SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
A seminar report on
MOBILE CLONING
BY
V.NAVYA
14A81A05B5
(Under the guidance of MR.J.VIJITHANAND, M.TECH)
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SRI VASAVI ENGINEERING COLLEGE
Pedatadepalli, Tadepalligudem-534101,
W.G.Dist, AndhraPradesh,
2016 - 17
ABSTRACT
Mobile communication has been readily available for several years, and is major business
today. It provides a valuable service to its users who are willing to pay a considerable
premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness
and the money involved in the business, it is subject to fraud. Unfortunately, the advance of
security standards has not kept pace with the dissemination of mobile communication.
Some of the features of mobile communication make it an alluring target for criminals. It is a
relatively new invention, so not all people are quite familiar with its possibilities, in good or
in bad. Its newness also means intense competition among mobile phone service providers as
they are attracting customers. The major threat to mobile phone is from cloning.
Cell phone cloning is a technique wherein security data from one cell phone is transferred
into another phone. The other cell phone becomes the exact replica of the original cell phone
like a clone. As a result, while calls can be made from both phones, only the original is
billed. Though communication channels are equipped with security algorithms, yet cloners
get away with the help of loop holes in systems. So when one gets huge bills, the chances are
that the phone is being cloned.
This paper describes about the cell phone cloning with implementation in GSM and CDMA
technology phones. It gives an insight into the security mechanism in CDMA and GSM
phones along with the loop holes in the systems and discusses on the different ways of
preventing this cloning. Moreover, the future threat of this fraud is being elaborated
CONTENTS
S.NO. CHAPTER PAGE NO.
1. INTRODUCTION
2. HOW CELL PHONE WORKS?
3. WHAT IS CELL PHONE CLONING?
4. WHEN DID CELL CLONING START?
5. HOW IS CELL CLONING DONE?
6. METHODS TO DETECT CLONED PHONE ON NETWORK
7. ARE OUR CELL PHONES SECURED?
8. HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
9. ROLE OF SERVICE PROVIDERS TO COMBAT CLONING
FRAUD?
10. HOW TO PREVENT CELL CLONING?
11. SOME FACTS AND FIGURES
12. FUTURE THREATS
13. CONCLUSION
14. REFERENCES
15. INDEX
CHAPTER-1
INTRODUCTION
Cloning is the creation of an organism that is an exact genetic copy of another. This means
that every single bit of DNA is the same between the two!
Remember Dolly the lamb, cloned from a six-year-old ewe in 1997, by a group of
researchers at the Roslin Institute in Scotland? While the debate on the ethics of cloning
continues, human race, for the first time, are faced with a more tangible and harmful version
of cloning and this time it is your cell phone that is the target.
Millions of cell phones users, be it GSM or CDMA, run at risk of having their phones cloned.
As a cell phone user if you have been receiving exorbitantly high bills for calls that were
never placed, chances are that your cell phone could be cloned. Unfortunately, there is no
way the subscriber can detect cloning. Events like call dropping or anomalies in monthly
bills can act as tickers.
According to media reports, recently the Delhi (India) police arrested a person with 20 cell-
phones, a laptop, a SIM scanner, and a writer. The accused was running an exchange illegally
wherein he cloned CDMA based cell phones. He used software named Patagonia for the
cloning and provided cheap international calls to Indian immigrants in West Asia.
CHAPTER-2
HOW CELL PHONE WORKS?
Cell phones send radio frequency transmissions through the air on two distinct channels, one for
voice communications and the other for control signals. When a cellular phone makes a call, it
normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN),
its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the
short buzz you hear after you press the SEND button and before the tower catches the data.
These four things are the components the cellular provider uses to ensure that the phone is
programmed to be billed and that it also has the identity of both the customer and the phone.
MIN and ESN is collectively known as the ‘Pair’ which is used for the cell phone identification.
When the cell site receives the pair signal, it determines if the requester is a legitimate
registered user by comparing the requestor's pair to a cellular subscriber list. Once the cellular
telephone's pair has been recognized, the cell site emits a control signal to permit the subscriber
to place calls at will. This process, known as Anonymous Registration, is carried out each time
the telephone is turned on or picked up by a new cell site.
ESN - The ESN (Electronic Serial Number) is the serial number of your cellular
telephone.The ESN is transmitted to the cell site and used in conjuction with the NAM to
verify that you are a legitimate user of the cellular system.
MIN - The MIN (Mobile Identification Number) is simply the phone number of the
cellular telephone.
CHAPTER-3
WHAT IS CELL PHONE CLONING?
Cell phone cloning is copying the identity of one mobile telephone to another mobile
telephone.
Usually this is done for the purpose of making fraudulent telephone calls. The bills for the
calls go to the legitimate subscriber. The cloner is also able to make effectively
anonymous calls, which attracts another group of interested users.
Cloning is the process of taking the programmed information that is stored in a legitimate
mobile phone and illegally programming the identical information into another mobile
