SlideShare a Scribd company logo
1 of 16
MOBILE PHONE CONING
INTRODUCTIONWHAT IS CELL PHONE CLONING?
WHEN DID CELL CLONING START?
GSM
CDMA
SECURITY FUNCTIONS OF THE GSM AND CDMA
HOW BIG OF A PROBLEM IS CLONING FRAUD?
HOW IS CELL CLONING DONE?
ARE OUR CELL PHONES SECURED?
CAN DIGITAL PHONES BE CLONED?
HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
CAN CALLS ON CLONED PHONE BE TRACKED?
HOW TO PREVENT CELL CLONING?
WHAT IS CELL PHONE CLONING?
Cell phone cloning is copying the identity of one
mobile telephone to another mobile telephone.
The purpose of cell phone cloning is making
fraudulent telephone calls.
The bills for the calls go to the legitimate subscriber.
The cloner is also able to make effectively
anonymous calls, which attracts another group of
interested users.
WHEN DID CELL CLONING START?
Cell phone cloning started with Motorola "bag" phones
and reached its peak in the mid 90's with a commonly
available modification for the Motorola "brick" phones,
such as the Classic, the Ultra Classic, and the Model
8000.
The Cellular Telecommunications Industry Association
(CTIA) estimates that financial losses in due to cloning
fraud are between $600 million and $900 million in the
United States. Some subscribers of Reliance had to suffer
because their phone was cloned. Mobile Cloning Is in
initial stages in India so preventive steps should be taken
by the network provider and the Government.
GSM
Global System for Mobile Communications. A
digital cellular phone technology based on
TDMA.
 GSM phones use a Subscriber Identity Module
(SIM) card that contains user account
information.
Any GSM phone becomes immediately
programmed after plugging in the SIM card, thus
allowing GSM phones to be easily rented or
borrowed.
Operators who provide GSM service are Airtel,
Vodafone etc.
CS 640 5
CDMA
Code Division Multiple Access.
A method for transmitting simultaneous
signals over a shared portion of the
spectrum.
There is no Subscriber Identity Module
(SIM) card like in GSM.
Operators who provide CDMA service in
India are Reliance and Tata Indicom.
BRIEF SECURITY FUNCTIONS OF
THE GSM AND CDMA
• Access control by means of a SIM CARD and
PIN,
• Authentication of the users towards the
network carrier
• Encryption of communication on the radio
interface
• concealing the users’ identity on the radio
interface,
HOW BIG OF A PROBLEM IS
CLONING FRAUD
HOW IS CELL CLONING DONE?
Cloning involved modifying or replacing the
EPROM in the phone with a new chip which
would allow you to configure an ESN
(Electronic serial number) via software.
You would also have to change the MIN
(Mobile Identification Number).
When you had successfully changed the
ESN/MIN pair, your phone was an effective
clone of the other phone.
REQUIREMENTS
Cloning required access to ESN and MIN pairs.
 ESN/MIN pairs were discovered in several ways:
Sniffing the cellular,
Trashing cellular companies,
Hacking cellular companies.
Cloning has been successfully demonstrated under
GSM.
 But the process is not easy and it currently remains in
the realm of serious hobbyists and researchers.
WHAT IS ESN NUMBER
ESN mean Electronic Serial Number.
This number is loaded when the phone number is
manufactured.
This number cannot be tampered or changes by the
user or subscriber.
If this number is known a mobile can be cloned
easily.
WHAT IS PIN NUMBERPersonal Identification Number (PIN).
Every subscriber provides a Personal Identification
Number (PIN) to its user.
This is a unique number. If PIN and ESN are know a
mobile phone can be cloned in seconds using some
software like PATAGONIA
Patagonia used to clone CDMA phones
HOW TO KNOW THAT THE CELL HAS BEEN CLONED
Frequent wrong number phone calls to your phone,
or hang-ups.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals or
wrong numbers. Unusual calls appearing on your
phone bills
HOW TO PREVENT CELL CLONING?
The MIN often can be dialed from other wireless or wire
line networks.
The number differs from the electronic serial number
(ESN), which is the unit number assigned by a phone
manufacturer. MINs and ESNs can be checked
electronically to help prevent fraud.
Always set a Pin that's required before the phone can be
used.
Check that all mobile devices are covered by a corporate
security policy.
Athetication
WHAT EXACTLY IS AUTHENTICATION
Authentication is a mathematical process by which identical
calculations are performed in both the network and the mobile
phone.
These calculations use secret information preprogrammed into
both the mobile phone and the network before service is activated.
Cloners typically have no access to this secret information , and
therefore cannot obtain the same results to the calculations
. A legitimate mobile phone will produce the same calculated result
as the network. The mobile phone's result is sent to the network
and compared with the network's results. If they match, the phone
is not a "clone."
CS 640 15
CONCLUSION:
 Presently the cellular phone industry relies on common law
(fraud and theft) and in-house counter measures to address
cellular phone fraud.
Mobile Cloning Is in initial stages in India so preventive steps
should be taken by the network provider and the Government
.
The enactment of legislation to prosecute crimes related to
cellular phones is not viewed as a priority.
However. It is essential that intended mobile crime legislation
be comprehensive enough to incorporate cellular phone fraud,
in particular "cloning fraud" as a specific crime.
CS 640 16

