SlideShare una empresa de Scribd logo
1 de 33
CELL PHONE CLONING

JASHIR C.K
S7 CSE
Rollno:28
INDEX
• INTRODUCTION
• HISTORY
• GSM
• CDMA
• IMPORTANT TERMS
• HOW IS A PHONE CLONED?
• METHODS TO DETECT CLONED PHONES
• IMPACT OF CLONING
• HOW TO PREVENT CLONING?
• CONCLUSION
INTRODUCTION
CELL PHONE CLONING:
– copying the identity of one to another
– For making fraudulent calls

– security data transferred
– Other cell phone become exact replica of original
INTRODUCTION
– Calls can be made from both
– Original is billed
– One get huge bill, possibility of cloning
– No way the subscriber can detect
– Taking programmed information
– Service provider has no way to differentiate
WHEN DID CELL CLONING
START?
• In telecom market since 1990’s-mostly CDMA
• Started with Motorola “bag” phones.
• Motorola brick●

classic, model 800,ultra classic
GSM
– Global System for Mobile Communications.
– A digital cellular phone technology based on
TDMA
– Europe, other part of world
– Use SIM contain user account information
GSM
– Immediately programmed after plugging in the SIM
card
– Numerous handsets and service providers available in
the market
– They comes with cheaper call rate, free message
facility
– Airtel,vodafone
CDMA
–
Code Division Multiple Access.
–
Newer technology used in USA,Canada,Australia
–
Method for transmitting simultaneous signals over a shared portion of the
spectrum.
– SIM card
No
–
Call cost cheaper
–
Call quality better
–
Reliance,tata indicom
GSM vs. CDMA
• Both handsets are prone to cloning
• it is easier to clone a CDMA
handset over a GSM one
• Though cloning a GSM cell phone
is not impossible
IMPORTANT TERMS
• ESN, which stands for
Electronic Serial Number.
– It is same as the IMEI but is used in CDMA handsets
– loaded when the phone number is manufactured
– Can’t be change by user or subscriber
– If this is known, easily cloned
IMPORTANT TERMS
• MIN stands for Mobile Identification Number,
– which is the same as the SIM of GSM, can’t be replaced
– Min chip is embedded in CDMA handset
HOW IS A PHONE CLONED?
• ESN/MIN pair discovered via

●

Sniffing the cellular

●

Trashing cellular companies

●

Hacking cellular companies
HOW IS A PHONE CLONED?
• Each phone has MIN/ESN for identify the phone
• While placing a call, phone transmit both MSN/ESN
to n/w
HOW IS A PHONE CLONED?
• Cellular thieves capture MSN/ESN

●

cell phone ESN reader

●

digital data interpreters (DDI)
– Specially manufactured to intercept ESN/MIN pair
HOW IS A PHONE CLONED?
• MSN/ESN can be cloned
●

electronic scanning device

• Cloned one is ready
METHODS TO DETECT CLONED PHONES ON NETWORK

• Duplicate detection
• Velocity trap
• Radio Frequency
• Usage profiling
• Call counting
• PIN codes
METHODS TO DETECT CLONED
PHONES ON NETWORK
• Duplicate detection
– Same phone at several place at same time
– Shutting down all of them
– Real customer will contact
– Cloned user switch to another clone
Duplicate detection
METHODS TO DETECT CLONED
PHONES
• Velocity trap
– Mobile moving at impossible speeds
– Example(Idk (5min)Trv)
– Must be two phone with same identity on n/w
METHODS TO DETECT CLONED
PHONES
• RF (Radio Frequency)
– Even Nominally identical radio equipment has
distinguishing fingerprint,
– n/w s/w stores and compares fingerprints of all phones that
it sees
– This way, it will spot the clones with the same identity but
different fingerprints.
METHODS TO DETECT CLONED
PHONES
• Usage profiling
– Keep customer phone usage profile
– Discrepancies noticed ,customer is contacted
– Example(local call -) foreign )
– Indicates a possible clone
METHODS TO DETECT CLONED
PHONES
• Call counting
– Phone and n/w keep track of call made
– If they differ from usually allowed one ,service
denied
METHODS TO DETECT CLONED
PHONES
• PIN codes
– to placing a call, the caller unlocks the phone by
PIN
– After the call completed, the user locks
– Operators may share PIN information to enable
safer roaming
IMPACT OF CLONING
• Loss of revenue
• CTIA estimates that financial losses
– b/w $600million to $800 million in US
IMPACT OF CLONING
• Illegal activities
– This phenomenon is especially prevalent in drug crimes
HOW TO PREVENT CLONING?
• Uniquely identifies a mobile unit within a wireless
carrier's network.
• MINs and ESNs can be checked electronically to help
prevent fraud.
• Service providers have adopted certain measures to
prevent fraud, includes
– Encryption,blocking,blacklisting,user verification, traffic analysis
HOW TO PREVENT CLONING?
• User verification using PIN is one of the customer
verification method
• Check that all mobile devices are covered by a
corporate security policy
CONCLUSION
• Presently the cellular phone industry relies on
common law
– fraud and theft and in-house counter measures
to address cellular phone fraud.