phone. The result is that the "cloned" phone can make and receive calls and the charges for
those calls are billed to the legitimate subscriber. The service provider network does not
have a way to differentiate between the legitimate phone and the "cloned" phone.
Cloning of mobile phones is the act of copying the subscriber information from one phone
onto the other for purposes of obtaining free calls. The other cell phone becomes the exact
replica of the original cell phone like a clone. As a result, while calls can be made from both
phones, only the original is billed.
Cloning occurs most frequently in areas of high cell phone usage -- valet parking lots,
airports, shopping malls, concert halls, sports stadiums, and high-congestion traffic areas in
metropolitan cities.
Figure 1. Cellular phone cloning
CHAPTER-4
WHEN DID CELL CLONING START?
The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100
Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result,
Cabinet Ministers, company chiefs and celebrities routinely found their most intimate
conversations published in the next day's tabloids
Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid
90's with a commonly available modification for the Motorola "brick" phones, such as the
Classic, the Ultra Classic, and the Model 8000.
GSM – Global System for Mobile Communications. A digital cellular phone technology
based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains
user account information. Any GSM phone becomes immediately programmed after
plugging in the SIM card, thus allowing GSM phones to be easily rented or
borrowed.Operators who provide GSM service are Airtel,Hutch etc.
CDMA - Code Division Multiple Access. A method for transmitting simultaneous signals
over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card
unlike in GSM.Operators who provides CDMA service in India are Reliance and Tata
Indicom.
Both GSM and CDMA handsets are prone to cloning. Technically, it is easier to clone a
CDMA handset over a GSM one, though cloning a GSM cell phone is not impossible. There
are also Internet sites that provide information on how one could go about hacking into cell-
phones.
Cloning CDMA Cell Phones - Cellular telephone thieves monitor the radio frequency
spectrum and steal the cell phone pair as it is being anonymously registered with a cell site.
The technology uses spread-spectrum techniques to share bands with multiple conversations.
Subscriber information is also encrypted and transmitted digitally. CDMA handsets are
particularly vulnerable to cloning, according to experts. First generation mobile cellular
networks allowed fraudsters to pull subscription data (such as ESN and MIN) from the
analog air interface and use this data to clone phones. A device called as DDi, Digital Data
Interface (which comes in various formats from the more expensive stand-alone box, to a
device which interfaces with your 800 MHz capable scanner and a PC) can be used to get
pairs by simply making the device mobile and sitting in a busy traffic area (freeway
overpass) and collect all the data you need. The stolen ESN and EMIN were then fed into a
new CDMA handset, whose existing program was erased with the help of downloaded
software. The buyer then programs them into new phones which will have the same number
as that of the original subscriber.
Cloning GSM Phones - GSM handsets, on the contrary, are safer, according to experts.
Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI). It is not a
particularly secret bit of information and you don't need to take any care to keep it private.
The important information is the IMSI, which is stored on the removable SIM card that
carries all your subscriber information, roaming database and so on. GSM employs a fairly
sophisticated asymmetric-key cryptosystem for over-the-air transmission of subscriber
information. Cloning a SIM using information captured over-the-air is therefore difficult,
though not impossible. As long as you don't lose your SIM card, you're safe with GSM. GSM
carriers use the COMP128 authentication algorithm for the SIM, authentication center and
network which make GSM a far secure technology.
GSM networks which are considered to be impregnable can also be hacked. The process is
simple: a SIM card is inserted into a reader. After connecting it to the computer using data
cables, the card details were transferred into the PC. Then, using freely available encryption
software on the Net, the card details can be encrypted on to a blank smart card. The result: A
cloned cell phone is ready for misuse
IS FIXED TELEPHONE NETWORK SAFER THAN MOBILE PHONE?
The answer is yes. In spite of this, the security functions which prevent eavesdropping and
unauthorized user are emphasized by the mobile phone companies. The existing mobile
communication networks are not safer than the fixed Telephone networks. They only offer
protection against the new forms of abuse.
SECURITY FUNCTIONS OF THE GSM AND CDMA -As background to a
better understanding of the attacks on the GSM and CDMA network the following gives a
brief introduction to the Security functions available in GSM. The following functions exist:
Access control by means of a personal smart card (called subscriber Identity module, SIM)
and PIN (personal identification number), Authentication of the users towards the network
carrier and generation of a session key in order to prevent abuse. Encryption of
communication on the radio interface, i.e. between mobile Station and base station,
concealing the users’ identity on the radio interface, i.e. a temporary valid Identity code
(TMSI) is used for the identification of a mobile user instead Of the IMSI.
