SlideShare a Scribd company logo
A Seminar Presentation
on
Phone Cloning
Represented by
Monodip Roy Chowdhury
Prasun Mandal
Sanghita Mukherjee
Souvik kumar Guin
Subhrajit Paul
Sumit ghosh
Mentor Prof. Somnath Patra
3rd
Year 6th
Semester
• What is cloning
• Important terms
• Phone cloning
CDMA
GSM
• Software for cloning
• Symptoms of phone cloning
• Method to detect phone cloning
• Impact of phone cloning
• Prevent cloning
• Future advantages
• Conclusion
• References
Contents
Introduction
What is cloning?
•Cloning is a creation of an organism that is an exact genetic copy of another.
•By other means every single DNA bit is same of two copy.
What is Phone cloning?
•Phone cloning is coping the specific identification one phone to another.
•Coping can be done both CDMA and GSM services mobile phone.
•The billing of calls will be paid by mother device subscriber.
•What can mother device do the copy device can also do the same.
•The purpose of doing this is to make fraudulent calls and for security reason it is done.
Some Important terms about Phone cloning
Some Important terms about Phone cloning
Some Important terms about Phone cloning
GSM
•GSM (Global System for Mobile communication) is a digital mobile telephony system
that is widely used in world.
•TDMA(time division multiplexing )system is used in this service.
• It operates at either the 900 MHz or 1800 MHz frequency band.
•It also provides GPRS, HSCSD, EDGE, UMTS services.
SIM
•SIM or Subscriber Identity Module is small card that contains a mobile network
subscriber's account information
•Available in GSM service only.
•It provides mobile network.
•At GSM cloning cloner mainly cloned the SIM card information.
How a phone cloned
How a phone cloned
Incomin
g Call
Thief Intercepts The ESN
and MIN
Using a PC the thief
reprogram a cellular
phone to carry the
stolen number
And when the re
program occurs the
phone has cloned
with that MIN and
ESN
Cell
site
How a phone cloned
GSM CLONING
Remove the SIM card
from mobile
Insert the SIM into SIM
card cloning device
Connect SIM card
duplicator application
on your PC
Locate IMSI number
Extract Authentication
Key
Remove the SIM card
and Inset a new SIM
Now extract all the data
to SIM
How a phone cloned
GMS Cloner devices
This device used to read the SIM card
How a phone cloned
GSM Cloning
Some screen shot for GSM cloning
The software's used to import and export the data to original SIM to Cloned SIM
Software For Cloning
CDMA Cloning
1.Patagonia
GSM Cloning
1.SIM Card Reader tool
2.SIM card editor
3.SIM Cloning tool
4.Mobilledit
also many more software are available for GSM cloning …
Symptoms of phone cloning
Unfortunately, there is no way the subscriber can detect cloning. Events like call dropping or
anomalies in monthly bills can act as tickers.  But some points mentioned below can help.
•Frequent wrong number phone calls to your phone, or hang-ups.
•Difficulty in placing outgoing calls.
•Difficulty in retrieving voice mail messages.
•Incoming calls constantly receiving busy signals or wrong numbers.
•Unusual calls appearing on phone bills.
Methods to Detect Phone cloning
Methods to Detect Phone cloning
The network sees the same phone in several places at the same time. Reaction include
shutting them all off so that the real customer will contact the operator because he lost
the service he is paying for.
The mobile phone seems to be moving at impossible, or most unlikely speeds.
It can be done by the tracking the locations of call simultaneously.
For example, if a call is first made at some place , and after five minutes, another call is
made at another place and if travel between two places in that time is impossible.
Duplicate Detection
Velocity Trap
Methods to Detect Phone cloning
By counting the monthly tariff of the calls.
To gave a SIM PIN lock security
To make a call by dialing a number followed by dialing SIM PIN Code
If a call is still going after that then the SIM must be cloned
Call Counting
PIN Codes
Impact of Phone cloning
Although the phone cloning is the huge problem in united state and europium countries but
in India which is 2nd
largest country in using mobile telephony, is in primary stage for mobile
cloning crime. Very few Indians are aware about this and have knowledge about that.
The Phone cloning has good impact and also have bad impact.
•The phone cloning has done for security reason and military security purpose
•Detectives also used this kind of technology
•And for SIM losing the nowadays the company also provides a duplicate SIM to subscriber
without loosing his number
GOOD IMPACT
Impact of Phone cloning
•Many criminals use cloned cellular telephones for illegal activities, because their calls are
billed to them, and are therefore much more difficult to trace.
•The bigger chance to subscribers security loss, banking details loss.
•It is quite easy to monitory a person by that way
•Each year, the mobile phone industry loses millions of dollars in revenue because of the
criminal action of person who are able to reconfigure mobile phones so that their calls are
billed to other phones owned by innocent third persons.
BAD IMPACT
Prevent Cloning
1. Traffic analysis though artificial intelligence software
2. User verification using Personal Identification Number(PIN) codes is one method for
customer protection against cellular phone fraud
3. Backlisting the stolen phone that will helping it to sorting the IMEI number
4. Do not receive the calls from suspicious number nowadays the fraud calls can track the
unique id of phone by receiving it
5. Do not give phones IMEI number and SIM cards specific numbers to any persons
• It may be a great technology for detectives
• The SIM owner can clone the SIM for multipurpose using by informing the company.(i.e
for working place and one for home)
• It is a valuable technology for militaries
• the technology helps the company and also the subscriber they had less chance to
loose their number.
Future Aspects
Conclusion
• Mobile Cloning is in initial stage in India
• preventive steps should be taken by the network provider and Also by the Government by
the enactment of legislation to prosecute crimes related to cellular phones.
• However It is essential that intended mobile crime legislation be comprehensive enough to
incorporate cellular phone fraud, in particular “cloning fraud” as a specific crime.
• Existing cellular system have a number of potential weakness that were considered.
• It is crucial that business and staff take mobile phone security seriously.
• However we have to throw out the negative part of this technology and try to use it
worthily, as science and technology is not for a destruction rather it is for a blessing for
human beings.
References
• We took help from our friend and also we got great support from our mentor
And also internet helped us like
• google.co.in [2-21]
• youtube.com [2-21]
• wikipedia.org [2-21]
• slideshare.net [2-8,12-21]
• seminarsonly.com [5-7]
• security.stackexchange.com [14-19]
• ehow.com [8,9]
• movzio.com [19]
• ids.nic.in [5]
• And many more……..
Thank you

