SlideShare a Scribd company logo
1 of 20
Seminar Presentation
                on
       Mobile Phone Cloning
                By
   Shishupal Nagar 8CSB-1(95)




DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING
     Jaipur Engineering College & Research Centre
              Sitapura Tonk, Road Jaipur
CONTENTS
 INTRODUCTION
 GSM & CDMA MOBILE PHONES
 SOME IMPORTANT TERMS
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 IMPACT OF CLONING
 HOW TO PREVENT CLONING?
 CONCLUSION
 REFERENCES
INTRODUCTION
CLONING:
 Cloning is the creation of an organism that is an exact
  genetic copy of another. This means that every single bit
  of DNA is the same between the two!

WHAT IS MOBILE PHONE CLONING?
 Mobile phone cloning is copying the identity of one
  mobile telephone to another mobile telephone.

 The purpose of mobile phone cloning is making
  fraudulent telephone calls.
 The bills for the calls go to the legitimate subscriber.
GSM
 Global System for Mobile Communications. A
  digital cellular phone technology based on TDMA.
 GSM phones use a Subscriber Identity Module
  (SIM) card that contains user account information.
 Any GSM phone becomes immediately programmed
  after plugging in the SIM card.
 Operators who provide GSM service are Airtel ,
  Vodafone ,Idea etc.
CDMA
 It stands for Code Division Multiple Access.
 In a CDMA system, your encoded voice is digitized and
  divided into packets.
 These packets are tagged with "codes." The packets
  then mix with all of the other packets of traffic in the
  local CDMA network as they are routed towards their
  destination. The receiving system only accepts the
  packets with the codes destined for it.
 Operators who provide CDMA service in India are
  Reliance , Tata Indicom etc.
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
  Identifier, this is a 10 digit universally unique number
  of our GSM handset. I use the term Universally
  Unique because there cannot be 2 mobile phones
  having the same IMEI no. This is a very valuable
  number and used in tracking mobile phones.
 SIM, which stands for Subscriber Identification
  Module. Basically the SIM provides storage of
  subscriber related information.
CONTD……
 ESN, which stands for Electronic Serial Number. It is
  same as the IMEI but is used in CDMA handsets
 MIN stands for Mobile Identification Number, which
  is the same as the SIM of GSM.
HOW IS A PHONE CLONED?
 Cellular thieves can capture ESN/MINs using devices
  such as cell phone ESN reader or digital data interpreters
  (DDI).
 The ESN/MIN pair can be cloned in a number of ways
  without the knowledge of the carrier or subscriber through
  the use of electronic scanning devices.
 After the ESN/MIN pair is captured, the cloner
  reprograms or alters the microchip of any wireless phone
  to create a clone of the wireless phone from which the
  ESN/MIN pair was stolen.
METHODS TO DETECT
      CLONED PHONES
 Duplicate detection - The network sees the same phone
  in several places at the same time. Reactions include
  shutting them all off so that the real customer will contact
  the operator because he lost the service he is paying for, or
  tearing down connections so that the clone users will
  switch to another clone but the real user will contact the
  operator.
 Velocity trap - The mobile phone seems to be moving at
  impossible, or most unlikely speeds. For example, if a call
  is first made in Helsinki, and five minutes later, another
  call is made but this time in Tampere, there must be two
  phones with the same identity on the network.
CONTD……
 Call counting - Both the phone and the network keep
  track of calls made with the phone, and should they differ
  more than the usually allowed one call, service is denied.

 PIN codes - Prior to placing a call, the caller unlocks the
  phone by entering a PIN code and then calls as usual.
  After the call has been completed, the user locks the
  phone by entering the PIN code again. Operators may
  share PIN information to enable safer roaming.
CONTD….
 Frequent wrong number phone calls to your phone, or
  hang-ups.

 Difficulty in placing outgoing calls.


 Difficulty in retrieving voice mail messages.