CHAPTER – 5
HOW IS CELL CLONING DONE?
Cloning involved modifying or replacing the EPROM in the phone with a new chip which
would allow you to configure an ESN (Electronic serial number) via software. You would
also have to change the MIN (Mobile Identification Number). When you had successfully
changed the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning
required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:
1. Sniffing the cellular
2. Trashing cellular companies or cellular resellers
3. Hacking cellular companies or cellular resellers
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older
clone able phones are more difficult to find and newer phones have not been successfully
reverse-engineered.
Cloning has been successfully demonstrated under GSM, but the process is not easy and it
currently remains in the realm of serious hobbyists and researchers.
When placing a call, the phone transmits both the ESN and the MIN to the network. These
were, however, sent in the clear, so anyone with a suitable scanner could receive them. The
eavesdropped codes would then be programmed into another phone, effectively cloning the
original subscription. Any calls made on this cloned phone would be charged on the original
customer. See figure2.
WHAT IS PATAGONIA?
Patagonia is software available in the market which is used to clone CDMA phone. Using this
software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are
other Software’s available in the market to clone GSM phone. This software’s are easily
available in the market. A SIM can be cloned again and again and they can be used at different
places. Messages and calls sent by cloned phones can be tracked. However, if the accused
manages to also clone the IMEI number of the handset, for which software’s are available, there
is no way he can be traced.
Figure 2. Cellular cloning.
CHAPTER -6
METHODS TO DETECT CLONED PHONES ON NETWORK
Several countermeasures were taken with varying success. Here are various methods to
detect cloned phones on the network:
Duplicate detection - The network sees the same phone in several places at the same
time. Reactions include shutting them all off so that the real customer will contact the
operator because he lost the service he is paying for, or tearing down connections so that the
clone users will switch to another clone but the real user will contact the operator.
Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely
speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is
made but this time in Tampere, there must be two phones with the same identity on the
network.
RF (Radio Frequency) - fingerprinting is originally a military technology. Even
nominally identical radio equipment has a distinguishing ``fingerprint'', so the network
software stores and compares fingerprints for all the phones that it sees. This way, it will spot
the clones with the same identity but different fingerprints.
Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies
are noticed, the customer is contacted. Credit card companies use the same method. For
example, if a customer normally makes only local network calls but is suddenly placing calls
to foreign countries for hours of airtime, it indicates a possible clone.
Call counting - Both the phone and the network keep track of calls made with the phone,
and should they differ more than the usually allowed one call, service is denied.
PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and
then calls as usual. After the call has been completed, the user locks the phone by entering
the PIN code again. Operators may share PIN information to enable safer roaming.
Figure 3.Duplicate Detection
CHAPTER -7
ARE OUR CELL PHONES SECURED?
Too many users treat their mobile phones as gadgets rather than as business assets covered by
corporate security policy. Did you realize there's a lucrative black market in stolen and "cloned"
Sim cards? This is possible because Sims are not network specific and, though tamper-proof,
their security is flawed. In fact, a Sim can be cloned many times and the resulting cards used in
numerous phones, each feeding illegally off the same bill.
But there are locking mechanisms on the cellular phones that require a PIN to access the phone.
This would dissuade some attackers, foil others, but might not work against a well financed and
equipped attacker. An 8-digit PIN requires approximately 50,000,000 guesses, but there may be
ways for sophisticated attackers to bypass it.
With the shift to GSM digital - which now covers almost the entire UK mobile sector - the phone
companies assure us that the bad old days are over. Mobile phones, they say, are secure and
privacy friendly.
This is not entirely true. While the amateur scanner menace has been largely exterminated, there
is now more potential than ever before for privacy invasion.
The alleged security of GSM relies on the myth that encryption - the mathematical scrambling of
our conversations - makes it impossible for anyone to intercept and understand our words. And
while this claim looks good on paper, it does not stand up to scrutiny.
The reality is that the encryption has deliberately been made insecure. Many encrypted calls can
therefore be intercepted and decrypted with a laptop computer.
CHAPTER -8
HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
 Frequent wrong number phone calls to your phone, or hang-ups.
 Difficulty in placing outgoing calls.
 Difficulty in retrieving voice mail messages.
 Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls
appearing on your phone bills
CHAPTER -9
ROLE OF SERVICE PROVIDER TO COMBAT CLONING FRAUD?
