SlideShare una empresa de Scribd logo
1 de 20
MOBILE PHONE
CLONING
BY:

SIMRANDEEP SINGH-1315970
STEGIN JOY-1315972
things we are going to present……
 HOW CELL PHONE WORKS?
 HISTORY OF MOBILE CLONING
 CLONING CDMA CELL PHONE


CLONING GSM CELL PHONE

 PATAGONIA

 PROCESS OF CLONING
 IMPACT OF CLONING
 DETECTION OF CLONED PHONES ON NETWORK
 PREVENTION
 FUTURE THREATS
 CONCLUSION
INTRODUCTION

Mobile phone cloning is
basically a technique where in the
transfer or copying the identity or
security data of one cellular phone
to another is done.
o The other cell phone becomes the
exact replica of the original cell
phone like a clone. As a result,
while calls can be made from both
phones and only the original
phone is billed.
o
HOW CELLPHONE WORKS?

Cell phones send radio frequency transmissions through the air on two
distinct channels, one for voice communications and the other for control
signals. When a cellular phone makes a call, it normally transmits its
Electronic Security Number (ESN), Mobile Identification Number (MIN),
its Station Class Mark (SCM) and the number called in a short burst of
data. This burst is the short buzz you hear after you press the SEND button
and before the tower catches the data
BACK TO

HISTORY
In 1990’s. Cell phone cloning started
with Motorola “bag” phones and
reached its peak in the mid 90’s with
a commonly available modification
for the Motorola “brick” phones,
such as the classic, the Ultra classic.
Both GSM and CDMA handsets are
Cloning CDMA
phones code division multiple
 It stands for
access

 In CDMA system, your encoded voice
is digitalized and divided into packets.

 These packets are tagged with “codes”.
the packets then mix with all of the
other packets of traffic in the local
CDMA networks as they are routed
towards their destination. The receiving
system only accepts the packets with
the codes destined for it.
CLONING

GSM CELL PHONE

Global system for
communication, A digital
cellular phone technology
based on TDMA
GSM phones use a subscriber
identify module (SIM) card that
contains user account
information
Any GSM phone becomes
immediately programmed after
plugging in the SIM card
IMPORTANT TERMS

 IMEI stands for International Mobile equipment
Identifier,this is a 10 digit universally unique number of
our GSM handset, I use the term universally unique
because there cannot be 2 mobile phones having the
same IMEI no.this is very valuable number and used in
tracking mobile phones

 SIM,which stands for Subscriber Identification Module.
basically the SIM provides storage of subscriber
related information
PATAGONIA
 Patagonia is software available in the market which is used to
clone CDMA phone.
 this software a cloner can take over the control of a CDMA
phone i.e. cloning of phone. There are other software’s available
in the market to clone GSM phone. This software’s are easily
available in the market.
 A SIM can be cloned again and again and they can be used at
different places. Messages and phone calls sent by the cloned
phones can be tracked. However, if the accused manages to
also clone the IMEI number of the handset for which software’s
are available, there is no way he can be traced.
Process of cloning
 Cloning involves modifying or replacing the EPROM in the
phone with a new chip which would allow you to configure an
ESN (Electronic Serial Number) via software. MIN (Mobile
Identification Number) should also have to change. When the
ESN/MIN pair had changed successfully then an effective
clone of the original phone has created. Cloning required
access to ESN and MIN pairs. ESN/MIN pairs were discovered in
several ways:
 1. Sniffing the cellular.

 2. Trashing cellular companies or cellular resellers.
 3. Hacking cellular companies or cellular resellers
IMPACTS OF CLONING
DETECTION OF CLONED
PHONES ON NETWORK
 1. Duplicate Detection
 2. Velocity Trap

 3. RF (Radio Frequency):
 4. Usage Profiling:
 5. Call Counting:
 6. PIN Codes
 RF(RADIO FREQUENCY)
Fingerprinting is originally a
military technology.so the network
software stores and compares
fingerprints for all the phones
that it sees. this way, it will spot
HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?

 1. Frequent wrong number phone calls to your phone or
hang ups.
 2. Difficulty in placing outgoing calls.
 3. Difficulty in retrieving voice mail messages.
 4. Incoming calls constantly receiving busy signals or
wrong numbers. Unusual call appearing on your phone
bills.
HOW TO PREVENT
PHONE CLONING ??
There are some prevention methods by which we can prevent our
cell phone from cloning:
 1. Mobile should never be trusted for storing confidential
information. So any secret information should not be kept in
mobile.
 2. Always set a pin that is required before the phone can be
used. This will help in
 preventing mobile from cloning to a great extent.

