01-12-2012, 06:31 PM
SIM CLONING
FINAL REPORT ON SIM CLONING.pptx (Size: 248.98 KB / Downloads: 30)
INTRODUCTION
Slowly but surely, technology is showing up its ugly face too. Today it’s increasingly being used by new age criminal in a variety of ways. The latest of it is SIM CLONING.
CLONING
It is a process of producing a replica of the original being, where it behaves exactly the original behaves. The replica is produced from the original.
SIM CLONING
It is a process of producing a SIM card that is an exact replica of an authenticated SIM card. This is done by stealing the Identification number, that are programmed in a legitimate handset and programming them into a duplicate SIM.
Why SIM cloning is done
This is one of the smartest tricks from a fraud point of view.
It’s an easy way of making money at the expense of authenticated users.
Using this “Cloned Card” attacker can place their calls and bill is paid from victim’s account.
Why does it happen
Cloning occurs due to various reasons like:
Due to carelessness of users of cell phones.
Due to rise in technology.
Technology is becoming cheap.
Increasing awareness of technology and diverting this in a negative way
Basically there are two types of mobile networks present i.e. CDMA and GSM.
There are two types of Mobile Cloning:
CDMA Cloning
GSM Cloning
CDMA CLONING
CDMA stands for Code Division Multiple Access.
CDMA is a complex radio technology.
CDMA cloning process can be prevented if the operators follow authentication process.
Digital CDMA networks are designed with an inherent authentication system. But always avoided by operators due to additional overhead of A-key management.