SlideShare a Scribd company logo
By
M.Sai Srinivas
15311A0568
CSE-B
 What is cell phone cloning?
 When did cloning start?
 GSM
 CDMA
 How is a phone cloned?
 Some Methods to detect cloned phones.
 Symptoms of cloned mobile.
 How to prevent cloning.
 Conclusion.
 Cell Phone cloning is copying the identity of one
mobile phone to another mobile phone.
 The main purpose of Mobile cloning is making
fraudulent calls.
 The bills for the calls goes to the legitimate
subscriber.
 The cloner also can also make anonymous calls
 Cell Phone cloning started with Motorola
“bag” phones and reached at their peak in mid
90’s.
 The Cellular Telecommunications Industry
Association(CTIA) estimates that financial losses
due to cloning fraud are around a billion
u.s.dollars.
 Mobile cloning is in initial stages in India
so preventive steps should be taken by network
provider and government
 Global System for Mobile Communication
.A cellular technology based on TDMA.
 GSM phones use a Subscriber Identity
Module(SIM) card that contains user info.
 Any GSM automatically programmed after
plugging in the SIM card.
 Code Division Multiple Access is a method of
transmitting simultaneously signals over shared
portion of spectrum.
 There is a built in UICC (Universal Integrated
Circuit Card) card in CDMA i.e., they are hand
set based mobiles.
 In India the major CDMA service providers are
Reliance and Tata Indicom.
 Electronic Serial Number(ESN).It is loaded when
the phone number is manufactured.
 This number cannot be tampered or changed by
the user or a subscriber.
 This is one of the essentials to be known for
cloning a mobile phone.
 Mobile Identification Number
 By Knowing ESN/MIN pairs cloning can be
Successfully done on any mobile phone.
It is nothing but your mobile number.
 Cloning involves modifying or replacing the
EPROM in the phone with a new chip
 It would allow you to configure ESN via software
like PATAGONIA.
 You would also have to change MIN number too.
 When you had successfully changed ESN/MIN
pair, the phone was an effective clone of another
phone.
 Cloning is rare on the GSM ,one of the more
widely used mobile telephone communication
systems.
 However, cloning GSM Phones is achieved by
cloning the SIM card contained within , not
necessarily any of the phone’s internal data.
 The important information is IMSI stored in SIM
card.
 SIM card inserted to a reader
 Connect a computer and transfer the card
details.
 Use encrypted software to interpret details.
Duplicate detection.
Velocity trap.
Call counting
 The network shows the same mobile phone at
several places
 Reactions include shutting all them off so that the
real customer will contact the operator as he lost
the service
 The Mobile phone seems to be moving with
impossible speed or most unlikely speeds.
 For example one phone call is made at Vizag
and in another 5 minutes call is made at
Hyderabad.
 Both phone and network keep the track of calls
made with the phone.
 If they differ by each other the service to that
mobile is denied(denial of service).
 Frequent wrong calls to your phone , or hang-
ups.
 Difficulty in placing outgoing calls.
 Incoming calls constantly receiving busy signals
or wrong numbers. Unusual calls appearing on
phone bills.
 Blacklisting of stolen phones is one type of
mechanism to prevent unauthorized use. An
Equipment Identity Register enables network
operators to disable stolen cellular phones on
network.
 User verification using Personal Identification
Number(PIN) codes is one method for customer
protection against cellular phone fraud
 Tests conducted by USA found that having a PIN
code reduced fraud by more than 80%.
 Traffic Analysis detects cellular fraud by using
artificial intelligence software to detect
suspicious calling patterns , such as sudden
increase in the length of calls or a sudden
increase in number of international calls.
 Software also determines whether it is physically
possible for subscriber to make a call from
current location and the time of previous call
 Mobile cloning is in initial stages in India so
preventive steps should be taken by the network
provider.
 Though the mobile cloning has some uses in
fields like army it has many disadvantages
 Existing cellular systems have a number of
potential weakness . It is crucial that business
and staff take mobile phone security seriously.
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented

More Related Content

What's hot

Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
Jagjit Khalsa
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Pushkar Dutt
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
hcls
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
774474
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
Saisharan Amaravadhi
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
Subhrajit Paul
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
maham4569
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
Devyani Vaidya
 

