Project_1D_CellPhone_Cloning

Project_1D_CellPhone_Cloning - CellPhoneCloning...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Cell Phone Cloning Project Team: Donpattara P Krushitha P Ray Roeder Mohammad A Vismi KV Advisor: Dr. Ronald P. Uhlig WCM605 Wireless Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Outline Introduction   Impacts of Cloning Cloning Process How? Security Measures  GSM, CDMA, UMTS Authentication Conclusions  WCM605 wireless Security "Cell Phone Cloning" - Jan12th-14th 2010
Background image of page 2
Introduction WCM605 wireless Security "Cell Phone Cloning" - Jan12th-14th 2010 Security Vulnerabilities in Cell Phone Monitoring of your conversations while using the phone. Your phone being turned into a microphone to monitor  conversations in the vicinity of your phone while the phone is  inactive.  Cloning  or the use of your phone number by others to make  calls that are charged to your account. 1.http://74.125.95.132/search?q=cache:vTbzd6UJRiwJ:www.swatijaininst.com/etechno/Feb2007/prateek %25202.doc+cdma+vs+gsm+Cloning+facts&cd=17&hl=en&ct=clnk&gl=us
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Overview /Impacts of Cloning What is Cloning? Act  of  illegally  copying  subscriber  information  from  one  phone  onto other for purposes of obtaining free calls.  Exact replica of original phone Result-Calls  can  be  made from both  phones, only the original is  billed.  WCM605 wireless Security "Cell Phone Cloning" - Jan12th-14th 2010 1. http://www.mobiledia.com/glossary/68.html Both cells can access the Cell Tower
Background image of page 4
WCM605 wireless Security "Cell Phone Cloning" - Jan12th-14th 2010 Southwestern Bell claims wireless fraud costs the industry $650 million  each year in the US.  Federal  agents  US  have  called  phone  cloning  an  especially  `popular'  crime and it is hard to trace.  iGillottResearch  Inc.  forecasts  cellular  network  operators  will  lose  18  percent of their total revenue in 2005, or more than $5.6 billion by fraud.  If the process continues unabated, carriers could lose as much as 22% of  their worldwide revenue by 2009, totaling more than $18 billion. 1. http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1131148,00.html
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How is Cloning Done? WCM605 wireless Security
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

Project_1D_CellPhone_Cloning - CellPhoneCloning...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online