SlideShare a Scribd company logo
1 of 28
PHONE CLONING TECHNOLOGY




GUIDED BY:-         PRESENTED BY:-
Prof. Sunil Yadav     JAGJIT SINGH KHALSA
                        Roll no-3107
INDEX
 INTRODUCTION.
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 SYMPTOMS OF PHONE CLONING.
 MEASURES TO BE TAKEN.
 ADVANTAGES AND DISADVANTAGES.
 VICTIMS OF PHONE CLONING.
 CONCLUSION.
 REFERENCES
INTRODUCTION
CLONING: Cloning is the creation of an organism that
 is an exact genetic copy of another.

PHONE CLONING: Phone cloning is the process of
 taking the programmed information that is stored in
 a legitimate mobile phone and illegally programming
 the identical information into another mobile phone.
CDMA MOBILE SETS
 CDMA stands for Code Division Multiple Access.


 A method for transmitting simultaneous signals over a
  shared portion of the spectrum.

 CDMA uses a Mobile Identification Number (MIN)
  card that contains user account information.
GSM MOBILE SETS
 GSM stands for      Global   System   for   Mobile
  Communications.

 GSM uses a Subscriber Identity Module (SIM) card.


 GSM is a standard set developed by the European
  Telecommunications Standards Institute (ETSI) to
 describe technologies for second generation (2G)
 digital cellular networks.
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
  Identifier, this is a 15 digit universally unique number
  of the GSM handset.
 SIM, which stands for Subscriber Identification
  Module. Basically the SIM provides storage of
  subscriber related information of three types:
1. Fixed data stored before the subscription is sold.
2. Temporary network data
3. Service related data.
 ESN, stands for Electronic Serial Number. It is
  same as the IMEI but is used in CDMA handsets.
 It is loaded when the phone is manufactured.
 MIN ,stands for Mobile Identification
  Number, It’s a 10 digit number used to identify a
  mobile phone.
HOW IS A PHONE CLONED?
 Capture the ESN/MIN pair or SIM/IMEI pair.
 Clone the ESN/MIN pair using electronic scanning
    devices.
   The cloner reprograms or alters the microchip of any
    wireless phone.
   The ESN/MINs are transferred using a computer to a
    device.
   These devices are connected to handsets.
   New information is entered into the phone.
    Thus a clone of the legitimate phone is thus obtained.
HOW CLONING TAKES PLACE.




        http://homesecurityandpersonalprotection.blogspot.in
• CLONING      DEVICE




      http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html
CLONING GSM PHONES
 The important information is the IMSI, which is
  stored on the removable SIM card.

 SIM card inserted into a reader.

 Connect to computer and card details transferred.

 Use encrypted software to interpret details.

 The result: A cloned cell phone is ready for misuse.
CLONING CDMA PHONES
 Cellular telephone thieves monitor the radio
  frequency spectrum.
 Steal the cell phone pair as it is being anonymously
  registered with a cell site.
 Subscriber information is also encrypted and
  transmitted digitally.
 A device called as DDI, Digital Data Interface can
  be used to get pairs.
 Stolen ESN and MIN were then fed into a new
  CDMA handset.
DETECTION OF PHONE
          CLONING
 Duplicate detection - The network sees the same
  phone in several places at the same time.



 Velocity trap - The mobile phone seems to be moving
  at impossible, or most unlikely speeds..
DETECTION (Continued..)
 RF (Radio Frequency) - Nominally identical radio
  equipment has a distinguishing ``fingerprint'', so the
  network software stores and compares fingerprints for
  all the phones that it sees.

 Usage profiling. - Profiles of customers' phone usage
  are kept, and when discrepancies are noticed, the
 customer is contacted.
DETECTION (Continued..)
 Call counting - Both the phone and the network keep
  track of calls made with the phone, and should they
  differ more than the usually allowed one call, service
  is denied.

 PIN codes - Prior to placing a call, the caller unlocks
  the phone by entering a PIN code and then calls as
 usual.
DETECTION(Continued..)
 The best detection method available in CDMA is the
 A KEY FEATURE.

• Secret 20 digit number.


• Number loaded in Authentication Centre.


• Cannot be copied.
PHONE CLONING
             SYMPTOMS
 Frequent wrong number phone calls to your phone, or
  hang-ups.

 Difficulty in placing outgoing calls.

