28
PHONE CLONING TECHNOLOGY GUIDED BY:- PRESENTED BY:- Prof. Sunil Yadav JAGJIT SINGH KHALSA Roll no-3107

mobile phone cloningl

Embed Size (px)

DESCRIPTION

mobile phone cloning

Citation preview

Page 1: mobile phone cloningl

PHONE CLONING TECHNOLOGY

GUIDED BY:- PRESENTED BY:-Prof. Sunil Yadav JAGJIT SINGH

KHALSA Roll no-3107

Page 2: mobile phone cloningl

INDEXINTRODUCTION.HOW IS A PHONE CLONED?METHODS TO DETECT CLONED PHONESSYMPTOMS OF PHONE CLONING.MEASURES TO BE TAKEN.ADVANTAGES AND DISADVANTAGES.VICTIMS OF PHONE CLONING.CONCLUSION.REFERENCES

Page 3: mobile phone cloningl

INTRODUCTION

CLONING: Cloning is the creation of an organism that is an exact genetic copy of another.

PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.

Page 4: mobile phone cloningl

CDMA MOBILE SETSCDMA stands for Code Division Multiple Access.

A method for transmitting simultaneous signals over a shared portion of the spectrum.

CDMA uses a Mobile Identification Number (MIN) card that contains user account information.

Page 5: mobile phone cloningl

GSM MOBILE SETSGSM stands for Global System for Mobile

Communications.

GSM uses a Subscriber Identity Module (SIM) card.

GSM is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks.

Page 6: mobile phone cloningl

IMPORTANT TERMSIMEI stands for International Mobile Equipment

Identifier, this is a 15 digit universally unique number of the GSM handset.

Page 7: mobile phone cloningl

SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types:

1. Fixed data stored before the subscription is sold.2. Temporary network data3. Service related data.

Page 8: mobile phone cloningl

ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets.

It is loaded when the phone is manufactured.MIN ,stands for Mobile Identification Number,

It’s a 10 digit number used to identify a mobile phone.

Page 9: mobile phone cloningl

HOW IS A PHONE CLONED?Capture the ESN/MIN pair or SIM/IMEI pair.Clone the ESN/MIN pair using electronic scanning

devices.The cloner reprograms or alters the microchip of any

wireless phone.The ESN/MINs are transferred using a computer to a

device.These devices are connected to handsets.New information is entered into the phone.

Thus a clone of the legitimate phone is thus obtained.

Page 10: mobile phone cloningl

HOW CLONING TAKES PLACE.

http://homesecurityandpersonalprotection.blogspot.in

Page 11: mobile phone cloningl

• CLONING DEVICE

http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html

Page 12: mobile phone cloningl

CLONING GSM PHONESThe important information is the IMSI, which is

stored on the removable SIM card.

SIM card inserted into a reader.

Connect to computer and card details transferred.

Use encrypted software to interpret details.

The result: A cloned cell phone is ready for misuse.

Page 13: mobile phone cloningl

CLONING CDMA PHONESCellular telephone thieves monitor the radio

frequency spectrum.Steal the cell phone pair as it is being anonymously

registered with a cell site. Subscriber information is also encrypted and

transmitted digitally. A device called as DDI, Digital Data Interface can

be used to get pairs.Stolen ESN and MIN were then fed into a new

CDMA handset.

Page 14: mobile phone cloningl

DETECTION OF PHONE CLONING

Duplicate detection - The network sees the same phone in several places at the same time.

Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds..

Page 15: mobile phone cloningl

DETECTION (Continued..)RF (Radio Frequency) - Nominally identical radio

equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees.

Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted.

Page 16: mobile phone cloningl

DETECTION (Continued..)Call counting - Both the phone and the network

keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.

PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual.

Page 17: mobile phone cloningl

DETECTION(Continued..)The best detection method available in CDMA is the A KEY FEATURE.

• Secret 20 digit number.

• Number loaded in Authentication Centre.

• Cannot be copied.

Page 18: mobile phone cloningl

PHONE CLONING SYMPTOMS

Frequent wrong number phone calls to your phone, or hang-ups. 

Difficulty in placing outgoing calls. 

Difficulty in retrieving voice mail messages. 

Incoming calls constantly receiving busy signals or wrong numbers.

Unusual calls appearing on your phone bills

Page 19: mobile phone cloningl

CLONING STATISTICS

Victimspercentage

Age

Page 20: mobile phone cloningl

MEASURES TO BE TAKENService providers have adopted certain measures to

prevent cellular fraud.

These include:Blacklisting of stolen phones is another mechanism

to prevent unauthorized use.

User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud

Page 21: mobile phone cloningl

Encryption: Encryption is regarded as the effective way to prevent cellular fraud

Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.

Blocking: Blocking is used by service providers to protect themselves from high risk callers.

Page 22: mobile phone cloningl

ADVANTAGES1. If your phone has been lost , you can use

your cloned cell phone.2. If your phone got damaged or if you forgot

your phone at home or any other place . Cloned phone can be helpful.

Page 23: mobile phone cloningl

DISADVANTAGESIt can be used by the terrorists for criminal

activities.

It can be used by the cloner for fraud calls.

It can be used for illegal money transfer.

Page 24: mobile phone cloningl

VICTIMS OF PHONE CLONINGAnita Davis, a mobile clone victim. One month, her

cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.

 A Louisville woman was shocked when she got her

February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it.

 

Page 25: mobile phone cloningl

CONCLUSIONPhone Cloning is in initial stages in India. Preventive

steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile phones was possible because there was no protection to the identification information.

Page 26: mobile phone cloningl

REFERENCEShttp://www.cdmasoftware.com/eng.htmlhttp://infotech.indiatimes.com http://www.hackinthebox.org/

 Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.

Page 27: mobile phone cloningl

THANK YOU...

Page 28: mobile phone cloningl

ANY QUESTIONS?