MOBILE PHONE CLONING-Steginjoy2013@gmail.com

11,792 views

Published on

mobile phone cloning

Published in: Technology
0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
11,792
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
1,099
Comments
0
Likes
6
Embeds 0
No embeds

No notes for slide

MOBILE PHONE CLONING-Steginjoy2013@gmail.com

  1. 1. MOBILE PHONE CLONING BY: SIMRANDEEP SINGH-1315970 STEGIN JOY-1315972
  2. 2. things we are going to present……  HOW CELL PHONE WORKS?  HISTORY OF MOBILE CLONING  CLONING CDMA CELL PHONE  CLONING GSM CELL PHONE  PATAGONIA  PROCESS OF CLONING  IMPACT OF CLONING  DETECTION OF CLONED PHONES ON NETWORK  PREVENTION  FUTURE THREATS  CONCLUSION
  3. 3. INTRODUCTION Mobile phone cloning is basically a technique where in the transfer or copying the identity or security data of one cellular phone to another is done. o The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed. o
  4. 4. HOW CELLPHONE WORKS? Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data
  5. 5. BACK TO HISTORY In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are
  6. 6. Cloning CDMA phones code division multiple  It stands for access  In CDMA system, your encoded voice is digitalized and divided into packets.  These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
  7. 7. CLONING GSM CELL PHONE Global system for communication, A digital cellular phone technology based on TDMA GSM phones use a subscriber identify module (SIM) card that contains user account information Any GSM phone becomes immediately programmed after plugging in the SIM card
  8. 8. IMPORTANT TERMS  IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones  SIM,which stands for Subscriber Identification Module. basically the SIM provides storage of subscriber related information
  9. 9. PATAGONIA  Patagonia is software available in the market which is used to clone CDMA phone.  this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.  A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.
  10. 10. Process of cloning  Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:  1. Sniffing the cellular.  2. Trashing cellular companies or cellular resellers.  3. Hacking cellular companies or cellular resellers
  11. 11. IMPACTS OF CLONING
  12. 12. DETECTION OF CLONED PHONES ON NETWORK  1. Duplicate Detection  2. Velocity Trap  3. RF (Radio Frequency):  4. Usage Profiling:  5. Call Counting:  6. PIN Codes
  13. 13.  RF(RADIO FREQUENCY) Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot
  14. 14. HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?  1. Frequent wrong number phone calls to your phone or hang ups.  2. Difficulty in placing outgoing calls.  3. Difficulty in retrieving voice mail messages.  4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.
  15. 15. HOW TO PREVENT PHONE CLONING ?? There are some prevention methods by which we can prevent our cell phone from cloning:  1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.  2. Always set a pin that is required before the phone can be used. This will help in  preventing mobile from cloning to a great extent.  4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.
  16. 16. CONCLUSION  Preventive steps should be taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority  Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously
  17. 17. THANK YOU

×