SlideShare ist ein Scribd-Unternehmen logo
1 von 35
SCHOOL OF ELECTRONICS
SEMINAR
ON
MOBILE CLONING TECHNOLOGY
Guided By:
Ms.Kirti Panwar
Presented By:
Virendra Baviskar
12MTMCT20(2nd Sem.)
DEVI AHILYA VISHWAVIDYALAYA INDORE
5/11/2014 1
ABSTRACT
 Mobile communication has been readily available for several
years, and is major business today. It provides a valuable
service to its users who are willing to pay a considerable
premium over a fixed line phone, to be able to walk and talk
freely. Because of its usefulness and the money involved in the
business, it is subject to fraud.
 Some of the features of mobile communication make it an
alluring target for criminals. It is a relatively new invention, so
not all people are quite familiar with its possibilities, in good or
in bad. Its newness also means intense competition among
mobile phone service providers as they are attracting
customers. The major threat to mobile phone is from cloning.
5/11/2014 2
ABSTRACT …..
 Mobile phone cloning is a technique wherein security data
from one cell phone is transferred into another phone. The
other cell phone becomes the exact replica of the original
mobile phone like a clone. As a result, while calls can be made
from both phones, only the original is billed. Though
communication channels are equipped with security
algorithms, yet cloners get away with the help of loop holes in
systems. So when one gets huge bills, the chances are that the
phone is being cloned.
 This seminar describes about the cell phone cloning with
implementation in GSM and CDMA technology phones. It
gives an insight into the security mechanism in CDMA and
GSM phones along with the loop holes in the systems and
discusses on the different ways of preventing this cloning.
Moreover, the future threat of this fraud is being elaborated.5/11/2014 3
INDEX
 INTRODUCTION.
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 SYMPTOMS OF PHONE CLONING.
 MEASURES TO BE TAKEN.
 ADVANTAGES AND DISADVANTAGES.
 VICTIMS OF PHONE CLONING.
 CONCLUSION.
 REFERENCES
5/11/2014 4
INTRODUCTION
 Cell phone transmits the radio frequencies with the help of two
separate channels one for voice and another for control signaling
information.
 When a call is done through cell phone along with other three
important components are transmitted- a) Electronic Serial
Number (ESN), b)Mobile Identification Number, c) Station Class
mark.
 These four parts are very important to service provider since they
provide the billing information to the cellular service .
 That how much a customer has to be charged. After receiving
this ESN and MIN, cell service provider verifies them with their
genuine subscriber list. If this pair is genuine then a control
signal is generated and permits the customer to make the call.
The successfully registering this way is known as Anonymous
Registration [5].
5/11/2014 5
INTRODUCTION….
CLONING: Cloning is the creation of an organism that
is an exact genetic copy of another.
PHONE CLONING: Phone cloning is the process of
taking the programmed information that is stored in
a legitimate mobile phone and illegally programming
the identical information into another mobile phone.
5/11/2014 6
CDMA MOBILE SETS
 CDMA stands for Code Division Multiple Access.
 A method for transmitting simultaneous signals over a
shared portion of the spectrum.
 CDMA uses a Mobile Identification Number (MIN)
card that contains user account information.
5/11/2014 7
GSM MOBILE SETS
 GSM stands for Global System for Mobile
Communications.
 GSM uses a Subscriber Identity Module (SIM) card.
 GSM is a standard set developed by the European
Telecommunications Standards Institute (ETSI) to
describe technologies for second generation (2G)
digital cellular networks.
5/11/2014 8
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
Identifier, this is a 15 or 17 digit universally unique
number of the GSM handset.
5/11/2014 9
 SIM, which stands for Subscriber Identification
Module. Basically the SIM provides storage of
subscriber related information of three types:
1. Fixed data stored before the subscription is sold.
2. Temporary network data
