SlideShare una empresa de Scribd logo
1 de 11
Department of Computer Science and Engineering
Department of Computer Science and Engineering
SEMINAR ON MOBILE PHONE CLONING
GUIDED BY: Ms. Sowjanya R PRESENTED BY :
A.V.V.S GANGADHAR
19QM1A0503
Department of Computer Science and Engineering
INTRODUCTION
CLONING
Cloning describes the processes used to create an exact genetic replica of another cell, tissue or organism. The
copied material, which has the same genetic makeup as the original, is referred to as a clone.
MOBILE PHONE CLONING
Mobile phone cloning is a way of making a copy of the entire mobile phone data in another mobile by an illegal
methodology. The purpose of such an activity is to make unauthorized use of the mobile phone. The data in the
other phone would contain all the data of the previous phone that can be used for fraudulent activities or for
making anonymous calls from the clone, causing the bill to be addressed to the correct mobile owner.
Department of Computer Science and Engineering
TYPES OF MOBILE PHONES
CDMA
This type of mobile phone is called the Code Division Multiple Access mobile phone. Using this, the signal can
be transferred over a shared portion of the spectrum. This type of mobile phone does not use SIM cards. The
operators providing CDMA services are Reliance and Tata Indicom.
GSM
Global System for Mobile Communications mobile phones contain the Subscriber Identity Model or SIM cards
which contain the information about the user. The SIM card can be plugged into the GSM phone to program it.
This also makes way for the GSM phones to be easily borrowed or rented. Operators providing GSM technology
services include Airtel, Reliance JIO, VI, etc.
Department of Computer Science and Engineering
HOW CLONING IS DONE?
TWO METHODS:
1. Cloning in CDMA Phones: The CDMA technology uses techniques such as spread-spectrum for sharing
bands with multiple communications. The user information, in the case of CDMA mobiles transmitted
digitally (although after encryption). This makes the CDMA phones more susceptible to attacks. The
attackers analyze the radio frequency spectrum and steal the data (cell phone pair) when the information is
being registered with the cell site. User data such as ESN and MIN are at risk in such situations.
2. Cloning in GSM Phones: Every GSM phone comes with an IMEI number, which is a 15-digit authenticator.
The IMEI number does not require to be kept private. More important than the IMEI number is the
IMSI information present on the SIM card. This is because it holds the subscriber information and the
roaming information. GSM is comparatively more secure than CDMA.
Department of Computer Science and Engineering
MOBILE PHONE CLONING SOFTWARE
The cloning software is a set of instructions used to copy data from one mobile to another. For this, the EPROM
or EEPROM of the mobile phones needs to be modified. This is done using a new chip that can configure the
ESN using the software. After this, changing of the MIN takes place. This results in the cloning of the phone.
Various software is used for cloning. Some are described below-
1. Patagonia: CDMA mobiles can be cloned using this software. This is a freely available software and it can
be used to clone a SIM card multiple times. The calls and messages originating from the cloned mobile can
be traced. If however the IMEI number of the mobile is changed, it cannot be tracked.
2. Tady Scanner: Another app used for cloning is Tandy Scanner which can be used for AMPS cloning in
analog phones.
Department of Computer Science and Engineering
METHODS OF DETECTION OF CLONED PHONES
1. Duplicate Detection Mechanism: This is a method by which the operators check if the same phone is active
in two places at the same instant. If such a situation occurs. The service providers usually block all services
which makes the attacker switch to a different mobile and the actual owner contacts the service provider to
resume services.
2. Counting the number of calls made every month (or before the payment is made): The phone along
with the network is used to analyze the calls. The calls made are matched by both the records. There can be a
discrepancy or mismatch of only 1 call at the maximum. If there are more irregularities, the service is
terminated.
Department of Computer Science and Engineering
HOW TO PREVENT MOBILE PHONE CLONING?
1. Traffic Analysis: This technique is used to know the patterns of making calls using Artificial Intelligence.
This can also be used to make a decision if the activity is fraudulent or very different from the actual user’s
behavior such as all of a sudden long length international calls.
2. Blacklisting: Blacklisting stolen phones is a way to prevent such unauthorized activities. The equipment
Identity register is used by mobile service providers to Blacklist mobile across the world.
3. PIN: The verification of a subscriber using the Personal Identification Number is a way to prevent cloning
activities. In surveys conducted by the USA, the usage of PINs was found to have reduced cell phone fraud by
up to 80%.
Department of Computer Science and Engineering
ADVANTAGES
• If you are phone has been lost, you can use your cloned cell phone.
• If your phone got damaged or if you forgot your phone at home or any other place, cloned phone can be
helpful.
DISADVANTAGES
• It can be used by terrorists for criminal activities.
• It can be used by the cloner for fraud calls.
• It can be used for illegal money transfer.
Department of Computer Science and Engineering
CONCLUSION
To conclude, cell phone communication is one of the most efficient, reliable and widespread. The utilization of
the system can be altered in either destructive or constructive manner. The security standards unfortunately are
quite easy to breach and takes very less time. Moreover, mobile phone cloning methods is now widespread and
can be implemented very easily. Hence, it must be taken into consideration about the security system which was
implemented lately must not be fruitful enough to secure the system in future aspects. Therefore it is very
important to verify the working of a protection system over a precaution system every once a while and change
or update it every once a year.
Department of Computer Science and Engineering
Thank you

