SlideShare una empresa de Scribd logo
1 de 16
MOBILE PHONE
CLONING
Copyright © 2015 Accenture All rights reserved. 2
INTRODUCTION
CLONING:Cloning is the creation of an organism that is
an exact genetic copy of another. This means that
every single bit of DNA is the same between the two!
MOBILE PHONE CLONING: Mobile phone cloning is
copying the identity of one mobile telephone to another
mobile telephone. Usually this is done for the purpose
of making fraudulent telephone calls. The bills for the
calls go to the legitimate subscriber. The cloner is also
able to make effectively anonymous calls,
Copyright © 2015 Accenture All rights reserved. 3
GSM & CDMA MOBILE
SETS
 CDMA( Code Division Multiple Access). A method for transmitting
simultaneous signals over a shared portion of the spectrum. There is no
Subscriber Identity Module (SIM) card. Operators who provides CDMA
service in India are Reliance and Tata Indicom.
 CDMA use a Mobile Identification Number (MIN) card that contains user
account information.
 GSM (Global System for Mobile) Communications. A digital cellular
phone technology based on TDMA GSM phones MHz frequency
band. There is a Subscriber Identity Module (SIM) card. Any GSM phone
becomes immediately programmed after plugging in the SIM card, thus
allowing GSM phones to be easily rented or borrowed.Operators who
provide GSM service are Airtel,Hutch etc
Copyright © 2015 Accenture All rights reserved. 4
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment Identifier, this is a
10 digit universally unique number of our GSM handset. I use the
term Universally Unique because there cannot be 2 mobile phones
having the same IMEI no. This is a very valuable number and used
in tracking mobile phones.
 SIM, which stands for Subscriber Identification Module.
Basically the SIM provides storage of subscriber related
information of three types:
1. Fixed data stored before the subscription is sold
2. Temporary network data
3. Service related data.
Copyright © 2015 Accenture All rights reserved. 5
ESN, which stands for Electronic Serial
Number. It is same as the IMEI but is used
in CDMA handsets
MIN stands for Mobile Identification
Number, which is the same as the SIM of
GSM.
Copyright © 2015 Accenture All rights reserved. 6
HOW IS A PHONE CLONED?
 Cellular thieves can capture ESN/MINs using devices such as cell
phone ESN reader or digital data interpreters (DDI).
 The ESN/MIN pair can be cloned in a number of ways without the
knowledge of the carrier or subscriber through the use of electronic
scanning devices.
 After the ESN/MIN pair is captured, the cloner reprograms or alters
the microchip of any wireless phone to create a clone of the wireless
phone from which the ESN/MIN pair was stolen.
Copyright © 2015 Accenture All rights reserved. 7
Copyright © 2015 Accenture All rights reserved. 8
CLONING GSM PHONES
 Every GSM phone has a 15 digit electronic serial number (referred to as the
IMEI). It is not a particularly secret bit of information and you don't need to
take any care to keep it private. The important information is the IMSI,
which is stored on the removable SIM card that carries all your subscriber
information
 GSM networks which are considered to be impregnable can also be hacked.
The process is simple: a SIM card is inserted into a reader. After connecting
it to the computer using data cables, the card details were transferred into
the PC. Then, using freely available encryption software on the Net, the card
details can be encrypted on to a blank smart card. The result: A cloned cell
phone is ready for misuse.
Copyright © 2015 Accenture All rights reserved. 9
METHODS TO DETECT
CLONED PHONES
 Duplicate detection - The network sees the same phone in several
places at the same time. Reactions include shutting them all off so
that the real customer will contact the operator because he lost the
service he is paying for, or tearing down connections so that the
clone users will switch to another clone but the real user will
contact the operator.
 Velocity trap - The mobile phone seems to be moving at
impossible, or most unlikely speeds. For example, if a call is first
made in Srilanka, and five minutes later, another call is made but
this time in China, there must be two phones with the same identity
on the network.
Copyright © 2015 Accenture All rights reserved. 10
 Call counting - Both the phone and the network keep track
of calls made with the phone, and should they differ more
than the usually allowed one call, service is denied.
 PIN codes - Prior to placing a call, the caller unlocks the
phone by entering a PIN code and then calls as usual. After
the call has been completed, the user locks the phone by
entering the PIN code again. Operators may share PIN
information to enable safer roaming.
Copyright © 2015 Accenture All rights reserved. 11
IMPACT OF CLONING
 Each year, the mobile phone industry loses millions of dollars in
revenue because of the criminal actions of persons who are able to
reconfigure mobile phones so that their calls are billed to other
phones owned by innocent third persons.
 Many criminals use cloned cellular telephones for illegal activities,
because their calls are not billed to them, and are therefore much
more difficult to trace.
Copyright © 2015 Accenture All rights reserved. 12
HOW TO PREVENT CLONING?
 Service providers have adopted certain measures to prevent cellular
fraud. These include encryption, blocking, blacklisting, user
verification and traffic analysis:
 Blacklisting of stolen phones is another mechanism to prevent
unauthorized use. An Equipment Identity Register (EIR) enables
network operators to disable stolen cellular phones on networks
around the world.
 User verification using Personal Identification Number (PIN)
codes is one method for customer protection against cellular phone
fraud.
Copyright © 2015 Accenture All rights reserved. 13
Analysis
 Tests conducted have proved that United States found that having a
PIN code reduced fraud by more than 80%.
 Traffic analysis detects cellular fraud by using artificial
intelligence software to detect suspicious calling patterns, such as a
sudden increase in the length of calls or a sudden increase in the
number of international calls.
 The software also determines whether it is physically possible for
the subscriber to be making a call from a current location,based on
the location and time of the previous call.
Copyright © 2015 Accenture All rights reserved. 14
FACTS & FIGURES
 Southwestern Bell claims wireless fraud costs the industry $650
million each year in the US. Some federal agents in the US have
called phone cloning an especially `popular' crime because it is hard
to trace. In one case, more than 1,500 telephone calls were placed in
a single day by cellular phone thieves using the number of a single
unsuspecting owner.
 A Home Office report in 2002 revealed that in London around 3,000
mobile phones were stolen in one month alone which were used for
cell phone cloning
Copyright © 2015 Accenture All rights reserved. 15
CONCLUSION
 Mobile Cloning Is in initial stages in India so preventive
steps should be taken by the network provider and the
Government the enactment of legislation to prosecute
crimes related to cellular phones is not viewed as a
priority, however. It is essential that intended mobile
crime legislation be comprehensive enough to incorporate
cellular phone fraud, in particular "cloning fraud" as a
specific crime.
 Existing cellular systems have a number of potential
weaknesses that were considered. It is crucial that
businesses and staff take mobile phone security seriously.
Mobile phone cloning

