You are on page 1of 2

ABSTRACT

Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication. Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning. Cell phone cloning is a technique wherein security data from one cell phone is transferred into another phone. The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones, only the original is billed. Though communication channels are equipped with security algorithms, yet cloners get away with the help of loop holes in systems. So when one gets huge bills, the chances are that the phone is being cloned. This paper describes about the cell phone cloning with implementation in GSM and CDMA technology phones. It gives an insight into the security mechanism in CDMA and GSM phones along with the loop holes in the systems and discusses on the different ways of preventing this cloning. Moreover, the future threat of this fraud is being elaborated By Anand Kumar Manohar

CONTEN TS
S.NO.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. INTRODUCTION HOW CELL PHONE WORKS? WHAT IS CELL PHONE CLONING? WHEN DID CELL CLONING START? HOW IS CELL CLONING DONE? METHODS TO DETECT CLONED PHONE ON NETWORK ARE OUR CELL PHONES SECURED? HOW TO KNOW THAT THE CELL HAS BEEN CLONED? ROLE OF SERVICE PROVIDERS TO COMBAT CLONING FRAUD? HOW TO PREVENT CELL CLONI\NG? SOME FACTS AND FIGURES

CHAPTER

PAGE NO.

12.
13. 14.

FUTURE THREATS
CONCLUSION REFERENCES

15.

INDEX

You might also like