SlideShare a Scribd company logo
1 of 28
PHONE CLONING TECHNOLOGY




GUIDED BY:-         PRESENTED BY:-
Prof. Sunil Yadav     JAGJIT SINGH KHALSA
                        Roll no-3107
INDEX
 INTRODUCTION.
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 SYMPTOMS OF PHONE CLONING.
 MEASURES TO BE TAKEN.
 ADVANTAGES AND DISADVANTAGES.
 VICTIMS OF PHONE CLONING.
 CONCLUSION.
 REFERENCES
INTRODUCTION
CLONING: Cloning is the creation of an organism that
 is an exact genetic copy of another.

PHONE CLONING: Phone cloning is the process of
 taking the programmed information that is stored in
 a legitimate mobile phone and illegally programming
 the identical information into another mobile phone.
CDMA MOBILE SETS
 CDMA stands for Code Division Multiple Access.


 A method for transmitting simultaneous signals over a
  shared portion of the spectrum.

 CDMA uses a Mobile Identification Number (MIN)
  card that contains user account information.
GSM MOBILE SETS
 GSM stands for      Global   System   for   Mobile
  Communications.

 GSM uses a Subscriber Identity Module (SIM) card.


 GSM is a standard set developed by the European
  Telecommunications Standards Institute (ETSI) to
 describe technologies for second generation (2G)
 digital cellular networks.
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
  Identifier, this is a 15 digit universally unique number
  of the GSM handset.
 SIM, which stands for Subscriber Identification
  Module. Basically the SIM provides storage of
  subscriber related information of three types:
1. Fixed data stored before the subscription is sold.
2. Temporary network data
3. Service related data.
 ESN, stands for Electronic Serial Number. It is
  same as the IMEI but is used in CDMA handsets.
 It is loaded when the phone is manufactured.
 MIN ,stands for Mobile Identification
  Number, It’s a 10 digit number used to identify a
  mobile phone.
HOW IS A PHONE CLONED?
 Capture the ESN/MIN pair or SIM/IMEI pair.
 Clone the ESN/MIN pair using electronic scanning
    devices.
   The cloner reprograms or alters the microchip of any
    wireless phone.
   The ESN/MINs are transferred using a computer to a
    device.
   These devices are connected to handsets.
   New information is entered into the phone.
    Thus a clone of the legitimate phone is thus obtained.
HOW CLONING TAKES PLACE.




        http://homesecurityandpersonalprotection.blogspot.in
• CLONING      DEVICE




      http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html
CLONING GSM PHONES
 The important information is the IMSI, which is
  stored on the removable SIM card.

 SIM card inserted into a reader.

 Connect to computer and card details transferred.

 Use encrypted software to interpret details.

 The result: A cloned cell phone is ready for misuse.
CLONING CDMA PHONES
 Cellular telephone thieves monitor the radio
  frequency spectrum.
 Steal the cell phone pair as it is being anonymously
  registered with a cell site.
 Subscriber information is also encrypted and
  transmitted digitally.
 A device called as DDI, Digital Data Interface can
  be used to get pairs.
 Stolen ESN and MIN were then fed into a new
  CDMA handset.
DETECTION OF PHONE
          CLONING
 Duplicate detection - The network sees the same
  phone in several places at the same time.



 Velocity trap - The mobile phone seems to be moving
  at impossible, or most unlikely speeds..
DETECTION (Continued..)
 RF (Radio Frequency) - Nominally identical radio
  equipment has a distinguishing ``fingerprint'', so the
  network software stores and compares fingerprints for
  all the phones that it sees.

 Usage profiling. - Profiles of customers' phone usage
  are kept, and when discrepancies are noticed, the
 customer is contacted.
DETECTION (Continued..)
 Call counting - Both the phone and the network keep
  track of calls made with the phone, and should they
  differ more than the usually allowed one call, service
  is denied.

 PIN codes - Prior to placing a call, the caller unlocks
  the phone by entering a PIN code and then calls as
 usual.
DETECTION(Continued..)
 The best detection method available in CDMA is the
 A KEY FEATURE.

• Secret 20 digit number.


• Number loaded in Authentication Centre.


• Cannot be copied.
PHONE CLONING
             SYMPTOMS
 Frequent wrong number phone calls to your phone, or
  hang-ups.