• Mobile Cloning Is in initial stages in India
– Preventive step taken by govt & n/w provider
CONCLUSION
• Existing cellular systems have a number of potential
weaknesses
• It is crucial that businesses and staff take mobile
phone security seriously.
REFERENCE
• IEEE journal for mobile
communication
• www.google.com
• wikipedia.org
• www.1000project.org
• www.seminaronly.com
QUESTIONS???
THANK YOU

Más contenido relacionado

La actualidad más candente

Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile Computing Architecture
Mobile Computing ArchitectureMobile Computing Architecture
Mobile Computing ArchitectureTrinity Dwarka
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and EncryptionUrvashi Kataria
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communicationssivakumar m
 
Cellular technologies and security
Cellular technologies and securityCellular technologies and security
Cellular technologies and securityundergraduate
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation8neutron8
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSeminar Links
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Wireless technology 1g 2g 3g 4g
Wireless technology 1g 2g 3g 4gWireless technology 1g 2g 3g 4g
Wireless technology 1g 2g 3g 4gKarthik Patil
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Mobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionMobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionAmanShaikh45
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM3G4G
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer ScienceTransweb Global Inc
 

La actualidad más candente (20)

Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Mobile Computing Architecture
Mobile Computing ArchitectureMobile Computing Architecture
Mobile Computing Architecture
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and Encryption
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Iptelephony ppt
Iptelephony pptIptelephony ppt
Iptelephony ppt
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communications
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Cellular technologies and security
Cellular technologies and securityCellular technologies and security
Cellular technologies and security
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost Mobile
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Wireless technology 1g 2g 3g 4g
Wireless technology 1g 2g 3g 4gWireless technology 1g 2g 3g 4g
Wireless technology 1g 2g 3g 4g
 
Ip telephony ppt
Ip telephony pptIp telephony ppt
Ip telephony ppt
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Mobile phone: Evolution to Revolution
Mobile phone: Evolution to RevolutionMobile phone: Evolution to Revolution
Mobile phone: Evolution to Revolution
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer Science
 

Destacado

What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?Sameer Mathur
 
Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...sshihabm
 
Ch11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept QuestionsCh11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept QuestionsSherrylou Marzo
 
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey Catherine Lirio
 
10 questions chapter11
10 questions chapter1110 questions chapter11
10 questions chapter11noelenthns
 
Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?Channel IQ
 
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0Greg Hochmuth
 
Competitive strategies
Competitive strategiesCompetitive strategies
Competitive strategiesGeetika Madhur
 
competitive strategies of markets followers
competitive strategies of markets followerscompetitive strategies of markets followers
competitive strategies of markets followerskdore
 
Market follower strategy ppt
Market follower strategy pptMarket follower strategy ppt
Market follower strategy pptsreelakshmi nair
 
Competitive Strategy
Competitive StrategyCompetitive Strategy
Competitive StrategySakshi Mehra
 
SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?Lasersec Technologies
 

Destacado (14)

What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?What major psychological processes influence consumer responses?
What major psychological processes influence consumer responses?
 
Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...Business research Synopsis: Impact of brand awareness on consumers attitude t...
Business research Synopsis: Impact of brand awareness on consumers attitude t...
 
Ch11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept QuestionsCh11 Dealing with Competition Concept Questions
Ch11 Dealing with Competition Concept Questions
 
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
June 18 2017 - Sunday Message - IMITATOR... by: Ptr. Rey
 
10 questions chapter11
10 questions chapter1110 questions chapter11
10 questions chapter11
 
Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?Counterfeit Sales: What are You Doing About It?
Counterfeit Sales: What are You Doing About It?
 
Imitators
ImitatorsImitators
Imitators
 
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0Copy vs. Create - Cloning, Learning and Competing in Web 2.0
Copy vs. Create - Cloning, Learning and Competing in Web 2.0
 
Brand Imitation
Brand ImitationBrand Imitation
Brand Imitation
 
Competitive strategies
Competitive strategiesCompetitive strategies
Competitive strategies
 
competitive strategies of markets followers
competitive strategies of markets followerscompetitive strategies of markets followers
competitive strategies of markets followers
 
Market follower strategy ppt
Market follower strategy pptMarket follower strategy ppt
Market follower strategy ppt
 
Competitive Strategy
Competitive StrategyCompetitive Strategy
Competitive Strategy
 
SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?SICK & TIRED OF COUNTERFEITED APPARELS?
SICK & TIRED OF COUNTERFEITED APPARELS?
 