More Related Content

What's hot

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning774474
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

What's hot (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

Similar to 52 mobile phone cloning

shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Cellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsCellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsSai Srinivas
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 

Similar to 52 mobile phone cloning (12)

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Clonning
ClonningClonning
Clonning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Test
TestTest
Test
 
Cellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsCellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@students
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 

More from SALMAN SHAIKH

Raj ngo brochure seminars update
Raj ngo brochure seminars updateRaj ngo brochure seminars update
Raj ngo brochure seminars updateSALMAN SHAIKH
 
Raj ngo brochure seminar
Raj ngo brochure seminarRaj ngo brochure seminar
Raj ngo brochure seminarSALMAN SHAIKH
 
46 smart glasses epson
46 smart glasses epson46 smart glasses epson
46 smart glasses epsonSALMAN SHAIKH
 
35 hard work and smart work
35 hard work and smart work35 hard work and smart work
35 hard work and smart workSALMAN SHAIKH
 
37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfx37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfxSALMAN SHAIKH
 
38 joy of giving.pdfx
38 joy of giving.pdfx38 joy of giving.pdfx
38 joy of giving.pdfxSALMAN SHAIKH
 
40 the dream self made millionaire lessons
40 the dream self made millionaire lessons40 the dream self made millionaire lessons
40 the dream self made millionaire lessonsSALMAN SHAIKH
 
45 android applications
45 android applications45 android applications
45 android applicationsSALMAN SHAIKH
 
43 sixth sense technology
43 sixth sense technology43 sixth sense technology
43 sixth sense technologySALMAN SHAIKH
 

More from SALMAN SHAIKH (20)

Campus vs corporate
Campus vs corporateCampus vs corporate
Campus vs corporate
 
Raj ngo brochure seminars update
Raj ngo brochure seminars updateRaj ngo brochure seminars update
Raj ngo brochure seminars update
 
Raj ngo brochure seminar
Raj ngo brochure seminarRaj ngo brochure seminar
Raj ngo brochure seminar
 
46 smart glasses epson
46 smart glasses epson46 smart glasses epson
46 smart glasses epson
 
48 apple story
48 apple story48 apple story
48 apple story
 
32 google products
32 google products32 google products
32 google products
 
50 5 g technology
50 5 g technology50 5 g technology
50 5 g technology
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
35 hard work and smart work
35 hard work and smart work35 hard work and smart work
35 hard work and smart work
 
36 winner vs losers
36 winner vs losers36 winner vs losers
36 winner vs losers
 
33 body language
33 body language33 body language
33 body language
 
34 you can win
34 you can win34 you can win
34 you can win
 
37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfx37 teachings of mahatma gandhi.pdfx
37 teachings of mahatma gandhi.pdfx
 
38 joy of giving.pdfx
38 joy of giving.pdfx38 joy of giving.pdfx
38 joy of giving.pdfx
 
