SlideShare a Scribd company logo
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
              JNANA SANGAMA, BELGAUM
                           SEMINAR ON

                        MOBILE CLONING

Under the guidance of
LECTURER                                 PRESENTED BY,
MOBILE CLONING
  PRESENTED BY,   KIRAN .K
                  1RG09IS002
CONTENTS
▪ INTRODUCTION
▪ IMEI
▪ GSM AND CDMA
▪ MOBILE CLONING
▪ METHODS
▪ CLONING GSM PHONES
▪ HOW TO KNOW
▪ TO PREVENT CLONING
▪ IMPACT OF CLONING
INTRODUCTION
▪ Cell phone cloning is copying the identity of one mobile
 telephone to another mobile telephone.

▪ Usually this is done for the purpose of making fraudulent
 telephone calls.

▪ The bills for the calls go to the legitimate subscriber. The
 cloner is also able to make effectively anonymous calls
CONTINUED…
▪ ESN- The ESN (Electronic Serial Number) is the serial number
  of your cellular telephone.

▪ The ESN is transmitted to the cell site and used to verify that
  you are a legitimate user of the cellular system.

▪ The MIN (Mobile Identification Number) is simply the phone
  number of the cellular
  telephone.
IMEI
▪ IMEI stands for International Mobile Equipment Identifier, this is a 10
  digit universally unique number of our GSM handset.

▪ It is used in tracking mobile phones.
GSM AND CDMA
▪ CDMA( Code Division Multiple Access). A method for transmitting
  simultaneous signals over a shared portion of the spectrum. There is no
  Subscriber Identity Module (SIM) card.

▪ CDMA use a Mobile Identification Number (MIN) card that contains user
  account information.

▪ GSM (Global System for Mobile) Communications. GSM uses a variation of
  Time Division Multiple Access (TDMA) and is the most widely used of the
  three digital wireless telephone technologies (TDMA, GSM, and CDMA).
CONTINUED…

▪ GSM digitizes and compresses data, then sends it down a channel with
  two other streams of user data, each in its own time slot.

▪ It operates at either the 900 MHz or 1,800 MHz frequency band.
MOBILE CLONING
▪ Each phone has an Electronic Serial Number (ESN), identifying the
  phone, as well as a Mobile Identification Number (MIN), which includes
  the telephone number of the phone.

▪ These are used to identify the subscriber.

▪ When placing a call, the phone transmits both the ESN and the MIN to
  the network.

▪ Esn and MIN can be received using a suitable scanner
CONTINUED…
▪ These codes would then be programmed into another phone,
  effectively cloning the original subscription.

▪ Any calls made on this cloned phone would be charged on the
  original customer.
CONTINUED…




     FIG I MOBILE CLONING
METHODS TO DETECT CLONED
PHONES ON THE NETWORK
▪ DUPLICATE DETECTION The network sees the same
 phone in several places at the same time. Reactions include
 shutting them all off so that the real customer will contact
 the operator because he lost the service he is paying for so
 that the clone users will switch to another clone but the
 real user will contact the operator.
CONTINUED…
▪ PIN CODES. Prior to placing a call, the caller unlocks the
 phone by entering a PIN code and then calls as usual. After
 the call has been completed, the user locks the phone by
 entering the PIN code again. Operators may share PIN
 information to enable safer roaming.
CONTINUED…
▪ RF (RADIO FREQUENCY) - fingerprinting is originally a
 military technology. so the network software stores and
 compares fingerprints for all the phones that it sees. This
 way, it will spot the clones with the same identity but
 different fingerprints.
CONTINUED…
▪ USAGE PROFILING. - Profiles of customers' phone
 usage are kept, and when discrepancies are noticed, the
 customer is contacted.

▪ For example, if a customer normally makes only local
 network calls but is suddenly placing calls to foreign
 countries for hours of airtime, it indicates a possible clone.
CONTINUED…
▪ CALL COUNTING - Both the phone and the network keep track
 of calls made with the phone, and should they differ more than the
 usually allowed one call, service is denied.
CLONING GSM PHONES
▪ Every GSM phone has a 15 digit electronic serial number
 (referred to as the IMEI).

