2. ๏ What is cellphone cloning?
๏ What is mobile cloning?
๏ When did cloning start?
๏ GSM
๏ CDMA
๏ How is a phone cloned?
๏ Some Methods to detect cloned phones.
๏ Symptoms of cloned mobile.
๏ How to prevent cloning.
๏ Conclusion.
3. ๏ Cell Phone cloning is copying the identity of one
mobile phone to another mobile phone.
๏ The main purpose of Mobile cloning is making
fraudulent calls.
๏ The bills for the class goes to the legitimate
subscriber.
๏ The cloner also can also make anonymous calls
4. ๏ Cell Phone cloning started with Motorola
โbagโ phones and reached at their peak in mid
90โs.
๏ The Cellular Telecommunications Industry
Assoiciation(CTIA) estimates that financial
losses due to cloning fraud are around a billion
u.s.dollars.
5. ๏ Mobile cloning is in initial stages in india
so preventive steps should be taken by network
provider and government
6. ๏ Global System for Mobile Communication
.A cellular technology based on TDMA.
๏ GSM phones use a Subscriber Identity
Module(SIM) card that contains user info.
๏ Any GSM automatically programmed after
plugging in the SIM card.
7. ๏ Code Division Multiple Access is a method of
transmitting simultaneously signals over shared
portion of spectrum.
๏ There is no SIM card in GSM.
๏ In India the major CDMA service providers are
Reliance and Tata Indicom.
8. ๏ Electronic Serial Number(ESN).It is loaded when
the phone number is manufactured.
๏ This number cannot be tampered or changed by
the user or a subscriber.
๏ This is one of the essentials to be known for
cloning a mobile phone.
9. ๏ Mobile Identification Number
๏ By Knowing ESN/MIN pairs cloning can be
Successfully done on any mobile phone.
10. ๏ Cloning involves modifying or replacing the
EPROM in the phone with a new chip
๏ It would allow you to configure ESN via software
like PATAGONIA.
๏ You would also have to change MIN number too.
11. ๏ When you had successfully changed ESN/MIN
pair, the phone was an effective clone of another
phone.
12. ๏ Cloning is rare on the GSM ,one of the more
widely used mobile telephone communication
systems.
๏ However, cloning GSM Phones is achieved by
cloning the SIM card contained within , not
necessarily any of the phoneโs internal data.
13. ๏ The important information is IMSI stored in SIM
card.
๏ SIM card inserted to a reader
๏ Connect a computer and transfer the card
details.
๏ Use encrypted software to interpret details.
16. ๏ The network shows the same mobile phone at
several places
๏ Reactions include shutting all them off so that the
real customer will contact the operator as he lost
the service
17.
18. ๏ The Mobile phone seems to be moving with
impossible speed or most unlikely speeds.
๏ For example one phone call is made at Vizag
and in another 5 minutes call is made at
Hyderabad.
19.
20. ๏ Both phone and network keep the track of calls
made with the phone.
๏ If they differ by each other the service to that
mobile is denied(denial of service).
21. ๏ Frequent wrong calls to your phone , or hang-
ups.
๏ Difficulty in placing outgoing calls.
๏ Incoming calls constantly receiving busy signals
or wrong numbers. Unusual calls appearing on
phone bills.
22. ๏ Blacklisting of stolen phones is one type of
mechanism to prevent unauthorized use. An
Equipment Identity Register enables network
operators to disable stolen cellular phones on
network.
๏ User verification using Personal Identification
Number(PIN) codes is one method for customer
protection against cellular phone fraud
23. ๏ Tests conducted by USA found that having a PIN
code reduced fraud by more than 80%.
๏ Traffic Analysis detects cellular fraud by using
artificial intelligence software to detect
suspicious calling patterns , such as sudden
increase in the length of calls or a sudden
increase in number of international calls.
24. ๏ Software also determines whether it is physically
possible for subscriber to make a call from
current location and the time of previous call
25. ๏ Mobile cloning is in initial stages in India so
preventive steps should be taken by the network
provider.
๏ Though the mobile cloning has some uses in
fields like army it has many disadvantages
๏ Existing cellular systems have a number of
potential weakness . It is crucial that business
and staff take mobile phone security seriously.