Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
VISVESVARAYA TECHNOLOGICAL UNIVERSITY              JNANA SANGAMA, BELGAUM                           SEMINAR ON            ...
MOBILE CLONING  PRESENTED BY,   KIRAN .K                  1RG09IS002
CONTENTS▪ INTRODUCTION▪ IMEI▪ GSM AND CDMA▪ MOBILE CLONING▪ METHODS▪ CLONING GSM PHONES▪ HOW TO KNOW▪ TO PREVENT CLONING▪ ...
INTRODUCTION▪ Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.▪ Usually thi...
CONTINUED…▪ ESN- The ESN (Electronic Serial Number) is the serial number  of your cellular telephone.▪ The ESN is transmit...
IMEI▪ IMEI stands for International Mobile Equipment Identifier, this is a 10  digit universally unique number of our GSM ...
GSM AND CDMA▪ CDMA( Code Division Multiple Access). A method for transmitting  simultaneous signals over a shared portion ...
CONTINUED…▪ GSM digitizes and compresses data, then sends it down a channel with  two other streams of user data, each in ...
MOBILE CLONING▪ Each phone has an Electronic Serial Number (ESN), identifying the  phone, as well as a Mobile Identificati...
CONTINUED…▪ These codes would then be programmed into another phone,  effectively cloning the original subscription.▪ Any ...
CONTINUED…     FIG I MOBILE CLONING
METHODS TO DETECT CLONEDPHONES ON THE NETWORK▪ DUPLICATE DETECTION The network sees the same phone in several places at th...
CONTINUED…▪ PIN CODES. Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usua...
CONTINUED…▪ RF (RADIO FREQUENCY) - fingerprinting is originally a military technology. so the network software stores and ...
CONTINUED…▪ USAGE PROFILING. - Profiles of customers phone usage are kept, and when discrepancies are noticed, the custome...
CONTINUED…▪ CALL COUNTING - Both the phone and the network keep track of calls made with the phone, and should they differ...
CLONING GSM PHONES▪ Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI).▪ The important info...
CONTINUED…▪ The process of hacking GSM networks is simple: a SIM card is  inserted into a reader.▪ After connecting it to ...
HOW TO KNOW THAT THE CELLHAS BEEN CLONED?▪ Frequent wrong number phone calls to your phone, or hang-ups▪ Difficulty in pla...
TO PREVENT CLONING▪ User verification using Personal Identification Number (PIN) codes is  one method for customer protect...
CONTINUED…▪ Software detects suspicious calling patterns, such as a sudden  increase in the length of calls or a sudden in...
CONTINUED…▪ BLACKLISTING       of stolen phones is another mechanism to prevent unauthorized use.▪ An Equipment Identity R...
IMPACT OF CLONING▪ Each year, the mobile phone industry loses millions of dollars in  revenue because of the criminal acti...
CONCLUSION▪ Preventive steps should be taken by the network provider and the  Government the enactment of legislation to p...
REFERENCES▪ http://wiretap.spies.com▪ http://www.hackinthebox.org▪ http://www.google.com▪ http://www.wikipedia.com
Mobile cloning
You’ve finished this document.
Upcoming SlideShare
Mobile phone-cloning
Next
Upcoming SlideShare
Mobile phone-cloning
Next

Share

Mobile cloning

This is a ppt on mobile cloning which is an emerging technology.This technology is being used widely these days,and also this
technology offers great help towards data replication and cloning device to device data.. which performs fucntions exactly same as the other device