 Incoming calls constantly receiving busy signals or
  wrong numbers. Unusual calls appearing on your
  phone bills.
IMPACT OF CLONING
 Each year, the mobile phone industry loses millions of
  dollars in revenue because of the criminal actions of
  persons who are able to reconfigure mobile phones so that
  their calls are billed to other phones owned by innocent
  third persons.
 Many criminals use cloned cellular telephones for illegal
  activities, because their calls are not billed to them, and
  are therefore much more difficult to trace.
CONTD….
 This phenomenon is especially prevalent in drug crimes.
  Drug dealers need to be in constant contact with their
  sources of supply and their confederates on the streets.
  Traffickers acquire cloned phones at a minimum cost,
  make dozens of calls, and then throw the phone away after
  as little as a days' use. In the same way, criminals who
  pose a threat to our national security, such as terrorists,
  have been known to use cloned phones to thwart law
  enforcement efforts aimed at tracking their whereabouts.
HOW TO PREVENT CLONING?
 Service providers have adopted certain measures to
  prevent cellular fraud. These include encryption, blocking,
  blacklisting, user verification and traffic analysis:
 Blacklisting of stolen phones is another mechanism to
  prevent unauthorized use. An Equipment Identity Register
  enables network operators to disable stolen cellular
  phones on networks around the world.
 User verification using Personal Identification Number
  (PIN) codes is one method for customer protection against
  cellular phone fraud.
CONTD….
 Tests conducted have proved that United States found that
  having a PIN code reduced fraud by more than 80%.
 Traffic analysis detects cellular fraud by using artificial
  intelligence software to detect suspicious calling patterns,
  such as a sudden increase in the length of calls or a sudden
  increase in the number of international calls.
 The software also determines whether it is physically
  possible for the subscriber to be making a call from a
  current location, based on the location and time of the
  previous call.
CONCLUSION
 Mobile Cloning Is in initial stages in India so preventive
  steps should be taken by the network provider and the
  Government the enactment of legislation to prosecute
  crimes related to cellular phones is not viewed as a
  priority, however. It is essential that intended mobile crime
  legislation be comprehensive enough to incorporate
  cellular phone fraud, in particular "cloning fraud" as a
  specific crime.
 Existing cellular systems have a number of potential
  weaknesses that were considered. It is crucial that
  businesses and staff take mobile phone security seriously.
REFERENCES
 www.google.co.in
 www.wikipedia.org
 www.1000projects.org/
 www.seminarsonly.com/
Mobile phone-cloning
Mobile phone-cloning

More Related Content

What's hot

What's hot (20)

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Artificial Passenger
Artificial PassengerArtificial Passenger
Artificial Passenger
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Silverlight
SilverlightSilverlight
Silverlight
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Plastic memory
Plastic memoryPlastic memory
Plastic memory
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 

Viewers also liked

Viewers also liked (7)

E contracts
E contractsE contracts
E contracts
 
E contract
E contractE contract
E contract
 
E contract
E  contractE  contract
E contract
 
GSM Network
GSM NetworkGSM Network
GSM Network
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Toorcamp 2016
Toorcamp 2016Toorcamp 2016
Toorcamp 2016
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Mobile phone-cloning

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 

Similar to Mobile phone-cloning (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Clonning
ClonningClonning
Clonning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Mobile phone-cloning

  • 1. Seminar Presentation on Mobile Phone Cloning By Shishupal Nagar 8CSB-1(95) DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura Tonk, Road Jaipur
  • 2. CONTENTS  INTRODUCTION  GSM & CDMA MOBILE PHONES  SOME IMPORTANT TERMS  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO PREVENT CLONING?  CONCLUSION  REFERENCES
  • 3. INTRODUCTION CLONING:  Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! WHAT IS MOBILE PHONE CLONING?  Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone.  The purpose of mobile phone cloning is making fraudulent telephone calls.  The bills for the calls go to the legitimate subscriber.
  • 4. GSM  Global System for Mobile Communications. A digital cellular phone technology based on TDMA.  GSM phones use a Subscriber Identity Module (SIM) card that contains user account information.  Any GSM phone becomes immediately programmed after plugging in the SIM card.  Operators who provide GSM service are Airtel , Vodafone ,Idea etc.
  • 5. CDMA  It stands for Code Division Multiple Access.  In a CDMA system, your encoded voice is digitized and divided into packets.  These packets are tagged with "codes." The packets then mix with all of the other packets of traffic in the local CDMA network as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.  Operators who provide CDMA service in India are Reliance , Tata Indicom etc.
  • 6. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information.
  • 7. CONTD……  ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets  MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
  • 8. HOW IS A PHONE CLONED?  Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).  The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices.  After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
  • 9.
  • 10. METHODS TO DETECT CLONED PHONES  Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network.
  • 11. CONTD……  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 12. CONTD….  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.
  • 13. IMPACT OF CLONING  Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons.  Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace.
  • 14. CONTD….  This phenomenon is especially prevalent in drug crimes. Drug dealers need to be in constant contact with their sources of supply and their confederates on the streets. Traffickers acquire cloned phones at a minimum cost, make dozens of calls, and then throw the phone away after as little as a days' use. In the same way, criminals who pose a threat to our national security, such as terrorists, have been known to use cloned phones to thwart law enforcement efforts aimed at tracking their whereabouts.
  • 15. HOW TO PREVENT CLONING?  Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register enables network operators to disable stolen cellular phones on networks around the world.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
  • 16. CONTD….  Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call.
  • 17. CONCLUSION  Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime.  Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
  • 18. REFERENCES  www.google.co.in  www.wikipedia.org  www.1000projects.org/  www.seminarsonly.com/