Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
CELL PHONE CLONING

JASHIR C.K
S7 CSE
Rollno:28
INDEX
• INTRODUCTION
• HISTORY
• GSM
• CDMA
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• METHODS TO DETECT CLONED PHONES
•...
INTRODUCTION
CELL PHONE CLONING:
– copying the identity of one to another
– For making fraudulent calls

– security data t...
INTRODUCTION
– Calls can be made from both
– Original is billed
– One get huge bill, possibility of cloning
– No way the s...
WHEN DID CELL CLONING
START?
• In telecom market since 1990’s-mostly CDMA
• Started with Motorola “bag” phones.
• Motorola...
GSM
– Global System for Mobile Communications.
– A digital cellular phone technology based on
TDMA
– Europe, other part of...
GSM
– Immediately programmed after plugging in the SIM
card
– Numerous handsets and service providers available in
the mar...
CDMA
–
Code Division Multiple Access.
–
Newer technology used in USA,Canada,Australia
–
Method for transmitting simultaneo...
GSM vs. CDMA
• Both handsets are prone to cloning
• it is easier to clone a CDMA
handset over a GSM one
• Though cloning a...
IMPORTANT TERMS
• ESN, which stands for
Electronic Serial Number.
– It is same as the IMEI but is used in CDMA handsets
– ...
IMPORTANT TERMS
• MIN stands for Mobile Identification Number,
– which is the same as the SIM of GSM, can’t be replaced
– ...
HOW IS A PHONE CLONED?
• ESN/MIN pair discovered via

●

Sniffing the cellular

●

Trashing cellular companies

●

Hacking...
HOW IS A PHONE CLONED?
• Each phone has MIN/ESN for identify the phone
• While placing a call, phone transmit both MSN/ESN...
HOW IS A PHONE CLONED?
• Cellular thieves capture MSN/ESN

●

cell phone ESN reader

●

digital data interpreters (DDI)
– ...
HOW IS A PHONE CLONED?
• MSN/ESN can be cloned
●

electronic scanning device

• Cloned one is ready
METHODS TO DETECT CLONED PHONES ON NETWORK

• Duplicate detection
• Velocity trap
• Radio Frequency
• Usage profiling
• Ca...
METHODS TO DETECT CLONED
PHONES ON NETWORK
• Duplicate detection
– Same phone at several place at same time
– Shutting dow...
Duplicate detection
METHODS TO DETECT CLONED
PHONES
• Velocity trap
– Mobile moving at impossible speeds
– Example(Idk (5min)Trv)
– Must be tw...
METHODS TO DETECT CLONED
PHONES
• RF (Radio Frequency)
– Even Nominally identical radio equipment has
distinguishing finge...
METHODS TO DETECT CLONED
PHONES
• Usage profiling
– Keep customer phone usage profile
– Discrepancies noticed ,customer is...
METHODS TO DETECT CLONED
PHONES
• Call counting
– Phone and n/w keep track of call made
– If they differ from usually allo...
METHODS TO DETECT CLONED
PHONES
• PIN codes
– to placing a call, the caller unlocks the phone by
PIN
– After the call comp...
IMPACT OF CLONING
• Loss of revenue
• CTIA estimates that financial losses
– b/w $600million to $800 million in US
IMPACT OF CLONING
• Illegal activities
– This phenomenon is especially prevalent in drug crimes
HOW TO PREVENT CLONING?
• Uniquely identifies a mobile unit within a wireless
carrier's network.
• MINs and ESNs can be ch...
HOW TO PREVENT CLONING?
• User verification using PIN is one of the customer
verification method
• Check that all mobile d...
CONCLUSION
• Presently the cellular phone industry relies on
common law
– fraud and theft and in-house counter measures
to...
CONCLUSION
• Existing cellular systems have a number of potential
weaknesses
• It is crucial that businesses and staff tak...
REFERENCE
• IEEE journal for mobile
communication
• www.google.com
• wikipedia.org
• www.1000project.org
• www.seminaronly...
QUESTIONS???
THANK YOU
Cell phone cloning
You’ve finished this document.
Download and read it offline.
Upcoming SlideShare
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Next
Upcoming SlideShare
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Next
Download to read offline and view in fullscreen.

Share

Cell phone cloning

Download to read offline

created by Jashir....

