3. INTRODUCTION
• Cloning is the creation of an organism that is an exact genetic
copy of another.
• Mobile phone cloning is copying the identity of one mobile
phone to another mobile phone.
• The purpose of mobile phone cloning is making fraudulent
telephone calls.
• The bills for calls go to legitimate subscriber.
3
4. SOME IMPORTANT TERMS
GSM stands for Global System for Mobile Communication. A
digital cellular phone technology based on TDMA GSM phones
which uses a Subscriber Identity Module(SIM) that contains user
account information.
Code Division Multiple Access. A method for transmitting
simultaneous signal over a shared portion of the spectrum.
There is no Subscriber Identity Module (SIM) card needed like in
GSM.
4
5. CONTD……
IMEI, stands for International Mobile Equipment Identifier. This
is a 10 digit universally unique number of our GSM handset.
There cannot be two mobile phones having the same IMEI
number.
ESN, it means Electronic Serial Number. Like IMEI number is
used for GSM handset, ESN is used in CDMA handset.
5
6. HOW A PHONE IS CLONED?
Cellular thieves can capture ESN/MINs using devices such as cell
phone ESN reader or Digital Data Interpreters(DDI).
The ESN/MIN pair can be cloned in number of ways without the
knowledge of carrier or subscriber through the use of electronics
scanning devices.
After the ESN/MIN pair is captured, the cloner reprograms or
alters the microchip of any wireless phone to create a clone of
the wireless phone from which the ESN/MIN pair is stolen.
6
8. METHODS TO DETECT CLONED
PHONE
Duplicate detection- The network detect the same phone in
several places at the same time. Reactions include shutting them
all off so that the real customer will contact the operator
because he lost the service he is paying for.
Velocity trap- The mobile phone seems to be moving at
impossible or most unlikely speed. For example if a call is first
made from Indore, but after five minutes from the same number
the call is made from Delhi.
8
9. CONTD….
Frequent wrong number incoming phone calls to your phone.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals, or receiving
phone bills higher than the calls you have made.
9
10. IMPACT OF CLONING
Each year the mobile phone industry loses millions of dollars in
revenue because of the criminal actions of the persons who are
able to reconfigure mobile phones so that their call are billed to
original phone owned by a person.
Many criminals use cloned cellular telephones for illegal
activities to hide their identity and therefore more difficult to
trace.
10
11. HOW TO PREVENT CLONING?
User verification using Personal Identification Number(PIN) code
is one method for customer protection against cellular phone
fraud.
Traffic analysis detects cellular fraud by using artificial
intelligence software.
Service providers use software which detects suspicious calling
patterns, such as sudden increase in call duration or sudden
increase in number of international calls.
11
12. CONTD….
BLACKLISTING of stolen phones is another mechanism to
prevent unauthorized use of it.
An Equipment Identity Register(EIR) enables network operators
to disable stolen cellular phones on network around the world.
12
13. CONCLUSION
Preventive steps should be taken by the network provider and
the Government the act of legislation to prosecute crimes
related to cellular phone is not viewed as a priority.
Existing cellular systems have a number of potential weakness
that were considered. It is crucial that business and staff take
mobile phone security seriously.
13