They are using many methods such as RF Fingerprinting, subscriber behavior profiling, and
Authentication. RF Fingerprinting is a method to uniquely identify mobile phones based on
certain unique radio frequency transmission characteristics that are essentially "fingerprints" of
the radio being used. Subscriber behavior profiling is used to predict possible fraudulent use of
mobile service based on the types of calls previously made by the subscriber.
Calls that are not typical of the subscriber's past usage are flagged as potentially fraudulent and
appropriate actions can be taken.
Authentication has advantages over these technologies in that it is the only industry standardized
procedure that is transparent to the user, a technology that can effectively combat roamer fraud,
and is a prevention system as opposed to a detection system.
CHAPTER -10
HOW TO PREVENT CELL CLONING?
Uniquely identifies a mobile unit within a wireless carrier's network. The MIN often can be
dialed from other wireless or wire line networks. The number differs from the electronic serial
number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can
be checked electronically to help prevent fraud.
.Mobiles should never be trusted for communicating/storing confidential information.
Always set a Pin that's required before the phone can be used.
Check that all mobile devices are covered by a corporate security policy.
Ensure one person is responsible for keeping tabs on who has what equipment and that they
update the central register. How do service providers handle reports of cloned phones?
Legitimate subscribers who have their phones cloned will receive bills with charges for calls they
didn't make. Sometimes these charges amount to several thousands of dollars in addition to the
legitimate charges.
Typically, the service provider will assume the cost of those additional fraudulent calls.
However, to keep the cloned phone from continuing to receive service, the service provider will
terminate the legitimate phone subscription. The subscriber is then required to activate a new
subscription with a different phone number requiring reprogramming of the phone, along with
the additional headaches that go along with phone number changes.
CHAPTER -11
SOME FACTS AND FIGURES
 Southwestern Bell claims wireless fraud costs the industry $650 million each year in
the US. Some federal agents in the US have called phone cloning an especially
`popular' crime because it is hard to trace. In one case, more than 1,500 telephone
calls were placed in a single day by cellular phone thieves using the number of a
single unsuspecting owner.
 A Home Office report in 2002 revealed that in London around 3,000 mobile phones
were stolen in one month alone which were used for cell phone cloning.
 Authorities, in the case, estimated the loss at $3,000 to $4,000 for each number used
in cell phone cloning.
 According to a school of thought, the Telecom Regulatory Authority of India (TRAI)
should issue a directive, which holds the operators responsible for duplications of
mobile phones.
 Qualcomm, which develops CDMA technology globally, says each instance of
mobile hacking is different and therefore there is very little an operator can do to
prevent hacking. "It's like a virus hitting the computer. The software which is used to
hack into the network is different, so operators can only keep upgrading their security
firewall as and when the hackers strike," says a Qualcomm executive.
CHAPTER - 12
FUTURE THREATS
Resolving subscriber fraud can be a long and difficult process for the victim. It may take time
to discover that subscriber fraud has occurred and an even longer time to prove that you did not
incur the debts. As described in this article there are many ways to abuse telecommunication
system, and to prevent abuse from occurring it is absolutely necessary to check out the weakness
and vulnerability of existing telecom systems. If it is planned to invest in new telecom
equipment, a security plan should be made and the system tested before being implemented. It is
therefore mandatory to keep in mind that a technique which is described as safe today can be the
most unsecured technique in the future.
CHAPTER - 13
CONCLUSION
Presently the cellular phone industry relies on common law (fraud and theft) and in-house
counter measures to address cellular phone fraud.
Is in initial stages in India so preventive steps should be taken by the network provider and the
Government the enactment of legislation to prosecute crimes related to cellular phones is not
viewed as a priority, however. It is essential that intended mobile crime legislation be
comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a
specific crime.
Existing cellular systems have a number of potential weaknesses that were considered. It is
crucial that businesses and staff take mobile phone security seriously.
Awareness and a few sensible precautions as part of the overall enterprise security policy will
deter all but the most sophisticated criminal. It is also mandatory to keep in mind that a technique
which is described as safe today can be the most unsecured technique in the future. Therefore it
is absolutely important to check the function of a security system once a year and if necessary
update or replace it. Finally, cell-phones have to go a long way in security before they can be
used in critical applications like m-commerce.
References -
Websites:
http://www.cdmasoftware.com/eng.html
http://www.victorgsm.com/products/msl/
http://www.unlocker.ru/cdma_soft.php
http://www.cxotoday.com
http://infotech.indiatimes.coM
http://wiretap.spies.com
http://www.hackinthebox.org/
http://www.google.com
http://www.wikipedia.com
14A81A05B5

