.S.P.
TEL 355: Communication and Information Systems in Organizations
Electronic Crime in Modern Business Cultures Hiram College Online Course By Roger Cram PowerPoint Presentation Atoms, Energy, and Electricity – PART IV.
IT TECHNOLOGIES By :Garcia, Nikko Shawn M.. Mobile Phone Cloning How is it Done ?
Mobile Phone Networks Dr. Hassan Nojumi1 MOBLIE PHONE NETWORKS Dr. Hassan Nojumi.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Cell Phone Jammer Sick of cell phones? Then jam them!
WHAT IS JAMMER ?  Jammer are the device by which we can creat a temporary “dead zone”in there immediate proxcimity.  There are three type of jammer.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM,GPRS & CDMA Technology
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
GSM Network Structure Lance Westberg.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Multiple Access Protocol ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department.
AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. AHNLAB INC. NLAB INC.AHNLAB INC.AHNLAB.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
GSM Mohammad AL-adwan. Introduction GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard developed by (ETSI)
 No mobility  Security problem  High call failure rate (line disconnection)  Delay in getting new connections  Limited value added services.
Just Because… Chat / Instant Messenging Application Multiple conversations Convenient (Away, Mobile Page, Etc.) Enhance collaboration efforts Simple –
The Physical Layer Chapter 2 – Part 2 Ch The Local Loop: Modems, ADSL, and Wireless The use of both analog and digital transmissions for a computer.
PHONE CLONING TECHNOLOGY
Topic 5: Basic Security.
Network Security & Accounting
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Overview of cellular system
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
COMPUTER NETWORKING 2 LECTURE : CELLULAR NETWORKS.
Sniffer for Detecting Lost Mobiles
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
Online Mobile Recharge payxm.in is one stop solution that delivers next generation instant online prepaid mobile recharge solution to end.
1 SUBMITTED BY SANDEEP B.V. 4PA07EC416 SANDEEP B.V. 4PA07EC416 NIYAZ K.A 4PA06EC067 NIYAZ K.A 4PA06EC067 NOUSHAD K 4PA06EC069 NOUSHAD K 4PA06EC069 DARWISH.
Presented by Sandeep Kumar IT Final Year 08ESOIT048.
5 G.
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GPS.
GSM.
GSM SECURITY AND ENCRYPTION
GSM,GPRS & CDMA Technology
WIRELESS INTELLIGENT NETWORKS (WIN)
Global system for Mobile Communications
What is Machine to Machine (M2M) communication?
Cellular Telephone Networks
Dept. of Business Administration
Security in Wide Area Networks
Physical Layer (2).
Presentation transcript:

PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548

MOBILE PHONE CLONING

AGENDA INTRODUCTION GSM & CDMA MOBILE PHONES HOW IS A PHONE CLONED? METHODS TO DETECT CLONED PHONES IMPACT OF CLONING HOW TO PREVENT CLONING? CONCLUSION

WHAT IS MOBILE PHONE CLONING? Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. The purpose of mobile phone cloning is making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber.

GSM Global system for Mobile Communications is a digital cellular phone technology. GSM phones use a Subscriber Identity Module (SIM) card that contains user account info. Any GSM phone becomes immediately programmed after plugging in the SIM card.

CDMA CDMA stands for Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no subscriber Identity Module (SIM) card unlike in GSM. Operators who provide CDMA service in India are Reliance, Tata Indicom etc.

HOW CLONING IS DONE? Cloning involves modifying as replacing the EPROM in the phones with a new chip, which would allow you to configure ESN via software. You would also have to change the MIN. When you has successfully changed ESN/MIN pair, your phone was an effective clone of the other phone.

METHODS TO DETECT CLONED PHONES Frequent wrong number phone calls to your phone, or hang-ups. Difficult in placing outgoing calls. Difficult in retrieving voice mail messages. Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.

IMPACT OF CLONING Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third-persons. Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to their, and are therefore much more difficult to trace.

HOW TO PREVENT CLONING? Service providers have adopted measures like blocking, blacklisting & user verification to prevent cellular fraud. Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An equipment Identity Register (IR) enables network operators to disable stolen cellular phones on networks around the world. User verification using personal Identification Number (PIN) code is one method for customer protection against cellular phone fraud.

CONCLUSION Preventive steps to be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. Keep in touch with your bill details. Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.

THANK YOU

QUERIES ?