mobile cloning technology
TRANSCRIPT
![Page 1: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/1.jpg)
Mobile Cloning Technology
Submitted By :- HEERA TAZEEN (3KC12CS007)
In The Name Of ALLAH Most Beneficent Most Merciful
![Page 2: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/2.jpg)
CONTENTS• INTRODUCTION• HISTORY• GSM AND CDMA• IMPORTANT TERMS• HOW A CELL PHONE IS CLONED?• HOW TO KNOW THAT THE CELL PHONE HAS BEEN CLONED?• DETECTION OF A CLONED CELL PHONE IN A NETWORK• HOW TO PREVENT CELL PHONE CLONING?• ADVANTAGES AND DISADVANTAGES• CONCLUSION• REFERENCES
![Page 3: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/3.jpg)
INTRODUCTION
CELL PHONE CLONING
• The result of that is a "cloned" phone.
• Taking the programmed information from mobile phone and programming the identical information into another mobile phone.
![Page 4: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/4.jpg)
HISTORY
• In 1990s cell phone Cloning started with Motorola “bag” phones.
• In mid 90’s they are commonly available by Motorola Co such as the classic, the ultra classic, and the model 8000.
![Page 5: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/5.jpg)
GSM AND CDMAGSM• A digital cellular phone technology based
on TDMA.• GSM phones use a SIM card that contains
user account information.
CDMA• Transmitting simultaneous signals over a
shared portion of the spectrum. • There is no SIM card unlike in GSM.
![Page 6: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/6.jpg)
IMPORTANT TERMS
IMEI (International Mobile Station Equipment Identity)
• Helps to identify valid devices.• Used for stopping a stolen phone from
accessing the network.
ESN (Electronic Serial Number)
• Used to uniquely identify a mobile phone operating on CDMA network.
![Page 7: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/7.jpg)
MIN (Mobile Identification Number)
• MIN is a number that is derived from the 10 -digit directory telephone number assigned to a mobile station.
![Page 8: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/8.jpg)
HOW IS CELL CLONING DONE?
• Modifying or replacing the EPROM in the phone with a new chip which allow to configure an ESN via software.
• We have to change the MIN. • Cloning require access to ESN and MIN
pairs.• ESN/MIN pairs can be discovered in several
ways:
![Page 9: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/9.jpg)
CONTD… • Sniffing the cellular.• Trashing cellular companies or cellular
resellers.• Hacking cellular companies or cellular
resellers.• Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).
• After the ESN/MIN pair is captured, the cloner reprograms the microchip of any wireless phone.
![Page 10: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/10.jpg)
![Page 11: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/11.jpg)
WHAT IS PATAGONIA?
• Used to clone CDMA phones.• Using this software a cloner can
modify the ESN/MIN of any CDMA phone.
![Page 12: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/12.jpg)
![Page 13: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/13.jpg)
• After we have modified the EEPROM of our device, it can be used as a cloned device.
• Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.
![Page 14: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/14.jpg)
HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
• Frequent wrong number phone calls to your phone, or busy.
• Difficulty in placing outgoing calls.• Difficulty in retrieving voice mail
messages.• Incoming calls constantly receiving busy
signals or wrong numbers. • Unusual calls appearing on your phone
bills.
![Page 15: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/15.jpg)
DETECTION OF A CLONED PHONE IN A NETWORK
• Duplicate Detection• Velocity Trap• Usage Profiling• Call Counting
![Page 16: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/16.jpg)
DUPLICATE DETECTION
• The network sees the same phone in several places at the same time.
• Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for.
![Page 17: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/17.jpg)
DUPLICATE DETECTION
![Page 18: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/18.jpg)
VELOCITY TRAP• It notices when the mobile phone seems
to be moving at impossible, or most unlikely speeds.
• So service will be terminated until the real user is verified.USAGE PROFILING
• Profiles of customers phone usage are kept, and when discrepancies are noticed, the customer is contacted.
![Page 19: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/19.jpg)
CALL COUNTING
• Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
![Page 20: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/20.jpg)
HOW TO PREVENT PHONE CLONING?
• User verification using PIN(Personal Identification Number)
• Blacklisting of stolen phones
• Traffic analysis
• Electrically checking the ESN/MIN
![Page 21: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/21.jpg)
ADVANTAGES
• If your phone has been lost , you can use your cloned cell phone.
• If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.
![Page 22: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/22.jpg)
DISADVANTAGES
• It can be used by the terrorists for criminal activities.
• It can be used by the cloner for fraud calls.
• It can be used for illegal money transfer.
![Page 23: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/23.jpg)
CONCLUSION
To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems.
![Page 24: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/24.jpg)
REFERENCES
http://www.hackinthebox.org
http://realhackerspoint.blogspoint.in
http://www.google.com
http://www.Wikipedia.org
Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.
http://www.Slideshare.net
![Page 25: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/25.jpg)
![Page 26: Mobile Cloning Technology](https://reader036.vdocument.in/reader036/viewer/2022062523/588615861a28abe63e8b61d9/html5/thumbnails/26.jpg)
ANY QUERIES