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Cell phone cloning

  1. 1. CELL PHONE CLONING JASHIR C.K S7 CSE Rollno:28
  2. 2. INDEX • INTRODUCTION • HISTORY • GSM • CDMA • IMPORTANT TERMS • HOW IS A PHONE CLONED? • METHODS TO DETECT CLONED PHONES • IMPACT OF CLONING • HOW TO PREVENT CLONING? • CONCLUSION
  3. 3. INTRODUCTION CELL PHONE CLONING: – copying the identity of one to another – For making fraudulent calls – security data transferred – Other cell phone become exact replica of original
  4. 4. INTRODUCTION – Calls can be made from both – Original is billed – One get huge bill, possibility of cloning – No way the subscriber can detect – Taking programmed information – Service provider has no way to differentiate
  5. 5. WHEN DID CELL CLONING START? • In telecom market since 1990’s-mostly CDMA • Started with Motorola “bag” phones. • Motorola brick● classic, model 800,ultra classic
  6. 6. GSM – Global System for Mobile Communications. – A digital cellular phone technology based on TDMA – Europe, other part of world – Use SIM contain user account information
  7. 7. GSM – Immediately programmed after plugging in the SIM card – Numerous handsets and service providers available in the market – They comes with cheaper call rate, free message facility – Airtel,vodafone
  8. 8. CDMA – Code Division Multiple Access. – Newer technology used in USA,Canada,Australia – Method for transmitting simultaneous signals over a shared portion of the spectrum. – SIM card No – Call cost cheaper – Call quality better – Reliance,tata indicom
  9. 9. GSM vs. CDMA • Both handsets are prone to cloning • it is easier to clone a CDMA handset over a GSM one • Though cloning a GSM cell phone is not impossible
  10. 10. IMPORTANT TERMS • ESN, which stands for Electronic Serial Number. – It is same as the IMEI but is used in CDMA handsets – loaded when the phone number is manufactured – Can’t be change by user or subscriber – If this is known, easily cloned
  11. 11. IMPORTANT TERMS • MIN stands for Mobile Identification Number, – which is the same as the SIM of GSM, can’t be replaced – Min chip is embedded in CDMA handset
  12. 12. HOW IS A PHONE CLONED? • ESN/MIN pair discovered via ● Sniffing the cellular ● Trashing cellular companies ● Hacking cellular companies
  13. 13. HOW IS A PHONE CLONED? • Each phone has MIN/ESN for identify the phone • While placing a call, phone transmit both MSN/ESN to n/w
  14. 14. HOW IS A PHONE CLONED? • Cellular thieves capture MSN/ESN ● cell phone ESN reader ● digital data interpreters (DDI) – Specially manufactured to intercept ESN/MIN pair
  15. 15. HOW IS A PHONE CLONED? • MSN/ESN can be cloned ● electronic scanning device • Cloned one is ready
  16. 16. METHODS TO DETECT CLONED PHONES ON NETWORK • Duplicate detection • Velocity trap • Radio Frequency • Usage profiling • Call counting • PIN codes
  17. 17. METHODS TO DETECT CLONED PHONES ON NETWORK • Duplicate detection – Same phone at several place at same time – Shutting down all of them – Real customer will contact – Cloned user switch to another clone
  18. 18. Duplicate detection
  19. 19. METHODS TO DETECT CLONED PHONES • Velocity trap – Mobile moving at impossible speeds – Example(Idk (5min)Trv) – Must be two phone with same identity on n/w
  20. 20. METHODS TO DETECT CLONED PHONES • RF (Radio Frequency) – Even Nominally identical radio equipment has distinguishing fingerprint, – n/w s/w stores and compares fingerprints of all phones that it sees – This way, it will spot the clones with the same identity but different fingerprints.
  21. 21. METHODS TO DETECT CLONED PHONES • Usage profiling – Keep customer phone usage profile – Discrepancies noticed ,customer is contacted – Example(local call -) foreign ) – Indicates a possible clone
  22. 22. METHODS TO DETECT CLONED PHONES • Call counting – Phone and n/w keep track of call made – If they differ from usually allowed one ,service denied
  23. 23. METHODS TO DETECT CLONED PHONES • PIN codes – to placing a call, the caller unlocks the phone by PIN – After the call completed, the user locks – Operators may share PIN information to enable safer roaming
  24. 24. IMPACT OF CLONING • Loss of revenue • CTIA estimates that financial losses – b/w $600million to $800 million in US
  25. 25. IMPACT OF CLONING • Illegal activities – This phenomenon is especially prevalent in drug crimes
  26. 26. HOW TO PREVENT CLONING? • Uniquely identifies a mobile unit within a wireless carrier's network. • MINs and ESNs can be checked electronically to help prevent fraud. • Service providers have adopted certain measures to prevent fraud, includes – Encryption,blocking,blacklisting,user verification, traffic analysis
  27. 27. HOW TO PREVENT CLONING? • User verification using PIN is one of the customer verification method • Check that all mobile devices are covered by a corporate security policy
  28. 28. CONCLUSION • Presently the cellular phone industry relies on common law – fraud and theft and in-house counter measures to address cellular phone fraud. • Mobile Cloning Is in initial stages in India – Preventive step taken by govt & n/w provider
  29. 29. CONCLUSION • Existing cellular systems have a number of potential weaknesses • It is crucial that businesses and staff take mobile phone security seriously.
  30. 30. REFERENCE • IEEE journal for mobile communication • www.google.com • wikipedia.org • www.1000project.org • www.seminaronly.com
  31. 31. QUESTIONS???
  32. 32. THANK YOU
  • Sowndaryaraju

    Dec. 22, 2018
  • PragatiNitwal

    Nov. 7, 2017
  • HafnaAzeez

    Dec. 13, 2016
  • MeghChowdhury

    Aug. 16, 2016
  • AnkitGarg165

    Apr. 22, 2016
  • gentianadesipojci

    Nov. 1, 2015
  • revathyrevz

    Aug. 4, 2015
  • hellodivya

    May. 18, 2015
  • gauravgholap90

    Mar. 14, 2015
  • vivektiwari9279

    Feb. 18, 2015
  • riyankashrivastava

    Sep. 25, 2014
  • pritikabatra

    Sep. 2, 2014
  • dhanshreepareek

    Mar. 29, 2014
  • rayerobinson

    Mar. 22, 2014
  • subiasayed

    Feb. 3, 2014
  • arun3564

    Feb. 1, 2014
  • KavyaKavs

    Jan. 23, 2014
  • ZaraKhan26

    Dec. 26, 2013

created by Jashir....

Views

Total views

12,904

On Slideshare

0

From embeds

0

Number of embeds

4

Actions

Downloads

3,442

Shares

0

Comments

0

Likes

18

×