SlideShare a Scribd company logo
MOBILE PHONE
CLONING
BY:

SIMRANDEEP SINGH-1315970
STEGIN JOY-1315972
things we are going to present……
 HOW CELL PHONE WORKS?
 HISTORY OF MOBILE CLONING
 CLONING CDMA CELL PHONE


CLONING GSM CELL PHONE

 PATAGONIA

 PROCESS OF CLONING
 IMPACT OF CLONING
 DETECTION OF CLONED PHONES ON NETWORK
 PREVENTION
 FUTURE THREATS
 CONCLUSION
INTRODUCTION

Mobile phone cloning is
basically a technique where in the
transfer or copying the identity or
security data of one cellular phone
to another is done.
o The other cell phone becomes the
exact replica of the original cell
phone like a clone. As a result,
while calls can be made from both
phones and only the original
phone is billed.
o
HOW CELLPHONE WORKS?

Cell phones send radio frequency transmissions through the air on two
distinct channels, one for voice communications and the other for control
signals. When a cellular phone makes a call, it normally transmits its
Electronic Security Number (ESN), Mobile Identification Number (MIN),
its Station Class Mark (SCM) and the number called in a short burst of
data. This burst is the short buzz you hear after you press the SEND button
and before the tower catches the data
BACK TO

HISTORY
In 1990’s. Cell phone cloning started
with Motorola “bag” phones and
reached its peak in the mid 90’s with
a commonly available modification
for the Motorola “brick” phones,
such as the classic, the Ultra classic.
Both GSM and CDMA handsets are
Cloning CDMA
phones code division multiple
 It stands for
access

 In CDMA system, your encoded voice
is digitalized and divided into packets.

 These packets are tagged with “codes”.
the packets then mix with all of the
other packets of traffic in the local
CDMA networks as they are routed
towards their destination. The receiving
system only accepts the packets with
the codes destined for it.
CLONING

GSM CELL PHONE

Global system for
communication, A digital
cellular phone technology
based on TDMA
GSM phones use a subscriber
identify module (SIM) card that
contains user account
information
Any GSM phone becomes
immediately programmed after
plugging in the SIM card
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
IMPORTANT TERMS

 IMEI stands for International Mobile equipment
Identifier,this is a 10 digit universally unique number of
our GSM handset, I use the term universally unique
because there cannot be 2 mobile phones having the
same IMEI no.this is very valuable number and used in
tracking mobile phones

 SIM,which stands for Subscriber Identification Module.
basically the SIM provides storage of subscriber
related information
PATAGONIA
 Patagonia is software available in the market which is used to
clone CDMA phone.
 this software a cloner can take over the control of a CDMA
phone i.e. cloning of phone. There are other software’s available
in the market to clone GSM phone. This software’s are easily
available in the market.
 A SIM can be cloned again and again and they can be used at
different places. Messages and phone calls sent by the cloned
phones can be tracked. However, if the accused manages to
also clone the IMEI number of the handset for which software’s
are available, there is no way he can be traced.
Process of cloning
 Cloning involves modifying or replacing the EPROM in the
phone with a new chip which would allow you to configure an
ESN (Electronic Serial Number) via software. MIN (Mobile
Identification Number) should also have to change. When the
ESN/MIN pair had changed successfully then an effective
clone of the original phone has created. Cloning required
access to ESN and MIN pairs. ESN/MIN pairs were discovered in
several ways:
 1. Sniffing the cellular.

 2. Trashing cellular companies or cellular resellers.
 3. Hacking cellular companies or cellular resellers
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
IMPACTS OF CLONING
DETECTION OF CLONED
PHONES ON NETWORK
 1. Duplicate Detection
 2. Velocity Trap

 3. RF (Radio Frequency):
 4. Usage Profiling:
 5. Call Counting:
 6. PIN Codes
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 RF(RADIO FREQUENCY)
Fingerprinting is originally a
military technology.so the network
software stores and compares
fingerprints for all the phones
that it sees. this way, it will spot
HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?

 1. Frequent wrong number phone calls to your phone or
hang ups.
 2. Difficulty in placing outgoing calls.
 3. Difficulty in retrieving voice mail messages.
 4. Incoming calls constantly receiving busy signals or
wrong numbers. Unusual call appearing on your phone
bills.
HOW TO PREVENT
PHONE CLONING ??
There are some prevention methods by which we can prevent our
cell phone from cloning:
 1. Mobile should never be trusted for storing confidential
information. So any secret information should not be kept in
mobile.
 2. Always set a pin that is required before the phone can be
used. This will help in
 preventing mobile from cloning to a great extent.

 4. Always keep in touch with monthly mobile bills. Any
unexpected increase in bill can cause threat to mobile
cloning.
CONCLUSION
 Preventive steps should be taken by the network
provider and the government the enactment of
legislation to prosecute crime related to cellular
phones is not viewed as a priority
 Existing cellular systems have a number of
potential weakness were considered.it is a crucial
business and staff take mobile phone security
seriously
THANK YOU

More Related Content

What's hot

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Abhishek Abhi
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
sorabh2312
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
Subhrajit Paul
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Sai Srinivas Mittapalli
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
Jagjit Khalsa
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
hcls
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
Devyani Vaidya
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
Shishupal Nagar
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
VIKASH MEWAL
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
maham4569
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 

What's hot (20)

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

Viewers also liked

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
ntel
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
Navin Kumar
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
neha pevekar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
Manjunath Singh
 
Wi DI
Wi DIWi DI
Seminar (VK)
Seminar (VK)Seminar (VK)
Seminar (VK)
S P ROHIT
 
Google classroom intro
Google classroom introGoogle classroom intro
Google classroom intro
jkeben
 
Emospark
EmosparkEmospark
Emospark
Abhirami P S
 

Viewers also liked (9)

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Wi DI
Wi DIWi DI
Wi DI
 
Seminar (VK)
Seminar (VK)Seminar (VK)
Seminar (VK)
 
Google classroom intro
Google classroom introGoogle classroom intro
Google classroom intro
 
Emospark
EmosparkEmospark
Emospark
 

Similar to MOBILE PHONE CLONING-Steginjoy2013@gmail.com

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
Clonning
ClonningClonning
Clonning
okolodennis
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
RohithKumarKishtam
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
Test
TestTest
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
Anisha Mangalappilly
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
Independent Contractor
 
clone sim card
clone sim cardclone sim card
clone sim card
ssuser1eca7d
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
krishan8018
 

Similar to MOBILE PHONE CLONING-Steginjoy2013@gmail.com (13)

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Clonning
ClonningClonning
Clonning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Test
TestTest
Test
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 

More from christ university

Stegin
SteginStegin
Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)
christ university
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
christ university
 
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inPOVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
christ university
 
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inDESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
christ university
 
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
christ university
 

More from christ university (6)

Stegin
SteginStegin
Stegin
 
Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inPOVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
 
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inDESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
 
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 

Recently uploaded

Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
SubhamMandal40
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
313mohammedarshad
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
ldtexsolbl
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
alexjohnson7307
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Patch Tuesday de julio
Patch Tuesday de julioPatch Tuesday de julio
Patch Tuesday de julio
Ivanti
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
DianaGray10
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
AmandaCheung15
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
Shiv Technolabs
 

Recently uploaded (20)

Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Patch Tuesday de julio
Patch Tuesday de julioPatch Tuesday de julio
Patch Tuesday de julio
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
 

MOBILE PHONE CLONING-Steginjoy2013@gmail.com

  • 2. things we are going to present……  HOW CELL PHONE WORKS?  HISTORY OF MOBILE CLONING  CLONING CDMA CELL PHONE  CLONING GSM CELL PHONE  PATAGONIA  PROCESS OF CLONING  IMPACT OF CLONING  DETECTION OF CLONED PHONES ON NETWORK  PREVENTION  FUTURE THREATS  CONCLUSION
  • 3. INTRODUCTION Mobile phone cloning is basically a technique where in the transfer or copying the identity or security data of one cellular phone to another is done. o The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed. o
  • 4. HOW CELLPHONE WORKS? Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data
  • 5. BACK TO HISTORY In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are
  • 6. Cloning CDMA phones code division multiple  It stands for access  In CDMA system, your encoded voice is digitalized and divided into packets.  These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
  • 7. CLONING GSM CELL PHONE Global system for communication, A digital cellular phone technology based on TDMA GSM phones use a subscriber identify module (SIM) card that contains user account information Any GSM phone becomes immediately programmed after plugging in the SIM card
  • 9. IMPORTANT TERMS  IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones  SIM,which stands for Subscriber Identification Module. basically the SIM provides storage of subscriber related information
  • 10. PATAGONIA  Patagonia is software available in the market which is used to clone CDMA phone.  this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.  A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.
  • 11. Process of cloning  Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:  1. Sniffing the cellular.  2. Trashing cellular companies or cellular resellers.  3. Hacking cellular companies or cellular resellers
  • 14. DETECTION OF CLONED PHONES ON NETWORK  1. Duplicate Detection  2. Velocity Trap  3. RF (Radio Frequency):  4. Usage Profiling:  5. Call Counting:  6. PIN Codes
  • 16.  RF(RADIO FREQUENCY) Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot
  • 17. HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?  1. Frequent wrong number phone calls to your phone or hang ups.  2. Difficulty in placing outgoing calls.  3. Difficulty in retrieving voice mail messages.  4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.
  • 18. HOW TO PREVENT PHONE CLONING ?? There are some prevention methods by which we can prevent our cell phone from cloning:  1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.  2. Always set a pin that is required before the phone can be used. This will help in  preventing mobile from cloning to a great extent.  4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.
  • 19. CONCLUSION  Preventive steps should be taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority  Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously