SlideShare a Scribd company logo
1 of 12
SEMINAR
ON
MOBILE PHONE CLONING
CONTENTS
What is cell phone cloning?
ESN(Electronic Serial Number)
MIN(Mobile Identification Number)
GSM
CDMA
Methods to detect cloned phones
How to prevent it?
Conclusion
ABSTRACT
Mobile communication has been readily available
for several years, and is major business today. It
provides a valuable service to its users who are
willing to pay a considerable premium over a
fixed line phone, to be able to walk and talk
freely. Because of its usefulness and the money
involved in the business, it is subject to fraud.
Unfortunately, the advance of security standards
has not kept pace with the dissemination of
mobile communication.
What is cell phone cloning
Each phone has an Electronic Serial Number (ESN),
identifying the phone, as well as a Mobile Identification
Number (MIN), which includes the telephone number
of the phone. As the acronyms indicate, these are
used to identify the subscriber.
When placing a call, the phone transmits both the ESN
and the MIN to the network. These were, however,
sent in the clear, so anyone with a suitable scanner
could receive them. The eavesdropped codes would
then be programmed into another phone, effectively
cloning the original subscription. Any calls made on
this cloned phone would be charged on the original
customer.
What is ESN?
The ESN (Electronic Serial Number) is the serial number of your
cellular telephone.
The ESN is transmitted to the cell site and used in conjunction with
the NAM to verify that you are a legitimate user of the cellular
system.
What is MIN?
The MIN (Mobile Identification Number) is simply the phone
number of the cellular telephone.
What is GSM(Global System for
mobile communication)?
GSM (Global System for Mobile communication) is a digital mobile
telephone system that is widely used in Europe and other parts of
the world. GSM uses a variation of Time Division Multiple Access
(TDMA) and is the most widely used of the three digital wireless
telephone technologies (TDMA, GSM, and CDMA). GSM digitizes
and compresses data, then sends it down a channel with two
other streams of user data, each in its own time slot. It operates at
either the 900 MHz or 1,800 MHz frequency band.
How CDMA Works?
IS-95 is a standard for CDMA (Code Division Multiple Access)
Digital Cellular.
In a CDMA system, your encoded voice is digitized and divided into
packets. These packets are tagged with "codes." The packets then
mix with all of the other packets of traffic in the local CDMA
network as they are routed towards their destination. The receiving
system only accepts the packets with the codes destined for it.
 
                                                             Figure 1. Cellular cloning. 
Methods to detect cloned phones
on the network
Duplicate detection. The network sees the same phone in several
places at the same time. Reactions include shutting them all off so
that the real customer will contact the operator because he lost the
service he is paying for, or tearing down connections so that the
clone users will switch to another clone but the real user will
contact the operator.
Velocity trap. The mobile phone seems to be moving at impossible,
or most unlikely speeds. For example, if a call is first made in
Helsinki, and five minutes later, another call is made but this time in
Tampere, there must be two phones with the same identity onthe
network.
PIN codes. Prior to placing a call, the caller unlocks the phone by
entering a PIN code and then calls as usual. After the call has been
completed, the user locks the phone by entering the PIN code
again. Operators may share PIN information to enable safer
roaming.
MINs and ESNs can be checked
electronically to help prevent fraud.
All devices should be covered by corporate
policy.
Always set a Pin.
Authentication.
HOW TO PREVENT CELL
CLONING?
Conclusion.
Some of the forms of fraud presented here have been possible
because of design flaws. The cloning of analog mobile phones was
possible because there was no protection to the identification
information and the cloning of GSM SIM-cards is possible because
of a leaking authentication algorithm. These problems can be
countered with technical means.