Más contenido relacionado

La actualidad más candente

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

La actualidad más candente (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Clonning
ClonningClonning
Clonning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 

Similar a 14A81A05B5

Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
IAEME Publication
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
Jacqueline Fick
 

Similar a 14A81A05B5 (12)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Test
TestTest
Test
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 

Más de Chaitanya Ram (20)

14 599
14 59914 599
14 599
 
14 598
14 59814 598
14 598
 
14 595
14 59514 595
14 595
 
14 593
14 59314 593
14 593
 
14 587
14 58714 587
14 587
 
14 586
14 58614 586
14 586
 
14 585
14 58514 585
14 585
 
14 584
14 58414 584
14 584
 
14 583
14 58314 583
14 583
 
14 581
14 58114 581
14 581
 
14 577
14 57714 577
14 577
 
14 576
14 57614 576
14 576
 
14 575
14 57514 575
14 575
 
14A81A0574
14A81A057414A81A0574
14A81A0574
 
14 572
14 57214 572
14 572
 
14 571
14 57114 571
14 571
 
14 570
14 57014 570
14 570
 
14 569
14 569 14 569
14 569
 
14 568
14 56814 568
14 568
 
14 567
14 56714 567
14 567
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

14A81A05B5

  • 1. A seminar report on MOBILE CLONING BY V.NAVYA 14A81A05B5 (Under the guidance of MR.J.VIJITHANAND, M.TECH) DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, Tadepalligudem-534101, W.G.Dist, AndhraPradesh, 2016 - 17
  • 2. ABSTRACT Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication. Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning. Cell phone cloning is a technique wherein security data from one cell phone is transferred into another phone. The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones, only the original is billed. Though communication channels are equipped with security algorithms, yet cloners get away with the help of loop holes in systems. So when one gets huge bills, the chances are that the phone is being cloned. This paper describes about the cell phone cloning with implementation in GSM and CDMA technology phones. It gives an insight into the security mechanism in CDMA and GSM phones along with the loop holes in the systems and discusses on the different ways of preventing this cloning. Moreover, the future threat of this fraud is being elaborated
  • 3. CONTENTS S.NO. CHAPTER PAGE NO. 1. INTRODUCTION 2. HOW CELL PHONE WORKS? 3. WHAT IS CELL PHONE CLONING? 4. WHEN DID CELL CLONING START? 5. HOW IS CELL CLONING DONE? 6. METHODS TO DETECT CLONED PHONE ON NETWORK 7. ARE OUR CELL PHONES SECURED? 8. HOW TO KNOW THAT THE CELL HAS BEEN CLONED? 9. ROLE OF SERVICE PROVIDERS TO COMBAT CLONING FRAUD? 10. HOW TO PREVENT CELL CLONING? 11. SOME FACTS AND FIGURES 12. FUTURE THREATS 13. CONCLUSION 14. REFERENCES 15. INDEX
  • 4. CHAPTER-1 INTRODUCTION Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! Remember Dolly the lamb, cloned from a six-year-old ewe in 1997, by a group of researchers at the Roslin Institute in Scotland? While the debate on the ethics of cloning continues, human race, for the first time, are faced with a more tangible and harmful version of cloning and this time it is your cell phone that is the target. Millions of cell phones users, be it GSM or CDMA, run at risk of having their phones cloned. As a cell phone user if you have been receiving exorbitantly high bills for calls that were never placed, chances are that your cell phone could be cloned. Unfortunately, there is no way the subscriber can detect cloning. Events like call dropping or anomalies in monthly bills can act as tickers. According to media reports, recently the Delhi (India) police arrested a person with 20 cell- phones, a laptop, a SIM scanner, and a writer. The accused was running an exchange illegally wherein he cloned CDMA based cell phones. He used software named Patagonia for the cloning and provided cheap international calls to Indian immigrants in West Asia.
  • 5. CHAPTER-2 HOW CELL PHONE WORKS? Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data. These four things are the components the cellular provider uses to ensure that the phone is programmed to be billed and that it also has the identity of both the customer and the phone. MIN and ESN is collectively known as the ‘Pair’ which is used for the cell phone identification. When the cell site receives the pair signal, it determines if the requester is a legitimate registered user by comparing the requestor's pair to a cellular subscriber list. Once the cellular telephone's pair has been recognized, the cell site emits a control signal to permit the subscriber to place calls at will. This process, known as Anonymous Registration, is carried out each time the telephone is turned on or picked up by a new cell site. ESN - The ESN (Electronic Serial Number) is the serial number of your cellular telephone.The ESN is transmitted to the cell site and used in conjuction with the NAM to verify that you are a legitimate user of the cellular system. MIN - The MIN (Mobile Identification Number) is simply the phone number of the cellular telephone.
