things we are going to present……
HOW CELL PHONE WORKS?
HISTORY OF MOBILE CLONING
CLONING CDMA CELL PHONE
CLONING GSM CELL PHONE
PROCESS OF CLONING
IMPACT OF CLONING
DETECTION OF CLONED PHONES ON NETWORK
Mobile phone cloning is
basically a technique where in the
transfer or copying the identity or
security data of one cellular phone
to another is done.
o The other cell phone becomes the
exact replica of the original cell
phone like a clone. As a result,
while calls can be made from both
phones and only the original
phone is billed.
HOW CELLPHONE WORKS?
Cell phones send radio frequency transmissions through the air on two
distinct channels, one for voice communications and the other for control
signals. When a cellular phone makes a call, it normally transmits its
Electronic Security Number (ESN), Mobile Identification Number (MIN),
its Station Class Mark (SCM) and the number called in a short burst of
data. This burst is the short buzz you hear after you press the SEND button
and before the tower catches the data
In 1990’s. Cell phone cloning started
with Motorola “bag” phones and
reached its peak in the mid 90’s with
a commonly available modification
for the Motorola “brick” phones,
such as the classic, the Ultra classic.
Both GSM and CDMA handsets are
phones code division multiple
It stands for
In CDMA system, your encoded voice
is digitalized and divided into packets.
These packets are tagged with “codes”.
the packets then mix with all of the
other packets of traffic in the local
CDMA networks as they are routed
towards their destination. The receiving
system only accepts the packets with
the codes destined for it.
GSM CELL PHONE
Global system for
communication, A digital
cellular phone technology
based on TDMA
GSM phones use a subscriber
identify module (SIM) card that
contains user account
Any GSM phone becomes
immediately programmed after
plugging in the SIM card
IMEI stands for International Mobile equipment
Identifier,this is a 10 digit universally unique number of
our GSM handset, I use the term universally unique
because there cannot be 2 mobile phones having the
same IMEI no.this is very valuable number and used in
tracking mobile phones
SIM,which stands for Subscriber Identification Module.
basically the SIM provides storage of subscriber
Patagonia is software available in the market which is used to
clone CDMA phone.
this software a cloner can take over the control of a CDMA
phone i.e. cloning of phone. There are other software’s available
in the market to clone GSM phone. This software’s are easily
available in the market.
A SIM can be cloned again and again and they can be used at
different places. Messages and phone calls sent by the cloned
phones can be tracked. However, if the accused manages to
also clone the IMEI number of the handset for which software’s
are available, there is no way he can be traced.
Process of cloning
Cloning involves modifying or replacing the EPROM in the
phone with a new chip which would allow you to configure an
ESN (Electronic Serial Number) via software. MIN (Mobile
Identification Number) should also have to change. When the
ESN/MIN pair had changed successfully then an effective
clone of the original phone has created. Cloning required
access to ESN and MIN pairs. ESN/MIN pairs were discovered in
1. Sniffing the cellular.
2. Trashing cellular companies or cellular resellers.
3. Hacking cellular companies or cellular resellers
Fingerprinting is originally a
military technology.so the network
software stores and compares
fingerprints for all the phones
that it sees. this way, it will spot
HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?
1. Frequent wrong number phone calls to your phone or
2. Difficulty in placing outgoing calls.
3. Difficulty in retrieving voice mail messages.
4. Incoming calls constantly receiving busy signals or
wrong numbers. Unusual call appearing on your phone
HOW TO PREVENT
PHONE CLONING ??
There are some prevention methods by which we can prevent our
cell phone from cloning:
1. Mobile should never be trusted for storing confidential
information. So any secret information should not be kept in
2. Always set a pin that is required before the phone can be
used. This will help in
preventing mobile from cloning to a great extent.
4. Always keep in touch with monthly mobile bills. Any
unexpected increase in bill can cause threat to mobile
Preventive steps should be taken by the network
provider and the government the enactment of
legislation to prosecute crime related to cellular
phones is not viewed as a priority
Existing cellular systems have a number of
potential weakness were considered.it is a crucial
business and staff take mobile phone security