Más contenido relacionado

La actualidad más candente

Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning774474
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

La actualidad más candente (20)

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

Similar a Mobile phone cloning

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersmParticle
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 

Similar a Mobile phone cloning (15)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Test
TestTest
Test
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokers
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 

Último

Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Último (20)

Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Mobile phone cloning

  • 2. Copyright © 2015 Accenture All rights reserved. 2 INTRODUCTION CLONING:Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! MOBILE PHONE CLONING: Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls,
  • 3. Copyright © 2015 Accenture All rights reserved. 3 GSM & CDMA MOBILE SETS  CDMA( Code Division Multiple Access). A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card. Operators who provides CDMA service in India are Reliance and Tata Indicom.  CDMA use a Mobile Identification Number (MIN) card that contains user account information.  GSM (Global System for Mobile) Communications. A digital cellular phone technology based on TDMA GSM phones MHz frequency band. There is a Subscriber Identity Module (SIM) card. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM service are Airtel,Hutch etc
  • 4. Copyright © 2015 Accenture All rights reserved. 4 IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold 2. Temporary network data 3. Service related data.
  • 5. Copyright © 2015 Accenture All rights reserved. 5 ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
  • 6. Copyright © 2015 Accenture All rights reserved. 6 HOW IS A PHONE CLONED?  Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).  The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices.  After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
  • 7. Copyright © 2015 Accenture All rights reserved. 7
  • 8. Copyright © 2015 Accenture All rights reserved. 8 CLONING GSM PHONES  Every GSM phone has a 15 digit electronic serial number (referred to as the IMEI). It is not a particularly secret bit of information and you don't need to take any care to keep it private. The important information is the IMSI, which is stored on the removable SIM card that carries all your subscriber information  GSM networks which are considered to be impregnable can also be hacked. The process is simple: a SIM card is inserted into a reader. After connecting it to the computer using data cables, the card details were transferred into the PC. Then, using freely available encryption software on the Net, the card details can be encrypted on to a blank smart card. The result: A cloned cell phone is ready for misuse.
  • 9. Copyright © 2015 Accenture All rights reserved. 9 METHODS TO DETECT CLONED PHONES  Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Srilanka, and five minutes later, another call is made but this time in China, there must be two phones with the same identity on the network.
  • 10. Copyright © 2015 Accenture All rights reserved. 10  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 11. Copyright © 2015 Accenture All rights reserved. 11 IMPACT OF CLONING  Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons.  Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace.
  • 12. Copyright © 2015 Accenture All rights reserved. 12 HOW TO PREVENT CLONING?  Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register (EIR) enables network operators to disable stolen cellular phones on networks around the world.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
  • 13. Copyright © 2015 Accenture All rights reserved. 13 Analysis  Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  The software also determines whether it is physically possible for the subscriber to be making a call from a current location,based on the location and time of the previous call.
  • 14. Copyright © 2015 Accenture All rights reserved. 14 FACTS & FIGURES  Southwestern Bell claims wireless fraud costs the industry $650 million each year in the US. Some federal agents in the US have called phone cloning an especially `popular' crime because it is hard to trace. In one case, more than 1,500 telephone calls were placed in a single day by cellular phone thieves using the number of a single unsuspecting owner.  A Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning
  • 15. Copyright © 2015 Accenture All rights reserved. 15 CONCLUSION  Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime.  Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.