  • 6. CHAPTER-3 WHAT IS CELL PHONE CLONING? Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users. Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone. Cloning of mobile phones is the act of copying the subscriber information from one phone onto the other for purposes of obtaining free calls. The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones, only the original is billed. Cloning occurs most frequently in areas of high cell phone usage -- valet parking lots, airports, shopping malls, concert halls, sports stadiums, and high-congestion traffic areas in metropolitan cities.
  • 7. Figure 1. Cellular phone cloning
  • 8. CHAPTER-4 WHEN DID CELL CLONING START? The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100 Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result, Cabinet Ministers, company chiefs and celebrities routinely found their most intimate conversations published in the next day's tabloids Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000. GSM – Global System for Mobile Communications. A digital cellular phone technology based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM service are Airtel,Hutch etc. CDMA - Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in GSM.Operators who provides CDMA service in India are Reliance and Tata Indicom. Both GSM and CDMA handsets are prone to cloning. Technically, it is easier to clone a CDMA handset over a GSM one, though cloning a GSM cell phone is not impossible. There are also Internet sites that provide information on how one could go about hacking into cell- phones. Cloning CDMA Cell Phones - Cellular telephone thieves monitor the radio frequency spectrum and steal the cell phone pair as it is being anonymously registered with a cell site. The technology uses spread-spectrum techniques to share bands with multiple conversations. Subscriber information is also encrypted and transmitted digitally. CDMA handsets are particularly vulnerable to cloning, according to experts. First generation mobile cellular networks allowed fraudsters to pull subscription data (such as ESN and MIN) from the analog air interface and use this data to clone phones. A device called as DDi, Digital Data Interface (which comes in various formats from the more expensive stand-alone box, to a device which interfaces with your 800 MHz capable scanner and a PC) can be used to get pairs by simply making the device mobile and sitting in a busy traffic area (freeway overpass) and collect all the data you need. The stolen ESN and EMIN were then fed into a new CDMA handset, whose existing program was erased with the help of downloaded software. The buyer then programs them into new phones which will have the same number as that of the original subscriber.
  • 9. Cloning GSM Phones - GSM handsets, on the contrary, are safer, according to experts. Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI). It is not a particularly secret bit of information and you don't need to take any care to keep it private. The important information is the IMSI, which is stored on the removable SIM card that carries all your subscriber information, roaming database and so on. GSM employs a fairly sophisticated asymmetric-key cryptosystem for over-the-air transmission of subscriber information. Cloning a SIM using information captured over-the-air is therefore difficult, though not impossible. As long as you don't lose your SIM card, you're safe with GSM. GSM carriers use the COMP128 authentication algorithm for the SIM, authentication center and network which make GSM a far secure technology. GSM networks which are considered to be impregnable can also be hacked. The process is simple: a SIM card is inserted into a reader. After connecting it to the computer using data cables, the card details were transferred into the PC. Then, using freely available encryption software on the Net, the card details can be encrypted on to a blank smart card. The result: A cloned cell phone is ready for misuse IS FIXED TELEPHONE NETWORK SAFER THAN MOBILE PHONE? The answer is yes. In spite of this, the security functions which prevent eavesdropping and unauthorized user are emphasized by the mobile phone companies. The existing mobile communication networks are not safer than the fixed Telephone networks. They only offer protection against the new forms of abuse. SECURITY FUNCTIONS OF THE GSM AND CDMA -As background to a better understanding of the attacks on the GSM and CDMA network the following gives a brief introduction to the Security functions available in GSM. The following functions exist: Access control by means of a personal smart card (called subscriber Identity module, SIM) and PIN (personal identification number), Authentication of the users towards the network carrier and generation of a session key in order to prevent abuse. Encryption of communication on the radio interface, i.e. between mobile Station and base station, concealing the users’ identity on the radio interface, i.e. a temporary valid Identity code (TMSI) is used for the identification of a mobile user instead Of the IMSI.
