1 / 11

IT TECHNOLOGIES

IT TECHNOLOGIES. By :Garcia, Nikko Shawn M. Mobile Phone Cloning. How is it Done ?. What is mobile Phone Cloning?. Mobile phone cloning is simply copying the identity of a mobile phone to another mobile phone or telephone

ziven
Download Presentation

IT TECHNOLOGIES

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT TECHNOLOGIES By :Garcia, Nikko Shawn M.

  2. Mobile Phone Cloning How is it Done ?

  3. What is mobile Phone Cloning? Mobile phone cloning is simply copying the identity of a mobile phone to another mobile phone or telephone Usually this is done for making fraudulent mobile phone calls & messages

  4. How is mobile phone cloning done? Cloning involves modifying or replacing the EPROM in the phones with a new chip, which would allow you to configure ESN via software. You also have to change its MIN(Mobile Identification Number).

  5. When you have successfully changed ESN/ MIN pair, your phone was an effective clone of the other phone How is mobile phone cloning done?

  6. What is ESN or Min Pair? The ESN ( Electronic Serial Number) is the cellular number of your telephone and a MIN (Mobile Identification number) is simply thephone number of cellular telephone.

  7. How thieves detect ESN/MIN pair? Cellular thieves can capture ESN/MIN using devices such as cell phone reader of Digital Data Interpreter(DDI). These devices specially manufactured to intercept ESN/MINs.

  8. Roaming Fraud Criminal Users Technical Method Fraud Examples

  9. Loss of Revenue • Illegal Activities • How can an organization help themselves ? • Never store confidential information • Always set pin • All devices should be covered by a policy. Impact of Cloning

  10. Duplicate detection • Velocity trap • User/usage profiling • Call counting • Voice sampling • PIN codes Technology used to in mobile phone cloning

  11. Take note : ESN : Electronic Serial Number EPROM : Erasable programmable read-only memory MIN : Mobile Identification Number THAT’S ALL 

More Related