SlideShare a Scribd company logo
www.studymafia.org
Seminar
On
Mobile Phone Cloning
Presented By :- Devyani B. Vaidya
CONTENT
 INTRODUCTION
 GSM & CDMA MOBILE SETS
 IMPORTANT TERMS
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 IMPACT OF CLONING
 HOW TO PREVENT CLONING?
 FACTS & FIGURES
 CONCLUSION
INTRODUCTION
CLONING: Cloning is the creation of an organism
that is an exact genetic copy of another. This means
that every single bit of DNA is the same between the
two!
MOBILE PHONE CLONING: Mobile phone
cloning is copying the identity of one mobile
telephone to another mobile telephone. Usually this
is done for the purpose of making fraudulent
telephone calls. The bills for the calls go to the
legitimate subscriber. The cloner is also able to make
effectively anonymous calls,
GSM & CDMA MOBILE SETS
 CDMA( Code Division Multiple Access). A method for
transmitting simultaneous signals over a shared portion of the
spectrum. There is no Subscriber Identity Module (SIM) card.
Operators who provides CDMA service in India are Reliance
and Tata Indicom.
 CDMA use a Mobile Identification Number (MIN) card that
contains user account information.
 GSM (Global System for Mobile) Communications. A
digital cellular phone technology based on TDMA GSM
phones MHz frequency band. There is a Subscriber
Identity Module (SIM) card. Any GSM phone becomes
immediately programmed after plugging in the SIM card, thus
allowing GSM phones to be easily rented or
borrowed.Operators who provide GSM service are
Airtel,Hutch etc
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
Identifier, this is a 10 digit universally unique number of
our GSM handset. I use the term Universally Unique
because there cannot be 2 mobile phones having the same
IMEI no. This is a very valuable number and used in
tracking mobile phones.
 SIM, which stands for Subscriber Identification
Module. Basically the SIM provides storage of
subscriber related information of three types:
1. Fixed data stored before the subscription is sold
2. Temporary network data
3. Service related data.
CONT….
 ESN, which stands for Electronic Serial Number. It
is same as the IMEI but is used in CDMA handsets
 MIN stands for Mobile Identification Number, which
is the same as the SIM of GSM.
HOW IS A PHONE CLONED?
 Cellular thieves can capture ESN/MINs using devices
such as cell phone ESN reader or digital data
interpreters (DDI).
 The ESN/MIN pair can be cloned in a number of ways
without the knowledge of the carrier or subscriber
through the use of electronic scanning devices.
 After the ESN/MIN pair is captured, the cloner
reprograms or alters the microchip of any wireless
phone to create a clone of the wireless phone from
which the ESN/MIN pair was stolen.
CLONING GSM PHONES
 Every GSM phone has a 15 digit electronic serial number
(referred to as the IMEI). It is not a particularly secret bit of
information and you don't need to take any care to keep it
private. The important information is the IMSI, which is
stored on the removable SIM card that carries all your
subscriber information
 GSM networks which are considered to be impregnable can
also be hacked. The process is simple: a SIM card is
inserted into a reader. After connecting it to the computer
using data cables, the card details were transferred into the
PC. Then, using freely available encryption software on the
Net, the card details can be encrypted on to a blank smart
card. The result: A cloned cell phone is ready for misuse.
METHODS TO DETECT CLONED
PHONES
 Duplicate detection - The network sees the same phone
in several places at the same time. Reactions include
shutting them all off so that the real customer will contact
the operator because he lost the service he is paying for,
or tearing down connections so that the clone users will
switch to another clone but the real user will contact the
operator.
 Velocity trap - The mobile phone seems to be moving at
impossible, or most unlikely speeds. For example, if a
call is first made in Helsinki, and five minutes later,
another call is made but this time in Tampere, there must
be two phones with the same identity on the network.
CONT…
 RF (Radio Frequency) - fingerprinting is originally a
military technology. Even nominally identical radio
equipment has a distinguishing ``fingerprint'', so the
network software stores and compares fingerprints for
all the phones that it sees. This way, it will spot the
clones with the same identity but different fingerprints.
 Usage profiling. - Profiles of customers' phone usage
are kept, and when discrepancies are noticed, the
customer is contacted. Credit card companies use the
same method. For example, if a customer normally
makes only local network calls but is suddenly placing
calls to foreign countries for hours of airtime, it
indicates a possible clone.
CONT…
 Call counting - Both the phone and the network
keep track of calls made with the phone, and should
they differ more than the usually allowed one call,
service is denied.
 PIN codes - Prior to placing a call, the caller
unlocks the phone by entering a PIN code and then
calls as usual. After the call has been completed,
the user locks the phone by entering the PIN code
again. Operators may share PIN information to
enable safer roaming.
IMPACT OF CLONING
 Each year, the mobile phone industry loses millions
of dollars in revenue because of the criminal
actions of persons who are able to reconfigure
mobile phones so that their calls are billed to other
phones owned by innocent third persons.
 Many criminals use cloned cellular telephones for
illegal activities, because their calls are not billed to
them, and are therefore much more difficult to
trace.
CONT…
 This phenomenon is especially prevalent in drug
crimes. Drug dealers need to be in constant contact
with their sources of supply and their confederates on
the streets.
 Traffickers acquire cloned phones at a minimum cost,
make dozens of calls, and then throw the phone away
after as little as a days' use.
 In the same way, criminals who pose a threat to our
national security, such as terrorists, have been known
to use cloned phones to thwart law enforcement efforts
aimed at tracking their whereabouts.
HOW TO PREVENT CLONING?
 Service providers have adopted certain measures to
prevent cellular fraud. These include encryption,
blocking, blacklisting, user verification and traffic
analysis:
 Blacklisting of stolen phones is another mechanism to
prevent unauthorized use. An Equipment Identity
Register (EIR) enables network operators to disable
stolen cellular phones on networks around the world.
 User verification using Personal Identification
Number (PIN) codes is one method for customer
protection against cellular phone fraud.
CONT…
 Tests conducted have proved that United States found
that having a PIN code reduced fraud by more than
80%.
 Traffic analysis detects cellular fraud by using
artificial intelligence software to detect suspicious
calling patterns, such as a sudden increase in the length
of calls or a sudden increase in the number of
international calls.
 The software also determines whether it is physically
possible for the subscriber to be making a call from a
current location, based on the location and time of the
previous call.
FACTS & FIGURES
 Southwestern Bell claims wireless fraud costs the
industry $650 million each year in the US. Some
federal agents in the US have called phone cloning an
especially `popular' crime because it is hard to trace. In
one case, more than 1,500 telephone calls were placed
in a single day by cellular phone thieves using the
number of a single unsuspecting owner.
 A Home Office report in 2002 revealed that in London
around 3,000 mobile phones were stolen in one month
alone which were used for cell phone cloning
CONT…
 Qualcomm, which develops CDMA technology
globally, says each instance of mobile hacking is
different and therefore there is very little an
operator can do to prevent hacking. "It's like a virus
hitting the computer.
 The software which is used to hack into the
network is different, so operators can only keep
upgrading their security firewall as and when the
hackers strike," says a Qualcomm executive.
CONCLUSION
 Mobile Cloning Is in initial stages in India so preventive
steps should be taken by the network provider and the
Government the enactment of legislation to prosecute
crimes related to cellular phones is not viewed as a
priority, however. It is essential that intended mobile
crime legislation be comprehensive enough to
incorporate cellular phone fraud, in particular "cloning
fraud" as a specific crime.
 Existing cellular systems have a number of potential
weaknesses that were considered. It is crucial that
businesses and staff take mobile phone security seriously.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.studymafia.org
 www.123seminarsonly.com
THANK YOU