 Difficulty in placing outgoing calls.

 Difficulty in retrieving voice mail messages.

 Incoming calls constantly receiving busy signals or
  wrong numbers.

 Unusual calls appearing on your phone bills
CLONING STATISTICS



Victims
percentage




                     Age
MEASURES TO BE TAKEN
 Service providers have adopted certain measures to
 prevent cellular fraud.

 These include:
 Blacklisting of stolen phones is another mechanism to
  prevent unauthorized use.

 User verification using Personal Identification
  Number (PIN) codes is one method for customer
  protection against cellular phone fraud
 Encryption: Encryption is regarded as the effective
  way to prevent cellular fraud

 Traffic analysis detects cellular fraud by using
 artificial intelligence software to detect suspicious
 calling patterns, such as a sudden increase in the
 length of calls or a sudden increase in the number of
 international calls.

 Blocking: Blocking is used by service providers
  to protect themselves from high risk callers.
ADVANTAGES
1. If your phone has been lost , you can use your cloned
   cell phone.
2. If your phone got damaged or if you forgot your
   phone at home or any other place . Cloned phone
   can be helpful.
DISADVANTAGES
 It can be used by the terrorists for criminal activities.


 It can be used by the cloner for fraud calls.


 It can be used for illegal money transfer.
VICTIMS OF PHONE CLONING
 Anita Davis, a mobile clone victim. One month, her
 cell phone bill showed $3,151 worth of calls in one
 month, to Pakistan, Israel, Jordan, Africa, and other
 countries.

 A Louisville woman was shocked when she got her
  February cell phone bill from T-Mobile. It was ten
  times higher than it's ever been before. Equally
  troubling, she didn't recognize most of the phone
  numbers on it.
CONCLUSION
 Phone Cloning is in initial stages in India. Preventive
  steps should be taken by the network provider and the
 Government. The enactment of legislation to
 prosecute crimes related to cellular phones is not
 viewed as a priority. The cloning of CDMA mobile
 phones was possible because there was no protection
 to the identification information.
REFERENCES
 http://www.cdmasoftware.com/eng.html
 http://infotech.indiatimes.com
 http://www.hackinthebox.org/


 Sankaranarayanan ,“Mobile phone cloning”, Wireless
 And Optical Communications Networks (WOCN),
 2010 Seventh International Conference in Sept,2010.
THANK YOU...
ANY QUESTIONS?

More Related Content

What's hot

NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
Communication Based Train Control (Mobile Train Radio Communication)
Communication Based Train Control (Mobile Train Radio Communication)Communication Based Train Control (Mobile Train Radio Communication)
Communication Based Train Control (Mobile Train Radio Communication)Suraj Talreja
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt finalLohit Dalal
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technologyJeet Das
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesAbhishek Abhi
 

What's hot (20)

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
Mobile security
Mobile securityMobile security
Mobile security
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Communication Based Train Control (Mobile Train Radio Communication)
Communication Based Train Control (Mobile Train Radio Communication)Communication Based Train Control (Mobile Train Radio Communication)
Communication Based Train Control (Mobile Train Radio Communication)
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Video processing on dsp
Video processing on dspVideo processing on dsp
Video processing on dsp
 
Blackberry Technology ppt
Blackberry Technology pptBlackberry Technology ppt
Blackberry Technology ppt
 
Cellular network
Cellular networkCellular network
Cellular network
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 

Viewers also liked

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedDavid Stoffel
 
5.1 mitosis
5.1 mitosis5.1 mitosis
5.1 mitosisSMKTA
 
Animal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and PerspectivesAnimal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and PerspectivesShafqat Khan
 
Characterization of Cell Line
Characterization of Cell LineCharacterization of Cell Line
Characterization of Cell LineVarij Nayan
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

Viewers also liked (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting Cloned
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
5.1 mitosis
5.1 mitosis5.1 mitosis
5.1 mitosis
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Animal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and PerspectivesAnimal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and Perspectives
 
Animal Cloning
Animal CloningAnimal Cloning
Animal Cloning
 
Characterization of Cell Line
Characterization of Cell LineCharacterization of Cell Line
Characterization of Cell Line
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cloning
CloningCloning
Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cloning
CloningCloning
Cloning
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 

Similar to Cloning. (4)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 

Similar to Cloning. (4) (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Clonning
ClonningClonning
Clonning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Test
TestTest
Test
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 

Cloning. (4)

  • 1. PHONE CLONING TECHNOLOGY GUIDED BY:- PRESENTED BY:- Prof. Sunil Yadav JAGJIT SINGH KHALSA Roll no-3107
  • 2. INDEX  INTRODUCTION.  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  SYMPTOMS OF PHONE CLONING.  MEASURES TO BE TAKEN.  ADVANTAGES AND DISADVANTAGES.  VICTIMS OF PHONE CLONING.  CONCLUSION.  REFERENCES
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  • 4. CDMA MOBILE SETS  CDMA stands for Code Division Multiple Access.  A method for transmitting simultaneous signals over a shared portion of the spectrum.  CDMA uses a Mobile Identification Number (MIN) card that contains user account information.
  • 5. GSM MOBILE SETS  GSM stands for Global System for Mobile Communications.  GSM uses a Subscriber Identity Module (SIM) card.  GSM is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks.
  • 6. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 15 digit universally unique number of the GSM handset.
  • 7.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold. 2. Temporary network data 3. Service related data.
  • 8.  ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets.  It is loaded when the phone is manufactured.  MIN ,stands for Mobile Identification Number, It’s a 10 digit number used to identify a mobile phone.
  • 9. HOW IS A PHONE CLONED?  Capture the ESN/MIN pair or SIM/IMEI pair.  Clone the ESN/MIN pair using electronic scanning devices.  The cloner reprograms or alters the microchip of any wireless phone.  The ESN/MINs are transferred using a computer to a device.  These devices are connected to handsets.  New information is entered into the phone. Thus a clone of the legitimate phone is thus obtained.
  • 10. HOW CLONING TAKES PLACE. http://homesecurityandpersonalprotection.blogspot.in
  • 11. • CLONING DEVICE http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html
  • 12. CLONING GSM PHONES  The important information is the IMSI, which is stored on the removable SIM card.  SIM card inserted into a reader.  Connect to computer and card details transferred.  Use encrypted software to interpret details.  The result: A cloned cell phone is ready for misuse.
  • 13. CLONING CDMA PHONES  Cellular telephone thieves monitor the radio frequency spectrum.  Steal the cell phone pair as it is being anonymously registered with a cell site.  Subscriber information is also encrypted and transmitted digitally.  A device called as DDI, Digital Data Interface can be used to get pairs.  Stolen ESN and MIN were then fed into a new CDMA handset.
  • 14. DETECTION OF PHONE CLONING  Duplicate detection - The network sees the same phone in several places at the same time.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds..
  • 15. DETECTION (Continued..)  RF (Radio Frequency) - Nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees.  Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted.
  • 16. DETECTION (Continued..)  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual.
  • 17. DETECTION(Continued..)  The best detection method available in CDMA is the A KEY FEATURE. • Secret 20 digit number. • Number loaded in Authentication Centre. • Cannot be copied.
  • 18. PHONE CLONING SYMPTOMS  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers.  Unusual calls appearing on your phone bills
  • 20. MEASURES TO BE TAKEN  Service providers have adopted certain measures to prevent cellular fraud.  These include:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud
  • 21.  Encryption: Encryption is regarded as the effective way to prevent cellular fraud  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  Blocking: Blocking is used by service providers to protect themselves from high risk callers.
  • 22. ADVANTAGES 1. If your phone has been lost , you can use your cloned cell phone. 2. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.
  • 23. DISADVANTAGES  It can be used by the terrorists for criminal activities.  It can be used by the cloner for fraud calls.  It can be used for illegal money transfer.
  • 24. VICTIMS OF PHONE CLONING  Anita Davis, a mobile clone victim. One month, her cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.  A Louisville woman was shocked when she got her February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it.
  • 25. CONCLUSION  Phone Cloning is in initial stages in India. Preventive steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile phones was possible because there was no protection to the identification information.
  • 26. REFERENCES  http://www.cdmasoftware.com/eng.html  http://infotech.indiatimes.com  http://www.hackinthebox.org/  Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.