3. Service related data.
5/11/2014 10
 ESN, stands for Electronic Serial Number. It is
same as the IMEI but is used in CDMA handsets.
 It is loaded when the phone is manufactured.
 MIN ,stands for Mobile Identification Number,
It’s a 10 digit number used to identify a mobile
phone.
5/11/2014 11
HOW IS A PHONE CLONED?
 Capture the ESN/MIN pair or SIM/IMEI pair.
 Clone the ESN/MIN pair using electronic scanning
devices.
 The cloner reprograms or alters the microchip of any
wireless phone.
 The ESN/MINs are transferred using a computer to a
device.
 These devices are connected to handsets.
 New information is entered into the phone.
Thus a clone of the legitimate phone is thus obtained.
5/11/2014 12
HOW CLONING TAKES PLACE.
http://homesecurityandpersonalprotection.blogspot.in5/11/2014 13
• CLONING DEVICE
http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html5/11/2014 14
CLONING GSM PHONES
 The important information is the IMSI, which is
stored on the removable SIM card.
 SIM card inserted into a reader.
 Connect to computer and card details transferred.
 Use encrypted software to interpret details.
 The result: A cloned cell phone is ready for misuse.
5/11/2014 15
 Cloning a SIM using information captured over-the-
air is therefore difficult, though not impossible.
 As long as you don't lose your SIM card, you're safe
with GSM.
 GSM carriers use the COMP128 authentication
algorithm for the SIM, authentication center and
network which make GSM a far secure technology.
 If your cellphone is late model Motorola, i.e.,
STARTAC, or Ericsson, NEC or other small phone
with a serial port, you'll most likely require the use of
a "Copycat" device to change the ESN
5/11/2014 16
CLONING CDMA PHONES
 Cellular telephone thieves monitor the radio
frequency spectrum.
 Steal the cell phone pair as it is being anonymously
registered with a cell site.
 Subscriber information is also encrypted and
transmitted digitally.
 A device called as DDI, Digital Data Interface can
be used to get pairs.
 Stolen ESN and MIN were then fed into a new
CDMA handset.
5/11/2014 17
DETECTION OF PHONE
CLONING
 Duplicate detection - The network sees the same
phone in several places at the same time.
5/11/2014 18
DETECTION (Continued..)
 Velocity trap - The mobile phone seems to be moving at
impossible, or most unlikely speeds..
 RF (Radio Frequency) - Nominally identical radio
equipment has a distinguishing ``fingerprint'', so the
network software stores and compares fingerprints for all
the phones that it sees.
 Usage profiling. - Profiles of customers' phone usage are
kept, and when discrepancies are noticed, the customer is
contacted.
5/11/2014 19
DETECTION (Continued..)
 Call counting - Both the phone and the network keep
track of calls made with the phone, and should they
differ more than the usually allowed one call, service
is denied.
 PIN codes - Prior to placing a call, the caller unlocks
the phone by entering a PIN code and then calls as
usual.
5/11/2014 20
DETECTION(Continued..)
 The best detection method available in CDMA is the
A KEY FEATURE.
• Secret 20 digit number.
• Number loaded in Authentication Centre.
• Cannot be copied.
5/11/2014 21
PHONE CLONING
SYMPTOMS
 Frequent wrong number phone calls to your phone, or
hang-ups.
 Difficulty in placing outgoing calls.
 Difficulty in retrieving voice mail messages.
 Incoming calls constantly receiving busy signals or
wrong numbers.
 Unusual calls appearing on your phone bills
5/11/2014 22
CLONING STATISTICS
Victims
percentage
Age
5/11/2014 23
 According to a school of thought, the Telecom
Regulatory Authority of India (TRAI) should issue a
directive, which holds the operators responsible for
duplications of mobile phones.
 Qualcomm, which develops CDMA technology
globally, says each instance of mobile hacking is
different and therefore there is very little an operator
can do to prevent hacking. "It's like a virus hitting the
computer. The software which is used to hack into the
network is different, so operators can only keep
upgrading their security firewall as and when the
hackers strike," says a Qualcomm executive