More Related Content

What's hot

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
Sim cards
Sim cardsSim cards
Sim cards
faizlap
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
Ronson Calvin Fernandes
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
e-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan Ke-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan K
Hariharan Krishnan
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
Mehul Ranavasiya
 
Phreaks
PhreaksPhreaks
Phreaks
Fanap
 
clone sim card
clone sim cardclone sim card
clone sim card
ssuser1eca7d
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
Venkata.Manish Reddy
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Shivam Jaiswal
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
Dr Raghu Khimani
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
AYSHA S KABEER
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Aditya Kumar Tripathy
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
akhila immadisetty
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Neha Singh
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
Jyothsna Sridhar
 

What's hot (20)

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Sim cards
Sim cardsSim cards
Sim cards
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
e-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan Ke-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan K
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Phreaks
PhreaksPhreaks
Phreaks
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
 

Viewers also liked

Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Bernard Toplak
 
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen
sree438
 
Graphical password
Graphical passwordGraphical password
Graphical password
swapnilbirdawade
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwaves
Devyani Vaidya
 
Table of contents blue brain
Table of contents blue brainTable of contents blue brain
Table of contents blue brain
koustuba
 
Resource management
Resource managementResource management
Resource management
Devyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousing
Devyani Vaidya
 
Environmental law
Environmental lawEnvironmental law
Environmental law
Devyani Vaidya
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
Devyani Vaidya
 
Digital Locker
Digital LockerDigital Locker
Digital Locker
Devyani Vaidya
 
Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directory
Devyani Vaidya
 
secued cloud
 secued cloud secued cloud
secued cloud
Devyani Vaidya
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting
Devyani Vaidya
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Devyani Vaidya
 
Wireless network
Wireless networkWireless network
Wireless network
Devyani Vaidya
 
Fuels Saver System
Fuels Saver SystemFuels Saver System
Fuels Saver System
Devyani Vaidya
 
History of Laptop
History of LaptopHistory of Laptop
History of Laptop
Devyani Vaidya
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile
Devyani Vaidya
 
Data As A Service
Data As A ServiceData As A Service
Data As A Service
Devyani Vaidya
 

Viewers also liked (20)

Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
 
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwaves
 
Table of contents blue brain
Table of contents blue brainTable of contents blue brain
Table of contents blue brain
 