More Related Content

What's hot

Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
Shishupal Nagar
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
Sameer Gupta
 
Amps
AmpsAmps
clone sim card
clone sim cardclone sim card
clone sim card
ssuser1eca7d
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
3G4G
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
Jagjit Khalsa
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
Muhammad Uzair Rasheed
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
Aditya Pandey
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Sniffer for the mobile phones
Sniffer for the mobile phonesSniffer for the mobile phones
Sniffer for the mobile phones
Upender Upr
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFC
Touroxy
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
Dheeraj Raja
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
Ronson Calvin Fernandes
 
eSIM
eSIMeSIM
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Abhishek Abhi
 

What's hot (20)

Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Amps
AmpsAmps
Amps
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Sniffer for the mobile phones
Sniffer for the mobile phonesSniffer for the mobile phones
Sniffer for the mobile phones
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFC
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
eSIM
eSIMeSIM
eSIM
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 

Viewers also liked

Wi DI
Wi DIWi DI
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
sorabh2312
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Shubham Sachan
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
Anjali Agarwal
 
3D Printing: Endless Opportunities
3D Printing: Endless Opportunities3D Printing: Endless Opportunities
3D Printing: Endless Opportunities
Institute of Customer Experience
 
3d printing technology
3d printing technology3d printing technology
3d printing technology
Prachi Agarwal
 

Viewers also liked (9)

Wi DI
Wi DIWi DI
Wi DI
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
 
3D Printing: Endless Opportunities
3D Printing: Endless Opportunities3D Printing: Endless Opportunities
3D Printing: Endless Opportunities
 
3d printing technology
3d printing technology3d printing technology
3d printing technology
 

Similar to Phone cloning

Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
Shivam Jaiswal
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
hcls
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Sai Srinivas Mittapalli
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
Sai Srinivas Mittapalli
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
MurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
RohithKumarKishtam
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
Clonning
ClonningClonning
Clonning
okolodennis
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
VIKASH MEWAL
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
krishan8018
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
Jacqueline Fick
 

Similar to Phone cloning (20)

Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
 

Recently uploaded

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 

Recently uploaded (20)