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Mobile cloning

  1. 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY JNANA SANGAMA, BELGAUM SEMINAR ON MOBILE CLONINGUnder the guidance ofLECTURER PRESENTED BY,
  2. 2. MOBILE CLONING PRESENTED BY, KIRAN .K 1RG09IS002
  3. 3. CONTENTS▪ INTRODUCTION▪ IMEI▪ GSM AND CDMA▪ MOBILE CLONING▪ METHODS▪ CLONING GSM PHONES▪ HOW TO KNOW▪ TO PREVENT CLONING▪ IMPACT OF CLONING
  4. 4. INTRODUCTION▪ Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.▪ Usually this is done for the purpose of making fraudulent telephone calls.▪ The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls
  5. 5. CONTINUED…▪ ESN- The ESN (Electronic Serial Number) is the serial number of your cellular telephone.▪ The ESN is transmitted to the cell site and used to verify that you are a legitimate user of the cellular system.▪ The MIN (Mobile Identification Number) is simply the phone number of the cellular telephone.
  6. 6. IMEI▪ IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset.▪ It is used in tracking mobile phones.
  7. 7. GSM AND CDMA▪ CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card.▪ CDMA use a Mobile Identification Number (MIN) card that contains user account information.▪ GSM (Global System for Mobile) Communications. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA).
  8. 8. CONTINUED…▪ GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.▪ It operates at either the 900 MHz or 1,800 MHz frequency band.
  9. 9. MOBILE CLONING▪ Each phone has an Electronic Serial Number (ESN), identifying the phone, as well as a Mobile Identification Number (MIN), which includes the telephone number of the phone.▪ These are used to identify the subscriber.▪ When placing a call, the phone transmits both the ESN and the MIN to the network.▪ Esn and MIN can be received using a suitable scanner
  10. 10. CONTINUED…▪ These codes would then be programmed into another phone, effectively cloning the original subscription.▪ Any calls made on this cloned phone would be charged on the original customer.
  11. 11. CONTINUED… FIG I MOBILE CLONING
  12. 12. METHODS TO DETECT CLONEDPHONES ON THE NETWORK▪ DUPLICATE DETECTION The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for so that the clone users will switch to another clone but the real user will contact the operator.
  13. 13. CONTINUED…▪ PIN CODES. Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  14. 14. CONTINUED…▪ RF (RADIO FREQUENCY) - fingerprinting is originally a military technology. so the network software stores and compares fingerprints for all the phones that it sees. This way, it will spot the clones with the same identity but different fingerprints.
  15. 15. CONTINUED…▪ USAGE PROFILING. - Profiles of customers phone usage are kept, and when discrepancies are noticed, the customer is contacted.▪ For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone.
  16. 16. CONTINUED…▪ CALL COUNTING - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
  17. 17. CLONING GSM PHONES▪ Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI).▪ The important information is the IMSI, which is stored on the removable SIM card that carries all your subscriber information
  18. 18. CONTINUED…▪ The process of hacking GSM networks is simple: a SIM card is inserted into a reader.▪ After connecting it to the computer using data cables, the card details were transferred into the PC.▪ Then, using freely available encryption software on the Net, the card details can be encrypted on to a blank smart card.▪ The result: A cloned cell phone is ready for misuse.
  19. 19. HOW TO KNOW THAT THE CELLHAS BEEN CLONED?▪ Frequent wrong number phone calls to your phone, or hang-ups▪ Difficulty in placing outgoing calls.▪ Difficulty in retrieving voice mail messages.▪ Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  20. 20. TO PREVENT CLONING▪ User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud▪ Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.▪ Traffic analysis detects cellular fraud by using artificial intelligence software
  21. 21. CONTINUED…▪ Software detects suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.▪ The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call
  22. 22. CONTINUED…▪ BLACKLISTING of stolen phones is another mechanism to prevent unauthorized use.▪ An Equipment Identity Register (EIR) enables network operators to disable stolen cellular phones on networks around the world
  23. 23. IMPACT OF CLONING▪ Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons.▪ Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace
  24. 24. CONCLUSION▪ Preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority▪ Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
  25. 25. REFERENCES▪ http://wiretap.spies.com▪ http://www.hackinthebox.org▪ http://www.google.com▪ http://www.wikipedia.com
  • curmtake

    Jul. 27, 2021
  • AbhishekJaiswal270

    May. 14, 2019
  • SumanthAlva

    Sep. 27, 2018
  • YashPatel130

    Apr. 6, 2018
  • RajathRajju1

    Mar. 17, 2018
  • NihithaPriya

    Mar. 14, 2018
  • ShaikhAli5

    Feb. 7, 2018
  • AjisegiriAdeniyiAyodeji

    Feb. 1, 2018
  • Bijayalaxmiroutray1

    Nov. 3, 2017
  • mohammedalimomin7

    Apr. 15, 2017
  • PoojaSharma803

    Apr. 14, 2017
  • saisrinivasmittapalli

    Dec. 27, 2016
  • marziarahman3

    Jul. 27, 2016
  • magatchrirtian19

    Jul. 13, 2016
  • rahat2u

    Mar. 13, 2016
  • SandeepReddi

    Feb. 17, 2016
  • RuchitaChandel

    Feb. 9, 2016
  • basanthkumar733

    Feb. 8, 2016
  • udaykiran135

    Feb. 6, 2016
  • sayalipawar35

    Feb. 2, 2016

This is a ppt on mobile cloning which is an emerging technology.This technology is being used widely these days,and also this technology offers great help towards data replication and cloning device to device data.. which performs fucntions exactly same as the other device

Views

Total views

32,712

On Slideshare

0

From embeds

0

Number of embeds

9

Actions

Downloads

0

Shares

0

Comments

0

Likes

77

×