20
MOBILE PHONE CLONING BY: SIMRANDEEP SINGH-1315970 STEGIN JOY-1315972

MOBILE PHONE [email protected]

Embed Size (px)

DESCRIPTION

mobile phone cloning

Citation preview

Page 1: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

MOBILE PHONE CLONING

BY:

SIMRANDEEP SINGH-1315970

STEGIN JOY-1315972

Page 2: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

things we are going to present……

HOW CELL PHONE WORKS?

HISTORY OF MOBILE CLONING

CLONING CDMA CELL PHONE

CLONING GSM CELL PHONE

PATAGONIA

PROCESS OF CLONING

IMPACT OF CLONING

DETECTION OF CLONED PHONES ON NETWORK

PREVENTION

FUTURE THREATS

CONCLUSION

Page 3: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

INTRODUCTIONo Mobile phone cloning is basically a

technique where in the transfer or copying the identity or security data of one cellular phone to another is done.

oThe other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed.

oThis is usually done for the purpose of making fraudulent phone calls. The bills for the calls go to the legitimate subscriber.

Page 4: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

HOW CELLPHONE WORKS?

Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data

Page 5: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

BACK TO

HISTORY

In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are prone to cloning.

Page 6: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

Cloning CDMA phones It stands for code division multiple access

In CDMA system, your encoded voice is digitalized and divided into packets.

These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.

Operators who provide CDMA service in India are reliance, Tata Indicom

Page 7: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

CLONING GSM CELL PHONE

Global system for communication, A digital cellular phone technology based on TDMA

GSM phones use a subscriber identify module (SIM) card that contains user account information

Any GSM phone becomes immediately programmed after plugging in the SIM card

Operators who provide GSM service are AIRTEL,Vodafone,Idea etc.

Page 8: MOBILE PHONE CLONING-Steginjoy2013@gmail.com
Page 9: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

IMPORTANT TERMS

IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones

SIM,which stands for Subscriber Identification Module.

basically the SIM provides storage of subscriber

related information

Page 10: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

PATAGONIA

Patagonia is software available in the market which is used to clone CDMA phone.

this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.

A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.

Page 11: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

Process of cloning

Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:

1. Sniffing the cellular.

2. Trashing cellular companies or cellular resellers.

3. Hacking cellular companies or cellular resellers

Page 12: MOBILE PHONE CLONING-Steginjoy2013@gmail.com
Page 13: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

IMPACTS OF CLONING

Page 14: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

DETECTION OF CLONED PHONES ON NETWORK

1. Duplicate Detection

2. Velocity Trap

3. RF (Radio Frequency):

4. Usage Profiling:

5. Call Counting:

6. PIN Codes

Page 15: MOBILE PHONE CLONING-Steginjoy2013@gmail.com
Page 16: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

RF(RADIO FREQUENCY)Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot the clones with the same identity but fingerprints.

Page 17: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?

1. Frequent wrong number phone calls to your phone or hang ups.

2. Difficulty in placing outgoing calls.

3. Difficulty in retrieving voice mail messages.

4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.

Page 18: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

HOW TO PREVENT PHONE CLONING ??

There are some prevention methods by which we can prevent our cell phone from cloning:

1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.

2. Always set a pin that is required before the phone can be used. This will help in

preventing mobile from cloning to a great extent.

4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.

Page 19: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

CONCLUSION Preventive steps should be

taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority

Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously

Page 20: MOBILE PHONE CLONING-Steginjoy2013@gmail.com

THANK YOU