its all about mobile jammer,its history,advantages,in whiv=ch circumstances it wi skacni;sauhjnesfnjcsjjskcncnunjcafknihcncnshfskfjciwufkjsanciUFHnekjwhfjfnk.sijaFFFFFFFHIfnfihcndiuhfjklciuafkjbjwkh8oahfnaknfknilfnbsknsnio;ahufnkfnk.jioasi;hulflnsaihjfaulaf;lnfiafhefhubj,shufeouefbklasjhufualeuhfbfiuhsuicnulsihc7eyceufhliacsnbjlfiufhe
2. Department of Computer Science and Engineering
SEMINAR ON MOBILE PHONE CLONING
GUIDED BY: Ms. Sowjanya R PRESENTED BY :
A.V.V.S GANGADHAR
19QM1A0503
3. Department of Computer Science and Engineering
INTRODUCTION
CLONING
Cloning describes the processes used to create an exact genetic replica of another cell, tissue or organism. The
copied material, which has the same genetic makeup as the original, is referred to as a clone.
MOBILE PHONE CLONING
Mobile phone cloning is a way of making a copy of the entire mobile phone data in another mobile by an illegal
methodology. The purpose of such an activity is to make unauthorized use of the mobile phone. The data in the
other phone would contain all the data of the previous phone that can be used for fraudulent activities or for
making anonymous calls from the clone, causing the bill to be addressed to the correct mobile owner.
4. Department of Computer Science and Engineering
TYPES OF MOBILE PHONES
CDMA
This type of mobile phone is called the Code Division Multiple Access mobile phone. Using this, the signal can
be transferred over a shared portion of the spectrum. This type of mobile phone does not use SIM cards. The
operators providing CDMA services are Reliance and Tata Indicom.
GSM
Global System for Mobile Communications mobile phones contain the Subscriber Identity Model or SIM cards
which contain the information about the user. The SIM card can be plugged into the GSM phone to program it.
This also makes way for the GSM phones to be easily borrowed or rented. Operators providing GSM technology
services include Airtel, Reliance JIO, VI, etc.
5. Department of Computer Science and Engineering
HOW CLONING IS DONE?
TWO METHODS:
1. Cloning in CDMA Phones: The CDMA technology uses techniques such as spread-spectrum for sharing
bands with multiple communications. The user information, in the case of CDMA mobiles transmitted
digitally (although after encryption). This makes the CDMA phones more susceptible to attacks. The
attackers analyze the radio frequency spectrum and steal the data (cell phone pair) when the information is
being registered with the cell site. User data such as ESN and MIN are at risk in such situations.
2. Cloning in GSM Phones: Every GSM phone comes with an IMEI number, which is a 15-digit authenticator.
The IMEI number does not require to be kept private. More important than the IMEI number is the
IMSI information present on the SIM card. This is because it holds the subscriber information and the
roaming information. GSM is comparatively more secure than CDMA.
6. Department of Computer Science and Engineering
MOBILE PHONE CLONING SOFTWARE
The cloning software is a set of instructions used to copy data from one mobile to another. For this, the EPROM
or EEPROM of the mobile phones needs to be modified. This is done using a new chip that can configure the
ESN using the software. After this, changing of the MIN takes place. This results in the cloning of the phone.
Various software is used for cloning. Some are described below-
1. Patagonia: CDMA mobiles can be cloned using this software. This is a freely available software and it can
be used to clone a SIM card multiple times. The calls and messages originating from the cloned mobile can
be traced. If however the IMEI number of the mobile is changed, it cannot be tracked.
2. Tady Scanner: Another app used for cloning is Tandy Scanner which can be used for AMPS cloning in
analog phones.
7. Department of Computer Science and Engineering
METHODS OF DETECTION OF CLONED PHONES
1. Duplicate Detection Mechanism: This is a method by which the operators check if the same phone is active
in two places at the same instant. If such a situation occurs. The service providers usually block all services
which makes the attacker switch to a different mobile and the actual owner contacts the service provider to
resume services.
2. Counting the number of calls made every month (or before the payment is made): The phone along
with the network is used to analyze the calls. The calls made are matched by both the records. There can be a
discrepancy or mismatch of only 1 call at the maximum. If there are more irregularities, the service is
terminated.
8. Department of Computer Science and Engineering
HOW TO PREVENT MOBILE PHONE CLONING?
1. Traffic Analysis: This technique is used to know the patterns of making calls using Artificial Intelligence.
This can also be used to make a decision if the activity is fraudulent or very different from the actual user’s
behavior such as all of a sudden long length international calls.
2. Blacklisting: Blacklisting stolen phones is a way to prevent such unauthorized activities. The equipment
Identity register is used by mobile service providers to Blacklist mobile across the world.
3. PIN: The verification of a subscriber using the Personal Identification Number is a way to prevent cloning
activities. In surveys conducted by the USA, the usage of PINs was found to have reduced cell phone fraud by
up to 80%.
9. Department of Computer Science and Engineering
ADVANTAGES
• If you are phone has been lost, you can use your cloned cell phone.
• If your phone got damaged or if you forgot your phone at home or any other place, cloned phone can be
helpful.
DISADVANTAGES
• It can be used by terrorists for criminal activities.
• It can be used by the cloner for fraud calls.
• It can be used for illegal money transfer.
10. Department of Computer Science and Engineering
CONCLUSION
To conclude, cell phone communication is one of the most efficient, reliable and widespread. The utilization of
the system can be altered in either destructive or constructive manner. The security standards unfortunately are
quite easy to breach and takes very less time. Moreover, mobile phone cloning methods is now widespread and
can be implemented very easily. Hence, it must be taken into consideration about the security system which was
implemented lately must not be fruitful enough to secure the system in future aspects. Therefore it is very
important to verify the working of a protection system over a precaution system every once a while and change
or update it every once a year.