SlideShare una empresa de Scribd logo
1 de 30
TOPIC: MOBILE PHONE CLONING

Presented By:
Ritik Nagar
ECE 3rd Year
* WHAT IS CELL PHONE CLONING?
* GSM
* CDMA
* IMEI, ESN, MIN
* HOW IS CELL PHONE CLONING DONE?
* ARE OUR CELL PHONES SECURED?
* HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
* DETECTION OF A CLONED PHONE IN A NETWORK
* IMPACTS OF CELL PHONE CLONING
* HOW TO PREVENT CELL CLONING?
* CONCLUSION
Cell phone cloning is copying the identity
of one mobile telephone to another mobile
telephone.
It is the process of taking the programmed
information that is stored in a legitimate
mobile phone and illegally programming the
identical information into another mobile
phone.
The result is that the "cloned" phone can
make and receive calls and the charges for
those calls are billed to the legitimate
subscriber. The service provider network
does not have a way to differentiate
between the legitimate phone and the
"cloned" phone.
Global System for Mobile Communications.
A digital cellular phone technology based
on TDMA GSM phones use a Subscriber
Identity Module (SIM) card that contains
user account information. Any GSM phone
becomes immediately programmed after
plugging in the SIM card, thus allowing
GSM phones to be easily rented or
borrowed. Operators who provide GSM
service are Airtel, Idea etc.
Code Division Multiple Access. A method
for transmitting simultaneous signals
over a shared portion of the spectrum.
There is no Subscriber Identity Module
(SIM) card unlike in GSM. Operators who
provides CDMA service in India are
Reliance and Tata Indicom.
IMEI (International Mobile Station
Equipment Identity)
The IMEI number is used by a GSM network to
identify valid
devices and therefore can
be used for stopping a stolen phone from
accessing that network.
ESN (Electronic Serial Number)
ESN number is used to uniquely identify a mobile
phone operating on CDMA network.

MIN (Mobile Identification Number)
MIN is a number that is derived from the 10digit directory telephone number assigned to a
mobile station.
Cloning involves modifying or replacing
the EPROM in the phone with a new chip
which would allow you to configure an ESN
(Electronic serial number) via software.
You would also have to change the MIN
(Mobile Identification Number). Cloning
require access to ESN and MIN pairs.
ESN/MIN pairs can be discovered in
several ways:
*Sniffing
*Trashing

the cellular
cellular companies or cellular

resellers

*Hacking

cellular companies or cellular
resellers
Cellular

thieves can capture ESN/MINs using
devices such as cell phone ESN reader or
digital data interpreters (DDI). DDIs are
devices specially manufactured to intercept
ESN/MINs.

Numbers

can be recorded by hand, one-byone, or stored in the box and later downloaded
to a computer.

After

the ESN/MIN pair is captured, the cloner
reprograms or alters the microchip of any
wireless phone to create a clone of the
wireless phone from which the ESN/MIN pair was
Patagonia is a software available in the
market which is used to clone CDMA phones.
Using this software a cloner can modify the
ESN/MIN of any CDMA phone.
Once we have the ESN/MIN of the target cell
phone, we can clone them to another phone
using this software.
*

After we have modified the EEPROM of our
device, it can be used as a cloned device.

*

Now we can use our phone for making
fraudulent telephone calls but the bills for
the calls will go to the legitimate
subscriber.
*We

have seen that CDMA phones can easily be
cloned but when it comes to GSM ,the task is
tougher but not impossible for expert hackers.

*With

the shift to GSM digital, the phone
companies assure us that the bad old days are
over and mobile phones are secure and privacy
friendly. But this not entirely true so we
still need to be careful about this matter.
*Frequent

wrong number phone calls to your
phone, or hang-ups.

*Difficulty in placing outgoing calls.
*Difficulty in retrieving voice mail messages.
*Incoming calls constantly receiving busy
signals or wrong numbers. Unusual calls
appearing on your phone bills
*Duplicate Detection
*Velocity Trap
*Usage Profiling
*Call Counting
*The

network sees the same phone in several
places at the same time.

*Reactions

include shutting them all off so
that the real customer will contact the
operator because he lost the service he is
paying for.

*After

verification the service will be
provided only to the real subscriber.
*

It notices when the mobile phone seems to be
moving at impossible, or most unlikely speeds.

*For

example, if a call is first made in Delhi,
and five minutes later, another call is made
from the same number but this time in Mumbai
then it is obvious that there must be two
phones with the same identity on the network.

*So

service will be terminated until the real
user is verified.
*Profiles

of customers' phone usage are kept,
and when discrepancies are noticed, the
customer is contacted.

*For

example, if a customer normally makes only
local network calls but is suddenly placing
calls to foreign countries for hours of
airtime, it indicates a possible clone
*Both

the phone and the network keep track of
calls made with the phone, and should they
differ more than the usually allowed one call,
service is denied.
*Each

year, the mobile phone industry loses
millions of dollars in revenue because of the
cloned phones as their calls are billed to
other phones owned by innocent third persons.

*Many

criminals like drug dealers use cloned
cellular telephones for illegal activities.