Más contenido relacionado

Similar a mobile jammer ppt.pptx

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

Similar a mobile jammer ppt.pptx (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Test
TestTest
Test
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 

Último (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

mobile jammer ppt.pptx

  • 1. Department of Computer Science and Engineering
  • 2. Department of Computer Science and Engineering SEMINAR ON MOBILE PHONE CLONING GUIDED BY: Ms. Sowjanya R PRESENTED BY : A.V.V.S GANGADHAR 19QM1A0503
  • 3. Department of Computer Science and Engineering INTRODUCTION CLONING Cloning describes the processes used to create an exact genetic replica of another cell, tissue or organism. The copied material, which has the same genetic makeup as the original, is referred to as a clone. MOBILE PHONE CLONING Mobile phone cloning is a way of making a copy of the entire mobile phone data in another mobile by an illegal methodology. The purpose of such an activity is to make unauthorized use of the mobile phone. The data in the other phone would contain all the data of the previous phone that can be used for fraudulent activities or for making anonymous calls from the clone, causing the bill to be addressed to the correct mobile owner.
  • 4. Department of Computer Science and Engineering TYPES OF MOBILE PHONES CDMA This type of mobile phone is called the Code Division Multiple Access mobile phone. Using this, the signal can be transferred over a shared portion of the spectrum. This type of mobile phone does not use SIM cards. The operators providing CDMA services are Reliance and Tata Indicom. GSM Global System for Mobile Communications mobile phones contain the Subscriber Identity Model or SIM cards which contain the information about the user. The SIM card can be plugged into the GSM phone to program it. This also makes way for the GSM phones to be easily borrowed or rented. Operators providing GSM technology services include Airtel, Reliance JIO, VI, etc.
  • 5. Department of Computer Science and Engineering HOW CLONING IS DONE? TWO METHODS: 1. Cloning in CDMA Phones: The CDMA technology uses techniques such as spread-spectrum for sharing bands with multiple communications. The user information, in the case of CDMA mobiles transmitted digitally (although after encryption). This makes the CDMA phones more susceptible to attacks. The attackers analyze the radio frequency spectrum and steal the data (cell phone pair) when the information is being registered with the cell site. User data such as ESN and MIN are at risk in such situations. 2. Cloning in GSM Phones: Every GSM phone comes with an IMEI number, which is a 15-digit authenticator. The IMEI number does not require to be kept private. More important than the IMEI number is the IMSI information present on the SIM card. This is because it holds the subscriber information and the roaming information. GSM is comparatively more secure than CDMA.
  • 6. Department of Computer Science and Engineering MOBILE PHONE CLONING SOFTWARE The cloning software is a set of instructions used to copy data from one mobile to another. For this, the EPROM or EEPROM of the mobile phones needs to be modified. This is done using a new chip that can configure the ESN using the software. After this, changing of the MIN takes place. This results in the cloning of the phone. Various software is used for cloning. Some are described below- 1. Patagonia: CDMA mobiles can be cloned using this software. This is a freely available software and it can be used to clone a SIM card multiple times. The calls and messages originating from the cloned mobile can be traced. If however the IMEI number of the mobile is changed, it cannot be tracked. 2. Tady Scanner: Another app used for cloning is Tandy Scanner which can be used for AMPS cloning in analog phones.
  • 7. Department of Computer Science and Engineering METHODS OF DETECTION OF CLONED PHONES 1. Duplicate Detection Mechanism: This is a method by which the operators check if the same phone is active in two places at the same instant. If such a situation occurs. The service providers usually block all services which makes the attacker switch to a different mobile and the actual owner contacts the service provider to resume services. 2. Counting the number of calls made every month (or before the payment is made): The phone along with the network is used to analyze the calls. The calls made are matched by both the records. There can be a discrepancy or mismatch of only 1 call at the maximum. If there are more irregularities, the service is terminated.
  • 8. Department of Computer Science and Engineering HOW TO PREVENT MOBILE PHONE CLONING? 1. Traffic Analysis: This technique is used to know the patterns of making calls using Artificial Intelligence. This can also be used to make a decision if the activity is fraudulent or very different from the actual user’s behavior such as all of a sudden long length international calls. 2. Blacklisting: Blacklisting stolen phones is a way to prevent such unauthorized activities. The equipment Identity register is used by mobile service providers to Blacklist mobile across the world. 3. PIN: The verification of a subscriber using the Personal Identification Number is a way to prevent cloning activities. In surveys conducted by the USA, the usage of PINs was found to have reduced cell phone fraud by up to 80%.
  • 9. Department of Computer Science and Engineering ADVANTAGES • If you are phone has been lost, you can use your cloned cell phone. • If your phone got damaged or if you forgot your phone at home or any other place, cloned phone can be helpful. DISADVANTAGES • It can be used by terrorists for criminal activities. • It can be used by the cloner for fraud calls. • It can be used for illegal money transfer.
  • 10. Department of Computer Science and Engineering CONCLUSION To conclude, cell phone communication is one of the most efficient, reliable and widespread. The utilization of the system can be altered in either destructive or constructive manner. The security standards unfortunately are quite easy to breach and takes very less time. Moreover, mobile phone cloning methods is now widespread and can be implemented very easily. Hence, it must be taken into consideration about the security system which was implemented lately must not be fruitful enough to secure the system in future aspects. Therefore it is very important to verify the working of a protection system over a precaution system every once a while and change or update it every once a year.
  • 11. Department of Computer Science and Engineering Thank you