5/11/2014 24
MEASURES TO BE TAKEN
 Service providers have adopted certain measures to
prevent cellular fraud.
 These include:
 Blacklisting of stolen phones is another mechanism to
prevent unauthorized use.
 User verification using Personal Identification
Number (PIN) codes is one method for customer
protection against cellular phone fraud
5/11/2014 25
Example:
 The Central Forensic Laboratory at Hyderabad has
reportedly developed software that would detect cloned
mobile phones. Called the Speaker Identification
Technique, the software enables one to recognize the
voice of a person by acoustics analysis. These methods
are only good at detecting cloning, not preventing
damage. A better solution is to add authentication to the
system. This initiative by the Forensic Laboratory had to
be taken up in the wake of more and more reports of
misuse of cloned mobiles
5/11/2014 26
 Encryption: Encryption is regarded as the effective
way to prevent cellular fraud
 Traffic analysis detects cellular fraud by using
artificial intelligence software to detect suspicious
calling patterns, such as a sudden increase in the
length of calls or a sudden increase in the number of
international calls.
 Blocking: Blocking is used by service providers
to protect themselves from high risk callers.
5/11/2014 27
ADVANTAGES
1. If your phone has been lost , you can use your cloned
cell phone.
2. If your phone got damaged or if you forgot your
phone at home or any other place . Cloned phone
can be helpful.
5/11/2014 28
DISADVANTAGES
 It can be used by the terrorists for criminal activities.
 It can be used by the cloner for fraud calls.
 It can be used for illegal money transfer.
5/11/2014 29
VICTIMS OF PHONE CLONING
 Anita Davis, a mobile clone victim. One month, her
cell phone bill showed $3,151 worth of calls in one
month, to Pakistan, Israel, Jordan, Africa, and other
countries.......zvideoplayback_33_xvid.avi
 A Louisville woman was shocked when she got her
February cell phone bill from T-Mobile. It was ten
times higher than it's ever been before. Equally
troubling, she didn't recognize most of the phone
numbers on it.
5/11/2014 30
 According to media reports, recently the Delhi (India) police
arrested a person with 20 cell- phones, a laptop, a SIM scanner,
and a writer. The accused was running an exchange illegally
wherein he cloned CDMA based cell phones. He used software
named Patagonia for the cloning and provided cheap
international calls to Indian immigrants in West Asia.
WHAT IS PATAGONIA?
 Patagonia is software available in the market which is used to
clone CDMA phone. Using this software a cloner can take over
the control of a CDMA phone i.e. cloning of phone. A SIM can
be cloned again and again and they can be used at different
places. Messages and calls sent by cloned phones can be
tracked. However, if the accused manages to also clone the
IMEI number of the handset, for which software’s are
available, there is no way he can be traced.
5/11/2014 31
CONCLUSION
 Phone Cloning is in initial stages in India. Preventive
steps should be taken by the network provider and the
Government. The enactment of legislation to
prosecute crimes related to cellular phones is not
viewed as a priority. The cloning of CDMA mobile
phones was possible because there was no protection
to the identification information.
5/11/2014 32
REFERENCES
[1]http://www.cdmasoftware.com/eng.html
[2]http://infotech.indiatimes.com
[3]http://www.hackinthebox.org/
[4] Rehault, F. (2010). Windows mobile advanced forensics: An alternative to existing
tools.Journal of Digital Investigation, 7(1–2).
[5] Moore, H. D. (2007, September 25). A root shell in my pocket (and maybe yours).
Available from http://blog.metasploit.com/2007/09/root-shell-in-my-pocket-and-maybe-
yours.html.
[6]Mislan, R., Casey, E., & Kessler, G. (2010). The growing need for on-scene triage of
mobile devices. Journal of Digital Investigation, 6.
 Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications
Networks (WOCN), 2010 Seventh International Conference in Sept,2010.
5/11/2014 33
THANK YOU...
5/11/2014 34
ANY QUESTIONS?
5/11/2014 35