Similar a Cell Phone Cloning Detection & Prevention

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraudXINTEC
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 
Project gsm
Project gsmProject gsm
Project gsmKIIT
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 

Similar a Cell Phone Cloning Detection & Prevention (20)

Fdp
FdpFdp
Fdp
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Project gsm
Project gsmProject gsm
Project gsm
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Cell Phone Cloning Detection & Prevention

  • 1. CELL PHONE CLONING JASHIR C.K S7 CSE Rollno:28
  • 2. INDEX • INTRODUCTION • HISTORY • GSM • CDMA • IMPORTANT TERMS • HOW IS A PHONE CLONED? • METHODS TO DETECT CLONED PHONES • IMPACT OF CLONING • HOW TO PREVENT CLONING? • CONCLUSION
  • 3. INTRODUCTION CELL PHONE CLONING: – copying the identity of one to another – For making fraudulent calls – security data transferred – Other cell phone become exact replica of original
  • 4. INTRODUCTION – Calls can be made from both – Original is billed – One get huge bill, possibility of cloning – No way the subscriber can detect – Taking programmed information – Service provider has no way to differentiate
  • 5. WHEN DID CELL CLONING START? • In telecom market since 1990’s-mostly CDMA • Started with Motorola “bag” phones. • Motorola brick● classic, model 800,ultra classic
  • 6. GSM – Global System for Mobile Communications. – A digital cellular phone technology based on TDMA – Europe, other part of world – Use SIM contain user account information
  • 7. GSM – Immediately programmed after plugging in the SIM card – Numerous handsets and service providers available in the market – They comes with cheaper call rate, free message facility – Airtel,vodafone
  • 8. CDMA – Code Division Multiple Access. – Newer technology used in USA,Canada,Australia – Method for transmitting simultaneous signals over a shared portion of the spectrum. – SIM card No – Call cost cheaper – Call quality better – Reliance,tata indicom
  • 9. GSM vs. CDMA • Both handsets are prone to cloning • it is easier to clone a CDMA handset over a GSM one • Though cloning a GSM cell phone is not impossible
  • 10. IMPORTANT TERMS • ESN, which stands for Electronic Serial Number. – It is same as the IMEI but is used in CDMA handsets – loaded when the phone number is manufactured – Can’t be change by user or subscriber – If this is known, easily cloned
  • 11. IMPORTANT TERMS • MIN stands for Mobile Identification Number, – which is the same as the SIM of GSM, can’t be replaced – Min chip is embedded in CDMA handset
  • 12. HOW IS A PHONE CLONED? • ESN/MIN pair discovered via ● Sniffing the cellular ● Trashing cellular companies ● Hacking cellular companies
  • 13. HOW IS A PHONE CLONED? • Each phone has MIN/ESN for identify the phone • While placing a call, phone transmit both MSN/ESN to n/w
  • 14.
  • 15. HOW IS A PHONE CLONED? • Cellular thieves capture MSN/ESN ● cell phone ESN reader ● digital data interpreters (DDI) – Specially manufactured to intercept ESN/MIN pair
  • 16. HOW IS A PHONE CLONED? • MSN/ESN can be cloned ● electronic scanning device • Cloned one is ready
  • 17. METHODS TO DETECT CLONED PHONES ON NETWORK • Duplicate detection • Velocity trap • Radio Frequency • Usage profiling • Call counting • PIN codes
  • 18. METHODS TO DETECT CLONED PHONES ON NETWORK • Duplicate detection – Same phone at several place at same time – Shutting down all of them – Real customer will contact – Cloned user switch to another clone
  • 20. METHODS TO DETECT CLONED PHONES • Velocity trap – Mobile moving at impossible speeds – Example(Idk (5min)Trv) – Must be two phone with same identity on n/w
  • 21. METHODS TO DETECT CLONED PHONES • RF (Radio Frequency) – Even Nominally identical radio equipment has distinguishing fingerprint, – n/w s/w stores and compares fingerprints of all phones that it sees – This way, it will spot the clones with the same identity but different fingerprints.
  • 22. METHODS TO DETECT CLONED PHONES • Usage profiling – Keep customer phone usage profile – Discrepancies noticed ,customer is contacted – Example(local call -) foreign ) – Indicates a possible clone
  • 23. METHODS TO DETECT CLONED PHONES • Call counting – Phone and n/w keep track of call made – If they differ from usually allowed one ,service denied
  • 24. METHODS TO DETECT CLONED PHONES • PIN codes – to placing a call, the caller unlocks the phone by PIN – After the call completed, the user locks – Operators may share PIN information to enable safer roaming
  • 25. IMPACT OF CLONING • Loss of revenue • CTIA estimates that financial losses – b/w $600million to $800 million in US
  • 26. IMPACT OF CLONING • Illegal activities – This phenomenon is especially prevalent in drug crimes
  • 27. HOW TO PREVENT CLONING? • Uniquely identifies a mobile unit within a wireless carrier's network. • MINs and ESNs can be checked electronically to help prevent fraud. • Service providers have adopted certain measures to prevent fraud, includes – Encryption,blocking,blacklisting,user verification, traffic analysis
  • 28. HOW TO PREVENT CLONING? • User verification using PIN is one of the customer verification method • Check that all mobile devices are covered by a corporate security policy
  • 29. CONCLUSION • Presently the cellular phone industry relies on common law – fraud and theft and in-house counter measures to address cellular phone fraud. • Mobile Cloning Is in initial stages in India – Preventive step taken by govt & n/w provider
  • 30. CONCLUSION • Existing cellular systems have a number of potential weaknesses • It is crucial that businesses and staff take mobile phone security seriously.
  • 31. REFERENCE • IEEE journal for mobile communication • www.google.com • wikipedia.org • www.1000project.org • www.seminaronly.com