SlideShare una empresa de Scribd logo
1 de 30
TOPIC: MOBILE PHONE CLONING

Presented By:
Ritik Nagar
ECE 3rd Year
* WHAT IS CELL PHONE CLONING?
* GSM
* CDMA
* IMEI, ESN, MIN
* HOW IS CELL PHONE CLONING DONE?
* ARE OUR CELL PHONES SECURED?
* HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
* DETECTION OF A CLONED PHONE IN A NETWORK
* IMPACTS OF CELL PHONE CLONING
* HOW TO PREVENT CELL CLONING?
* CONCLUSION
Cell phone cloning is copying the identity
of one mobile telephone to another mobile
telephone.
It is the process of taking the programmed
information that is stored in a legitimate
mobile phone and illegally programming the
identical information into another mobile
phone.
The result is that the "cloned" phone can
make and receive calls and the charges for
those calls are billed to the legitimate
subscriber. The service provider network
does not have a way to differentiate
between the legitimate phone and the
"cloned" phone.
Global System for Mobile Communications.
A digital cellular phone technology based
on TDMA GSM phones use a Subscriber
Identity Module (SIM) card that contains
user account information. Any GSM phone
becomes immediately programmed after
plugging in the SIM card, thus allowing
GSM phones to be easily rented or
borrowed. Operators who provide GSM
service are Airtel, Idea etc.
Code Division Multiple Access. A method
for transmitting simultaneous signals
over a shared portion of the spectrum.
There is no Subscriber Identity Module
(SIM) card unlike in GSM. Operators who
provides CDMA service in India are
Reliance and Tata Indicom.
IMEI (International Mobile Station
Equipment Identity)
The IMEI number is used by a GSM network to
identify valid
devices and therefore can
be used for stopping a stolen phone from
accessing that network.
ESN (Electronic Serial Number)
ESN number is used to uniquely identify a mobile
phone operating on CDMA network.

MIN (Mobile Identification Number)
MIN is a number that is derived from the 10digit directory telephone number assigned to a
mobile station.
Cloning involves modifying or replacing
the EPROM in the phone with a new chip
which would allow you to configure an ESN
(Electronic serial number) via software.
You would also have to change the MIN
(Mobile Identification Number). Cloning
require access to ESN and MIN pairs.
ESN/MIN pairs can be discovered in
several ways:
*Sniffing
*Trashing

the cellular
cellular companies or cellular

resellers

*Hacking

cellular companies or cellular
resellers
Cellular

thieves can capture ESN/MINs using
devices such as cell phone ESN reader or
digital data interpreters (DDI). DDIs are
devices specially manufactured to intercept
ESN/MINs.

Numbers

can be recorded by hand, one-byone, or stored in the box and later downloaded
to a computer.

After

the ESN/MIN pair is captured, the cloner
reprograms or alters the microchip of any
wireless phone to create a clone of the
wireless phone from which the ESN/MIN pair was
Patagonia is a software available in the
market which is used to clone CDMA phones.
Using this software a cloner can modify the
ESN/MIN of any CDMA phone.
Once we have the ESN/MIN of the target cell
phone, we can clone them to another phone
using this software.
*

After we have modified the EEPROM of our
device, it can be used as a cloned device.

*

Now we can use our phone for making
fraudulent telephone calls but the bills for
the calls will go to the legitimate
subscriber.
*We

have seen that CDMA phones can easily be
cloned but when it comes to GSM ,the task is
tougher but not impossible for expert hackers.

*With

the shift to GSM digital, the phone
companies assure us that the bad old days are
over and mobile phones are secure and privacy
friendly. But this not entirely true so we
still need to be careful about this matter.
*Frequent

wrong number phone calls to your
phone, or hang-ups.

*Difficulty in placing outgoing calls.
*Difficulty in retrieving voice mail messages.
*Incoming calls constantly receiving busy
signals or wrong numbers. Unusual calls
appearing on your phone bills
*Duplicate Detection
*Velocity Trap
*Usage Profiling
*Call Counting
*The

network sees the same phone in several
places at the same time.

*Reactions

include shutting them all off so
that the real customer will contact the
operator because he lost the service he is
paying for.

*After

verification the service will be
provided only to the real subscriber.
*

It notices when the mobile phone seems to be
moving at impossible, or most unlikely speeds.

*For

example, if a call is first made in Delhi,
and five minutes later, another call is made
from the same number but this time in Mumbai
then it is obvious that there must be two
phones with the same identity on the network.

*So

service will be terminated until the real
user is verified.
*Profiles

of customers' phone usage are kept,
and when discrepancies are noticed, the
customer is contacted.

*For

example, if a customer normally makes only
local network calls but is suddenly placing
calls to foreign countries for hours of
airtime, it indicates a possible clone
*Both

the phone and the network keep track of
calls made with the phone, and should they
differ more than the usually allowed one call,
service is denied.
*Each

year, the mobile phone industry loses
millions of dollars in revenue because of the
cloned phones as their calls are billed to
other phones owned by innocent third persons.

*Many

criminals like drug dealers use cloned
cellular telephones for illegal activities.

*Terrorists

have been known to use cloned
phones to escape law enforcement efforts aimed
at tracking their whereabouts.
*User

verification using PIN(Personal
Identification Number)

*Blacklisting

*Traffic

of stolen phones

analysis

*Electrically

checking the ESN/MIN
To avoid such abuse to telecommunication system
it is absolutely necessary to check out the
weakness and vulnerability of existing telecom
systems.

If it is planned to invest in new telecom
equipment, a security plan should be made and
the system should be tested before being
implemented.
*http://www.hackinthebox.org
*http://realhackerspoint.blogspot.in
*http://www.google.com

*http://www.wikipedia.com
Mobile Phone Cloning By: Ritik Nagar

Más contenido relacionado

La actualidad más candente

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammerakash roy
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming systemPatel Ibrahim
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesAbhishek Abhi
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESChaitanya Ram
 

La actualidad más candente (20)

Bluejacking
BluejackingBluejacking
Bluejacking
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming system
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
eSIM
eSIMeSIM
eSIM
 

Destacado

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 

Destacado (20)

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
cdma by svr
cdma  by svrcdma  by svr
cdma by svr
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cdma 101
Cdma 101Cdma 101
Cdma 101
 
Cdma by svr
Cdma by svrCdma by svr
Cdma by svr
 

Similar a Mobile Phone Cloning By: Ritik Nagar

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phoneExpress News
 

Similar a Mobile Phone Cloning By: Ritik Nagar (19)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Fdp
FdpFdp
Fdp
 
Test
TestTest
Test
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
 

Último

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Último (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Mobile Phone Cloning By: Ritik Nagar

  • 1. TOPIC: MOBILE PHONE CLONING Presented By: Ritik Nagar ECE 3rd Year
  • 2. * WHAT IS CELL PHONE CLONING? * GSM * CDMA * IMEI, ESN, MIN * HOW IS CELL PHONE CLONING DONE? * ARE OUR CELL PHONES SECURED? * HOW TO KNOW THAT THE CELL HAS BEEN CLONED? * DETECTION OF A CLONED PHONE IN A NETWORK * IMPACTS OF CELL PHONE CLONING * HOW TO PREVENT CELL CLONING? * CONCLUSION
  • 3. Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. It is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  • 4. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.
  • 5.
  • 6. Global System for Mobile Communications. A digital cellular phone technology based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed. Operators who provide GSM service are Airtel, Idea etc.
  • 7. Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in GSM. Operators who provides CDMA service in India are Reliance and Tata Indicom.
  • 8. IMEI (International Mobile Station Equipment Identity) The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network.
  • 9. ESN (Electronic Serial Number) ESN number is used to uniquely identify a mobile phone operating on CDMA network. MIN (Mobile Identification Number) MIN is a number that is derived from the 10digit directory telephone number assigned to a mobile station.
  • 10.
  • 11. Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). Cloning require access to ESN and MIN pairs. ESN/MIN pairs can be discovered in several ways:
  • 12. *Sniffing *Trashing the cellular cellular companies or cellular resellers *Hacking cellular companies or cellular resellers
  • 13. Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI). DDIs are devices specially manufactured to intercept ESN/MINs. Numbers can be recorded by hand, one-byone, or stored in the box and later downloaded to a computer. After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was
  • 14.
  • 15. Patagonia is a software available in the market which is used to clone CDMA phones. Using this software a cloner can modify the ESN/MIN of any CDMA phone. Once we have the ESN/MIN of the target cell phone, we can clone them to another phone using this software.
  • 16.
  • 17. * After we have modified the EEPROM of our device, it can be used as a cloned device. * Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.
  • 18. *We have seen that CDMA phones can easily be cloned but when it comes to GSM ,the task is tougher but not impossible for expert hackers. *With the shift to GSM digital, the phone companies assure us that the bad old days are over and mobile phones are secure and privacy friendly. But this not entirely true so we still need to be careful about this matter.
  • 19. *Frequent wrong number phone calls to your phone, or hang-ups. *Difficulty in placing outgoing calls. *Difficulty in retrieving voice mail messages. *Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  • 20. *Duplicate Detection *Velocity Trap *Usage Profiling *Call Counting
  • 21. *The network sees the same phone in several places at the same time. *Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. *After verification the service will be provided only to the real subscriber.
  • 22.
  • 23. * It notices when the mobile phone seems to be moving at impossible, or most unlikely speeds. *For example, if a call is first made in Delhi, and five minutes later, another call is made from the same number but this time in Mumbai then it is obvious that there must be two phones with the same identity on the network. *So service will be terminated until the real user is verified.
  • 24. *Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. *For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone
  • 25. *Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
  • 26. *Each year, the mobile phone industry loses millions of dollars in revenue because of the cloned phones as their calls are billed to other phones owned by innocent third persons. *Many criminals like drug dealers use cloned cellular telephones for illegal activities. *Terrorists have been known to use cloned phones to escape law enforcement efforts aimed at tracking their whereabouts.
  • 27. *User verification using PIN(Personal Identification Number) *Blacklisting *Traffic of stolen phones analysis *Electrically checking the ESN/MIN
  • 28. To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems. If it is planned to invest in new telecom equipment, a security plan should be made and the system should be tested before being implemented.