 4. Always keep in touch with monthly mobile bills. Any
unexpected increase in bill can cause threat to mobile
cloning.
CONCLUSION
 Preventive steps should be taken by the network
provider and the government the enactment of
legislation to prosecute crime related to cellular
phones is not viewed as a priority
 Existing cellular systems have a number of
potential weakness were considered.it is a crucial
business and staff take mobile phone security
seriously
THANK YOU

Más contenido relacionado

La actualidad más candente

Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

La actualidad más candente (20)

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

Destacado

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
Skinput technology
Skinput technologySkinput technology
Skinput technologyneha pevekar
 
Seminar (VK)
Seminar (VK)Seminar (VK)
Seminar (VK)S P ROHIT
 
Google classroom intro
Google classroom introGoogle classroom intro
Google classroom introjkeben
 

Destacado (9)

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Wi DI
Wi DIWi DI
Wi DI
 
Seminar (VK)
Seminar (VK)Seminar (VK)
Seminar (VK)
 
Google classroom intro
Google classroom introGoogle classroom intro
Google classroom intro
 
Emospark
EmosparkEmospark
Emospark
 

Similar a MOBILE PHONE CLONING-Steginjoy2013@gmail.com

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 

Similar a MOBILE PHONE CLONING-Steginjoy2013@gmail.com (13)

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Clonning
ClonningClonning
Clonning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Test
TestTest
Test
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 

Más de christ university

Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)christ university
 
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inPOVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inchrist university
 
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inDESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inchrist university
 
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.inchrist university
 

Más de christ university (6)

Stegin
SteginStegin
Stegin
 
Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inPOVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
 
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inDESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
 
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 

Último

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

MOBILE PHONE CLONING-Steginjoy2013@gmail.com

  • 2. things we are going to present……  HOW CELL PHONE WORKS?  HISTORY OF MOBILE CLONING  CLONING CDMA CELL PHONE  CLONING GSM CELL PHONE  PATAGONIA  PROCESS OF CLONING  IMPACT OF CLONING  DETECTION OF CLONED PHONES ON NETWORK  PREVENTION  FUTURE THREATS  CONCLUSION
  • 3. INTRODUCTION Mobile phone cloning is basically a technique where in the transfer or copying the identity or security data of one cellular phone to another is done. o The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed. o
  • 4. HOW CELLPHONE WORKS? Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data
  • 5. BACK TO HISTORY In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are
  • 6. Cloning CDMA phones code division multiple  It stands for access  In CDMA system, your encoded voice is digitalized and divided into packets.  These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
  • 7. CLONING GSM CELL PHONE Global system for communication, A digital cellular phone technology based on TDMA GSM phones use a subscriber identify module (SIM) card that contains user account information Any GSM phone becomes immediately programmed after plugging in the SIM card
  • 8.
  • 9. IMPORTANT TERMS  IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones  SIM,which stands for Subscriber Identification Module. basically the SIM provides storage of subscriber related information
  • 10. PATAGONIA  Patagonia is software available in the market which is used to clone CDMA phone.  this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.  A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.
  • 11. Process of cloning  Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:  1. Sniffing the cellular.  2. Trashing cellular companies or cellular resellers.  3. Hacking cellular companies or cellular resellers
  • 12.
  • 14. DETECTION OF CLONED PHONES ON NETWORK  1. Duplicate Detection  2. Velocity Trap  3. RF (Radio Frequency):  4. Usage Profiling:  5. Call Counting:  6. PIN Codes
  • 15.
  • 16.  RF(RADIO FREQUENCY) Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot
  • 17. HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?  1. Frequent wrong number phone calls to your phone or hang ups.  2. Difficulty in placing outgoing calls.  3. Difficulty in retrieving voice mail messages.  4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.
  • 18. HOW TO PREVENT PHONE CLONING ?? There are some prevention methods by which we can prevent our cell phone from cloning:  1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.  2. Always set a pin that is required before the phone can be used. This will help in  preventing mobile from cloning to a great extent.  4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.
  • 19. CONCLUSION  Preventive steps should be taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority  Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously