SlideShare a Scribd company logo
2
Most read
9
Most read
10
Most read
Submitted To: Submitted By:
AKANKSHA MA’AM HEMA SHARMA
(CSE DEPT.) 13EEBCSO30
CONTENT
• INTRODUCTION
• GSM & CDMA MOBILE SETS
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• WHAT ARE THE SYMPTOMS?
• METHODS TO DETECT CLONED PHONES
• HOW TO PREVENT CLONING?
• FACTS AND FIGURES
• ADVANTAGES
• DISADVANTAGES
• CONCLUSION
INTRODUCTION
CLONING: Cloning is the creation of an organism
that is an exact genetic copy of another. This
means that every single bit of DNA is the same
between the two!
MOBILE PHONE CLONING: Mobile phone cloning
is copying the identity of one mobile telephone to
another mobile telephone. The bills for the calls
go to the legitimate subscriber.
GSM & CDMA MOBILE
SETS
• CDMA( Code Division Multiple Access). A
method for transmitting simultaneous signals
over a shared portion of the spectrum.
• GSM (Global System for Mobile)
Communications. Any GSM phone becomes
immediately programmed after plugging in the
SIM card.
IMPORTANT TERMS
• IMEI stands for International Mobile Equipment Identifier.
• SIM, which stands for Subscriber Identification Module.
• ESN, which stands for Electronic Serial Number.
• MIN stands for Mobile Identification Number.
HOW IS A PHONE
CLONED?
Cse mobile phone cloning ppt
What Are The Symptoms?
• Frequent wrong numbers
• Calls that hang up after you answer
• Problems making outgoing calls
• Incoming calls that constantly get the busy signal
• Large phone bills to numbers you’ve never heard of
• Problems accessing your voicemail
METHODS TO DETECT
CLONED PHONES
• Duplicate detection
• Velocity trap
• Usage profiling
• Call counting
• PIN codes
HOW TO PREVENT CLONING?
• Blacklisting of stolen phones is another mechanism to prevent
unauthorized use.
• User verification using Personal Identification Number
(PIN) codes.
• Tests conducted have proved that United States found that
having a PIN code reduced fraud by more than 80%.
• Traffic analysis
FACTS AND FIGURES:
• Southwestern Bell claims wireless fraud costs the
industry $650 million each year in the US.
• More than 1500 telephone calls were placed in a single
day.
• Estimated loss at $3000 to $4000 for each.
• Telecom regulatory authority of India should issue
directive, which holds the operators responsible for
duplications.
VICTIMS OF MOBILE
PHONE CLONING:
5
29
24
20
13
9
BELOW 18 18-29 30-39 40-49 50-59 60-69
PERCENTAGE OF VICTIMS BY AGESP
E
R
C
E
N
T
A
G
E
A G E
ADVANTAGES
• If your phone is been lost ,you can use your cloned cell
phone.
• If your phone get damaged, your cloned phone can be
helpful.
• Advancement itself of being able to clone an organism.
DISADVANTAGES
• Terrorist for criminal activities.
• Used by the cloner for a fraud calls.
• Used for illegal money transfer.
CONCLUSION
• Mobile Cloning Is in initial stages in India so
preventive steps should be taken by the
network provider and the Government the
enactment of legislation to prosecute crimes
related to cellular phones is not viewed as a
priority.
• It is crucial that businesses and staff take
mobile phone security seriously.
REFERENCE
• www.google.com
• www.wikipedia.com
THANK YOU
QUERIES
…??

More Related Content

PPTX
Daknet ppt ( prepared by me for seminar in my college )
PDF
Seminar report of 3D Holographic Projection Technology (Hologram).
PPTX
Final presentation on chatbot
PPTX
Image classification using convolutional neural network
PPTX
Image classification using CNN
PPTX
Diabetes Mellitus
PPTX
Hypertension
PPTX
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Daknet ppt ( prepared by me for seminar in my college )
Seminar report of 3D Holographic Projection Technology (Hologram).
Final presentation on chatbot
Image classification using convolutional neural network
Image classification using CNN
Diabetes Mellitus
Hypertension
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx

What's hot (20)

PPTX
Mobile phone cloning
PPTX
Mobile phone-cloning
DOCX
Mobile Cloning Technology Report
PPTX
Mobile Phone and SIM card cloning
PPTX
Mobile Cloning Technology
PPTX
Mobile phone cloning
PDF
Mobile Security
PPTX
Tracking and positioning of mobile in telecommunication network
PPTX
Biometrics
PPTX
Mobile Phone Cloning By: Ritik Nagar
PPTX
Smartphone security
PPTX
Mobile security in Cyber Security
PPTX
Mobile security
PPTX
Cloning. (4)
PPTX
Mobile cloning
PPTX
Biometrics
PDF
Seminar Report face recognition_technology
PPTX
Wireless charging of mobile phones using microwaves
PPT
Iris recognition
PPT
Development of mobile phones past and present
Mobile phone cloning
Mobile phone-cloning
Mobile Cloning Technology Report
Mobile Phone and SIM card cloning
Mobile Cloning Technology
Mobile phone cloning
Mobile Security
Tracking and positioning of mobile in telecommunication network
Biometrics
Mobile Phone Cloning By: Ritik Nagar
Smartphone security
Mobile security in Cyber Security
Mobile security
Cloning. (4)
Mobile cloning
Biometrics
Seminar Report face recognition_technology
Wireless charging of mobile phones using microwaves
Iris recognition
Development of mobile phones past and present
Ad

Viewers also liked (17)

PPT
Mobile Cloning
PPTX
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
PPTX
Mobile Cloning Technology
PDF
Mobile phone technology
PPT
Cell phone cloning
PPTX
Cell phone cloning
PPTX
Favorite sports
DOCX
Best topics for seminar
PPTX
Mobile phone cloning
PDF
Mobile cloning
PDF
PPT
Phone cloning
PPT
Omega electronics ppt
PPTX
Transmileniowilfor
PPTX
Jedlanka roksana sajdak
PPTX
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
PDF
Asp avia eng
Mobile Cloning
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
Mobile Cloning Technology
Mobile phone technology
Cell phone cloning
Cell phone cloning
Favorite sports
Best topics for seminar
Mobile phone cloning
Mobile cloning
Phone cloning
Omega electronics ppt
Transmileniowilfor
Jedlanka roksana sajdak
CARACTERIZAÇÃO DA ADOÇÃO DE SISTEMAS CRM NA INDÚSTRIA DOS VINHOS / ENOTURISMO
Asp avia eng
Ad

Similar to Cse mobile phone cloning ppt (20)

PPTX
Cell phone cloning seminar
PPTX
muthyam seminarppt.pptx12345678900000000
PPTX
Mobile Phone Cloning
PPTX
mobile-phone-cloning-8886-hNyjka1.pptx
PDF
52 mobile phone cloning
PPTX
mobile-phone-cloning-8886-hNyjka1.pptx
PPTX
mobile jammer ppt.pptx
PPT
52 mobile phone cloning
PPTX
Mobile Phone Cloning
PPTX
Introduction to Mobile Forensics Part 1.pptx
PPTX
Mobile cloning modified with images and bettermented
PDF
14A81A05B5
PPTX
Mobile cloning
PPTX
shubhadappt(3273)
DOCX
Clonning
PPTX
PPTX
Mobile Cloning
PPT
Cell phone cloning
PPT
Mobile cloning
PPTX
Presentation1 1.pptx
Cell phone cloning seminar
muthyam seminarppt.pptx12345678900000000
Mobile Phone Cloning
mobile-phone-cloning-8886-hNyjka1.pptx
52 mobile phone cloning
mobile-phone-cloning-8886-hNyjka1.pptx
mobile jammer ppt.pptx
52 mobile phone cloning
Mobile Phone Cloning
Introduction to Mobile Forensics Part 1.pptx
Mobile cloning modified with images and bettermented
14A81A05B5
Mobile cloning
shubhadappt(3273)
Clonning
Mobile Cloning
Cell phone cloning
Mobile cloning
Presentation1 1.pptx

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Well-logging-methods_new................
PPTX
web development for engineering and engineering
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
bas. eng. economics group 4 presentation 1.pptx
additive manufacturing of ss316l using mig welding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Well-logging-methods_new................
web development for engineering and engineering
CH1 Production IntroductoryConcepts.pptx
Internet of Things (IOT) - A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
Automation-in-Manufacturing-Chapter-Introduction.pdf
Mechanical Engineering MATERIALS Selection
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
UNIT 4 Total Quality Management .pptx
CYBER-CRIMES AND SECURITY A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
OOP with Java - Java Introduction (Basics)
bas. eng. economics group 4 presentation 1.pptx

Cse mobile phone cloning ppt

  • 1. Submitted To: Submitted By: AKANKSHA MA’AM HEMA SHARMA (CSE DEPT.) 13EEBCSO30
  • 2. CONTENT • INTRODUCTION • GSM & CDMA MOBILE SETS • IMPORTANT TERMS • HOW IS A PHONE CLONED? • WHAT ARE THE SYMPTOMS? • METHODS TO DETECT CLONED PHONES • HOW TO PREVENT CLONING? • FACTS AND FIGURES • ADVANTAGES • DISADVANTAGES • CONCLUSION
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. The bills for the calls go to the legitimate subscriber.
  • 4. GSM & CDMA MOBILE SETS • CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. • GSM (Global System for Mobile) Communications. Any GSM phone becomes immediately programmed after plugging in the SIM card.
  • 5. IMPORTANT TERMS • IMEI stands for International Mobile Equipment Identifier. • SIM, which stands for Subscriber Identification Module. • ESN, which stands for Electronic Serial Number. • MIN stands for Mobile Identification Number.
  • 6. HOW IS A PHONE CLONED?
  • 8. What Are The Symptoms? • Frequent wrong numbers • Calls that hang up after you answer • Problems making outgoing calls • Incoming calls that constantly get the busy signal • Large phone bills to numbers you’ve never heard of • Problems accessing your voicemail
  • 9. METHODS TO DETECT CLONED PHONES • Duplicate detection • Velocity trap • Usage profiling • Call counting • PIN codes
  • 10. HOW TO PREVENT CLONING? • Blacklisting of stolen phones is another mechanism to prevent unauthorized use. • User verification using Personal Identification Number (PIN) codes. • Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%. • Traffic analysis
  • 11. FACTS AND FIGURES: • Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. • More than 1500 telephone calls were placed in a single day. • Estimated loss at $3000 to $4000 for each. • Telecom regulatory authority of India should issue directive, which holds the operators responsible for duplications.
  • 12. VICTIMS OF MOBILE PHONE CLONING: 5 29 24 20 13 9 BELOW 18 18-29 30-39 40-49 50-59 60-69 PERCENTAGE OF VICTIMS BY AGESP E R C E N T A G E A G E
  • 13. ADVANTAGES • If your phone is been lost ,you can use your cloned cell phone. • If your phone get damaged, your cloned phone can be helpful. • Advancement itself of being able to clone an organism.
  • 14. DISADVANTAGES • Terrorist for criminal activities. • Used by the cloner for a fraud calls. • Used for illegal money transfer.
  • 15. CONCLUSION • Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. • It is crucial that businesses and staff take mobile phone security seriously.