What's hot (20)

Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 

Similar to Mobile cloning modified with images and bettermented

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
RohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
Anisha Mangalappilly
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 

Similar to Mobile cloning modified with images and bettermented (14)

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Clonning
ClonningClonning
Clonning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Test
TestTest
Test
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 

Recently uploaded

MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 

Mobile cloning modified with images and bettermented

  • 2.  What is cell phone cloning?  When did cloning start?  GSM  CDMA  How is a phone cloned?  Some Methods to detect cloned phones.  Symptoms of cloned mobile.  How to prevent cloning.  Conclusion.
  • 3.  Cell Phone cloning is copying the identity of one mobile phone to another mobile phone.  The main purpose of Mobile cloning is making fraudulent calls.  The bills for the calls goes to the legitimate subscriber.  The cloner also can also make anonymous calls
  • 4.  Cell Phone cloning started with Motorola “bag” phones and reached at their peak in mid 90’s.  The Cellular Telecommunications Industry Association(CTIA) estimates that financial losses due to cloning fraud are around a billion u.s.dollars.
  • 5.  Mobile cloning is in initial stages in India so preventive steps should be taken by network provider and government
  • 6.  Global System for Mobile Communication .A cellular technology based on TDMA.  GSM phones use a Subscriber Identity Module(SIM) card that contains user info.  Any GSM automatically programmed after plugging in the SIM card.
  • 7.  Code Division Multiple Access is a method of transmitting simultaneously signals over shared portion of spectrum.  There is a built in UICC (Universal Integrated Circuit Card) card in CDMA i.e., they are hand set based mobiles.  In India the major CDMA service providers are Reliance and Tata Indicom.
  • 8.  Electronic Serial Number(ESN).It is loaded when the phone number is manufactured.  This number cannot be tampered or changed by the user or a subscriber.  This is one of the essentials to be known for cloning a mobile phone.
  • 9.  Mobile Identification Number  By Knowing ESN/MIN pairs cloning can be Successfully done on any mobile phone. It is nothing but your mobile number.
  • 10.  Cloning involves modifying or replacing the EPROM in the phone with a new chip  It would allow you to configure ESN via software like PATAGONIA.  You would also have to change MIN number too.
  • 11.  When you had successfully changed ESN/MIN pair, the phone was an effective clone of another phone.
  • 12.  Cloning is rare on the GSM ,one of the more widely used mobile telephone communication systems.  However, cloning GSM Phones is achieved by cloning the SIM card contained within , not necessarily any of the phone’s internal data.
  • 13.  The important information is IMSI stored in SIM card.  SIM card inserted to a reader  Connect a computer and transfer the card details.  Use encrypted software to interpret details.
  • 14.
  • 15.
  • 17.  The network shows the same mobile phone at several places  Reactions include shutting all them off so that the real customer will contact the operator as he lost the service
  • 18.
  • 19.  The Mobile phone seems to be moving with impossible speed or most unlikely speeds.  For example one phone call is made at Vizag and in another 5 minutes call is made at Hyderabad.
  • 20.
  • 21.  Both phone and network keep the track of calls made with the phone.  If they differ by each other the service to that mobile is denied(denial of service).
  • 22.  Frequent wrong calls to your phone , or hang- ups.  Difficulty in placing outgoing calls.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on phone bills.
  • 23.  Blacklisting of stolen phones is one type of mechanism to prevent unauthorized use. An Equipment Identity Register enables network operators to disable stolen cellular phones on network.  User verification using Personal Identification Number(PIN) codes is one method for customer protection against cellular phone fraud
  • 24.  Tests conducted by USA found that having a PIN code reduced fraud by more than 80%.  Traffic Analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns , such as sudden increase in the length of calls or a sudden increase in number of international calls.
  • 25.  Software also determines whether it is physically possible for subscriber to make a call from current location and the time of previous call
  • 26.  Mobile cloning is in initial stages in India so preventive steps should be taken by the network provider.  Though the mobile cloning has some uses in fields like army it has many disadvantages  Existing cellular systems have a number of potential weakness . It is crucial that business and staff take mobile phone security seriously.