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
 
Third generation (3g)wireless technology
Third generation (3g)wireless technologyThird generation (3g)wireless technology
Third generation (3g)wireless technologySardar Kaukaz
 
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEMIoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEMjohn solomon j
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...mahesh_rman
 

Was ist angesagt? (20)

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
eSIM
eSIMeSIM
eSIM
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
esim
esimesim
esim
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Third generation (3g)wireless technology
Third generation (3g)wireless technologyThird generation (3g)wireless technology
Third generation (3g)wireless technology
 
Iptelephony ppt
Iptelephony pptIptelephony ppt
Iptelephony ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEMIoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
IoT BASED VEHICLE TRACKING AND TRAFFIC SURVIELLENCE SYSTEM
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
 
5 G Mobile Technology
5 G Mobile Technology5 G Mobile Technology
5 G Mobile Technology
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 

Andere mochten auch

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Tis endangered and or extinct species cloning
Tis endangered and or extinct species cloningTis endangered and or extinct species cloning
Tis endangered and or extinct species cloningMorganScience
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Intel Centrino Mobile Technology
Intel Centrino Mobile TechnologyIntel Centrino Mobile Technology
Intel Centrino Mobile TechnologyArpan Bhansali
 
1seg - mobile digital TV in Japan
1seg - mobile digital TV in Japan1seg - mobile digital TV in Japan
1seg - mobile digital TV in JapanGerhard Fasol
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Moletronics or molecular electronics - technical seminar
Moletronics or molecular electronics - technical seminarMoletronics or molecular electronics - technical seminar
Moletronics or molecular electronics - technical seminarSUKHWINDER SINGH
 

Andere mochten auch (20)

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Tis endangered and or extinct species cloning
Tis endangered and or extinct species cloningTis endangered and or extinct species cloning
Tis endangered and or extinct species cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
virtual surgery
virtual surgeryvirtual surgery
virtual surgery
 
Intel Centrino Mobile Technology
Intel Centrino Mobile TechnologyIntel Centrino Mobile Technology
Intel Centrino Mobile Technology
 
1seg - mobile digital TV in Japan
1seg - mobile digital TV in Japan1seg - mobile digital TV in Japan
1seg - mobile digital TV in Japan
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Electronics bomb
Electronics bombElectronics bomb
Electronics bomb
 
Brain gate system
Brain gate systemBrain gate system
Brain gate system
 
Moletronics or molecular electronics - technical seminar
Moletronics or molecular electronics - technical seminarMoletronics or molecular electronics - technical seminar
Moletronics or molecular electronics - technical seminar
 
Multi touch interaction
Multi touch interactionMulti touch interaction
Multi touch interaction
 

Ähnlich wie Mobile Cloning Technology

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersmParticle
 

Ähnlich wie Mobile Cloning Technology (18)

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Clonning
ClonningClonning
Clonning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Test
TestTest
Test
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokers
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 

