513 Mobile Cloning

Embed Size (px)

Citation preview

  • 7/28/2019 513 Mobile Cloning

    1/11

    Presented by

    D.Rajasekhar

    097A1A0513

  • 7/28/2019 513 Mobile Cloning

    2/11

    CONTENTS

    ESN(Electronic Serial Number)

    MIN(Mobile Identification Number)

    AMPS / NAMPS

    GSM

    CDMA

    Cloning

    Methods to detect cloned phones

    Conclusion

  • 7/28/2019 513 Mobile Cloning

    3/11

    What is ESN?The ESN (Electronic Serial Number) is the serial number of yourcellular telephone.

    The ESN is transmitted to the cell site and used in conjunction withthe NAM to verify that you are a legitimate user of the cellularsystem.

    What is MIN?The MIN (Mobile Identification Number) is simply the phonenumber of the cellular telephone.

  • 7/28/2019 513 Mobile Cloning

    4/11

    AMPSAMPS (Advanced Mobile Phone Service) was the first cellularmobile system in the United States. AMPS operate as an analog

    system using 30 kHz wide channels.

    NAMPSAMPS was later enhanced to NAMPS (Narrowband Advanced MobilePhone Service), a version of AMPS that uses 10 kHz channels andby doing so triples cellular capacity.

  • 7/28/2019 513 Mobile Cloning

    5/11

    What is GSM(Global System formobile communication)?

    GSM (Global System for Mobile communication) is a digital mobiletelephone system that is widely used in Europe

    GSM uses a variation of Time Division Multiple Access (TDMA) andis the most widely used of the three digital wireless telephonetechnologies (TDMA, GSM, and CDMA). GSM digitizes andcompresses data, then sends it down a channel with two otherstreams of user data, each in its own time slot. It operates ateither the 900 MHz or 1,800 MHz frequency band.

  • 7/28/2019 513 Mobile Cloning

    6/11

    How CDMA Works?

    IS-95 is a standard for CDMA (Code Division Multiple Access)Digital Cellular.In a CDMA system, your encoded voice is digitized and divided intopackets. These packets are tagged with "codes." The packets then

    mix with all of the other packets of traffic in the local CDMAnetwork as they are routed towards their destination. The receivingsystem only accepts the packets with the codes destined for it.

  • 7/28/2019 513 Mobile Cloning

    7/11

    What is cell phone cloning

    Each phone has an Electronic Serial Number (ESN),identifying the phone, as well as a Mobile IdentificationNumber (MIN), which includes the telephone numberof the phone. As the acronyms indicate, these are used

    to identify the subscriber.When placing a call, the phone transmits both the ESNand the MIN to the network. These were, however,sent in the clear, so anyone with a suitable scannercould receive them. The eavesdropped codes would

    then be programmed into another phone, effectivelycloning the original subscription. Any calls made onthis cloned phone would be charged on the originalcustomer.

  • 7/28/2019 513 Mobile Cloning

    8/11

    Figure 1. Cellular cloning.

  • 7/28/2019 513 Mobile Cloning

    9/11

    Methods to detect cloned phoneson the networkDuplicate detection. The network sees the same phone in several

    places at the same time. Reactions include shutting them all off sothat the real customer will contact the operator because he lost theservice he is paying for, or tearing down connections so that theclone users will switch to another clone but the real user willcontact the operator.

    Velocity trap. The mobile phone seems to be moving at impossible,or most unlikely speeds. For example, if a call is first made inHelsinki, and five minutes later, another call is made but this timein Tampere, there must be two phones with the same identity

    onthe network.PIN codes. Prior to placing a call, the caller unlocks the phone byentering a PIN code and then calls as usual. After the call has beencompleted, the user locks the phone by entering the PIN codeagain. Operators may share PIN information to enable safer

    roaming.

  • 7/28/2019 513 Mobile Cloning

    10/11

    Conclusion.

    Some of the forms of fraud presented here have been possiblebecause of design flaws.The cloning of analog mobile phones was possible because therewas no protection to the identification information and the cloning

    of GSM SIM-cards is possible because of a leaking authenticationalgorithm. These problems can be countered with technical means.

    fraudsters.

  • 7/28/2019 513 Mobile Cloning

    11/11

    Thank u.