More Related Content

What's hot

What's hot (20)

Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 

Viewers also liked (14)

Mba mca+colleges+list
Mba mca+colleges+listMba mca+colleges+list
Mba mca+colleges+list
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Railway signal
Railway signalRailway signal
Railway signal
 
HUMANOID ROBOT
HUMANOID ROBOTHUMANOID ROBOT
HUMANOID ROBOT
 
E Waste
E WasteE Waste
E Waste
 
HUMANOID ROBOT PPT
HUMANOID ROBOT PPTHUMANOID ROBOT PPT
HUMANOID ROBOT PPT
 
E-WASTE POWERPOINT PRESENTATION
E-WASTE POWERPOINT PRESENTATIONE-WASTE POWERPOINT PRESENTATION
E-WASTE POWERPOINT PRESENTATION
 
Humanoid robots
Humanoid robotsHumanoid robots
Humanoid robots
 
Ewaste ppt
Ewaste ppt Ewaste ppt
Ewaste ppt
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
E waste management
E waste managementE waste management
E waste management
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 

Similar to Mobile cloning

Similar to Mobile cloning (16)

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Clonning
ClonningClonning
Clonning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Test
TestTest
Test
 
Gsm1
Gsm1Gsm1
Gsm1
 
Gsm
Gsm    Gsm
Gsm
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
Pakdo life ka har signal
Pakdo life ka har signalPakdo life ka har signal
Pakdo life ka har signal
 
GSM
GSMGSM
GSM
 

More from Pushkar Dutt (20)

Wireless usb
Wireless usbWireless usb
Wireless usb
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Nui
NuiNui
Nui
 
Network security
Network securityNetwork security
Network security
 
Manet
ManetManet
Manet
 
Jquery
JqueryJquery
Jquery
 
Intelligent highway
Intelligent highwayIntelligent highway
Intelligent highway
 
Gi fi
Gi fiGi fi
Gi fi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Eye phone
Eye phoneEye phone
Eye phone
 
Epoc
EpocEpoc
Epoc
 
E commerce
E commerceE commerce
E commerce
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Atm security
Atm securityAtm security
Atm security
 
5 pen pc
5 pen pc5 pen pc
5 pen pc
 

Recently uploaded

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 

Recently uploaded (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 

Mobile cloning

  • 2. CONTENTS What is cell phone cloning? ESN(Electronic Serial Number) MIN(Mobile Identification Number) GSM CDMA Methods to detect cloned phones How to prevent it? Conclusion
  • 3. ABSTRACT Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication.
  • 4. What is cell phone cloning Each phone has an Electronic Serial Number (ESN), identifying the phone, as well as a Mobile Identification Number (MIN), which includes the telephone number of the phone. As the acronyms indicate, these are used to identify the subscriber. When placing a call, the phone transmits both the ESN and the MIN to the network. These were, however, sent in the clear, so anyone with a suitable scanner could receive them. The eavesdropped codes would then be programmed into another phone, effectively cloning the original subscription. Any calls made on this cloned phone would be charged on the original customer.
  • 5. What is ESN? The ESN (Electronic Serial Number) is the serial number of your cellular telephone. The ESN is transmitted to the cell site and used in conjunction with the NAM to verify that you are a legitimate user of the cellular system. What is MIN? The MIN (Mobile Identification Number) is simply the phone number of the cellular telephone.
  • 6. What is GSM(Global System for mobile communication)? GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in Europe and other parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1,800 MHz frequency band.
  • 7. How CDMA Works? IS-95 is a standard for CDMA (Code Division Multiple Access) Digital Cellular. In a CDMA system, your encoded voice is digitized and divided into packets. These packets are tagged with "codes." The packets then mix with all of the other packets of traffic in the local CDMA network as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
  • 8.
  • 10. Methods to detect cloned phones on the network Duplicate detection. The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator. Velocity trap. The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity onthe network. PIN codes. Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 11. MINs and ESNs can be checked electronically to help prevent fraud. All devices should be covered by corporate policy. Always set a Pin. Authentication. HOW TO PREVENT CELL CLONING?
  • 12. Conclusion. Some of the forms of fraud presented here have been possible because of design flaws. The cloning of analog mobile phones was possible because there was no protection to the identification information and the cloning of GSM SIM-cards is possible because of a leaking authentication algorithm. These problems can be countered with technical means.