Kürzlich hochgeladen

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 

Kürzlich hochgeladen (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 

Mobile Cloning Technology

  • 1. SCHOOL OF ELECTRONICS SEMINAR ON MOBILE CLONING TECHNOLOGY Guided By: Ms.Kirti Panwar Presented By: Virendra Baviskar 12MTMCT20(2nd Sem.) DEVI AHILYA VISHWAVIDYALAYA INDORE 5/11/2014 1
  • 2. ABSTRACT  Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud.  Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning. 5/11/2014 2
  • 3. ABSTRACT …..  Mobile phone cloning is a technique wherein security data from one cell phone is transferred into another phone. The other cell phone becomes the exact replica of the original mobile phone like a clone. As a result, while calls can be made from both phones, only the original is billed. Though communication channels are equipped with security algorithms, yet cloners get away with the help of loop holes in systems. So when one gets huge bills, the chances are that the phone is being cloned.  This seminar describes about the cell phone cloning with implementation in GSM and CDMA technology phones. It gives an insight into the security mechanism in CDMA and GSM phones along with the loop holes in the systems and discusses on the different ways of preventing this cloning. Moreover, the future threat of this fraud is being elaborated.5/11/2014 3
  • 4. INDEX  INTRODUCTION.  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  SYMPTOMS OF PHONE CLONING.  MEASURES TO BE TAKEN.  ADVANTAGES AND DISADVANTAGES.  VICTIMS OF PHONE CLONING.  CONCLUSION.  REFERENCES 5/11/2014 4
  • 5. INTRODUCTION  Cell phone transmits the radio frequencies with the help of two separate channels one for voice and another for control signaling information.  When a call is done through cell phone along with other three important components are transmitted- a) Electronic Serial Number (ESN), b)Mobile Identification Number, c) Station Class mark.  These four parts are very important to service provider since they provide the billing information to the cellular service .  That how much a customer has to be charged. After receiving this ESN and MIN, cell service provider verifies them with their genuine subscriber list. If this pair is genuine then a control signal is generated and permits the customer to make the call. The successfully registering this way is known as Anonymous Registration [5]. 5/11/2014 5
  • 6. INTRODUCTION…. CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. 5/11/2014 6
  • 7. CDMA MOBILE SETS  CDMA stands for Code Division Multiple Access.  A method for transmitting simultaneous signals over a shared portion of the spectrum.  CDMA uses a Mobile Identification Number (MIN) card that contains user account information. 5/11/2014 7
  • 8. GSM MOBILE SETS  GSM stands for Global System for Mobile Communications.  GSM uses a Subscriber Identity Module (SIM) card.  GSM is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks. 5/11/2014 8
  • 9. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 15 or 17 digit universally unique number of the GSM handset. 5/11/2014 9
  • 10.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold. 2. Temporary network data 3. Service related data. 5/11/2014 10
  • 11.  ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets.  It is loaded when the phone is manufactured.  MIN ,stands for Mobile Identification Number, It’s a 10 digit number used to identify a mobile phone. 5/11/2014 11
  • 12. HOW IS A PHONE CLONED?  Capture the ESN/MIN pair or SIM/IMEI pair.  Clone the ESN/MIN pair using electronic scanning devices.  The cloner reprograms or alters the microchip of any wireless phone.  The ESN/MINs are transferred using a computer to a device.  These devices are connected to handsets.  New information is entered into the phone. Thus a clone of the legitimate phone is thus obtained. 5/11/2014 12
  • 13. HOW CLONING TAKES PLACE. http://homesecurityandpersonalprotection.blogspot.in5/11/2014 13
  • 15. CLONING GSM PHONES  The important information is the IMSI, which is stored on the removable SIM card.  SIM card inserted into a reader.  Connect to computer and card details transferred.  Use encrypted software to interpret details.  The result: A cloned cell phone is ready for misuse. 5/11/2014 15
  • 16.  Cloning a SIM using information captured over-the- air is therefore difficult, though not impossible.  As long as you don't lose your SIM card, you're safe with GSM.  GSM carriers use the COMP128 authentication algorithm for the SIM, authentication center and network which make GSM a far secure technology.  If your cellphone is late model Motorola, i.e., STARTAC, or Ericsson, NEC or other small phone with a serial port, you'll most likely require the use of a "Copycat" device to change the ESN 5/11/2014 16
