This document discusses cell phone cloning, which is copying the identity of one mobile phone to another. It can be done by obtaining a phone's ESN (for CDMA phones) or IMEI number (for GSM phones) and MIN or SIM information, and using software to clone it onto another phone. This allows calls made on the cloned phone to be improperly billed to the original phone. It costs mobile carriers millions annually. The best way to prevent cloning is for networks and phones to use authentication, where a secret key is used to perform identical calculations and verify the phone is not a clone.
Roadmap to Membership of RICS - Pathways and Routes
shubhadappt(3273)
1.
2. CONTENTS
INTRODUCTION
IMPORTANT TERMS
HOW A PHONE CLONED?
METHODS TO DETECT CLONED PHONES
IMPACT OF CLONING
HOW TO PREVENT CLONING
FACTS AND FIGURES
3. INTRODUCTION
CLONING :
Cloning is the creation of an organism that is an exact
genetic copy of other.
This means that every single bit of DNA is the same
between the two!
CELL PHONE CLONING:
Cell phone cloning is copying the identity of one mobile
telephone to another mobile telephone.
4.
5.
6. Fixed data stored before the subscription is sold.
Temporary network data
Service related data
ESN
Which stands for Electronic Serial Number . It is same
as the IMEI but it is used in the CDMA handset.
MIN
Stands for Mobile Identification Number ,which is the
same as the SIM of GSM .
7. SOFTWARES AVAILABLE FOR CLONING
FOR CDMA. If PIN and ESN are known, a mobile
phone can be cloned in seconds using some software’s
like Patagonia which is used to clone CDMA
phones.
FOR GSM. However, if the accused manages to also
clone the IMEI number of the handset, for which
software’s are available, there is no way he can be
traced.
BLUETOOTH HACK is the software available in the
market which is used to hack/clone GSM phone.
8.
9.
10. CALL COUNTING :Both the phone and the network
keep track of calls made with the phone, and should
they differ more than the usually allowed one call ,
service is denied.
PIN CODES : Prior to placing a call , the caller unlocks
the phone by entering a PIN code and then calls as
usual . After the call has been completed , the user
locks the phone by PIN code again. Operators may
share PIN information to enable safer roaming .
11.
12. IMPACT OF CLONING
Each year , the mobile phone industry loses millions of
dollars in revenue because of the criminal actions of
persons who are able to reconfigure mobile phones so
that their calls are billed to other phones owned by
innocent third persons.
13.
14. The best way to prevent you SIM card or mobile phone from
being cloned is to use Authentication feature.
Authentication is a mathematical process by which identical
calculations are performed in both the network and the
mobile phone.
• These calculations use secret information (known as a “key”)
pre-programmed into both the mobile phone and the network
before service is activated.
Cloners typically have no access to this secret information
(i.e., the key), and therefore cannot obtain the same results to
the calculations.
A legitimate mobile phone will produce the same calculated
result as the network.
The mobile phone’s result is sent to the network and
compared with the network’s results.
If they match, the phone is not a ”cloned”