  • 10. CHAPTER – 5 HOW IS CELL CLONING DONE? Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). When you had successfully changed the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways: 1. Sniffing the cellular 2. Trashing cellular companies or cellular resellers 3. Hacking cellular companies or cellular resellers Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone able phones are more difficult to find and newer phones have not been successfully reverse-engineered. Cloning has been successfully demonstrated under GSM, but the process is not easy and it currently remains in the realm of serious hobbyists and researchers. When placing a call, the phone transmits both the ESN and the MIN to the network. These were, however, sent in the clear, so anyone with a suitable scanner could receive them. The eavesdropped codes would then be programmed into another phone, effectively cloning the original subscription. Any calls made on this cloned phone would be charged on the original customer. See figure2. WHAT IS PATAGONIA? Patagonia is software available in the market which is used to clone CDMA phone. Using this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other Software’s available in the market to clone GSM phone. This software’s are easily available in the market. A SIM can be cloned again and again and they can be used at different places. Messages and calls sent by cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset, for which software’s are available, there is no way he can be traced.
  • 11. Figure 2. Cellular cloning.
  • 12. CHAPTER -6 METHODS TO DETECT CLONED PHONES ON NETWORK Several countermeasures were taken with varying success. Here are various methods to detect cloned phones on the network: Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator. Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network. RF (Radio Frequency) - fingerprinting is originally a military technology. Even nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees. This way, it will spot the clones with the same identity but different fingerprints. Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. Credit card companies use the same method. For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone. Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied. PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 14. CHAPTER -7 ARE OUR CELL PHONES SECURED? Too many users treat their mobile phones as gadgets rather than as business assets covered by corporate security policy. Did you realize there's a lucrative black market in stolen and "cloned" Sim cards? This is possible because Sims are not network specific and, though tamper-proof, their security is flawed. In fact, a Sim can be cloned many times and the resulting cards used in numerous phones, each feeding illegally off the same bill. But there are locking mechanisms on the cellular phones that require a PIN to access the phone. This would dissuade some attackers, foil others, but might not work against a well financed and equipped attacker. An 8-digit PIN requires approximately 50,000,000 guesses, but there may be ways for sophisticated attackers to bypass it. With the shift to GSM digital - which now covers almost the entire UK mobile sector - the phone companies assure us that the bad old days are over. Mobile phones, they say, are secure and privacy friendly. This is not entirely true. While the amateur scanner menace has been largely exterminated, there is now more potential than ever before for privacy invasion. The alleged security of GSM relies on the myth that encryption - the mathematical scrambling of our conversations - makes it impossible for anyone to intercept and understand our words. And while this claim looks good on paper, it does not stand up to scrutiny. The reality is that the encryption has deliberately been made insecure. Many encrypted calls can therefore be intercepted and decrypted with a laptop computer.