39 work ethics
39 work ethics39 work ethics
39 work ethics
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
40 the dream self made millionaire lessons
40 the dream self made millionaire lessons40 the dream self made millionaire lessons
40 the dream self made millionaire lessons
 
45 android applications
45 android applications45 android applications
45 android applications
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
43 sixth sense technology
43 sixth sense technology43 sixth sense technology
43 sixth sense technology
 

52 mobile phone cloning

  • 2. INTRODUCTIONWHAT IS CELL PHONE CLONING? WHEN DID CELL CLONING START? GSM CDMA SECURITY FUNCTIONS OF THE GSM AND CDMA HOW BIG OF A PROBLEM IS CLONING FRAUD? HOW IS CELL CLONING DONE? ARE OUR CELL PHONES SECURED? CAN DIGITAL PHONES BE CLONED? HOW TO KNOW THAT THE CELL HAS BEEN CLONED? CAN CALLS ON CLONED PHONE BE TRACKED? HOW TO PREVENT CELL CLONING?
  • 3. WHAT IS CELL PHONE CLONING? Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. The purpose of cell phone cloning is making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users.
  • 4. WHEN DID CELL CLONING START? Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000. The Cellular Telecommunications Industry Association (CTIA) estimates that financial losses in due to cloning fraud are between $600 million and $900 million in the United States. Some subscribers of Reliance had to suffer because their phone was cloned. Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government.
  • 5. GSM Global System for Mobile Communications. A digital cellular phone technology based on TDMA.  GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed. Operators who provide GSM service are Airtel, Vodafone etc. CS 640 5
  • 6. CDMA Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card like in GSM. Operators who provide CDMA service in India are Reliance and Tata Indicom.
  • 7. BRIEF SECURITY FUNCTIONS OF THE GSM AND CDMA • Access control by means of a SIM CARD and PIN, • Authentication of the users towards the network carrier • Encryption of communication on the radio interface • concealing the users’ identity on the radio interface,
  • 8. HOW BIG OF A PROBLEM IS CLONING FRAUD
  • 9. HOW IS CELL CLONING DONE? Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). When you had successfully changed the ESN/MIN pair, your phone was an effective clone of the other phone.
  • 10. REQUIREMENTS Cloning required access to ESN and MIN pairs.  ESN/MIN pairs were discovered in several ways: Sniffing the cellular, Trashing cellular companies, Hacking cellular companies. Cloning has been successfully demonstrated under GSM.  But the process is not easy and it currently remains in the realm of serious hobbyists and researchers.
  • 11. WHAT IS ESN NUMBER ESN mean Electronic Serial Number. This number is loaded when the phone number is manufactured. This number cannot be tampered or changes by the user or subscriber. If this number is known a mobile can be cloned easily.
  • 12. WHAT IS PIN NUMBERPersonal Identification Number (PIN). Every subscriber provides a Personal Identification Number (PIN) to its user. This is a unique number. If PIN and ESN are know a mobile phone can be cloned in seconds using some software like PATAGONIA Patagonia used to clone CDMA phones
  • 13. HOW TO KNOW THAT THE CELL HAS BEEN CLONED Frequent wrong number phone calls to your phone, or hang-ups. Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  • 14. HOW TO PREVENT CELL CLONING? The MIN often can be dialed from other wireless or wire line networks. The number differs from the electronic serial number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can be checked electronically to help prevent fraud. Always set a Pin that's required before the phone can be used. Check that all mobile devices are covered by a corporate security policy. Athetication
  • 15. WHAT EXACTLY IS AUTHENTICATION Authentication is a mathematical process by which identical calculations are performed in both the network and the mobile phone. These calculations use secret information preprogrammed into both the mobile phone and the network before service is activated. Cloners typically have no access to this secret information , and therefore cannot obtain the same results to the calculations . A legitimate mobile phone will produce the same calculated result as the network. The mobile phone's result is sent to the network and compared with the network's results. If they match, the phone is not a "clone." CS 640 15
  • 16. CONCLUSION:  Presently the cellular phone industry relies on common law (fraud and theft) and in-house counter measures to address cellular phone fraud. Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government . The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. However. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime. CS 640 16