mobile cloning

Upload: swatisingla786

Post on 16-Oct-2015

39 views

Category:

Documents


0 download

DESCRIPTION

seminar report on mobile cloningduplicating sim card

TRANSCRIPT

MOBILE CLONING

MOBILE CLONINGCONTENTSCLONING Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two!

CELL PHONE CLONINGCell phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls.

GSM & CDMA MOBILE SETS CDMA(Code Division Multiple Access)- A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card.

GSM(Global System for Mobile Communications)- A digital cellular phone technology based on TDMA GSM phones MHz frequency band. There is a Subscriber Identity Module (SIM) card. Any GSM phone becomes immediately programmed after plugging in the SIM card.

IMPORTANT TERMSIMEI stands for International Mobile Equipment Identifier. This is a 15 digit universally unique number of our GSM handset. There cannot be 2 mobile phones having the same IMEI no..SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related info. ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsetsMIN stands for Mobile Identification Number, which is the same as the SIM of GSM.

IMEI (International Mobile Equipment Identifier) for GSMSIM CARD for GSMElectronic Serial Number for CDMA

HOW CELL PHONE WORKS?Radio Frequency TransmissionsThree things are transmitted while making a call:ESN- Electronic Serial NumberMIN- Mobile Identification NumberNumber called.Cell site checks whether the call is legitimate or not. Voice Communication Channel

Control Signals

CLONING GSM PHONES GSM networks which are considered to be secured can also be hacked. The process is simple: a SIM card is inserted into a reader. After connecting it to the computer the card details are transferred into the PC. Then, using encryption software the card details can be encrypted on to a blank smart card.

The result: A cloned cell phone is ready for misuse.

CLONING CDMA PHONES

CDMAcloning involves gaining access to the devicesvia specialized software or placing a modifiedEEPROMinto the target mobile telephone, allowing theelectronic serial number(ESN) of the mobile phone to be changed. Modifying this, as well as the number itself (known as themobile identification number, or MIN) can pave the way for fraudulent calls, as the target telephone is now a clone of the cell phone.METHODS TO DETECT CLONED PHONESDuplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for.Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in India, and five minutes later, another call is made but this time in Paris, there must be two phones with the same identity on the network.Usage profiling. - Profiles of customers' phone usage are kept, and noticed, the customer is contacted. For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone.

DUPLICATE DETECTION

HOW TO PREVENT CLONING?Blacklisting of stolen phones helps to prevent unauthorized use. An Equipment Identity Register (EIR) enables network operators to disable the network of stolen cellular phones.

Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.

CONCLUSIONMobile Cloning is at initial stages in India so preventive steps should be taken by the network provider and the Government as cellular crimes should also be given priority.

The subscribers should be alert and inform the police on suspecting any foul play. It would be advisable for them to ask for the list of outgoing calls, as soon as they realize that they've been overcharged.

References

1) IEEE journal for mobile communication2) Science today magazine3) Mobile cloning Reliance report4) Report on Mobile Cloning BSNL5) Mobile communication Govt. Of India reports6) Mobile phone cloning Indiatimes news network7) CDMA cloning Qualcomm reports8) SIM cloning, TechnicalInfo.com9) Mobile cloning, mobiledia.com