 Difficulty in retrieving voice mail messages.

 Incoming calls constantly receiving busy signals or
  wrong numbers.

 Unusual calls appearing on your phone bills
CLONING STATISTICS



Victims
percentage




                     Age
MEASURES TO BE TAKEN
 Service providers have adopted certain measures to
 prevent cellular fraud.

 These include:
 Blacklisting of stolen phones is another mechanism to
  prevent unauthorized use.

 User verification using Personal Identification
  Number (PIN) codes is one method for customer
  protection against cellular phone fraud
 Encryption: Encryption is regarded as the effective
  way to prevent cellular fraud

 Traffic analysis detects cellular fraud by using
 artificial intelligence software to detect suspicious
 calling patterns, such as a sudden increase in the
 length of calls or a sudden increase in the number of
 international calls.

 Blocking: Blocking is used by service providers
  to protect themselves from high risk callers.
ADVANTAGES
1. If your phone has been lost , you can use your cloned
   cell phone.
2. If your phone got damaged or if you forgot your
   phone at home or any other place . Cloned phone
   can be helpful.
DISADVANTAGES
 It can be used by the terrorists for criminal activities.


 It can be used by the cloner for fraud calls.


 It can be used for illegal money transfer.
VICTIMS OF PHONE CLONING
 Anita Davis, a mobile clone victim. One month, her
 cell phone bill showed $3,151 worth of calls in one
 month, to Pakistan, Israel, Jordan, Africa, and other
 countries.

 A Louisville woman was shocked when she got her
  February cell phone bill from T-Mobile. It was ten
  times higher than it's ever been before. Equally
  troubling, she didn't recognize most of the phone
  numbers on it.
CONCLUSION
 Phone Cloning is in initial stages in India. Preventive
  steps should be taken by the network provider and the
 Government. The enactment of legislation to
 prosecute crimes related to cellular phones is not
 viewed as a priority. The cloning of CDMA mobile
 phones was possible because there was no protection
 to the identification information.
REFERENCES
 http://www.cdmasoftware.com/eng.html
 http://infotech.indiatimes.com
 http://www.hackinthebox.org/


 Sankaranarayanan ,“Mobile phone cloning”, Wireless
 And Optical Communications Networks (WOCN),
 2010 Seventh International Conference in Sept,2010.
THANK YOU...
ANY QUESTIONS?

More Related Content

What's hot

Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?xiha tareen
 
Smart phones and how they affect our lives
Smart phones and how they affect our livesSmart phones and how they affect our lives
Smart phones and how they affect our livesckap5
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 

What's hot (20)

Smart card
Smart cardSmart card
Smart card
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Eye phone
Eye phoneEye phone
Eye phone
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
presentation on 4g technology
presentation on 4g technologypresentation on 4g technology
presentation on 4g technology
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Smart phones and how they affect our lives
Smart phones and how they affect our livesSmart phones and how they affect our lives
Smart phones and how they affect our lives
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Internet security
Internet securityInternet security
Internet security
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile security
Mobile securityMobile security
Mobile security
 

Viewers also liked

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedDavid Stoffel
 
5.1 mitosis
5.1 mitosis5.1 mitosis
5.1 mitosisSMKTA
 
Animal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and PerspectivesAnimal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and PerspectivesShafqat Khan
 
Characterization of Cell Line
Characterization of Cell LineCharacterization of Cell Line
Characterization of Cell LineVarij Nayan
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Cruise Missile Technology By Takalikar Mayur ppt
Cruise Missile Technology By Takalikar Mayur pptCruise Missile Technology By Takalikar Mayur ppt
Cruise Missile Technology By Takalikar Mayur pptmayur takalikar
 

Viewers also liked (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting Cloned
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
5.1 mitosis
5.1 mitosis5.1 mitosis
5.1 mitosis
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Animal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and PerspectivesAnimal Cloning Procedure, Problems and Perspectives
Animal Cloning Procedure, Problems and Perspectives
 
Animal Cloning
Animal CloningAnimal Cloning
Animal Cloning
 
Characterization of Cell Line
Characterization of Cell LineCharacterization of Cell Line
Characterization of Cell Line
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Cloning
CloningCloning
Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cloning
CloningCloning
Cloning
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 
Cruise Missile Technology By Takalikar Mayur ppt
Cruise Missile Technology By Takalikar Mayur pptCruise Missile Technology By Takalikar Mayur ppt
Cruise Missile Technology By Takalikar Mayur ppt
 

