The telecom department has told the supreme court that over 90 percent of SIM card holders will only be allowed to recharge after proving their identity. Attorney General Mukul Rohtagi told that the program will take off in a year. He revealed the information to the bench led by Chief Justice of India Khehar.
Those possessing prepaid cards will only be allowed to recharge on successfully producing proof of identity-based on valid papers that may include Aadhar card, PAN card, Voter ID, driving license or any such proof.
The court was told that the move is meant to discourage the financial frauds and criminal activity. The majority of the Indian subscribers hold prepaid SIM cards and only the remaining 10% are Postpaid SIM holders.
One major fraudulent activity adopted by the terrorists is SIM card cloning.Using this method terrorists can hide their real identity and the bill for the calls made by the terrorists will be levied on the owner of the SIM card. Say for example you have not made a call to Delhi but in the bill, you will be charged for Delhi call suggesting the other person has cloned your SIM card and has been using it. Apart from it, there are other possible threats associated with SIM card cloning.
Nowadays all online accounts like Gmail, facebook are secured by security key received on your contact number. So in the case of SIM card cloning the other person can hack your social accounts. Even it poses a threat to the financial transactions of the bank which are done through the mobile phone.
Those possessing prepaid cards will only be allowed to recharge on successfully producing proof of identity-based on valid papers that may include Aadhar card, PAN card, Voter ID, driving license or any such proof.
The court was told that the move is meant to discourage the financial frauds and criminal activity. The majority of the Indian subscribers hold prepaid SIM cards and only the remaining 10% are Postpaid SIM holders.
One major fraudulent activity adopted by the terrorists is SIM card cloning.Using this method terrorists can hide their real identity and the bill for the calls made by the terrorists will be levied on the owner of the SIM card. Say for example you have not made a call to Delhi but in the bill, you will be charged for Delhi call suggesting the other person has cloned your SIM card and has been using it. Apart from it, there are other possible threats associated with SIM card cloning.
Nowadays all online accounts like Gmail, facebook are secured by security key received on your contact number. So in the case of SIM card cloning the other person can hack your social accounts. Even it poses a threat to the financial transactions of the bank which are done through the mobile phone.
No comments:
Post a Comment