▪ The important information is the IMSI, which is stored on
 the removable SIM card that carries all your subscriber
 information
CONTINUED…
▪ The process of hacking GSM networks is simple: a SIM card is
  inserted into a reader.

▪ After connecting it to the computer using data cables, the card
  details were transferred into the PC.

▪ Then, using freely available encryption software on the Net, the card
  details can be encrypted on to a blank smart card.

▪ The result: A cloned cell phone is ready for misuse.
HOW TO KNOW THAT THE CELL
HAS BEEN CLONED?
▪ Frequent wrong number phone calls to your phone, or hang-ups

▪ Difficulty in placing outgoing calls.

▪ Difficulty in retrieving voice mail messages.

▪ Incoming calls constantly receiving busy signals or wrong numbers.
  Unusual calls appearing on your phone bills
TO PREVENT CLONING
▪ User verification using Personal Identification Number (PIN) codes is
  one method for customer protection against cellular phone fraud

▪ Tests conducted have proved that United States found that having a
  PIN code reduced fraud by more than 80%.

▪ Traffic analysis detects cellular fraud by using artificial intelligence
  software
CONTINUED…
▪ Software detects suspicious calling patterns, such as a sudden
  increase in the length of calls or a sudden increase in the number
  of international calls.

▪ The software also determines whether it is physically possible for
  the subscriber to be making a call from a current location, based
  on the location and time of the previous call
CONTINUED…
▪ BLACKLISTING       of stolen phones is another mechanism to
 prevent unauthorized use.

▪ An Equipment Identity Register (EIR) enables network operators
 to disable stolen cellular phones on networks around the world
IMPACT OF CLONING
▪ Each year, the mobile phone industry loses millions of dollars in
  revenue because of the criminal actions of persons who are able to
  reconfigure mobile phones so that their calls are billed to other
  phones owned by innocent third persons.

▪ Many criminals use cloned cellular telephones for illegal activities,
  because their calls are not billed to them, and are therefore much
  more difficult to trace
CONCLUSION
▪ Preventive steps should be taken by the network provider and the
  Government the enactment of legislation to prosecute crimes related
  to cellular phones is not viewed as a priority

▪ Existing cellular systems have a number of potential weaknesses that
  were considered. It is crucial that businesses and staff take mobile
  phone security seriously.
REFERENCES
▪ http://wiretap.spies.com

▪ http://www.hackinthebox.org

▪ http://www.google.com

▪ http://www.wikipedia.com
Mobile cloning

More Related Content

What's hot

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
Subhrajit Paul
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Shivam Jaiswal
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
sorabh2312
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
Ronson Calvin Fernandes
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
Jyothsna Sridhar
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
Chaitanya Ram
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 
Sim cards
Sim cardsSim cards
Sim cards
faizlap
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Pankaj Dubey
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
akhila immadisetty
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Juice Jacking 101
Juice Jacking 101Juice Jacking 101
Juice Jacking 101
Robert Rowley
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 

What's hot (20)

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Sim cards
Sim cardsSim cards
Sim cards
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Juice Jacking 101
Juice Jacking 101Juice Jacking 101
Juice Jacking 101
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 

Similar to Mobile cloning

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
RohithKumarKishtam
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
hcls
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Pushkar Dutt
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Shubham Sachan
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Sai Srinivas Mittapalli
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
VIKASH MEWAL
 
Clonning
ClonningClonning
Clonning
okolodennis
 

Similar to Mobile cloning (20)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Clonning
ClonningClonning
Clonning
 

More from Abhishek Abhi

Blue brain
Blue brainBlue brain
Blue brain
Abhishek Abhi
 
3d search
3d search3d search
3d search
Abhishek Abhi
 
Java Ring
Java RingJava Ring
Java Ring
Abhishek Abhi
 
3D Internet
3D Internet 3D Internet
3D Internet
Abhishek Abhi
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
Abhishek Abhi
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
Abhishek Abhi
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
Abhishek Abhi
 

More from Abhishek Abhi (7)

Blue brain
Blue brainBlue brain
Blue brain
 
3d search
3d search3d search
3d search
 
Java Ring
Java RingJava Ring
Java Ring
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 