Resource management
Resource managementResource management
Resource management
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Environmental law
Environmental lawEnvironmental law
Environmental law
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Digital Locker
Digital LockerDigital Locker
Digital Locker
 
Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directory
 
secued cloud
 secued cloud secued cloud
secued cloud
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Wireless network
Wireless networkWireless network
Wireless network
 
Fuels Saver System
Fuels Saver SystemFuels Saver System
Fuels Saver System
 
History of Laptop
History of LaptopHistory of Laptop
History of Laptop
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile
 
Data As A Service
Data As A ServiceData As A Service
Data As A Service
 

Similar to Mobile Phone Cloning

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
RohithKumarKishtam
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
hcls
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
VIKASH MEWAL
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Shubham Sachan
 
Clonning
ClonningClonning
Clonning
okolodennis
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Sai Srinivas Mittapalli
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Pushkar Dutt
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
 
Test
TestTest

Similar to Mobile Phone Cloning (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Clonning
ClonningClonning
Clonning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Test
TestTest
Test
 

More from Devyani Vaidya

Hashing
HashingHashing
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
Devyani Vaidya
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large files
Devyani Vaidya
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
Devyani Vaidya
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
Devyani Vaidya
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
Devyani Vaidya
 
Applet programming
Applet programming Applet programming
Applet programming
Devyani Vaidya
 
Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet
Devyani Vaidya
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
Devyani Vaidya
 
3D- Doctor
3D- Doctor3D- Doctor
3D- Doctor
Devyani Vaidya
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
Devyani Vaidya
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
Devyani Vaidya
 

More from Devyani Vaidya (13)

Hashing
HashingHashing
Hashing
 
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large files
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
Applet programming
Applet programming Applet programming
Applet programming
 
Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
 
3D- Doctor
3D- Doctor3D- Doctor
3D- Doctor
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 

Recently uploaded

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

Mobile Phone Cloning

  • 2. CONTENT  INTRODUCTION  GSM & CDMA MOBILE SETS  IMPORTANT TERMS  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO PREVENT CLONING?  FACTS & FIGURES  CONCLUSION
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls,
  • 4. GSM & CDMA MOBILE SETS  CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card. Operators who provides CDMA service in India are Reliance and Tata Indicom.  CDMA use a Mobile Identification Number (MIN) card that contains user account information.  GSM (Global System for Mobile) Communications. A digital cellular phone technology based on TDMA GSM phones MHz frequency band. There is a Subscriber Identity Module (SIM) card. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM service are Airtel,Hutch etc
  • 5. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold 2. Temporary network data 3. Service related data.
  • 6. CONT….  ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets  MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
  • 7. HOW IS A PHONE CLONED?  Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).  The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices.  After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
  • 8.
  • 9. CLONING GSM PHONES  Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI). It is not a particularly secret bit of information and you don't need to take any care to keep it private. The important information is the IMSI, which is stored on the removable SIM card that carries all your subscriber information  GSM networks which are considered to be impregnable can also be hacked. The process is simple: a SIM card is inserted into a reader. After connecting it to the computer using data cables, the card details were transferred into the PC. Then, using freely available encryption software on the Net, the card details can be encrypted on to a blank smart card. The result: A cloned cell phone is ready for misuse.
  • 10. METHODS TO DETECT CLONED PHONES  Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network.
  • 11.
  • 12. CONT…  RF (Radio Frequency) - fingerprinting is originally a military technology. Even nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees. This way, it will spot the clones with the same identity but different fingerprints.  Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. Credit card companies use the same method. For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone.
  • 13. CONT…  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 14. IMPACT OF CLONING  Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons.  Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace.
  • 15. CONT…  This phenomenon is especially prevalent in drug crimes. Drug dealers need to be in constant contact with their sources of supply and their confederates on the streets.  Traffickers acquire cloned phones at a minimum cost, make dozens of calls, and then throw the phone away after as little as a days' use.  In the same way, criminals who pose a threat to our national security, such as terrorists, have been known to use cloned phones to thwart law enforcement efforts aimed at tracking their whereabouts.
  • 16. HOW TO PREVENT CLONING?  Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register (EIR) enables network operators to disable stolen cellular phones on networks around the world.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
  • 17. CONT…  Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call.
  • 18. FACTS & FIGURES  Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. Some federal agents in the US have called phone cloning an especially `popular' crime because it is hard to trace. In one case, more than 1,500 telephone calls were placed in a single day by cellular phone thieves using the number of a single unsuspecting owner.  A Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning
  • 19. CONT…  Qualcomm, which develops CDMA technology globally, says each instance of mobile hacking is different and therefore there is very little an operator can do to prevent hacking. "It's like a virus hitting the computer.  The software which is used to hack into the network is different, so operators can only keep upgrading their security firewall as and when the hackers strike," says a Qualcomm executive.
  • 20. CONCLUSION  Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime.  Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
  • 21. REFERENCE  www.google.com  www.wikipedia.com  www.studymafia.org  www.123seminarsonly.com