  • 15. CHAPTER -8 HOW TO KNOW THAT THE CELL HAS BEEN CLONED?  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  • 16. CHAPTER -9 ROLE OF SERVICE PROVIDER TO COMBAT CLONING FRAUD? They are using many methods such as RF Fingerprinting, subscriber behavior profiling, and Authentication. RF Fingerprinting is a method to uniquely identify mobile phones based on certain unique radio frequency transmission characteristics that are essentially "fingerprints" of the radio being used. Subscriber behavior profiling is used to predict possible fraudulent use of mobile service based on the types of calls previously made by the subscriber. Calls that are not typical of the subscriber's past usage are flagged as potentially fraudulent and appropriate actions can be taken. Authentication has advantages over these technologies in that it is the only industry standardized procedure that is transparent to the user, a technology that can effectively combat roamer fraud, and is a prevention system as opposed to a detection system.
  • 17. CHAPTER -10 HOW TO PREVENT CELL CLONING? Uniquely identifies a mobile unit within a wireless carrier's network. The MIN often can be dialed from other wireless or wire line networks. The number differs from the electronic serial number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can be checked electronically to help prevent fraud. .Mobiles should never be trusted for communicating/storing confidential information. Always set a Pin that's required before the phone can be used. Check that all mobile devices are covered by a corporate security policy. Ensure one person is responsible for keeping tabs on who has what equipment and that they update the central register. How do service providers handle reports of cloned phones? Legitimate subscribers who have their phones cloned will receive bills with charges for calls they didn't make. Sometimes these charges amount to several thousands of dollars in addition to the legitimate charges. Typically, the service provider will assume the cost of those additional fraudulent calls. However, to keep the cloned phone from continuing to receive service, the service provider will terminate the legitimate phone subscription. The subscriber is then required to activate a new subscription with a different phone number requiring reprogramming of the phone, along with the additional headaches that go along with phone number changes.
  • 18. CHAPTER -11 SOME FACTS AND FIGURES  Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. Some federal agents in the US have called phone cloning an especially `popular' crime because it is hard to trace. In one case, more than 1,500 telephone calls were placed in a single day by cellular phone thieves using the number of a single unsuspecting owner.  A Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning.  Authorities, in the case, estimated the loss at $3,000 to $4,000 for each number used in cell phone cloning.  According to a school of thought, the Telecom Regulatory Authority of India (TRAI) should issue a directive, which holds the operators responsible for duplications of mobile phones.  Qualcomm, which develops CDMA technology globally, says each instance of mobile hacking is different and therefore there is very little an operator can do to prevent hacking. "It's like a virus hitting the computer. The software which is used to hack into the network is different, so operators can only keep upgrading their security firewall as and when the hackers strike," says a Qualcomm executive.
  • 19. CHAPTER - 12 FUTURE THREATS Resolving subscriber fraud can be a long and difficult process for the victim. It may take time to discover that subscriber fraud has occurred and an even longer time to prove that you did not incur the debts. As described in this article there are many ways to abuse telecommunication system, and to prevent abuse from occurring it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems. If it is planned to invest in new telecom equipment, a security plan should be made and the system tested before being implemented. It is therefore mandatory to keep in mind that a technique which is described as safe today can be the most unsecured technique in the future.
  • 20. CHAPTER - 13 CONCLUSION Presently the cellular phone industry relies on common law (fraud and theft) and in-house counter measures to address cellular phone fraud. Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime. Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously. Awareness and a few sensible precautions as part of the overall enterprise security policy will deter all but the most sophisticated criminal. It is also mandatory to keep in mind that a technique which is described as safe today can be the most unsecured technique in the future. Therefore it is absolutely important to check the function of a security system once a year and if necessary update or replace it. Finally, cell-phones have to go a long way in security before they can be used in critical applications like m-commerce.