mobile phone [email protected]
DESCRIPTION
mobile phone cloningTRANSCRIPT
MOBILE PHONE CLONING
BY:
SIMRANDEEP SINGH-1315970
STEGIN JOY-1315972
things we are going to present……
HOW CELL PHONE WORKS?
HISTORY OF MOBILE CLONING
CLONING CDMA CELL PHONE
CLONING GSM CELL PHONE
PATAGONIA
PROCESS OF CLONING
IMPACT OF CLONING
DETECTION OF CLONED PHONES ON NETWORK
PREVENTION
FUTURE THREATS
CONCLUSION
INTRODUCTIONo Mobile phone cloning is basically a
technique where in the transfer or copying the identity or security data of one cellular phone to another is done.
oThe other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed.
oThis is usually done for the purpose of making fraudulent phone calls. The bills for the calls go to the legitimate subscriber.
HOW CELLPHONE WORKS?
Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data
BACK TO
HISTORY
In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are prone to cloning.
Cloning CDMA phones It stands for code division multiple access
In CDMA system, your encoded voice is digitalized and divided into packets.
These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
Operators who provide CDMA service in India are reliance, Tata Indicom
CLONING GSM CELL PHONE
Global system for communication, A digital cellular phone technology based on TDMA
GSM phones use a subscriber identify module (SIM) card that contains user account information
Any GSM phone becomes immediately programmed after plugging in the SIM card
Operators who provide GSM service are AIRTEL,Vodafone,Idea etc.
IMPORTANT TERMS
IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones
SIM,which stands for Subscriber Identification Module.
basically the SIM provides storage of subscriber
related information
PATAGONIA
Patagonia is software available in the market which is used to clone CDMA phone.
this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.
A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.
Process of cloning
Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:
1. Sniffing the cellular.
2. Trashing cellular companies or cellular resellers.
3. Hacking cellular companies or cellular resellers
IMPACTS OF CLONING
DETECTION OF CLONED PHONES ON NETWORK
1. Duplicate Detection
2. Velocity Trap
3. RF (Radio Frequency):
4. Usage Profiling:
5. Call Counting:
6. PIN Codes
RF(RADIO FREQUENCY)Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot the clones with the same identity but fingerprints.
HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?
1. Frequent wrong number phone calls to your phone or hang ups.
2. Difficulty in placing outgoing calls.
3. Difficulty in retrieving voice mail messages.
4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.
HOW TO PREVENT PHONE CLONING ??
There are some prevention methods by which we can prevent our cell phone from cloning:
1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.
2. Always set a pin that is required before the phone can be used. This will help in
preventing mobile from cloning to a great extent.
4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.
CONCLUSION Preventive steps should be
taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority
Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously
THANK YOU