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 

Phone cloning

  • 1. A Seminar Presentation on Phone Cloning Represented by Monodip Roy Chowdhury Prasun Mandal Sanghita Mukherjee Souvik kumar Guin Subhrajit Paul Sumit ghosh Mentor Prof. Somnath Patra 3rd Year 6th Semester
  • 2. • What is cloning • Important terms • Phone cloning CDMA GSM • Software for cloning • Symptoms of phone cloning • Method to detect phone cloning • Impact of phone cloning • Prevent cloning • Future advantages • Conclusion • References Contents
  • 3. Introduction What is cloning? •Cloning is a creation of an organism that is an exact genetic copy of another. •By other means every single DNA bit is same of two copy. What is Phone cloning? •Phone cloning is coping the specific identification one phone to another. •Coping can be done both CDMA and GSM services mobile phone. •The billing of calls will be paid by mother device subscriber. •What can mother device do the copy device can also do the same. •The purpose of doing this is to make fraudulent calls and for security reason it is done.
  • 4. Some Important terms about Phone cloning
  • 5. Some Important terms about Phone cloning
  • 6. Some Important terms about Phone cloning GSM •GSM (Global System for Mobile communication) is a digital mobile telephony system that is widely used in world. •TDMA(time division multiplexing )system is used in this service. • It operates at either the 900 MHz or 1800 MHz frequency band. •It also provides GPRS, HSCSD, EDGE, UMTS services. SIM •SIM or Subscriber Identity Module is small card that contains a mobile network subscriber's account information •Available in GSM service only. •It provides mobile network. •At GSM cloning cloner mainly cloned the SIM card information.
  • 7. How a phone cloned
  • 8. How a phone cloned Incomin g Call Thief Intercepts The ESN and MIN Using a PC the thief reprogram a cellular phone to carry the stolen number And when the re program occurs the phone has cloned with that MIN and ESN Cell site
  • 9. How a phone cloned GSM CLONING Remove the SIM card from mobile Insert the SIM into SIM card cloning device Connect SIM card duplicator application on your PC Locate IMSI number Extract Authentication Key Remove the SIM card and Inset a new SIM Now extract all the data to SIM
  • 10. How a phone cloned GMS Cloner devices This device used to read the SIM card
  • 11. How a phone cloned GSM Cloning Some screen shot for GSM cloning The software's used to import and export the data to original SIM to Cloned SIM
  • 12. Software For Cloning CDMA Cloning 1.Patagonia GSM Cloning 1.SIM Card Reader tool 2.SIM card editor 3.SIM Cloning tool 4.Mobilledit also many more software are available for GSM cloning …
  • 13. Symptoms of phone cloning Unfortunately, there is no way the subscriber can detect cloning. Events like call dropping or anomalies in monthly bills can act as tickers.  But some points mentioned below can help. •Frequent wrong number phone calls to your phone, or hang-ups. •Difficulty in placing outgoing calls. •Difficulty in retrieving voice mail messages. •Incoming calls constantly receiving busy signals or wrong numbers. •Unusual calls appearing on phone bills.
  • 14. Methods to Detect Phone cloning
  • 15. Methods to Detect Phone cloning The network sees the same phone in several places at the same time. Reaction include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. The mobile phone seems to be moving at impossible, or most unlikely speeds. It can be done by the tracking the locations of call simultaneously. For example, if a call is first made at some place , and after five minutes, another call is made at another place and if travel between two places in that time is impossible. Duplicate Detection Velocity Trap
  • 16. Methods to Detect Phone cloning By counting the monthly tariff of the calls. To gave a SIM PIN lock security To make a call by dialing a number followed by dialing SIM PIN Code If a call is still going after that then the SIM must be cloned Call Counting PIN Codes
  • 17. Impact of Phone cloning Although the phone cloning is the huge problem in united state and europium countries but in India which is 2nd largest country in using mobile telephony, is in primary stage for mobile cloning crime. Very few Indians are aware about this and have knowledge about that. The Phone cloning has good impact and also have bad impact. •The phone cloning has done for security reason and military security purpose •Detectives also used this kind of technology •And for SIM losing the nowadays the company also provides a duplicate SIM to subscriber without loosing his number GOOD IMPACT
  • 18. Impact of Phone cloning •Many criminals use cloned cellular telephones for illegal activities, because their calls are billed to them, and are therefore much more difficult to trace. •The bigger chance to subscribers security loss, banking details loss. •It is quite easy to monitory a person by that way •Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal action of person who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. BAD IMPACT
  • 19. Prevent Cloning 1. Traffic analysis though artificial intelligence software 2. User verification using Personal Identification Number(PIN) codes is one method for customer protection against cellular phone fraud 3. Backlisting the stolen phone that will helping it to sorting the IMEI number 4. Do not receive the calls from suspicious number nowadays the fraud calls can track the unique id of phone by receiving it 5. Do not give phones IMEI number and SIM cards specific numbers to any persons
  • 20. • It may be a great technology for detectives • The SIM owner can clone the SIM for multipurpose using by informing the company.(i.e for working place and one for home) • It is a valuable technology for militaries • the technology helps the company and also the subscriber they had less chance to loose their number. Future Aspects
  • 21. Conclusion • Mobile Cloning is in initial stage in India • preventive steps should be taken by the network provider and Also by the Government by the enactment of legislation to prosecute crimes related to cellular phones. • However It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular “cloning fraud” as a specific crime. • Existing cellular system have a number of potential weakness that were considered. • It is crucial that business and staff take mobile phone security seriously. • However we have to throw out the negative part of this technology and try to use it worthily, as science and technology is not for a destruction rather it is for a blessing for human beings.
  • 22. References • We took help from our friend and also we got great support from our mentor And also internet helped us like • google.co.in [2-21] • youtube.com [2-21] • wikipedia.org [2-21] • slideshare.net [2-8,12-21] • seminarsonly.com [5-7] • security.stackexchange.com [14-19] • ehow.com [8,9] • movzio.com [19] • ids.nic.in [5] • And many more……..