Mobile cloning

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY JNANA SANGAMA, BELGAUM SEMINAR ON MOBILE CLONING Under the guidance of LECTURER PRESENTED BY,
  • 2. MOBILE CLONING PRESENTED BY, KIRAN .K 1RG09IS002
  • 3. CONTENTS ▪ INTRODUCTION ▪ IMEI ▪ GSM AND CDMA ▪ MOBILE CLONING ▪ METHODS ▪ CLONING GSM PHONES ▪ HOW TO KNOW ▪ TO PREVENT CLONING ▪ IMPACT OF CLONING
  • 4. INTRODUCTION ▪ Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. ▪ Usually this is done for the purpose of making fraudulent telephone calls. ▪ The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls
  • 5. CONTINUED… ▪ ESN- The ESN (Electronic Serial Number) is the serial number of your cellular telephone. ▪ The ESN is transmitted to the cell site and used to verify that you are a legitimate user of the cellular system. ▪ The MIN (Mobile Identification Number) is simply the phone number of the cellular telephone.
  • 6. IMEI ▪ IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. ▪ It is used in tracking mobile phones.
  • 7. GSM AND CDMA ▪ CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card. ▪ CDMA use a Mobile Identification Number (MIN) card that contains user account information. ▪ GSM (Global System for Mobile) Communications. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA).
  • 8. CONTINUED… ▪ GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. ▪ It operates at either the 900 MHz or 1,800 MHz frequency band.
  • 9. MOBILE CLONING ▪ Each phone has an Electronic Serial Number (ESN), identifying the phone, as well as a Mobile Identification Number (MIN), which includes the telephone number of the phone. ▪ These are used to identify the subscriber. ▪ When placing a call, the phone transmits both the ESN and the MIN to the network. ▪ Esn and MIN can be received using a suitable scanner
  • 10. CONTINUED… ▪ These codes would then be programmed into another phone, effectively cloning the original subscription. ▪ Any calls made on this cloned phone would be charged on the original customer.
  • 11. CONTINUED… FIG I MOBILE CLONING
  • 12. METHODS TO DETECT CLONED PHONES ON THE NETWORK ▪ DUPLICATE DETECTION The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for so that the clone users will switch to another clone but the real user will contact the operator.
  • 13. CONTINUED… ▪ PIN CODES. Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 14. CONTINUED… ▪ RF (RADIO FREQUENCY) - fingerprinting is originally a military technology. so the network software stores and compares fingerprints for all the phones that it sees. This way, it will spot the clones with the same identity but different fingerprints.
  • 15. CONTINUED… ▪ USAGE PROFILING. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. ▪ For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone.
  • 16. CONTINUED… ▪ CALL COUNTING - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
  • 17. CLONING GSM PHONES ▪ Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI). ▪ The important information is the IMSI, which is stored on the removable SIM card that carries all your subscriber information
  • 18. CONTINUED… ▪ The process of hacking GSM networks is simple: a SIM card is inserted into a reader. ▪ After connecting it to the computer using data cables, the card details were transferred into the PC. ▪ Then, using freely available encryption software on the Net, the card details can be encrypted on to a blank smart card. ▪ The result: A cloned cell phone is ready for misuse.
  • 19. HOW TO KNOW THAT THE CELL HAS BEEN CLONED? ▪ Frequent wrong number phone calls to your phone, or hang-ups ▪ Difficulty in placing outgoing calls. ▪ Difficulty in retrieving voice mail messages. ▪ Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  • 20. TO PREVENT CLONING ▪ User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud ▪ Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%. ▪ Traffic analysis detects cellular fraud by using artificial intelligence software
  • 21. CONTINUED… ▪ Software detects suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls. ▪ The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call
  • 22. CONTINUED… ▪ BLACKLISTING of stolen phones is another mechanism to prevent unauthorized use. ▪ An Equipment Identity Register (EIR) enables network operators to disable stolen cellular phones on networks around the world
  • 23. IMPACT OF CLONING ▪ Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. ▪ Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace
  • 24. CONCLUSION ▪ Preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority ▪ Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
  • 25. REFERENCES ▪ http://wiretap.spies.com ▪ http://www.hackinthebox.org ▪ http://www.google.com ▪ http://www.wikipedia.com