Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: SIM CLONING
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
SIM CLONING

[attachment=42189]

INTRODUCTION


Slowly but surely, technology is showing up its ugly face too. Today it’s increasingly being used by new age criminal in a variety of ways. The latest of it is SIM CLONING.

CLONING
It is a process of producing a replica of the original being, where it behaves exactly the original behaves. The replica is produced from the original.

SIM CLONING
It is a process of producing a SIM card that is an exact replica of an authenticated SIM card. This is done by stealing the Identification number, that are programmed in a legitimate handset and programming them into a duplicate SIM.


Why SIM cloning is done


This is one of the smartest tricks from a fraud point of view.
It’s an easy way of making money at the expense of authenticated users.
Using this “Cloned Card” attacker can place their calls and bill is paid from victim’s account.



Why does it happen


Cloning occurs due to various reasons like:
Due to carelessness of users of cell phones.
Due to rise in technology.
Technology is becoming cheap.
Increasing awareness of technology and diverting this in a negative way
Basically there are two types of mobile networks present i.e. CDMA and GSM.
There are two types of Mobile Cloning:
CDMA Cloning
GSM Cloning


CDMA CLONING


CDMA stands for Code Division Multiple Access.

CDMA is a complex radio technology.

CDMA cloning process can be prevented if the operators follow authentication process.

Digital CDMA networks are designed with an inherent authentication system. But always avoided by operators due to additional overhead of A-key management.