Similar to Cloning. (4)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 

Similar to Cloning. (4) (20)

Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Clonning
ClonningClonning
Clonning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Test
TestTest
Test
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 

Cloning. (4)

  • 1. PHONE CLONING TECHNOLOGY GUIDED BY:- PRESENTED BY:- Prof. Sunil Yadav JAGJIT SINGH KHALSA Roll no-3107
  • 2. INDEX  INTRODUCTION.  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  SYMPTOMS OF PHONE CLONING.  MEASURES TO BE TAKEN.  ADVANTAGES AND DISADVANTAGES.  VICTIMS OF PHONE CLONING.  CONCLUSION.  REFERENCES
  • 3. INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  • 4. CDMA MOBILE SETS  CDMA stands for Code Division Multiple Access.  A method for transmitting simultaneous signals over a shared portion of the spectrum.  CDMA uses a Mobile Identification Number (MIN) card that contains user account information.
  • 5. GSM MOBILE SETS  GSM stands for Global System for Mobile Communications.  GSM uses a Subscriber Identity Module (SIM) card.  GSM is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks.
  • 6. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 15 digit universally unique number of the GSM handset.
  • 7.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold. 2. Temporary network data 3. Service related data.
  • 8.  ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets.  It is loaded when the phone is manufactured.  MIN ,stands for Mobile Identification Number, It’s a 10 digit number used to identify a mobile phone.
  • 9. HOW IS A PHONE CLONED?  Capture the ESN/MIN pair or SIM/IMEI pair.  Clone the ESN/MIN pair using electronic scanning devices.  The cloner reprograms or alters the microchip of any wireless phone.  The ESN/MINs are transferred using a computer to a device.  These devices are connected to handsets.  New information is entered into the phone. Thus a clone of the legitimate phone is thus obtained.
  • 10. HOW CLONING TAKES PLACE. http://homesecurityandpersonalprotection.blogspot.in
  • 11. • CLONING DEVICE http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html
  • 12. CLONING GSM PHONES  The important information is the IMSI, which is stored on the removable SIM card.  SIM card inserted into a reader.  Connect to computer and card details transferred.  Use encrypted software to interpret details.  The result: A cloned cell phone is ready for misuse.
  • 13. CLONING CDMA PHONES  Cellular telephone thieves monitor the radio frequency spectrum.  Steal the cell phone pair as it is being anonymously registered with a cell site.  Subscriber information is also encrypted and transmitted digitally.  A device called as DDI, Digital Data Interface can be used to get pairs.  Stolen ESN and MIN were then fed into a new CDMA handset.
  • 14. DETECTION OF PHONE CLONING  Duplicate detection - The network sees the same phone in several places at the same time.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds..
  • 15. DETECTION (Continued..)  RF (Radio Frequency) - Nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees.  Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted.
  • 16. DETECTION (Continued..)  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual.
  • 17. DETECTION(Continued..)  The best detection method available in CDMA is the A KEY FEATURE. • Secret 20 digit number. • Number loaded in Authentication Centre. • Cannot be copied.
  • 18. PHONE CLONING SYMPTOMS  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers.  Unusual calls appearing on your phone bills
  • 20. MEASURES TO BE TAKEN  Service providers have adopted certain measures to prevent cellular fraud.  These include:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud
  • 21.  Encryption: Encryption is regarded as the effective way to prevent cellular fraud  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  Blocking: Blocking is used by service providers to protect themselves from high risk callers.
  • 22. ADVANTAGES 1. If your phone has been lost , you can use your cloned cell phone. 2. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.
  • 23. DISADVANTAGES  It can be used by the terrorists for criminal activities.  It can be used by the cloner for fraud calls.  It can be used for illegal money transfer.
  • 24. VICTIMS OF PHONE CLONING  Anita Davis, a mobile clone victim. One month, her cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.  A Louisville woman was shocked when she got her February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it.
  • 25. CONCLUSION  Phone Cloning is in initial stages in India. Preventive steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile phones was possible because there was no protection to the identification information.
  • 26. REFERENCES  http://www.cdmasoftware.com/eng.html  http://infotech.indiatimes.com  http://www.hackinthebox.org/  Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.