*Terrorists

have been known to use cloned
phones to escape law enforcement efforts aimed
at tracking their whereabouts.
*User

verification using PIN(Personal
Identification Number)

*Blacklisting

*Traffic

of stolen phones

analysis

*Electrically

checking the ESN/MIN
To avoid such abuse to telecommunication system
it is absolutely necessary to check out the
weakness and vulnerability of existing telecom
systems.

If it is planned to invest in new telecom
equipment, a security plan should be made and
the system should be tested before being
implemented.
*http://www.hackinthebox.org
*http://realhackerspoint.blogspot.in
*http://www.google.com

*http://www.wikipedia.com
Mobile Phone Cloning By: Ritik Nagar

Más contenido relacionado

La actualidad más candente

Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
akhila immadisetty
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
Sameer Gupta
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
Sameer Gupta
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
asmita tarar
 

La actualidad más candente (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Cellular Mobile Communication Concept and GSM Frequency Band
Cellular Mobile Communication Concept and GSM Frequency BandCellular Mobile Communication Concept and GSM Frequency Band
Cellular Mobile Communication Concept and GSM Frequency Band
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Outes
OutesOutes
Outes
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 

Destacado

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 

Destacado (20)

Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
cdma by svr
cdma  by svrcdma  by svr
cdma by svr
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 

Similar a Mobile Phone Cloning By: Ritik Nagar

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

Similar a Mobile Phone Cloning By: Ritik Nagar (17)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Fdp
FdpFdp
Fdp
 
Test
TestTest
Test
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Mobile Phone Cloning By: Ritik Nagar

  • 1. TOPIC: MOBILE PHONE CLONING Presented By: Ritik Nagar ECE 3rd Year
  • 2. * WHAT IS CELL PHONE CLONING? * GSM * CDMA * IMEI, ESN, MIN * HOW IS CELL PHONE CLONING DONE? * ARE OUR CELL PHONES SECURED? * HOW TO KNOW THAT THE CELL HAS BEEN CLONED? * DETECTION OF A CLONED PHONE IN A NETWORK * IMPACTS OF CELL PHONE CLONING * HOW TO PREVENT CELL CLONING? * CONCLUSION
  • 3. Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. It is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  • 4. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.
  • 5.
  • 6. Global System for Mobile Communications. A digital cellular phone technology based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed. Operators who provide GSM service are Airtel, Idea etc.
  • 7. Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in GSM. Operators who provides CDMA service in India are Reliance and Tata Indicom.
  • 8. IMEI (International Mobile Station Equipment Identity) The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network.
  • 9. ESN (Electronic Serial Number) ESN number is used to uniquely identify a mobile phone operating on CDMA network. MIN (Mobile Identification Number) MIN is a number that is derived from the 10digit directory telephone number assigned to a mobile station.
  • 10.
  • 11. Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). Cloning require access to ESN and MIN pairs. ESN/MIN pairs can be discovered in several ways:
  • 12. *Sniffing *Trashing the cellular cellular companies or cellular resellers *Hacking cellular companies or cellular resellers
  • 13. Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI). DDIs are devices specially manufactured to intercept ESN/MINs. Numbers can be recorded by hand, one-byone, or stored in the box and later downloaded to a computer. After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was
  • 14.
  • 15. Patagonia is a software available in the market which is used to clone CDMA phones. Using this software a cloner can modify the ESN/MIN of any CDMA phone. Once we have the ESN/MIN of the target cell phone, we can clone them to another phone using this software.
  • 16.
  • 17. * After we have modified the EEPROM of our device, it can be used as a cloned device. * Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.
  • 18. *We have seen that CDMA phones can easily be cloned but when it comes to GSM ,the task is tougher but not impossible for expert hackers. *With the shift to GSM digital, the phone companies assure us that the bad old days are over and mobile phones are secure and privacy friendly. But this not entirely true so we still need to be careful about this matter.
  • 19. *Frequent wrong number phone calls to your phone, or hang-ups. *Difficulty in placing outgoing calls. *Difficulty in retrieving voice mail messages. *Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  • 20. *Duplicate Detection *Velocity Trap *Usage Profiling *Call Counting
  • 21. *The network sees the same phone in several places at the same time. *Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. *After verification the service will be provided only to the real subscriber.
  • 22.
  • 23. * It notices when the mobile phone seems to be moving at impossible, or most unlikely speeds. *For example, if a call is first made in Delhi, and five minutes later, another call is made from the same number but this time in Mumbai then it is obvious that there must be two phones with the same identity on the network. *So service will be terminated until the real user is verified.
  • 24. *Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. *For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone
  • 25. *Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
  • 26. *Each year, the mobile phone industry loses millions of dollars in revenue because of the cloned phones as their calls are billed to other phones owned by innocent third persons. *Many criminals like drug dealers use cloned cellular telephones for illegal activities. *Terrorists have been known to use cloned phones to escape law enforcement efforts aimed at tracking their whereabouts.
  • 27. *User verification using PIN(Personal Identification Number) *Blacklisting *Traffic of stolen phones analysis *Electrically checking the ESN/MIN
  • 28. To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems. If it is planned to invest in new telecom equipment, a security plan should be made and the system should be tested before being implemented.