  • 17. CLONING CDMA PHONES  Cellular telephone thieves monitor the radio frequency spectrum.  Steal the cell phone pair as it is being anonymously registered with a cell site.  Subscriber information is also encrypted and transmitted digitally.  A device called as DDI, Digital Data Interface can be used to get pairs.  Stolen ESN and MIN were then fed into a new CDMA handset. 5/11/2014 17
  • 18. DETECTION OF PHONE CLONING  Duplicate detection - The network sees the same phone in several places at the same time. 5/11/2014 18
  • 19. DETECTION (Continued..)  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds..  RF (Radio Frequency) - Nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees.  Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. 5/11/2014 19
  • 20. DETECTION (Continued..)  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. 5/11/2014 20
  • 21. DETECTION(Continued..)  The best detection method available in CDMA is the A KEY FEATURE. • Secret 20 digit number. • Number loaded in Authentication Centre. • Cannot be copied. 5/11/2014 21
  • 22. PHONE CLONING SYMPTOMS  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers.  Unusual calls appearing on your phone bills 5/11/2014 22
  • 24.  According to a school of thought, the Telecom Regulatory Authority of India (TRAI) should issue a directive, which holds the operators responsible for duplications of mobile phones.  Qualcomm, which develops CDMA technology globally, says each instance of mobile hacking is different and therefore there is very little an operator can do to prevent hacking. "It's like a virus hitting the computer. The software which is used to hack into the network is different, so operators can only keep upgrading their security firewall as and when the hackers strike," says a Qualcomm executive 5/11/2014 24
  • 25. MEASURES TO BE TAKEN  Service providers have adopted certain measures to prevent cellular fraud.  These include:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud 5/11/2014 25
  • 26. Example:  The Central Forensic Laboratory at Hyderabad has reportedly developed software that would detect cloned mobile phones. Called the Speaker Identification Technique, the software enables one to recognize the voice of a person by acoustics analysis. These methods are only good at detecting cloning, not preventing damage. A better solution is to add authentication to the system. This initiative by the Forensic Laboratory had to be taken up in the wake of more and more reports of misuse of cloned mobiles 5/11/2014 26
  • 27.  Encryption: Encryption is regarded as the effective way to prevent cellular fraud  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  Blocking: Blocking is used by service providers to protect themselves from high risk callers. 5/11/2014 27
  • 28. ADVANTAGES 1. If your phone has been lost , you can use your cloned cell phone. 2. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful. 5/11/2014 28
  • 29. DISADVANTAGES  It can be used by the terrorists for criminal activities.  It can be used by the cloner for fraud calls.  It can be used for illegal money transfer. 5/11/2014 29
  • 30. VICTIMS OF PHONE CLONING  Anita Davis, a mobile clone victim. One month, her cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.......zvideoplayback_33_xvid.avi  A Louisville woman was shocked when she got her February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it. 5/11/2014 30
  • 31.  According to media reports, recently the Delhi (India) police arrested a person with 20 cell- phones, a laptop, a SIM scanner, and a writer. The accused was running an exchange illegally wherein he cloned CDMA based cell phones. He used software named Patagonia for the cloning and provided cheap international calls to Indian immigrants in West Asia. WHAT IS PATAGONIA?  Patagonia is software available in the market which is used to clone CDMA phone. Using this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. A SIM can be cloned again and again and they can be used at different places. Messages and calls sent by cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset, for which software’s are available, there is no way he can be traced. 5/11/2014 31
  • 32. CONCLUSION  Phone Cloning is in initial stages in India. Preventive steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile phones was possible because there was no protection to the identification information. 5/11/2014 32
  • 33. REFERENCES [1]http://www.cdmasoftware.com/eng.html [2]http://infotech.indiatimes.com [3]http://www.hackinthebox.org/ [4] Rehault, F. (2010). Windows mobile advanced forensics: An alternative to existing tools.Journal of Digital Investigation, 7(1–2). [5] Moore, H. D. (2007, September 25). A root shell in my pocket (and maybe yours). Available from http://blog.metasploit.com/2007/09/root-shell-in-my-pocket-and-maybe- yours.html. [6]Mislan, R., Casey, E., & Kessler, G. (2010). The growing need for on-scene triage of mobile devices. Journal of Digital Investigation, 6.  Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010. 5/11/2014 33