This document discusses mobile phone cloning technology. It provides a history of cloning beginning in the 1990s with Motorola bag phones. It explains the differences between GSM and CDMA networks and important terms like IMEI, ESN, and MIN. The document details how cloning is done by capturing a phone's ESN/MIN and reprogramming another phone. It also covers how to detect a cloned phone and prevent cloning through user verification and blacklisting stolen phones. While cloning can allow using a lost phone, it enables criminal activities so telecom systems must address vulnerabilities.
2. CONTENTS
• INTRODUCTION
• HISTORY
• GSM AND CDMA
• IMPORTANT TERMS
• HOW A CELL PHONE IS CLONED?
• HOW TO KNOW THAT THE CELL PHONE HAS BEEN CLONED?
• DETECTION OF A CLONED CELL PHONE IN A NETWORK
• HOW TO PREVENT CELL PHONE CLONING?
• ADVANTAGES AND DISADVANTAGES
• CONCLUSION
• REFERENCES
3. INTRODUCTION
CELL PHONE CLONING
• The result of that is a "cloned" phone.
• Taking the programmed information from
mobile phone and programming the identical
information into another mobile phone.
4. HISTORY
• In 1990s cell phone Cloning started with Motorola
“bag” phones.
• In mid 90’s they are commonly available by
Motorola Co such as the classic, the ultra classic, and
the model 8000.
5. GSM AND CDMA
GSM
• A digital cellular phone technology based on TDMA.
• GSM phones use a SIM card that contains user
account information.
CDMA
• Transmitting simultaneous signals over a shared
portion of the spectrum.
• There is no SIM card unlike in GSM.
6. IMPORTANT TERMS
IMEI (International Mobile Station Equipment
Identity)
• Helps to identify valid devices.
• Used for stopping a stolen phone from accessing the
network.
ESN (Electronic Serial Number)
• Used to uniquely identify a mobile phone
operating on CDMA network.
7. MIN (Mobile Identification Number)
• MIN is a number that is derived from the 10 -digit
directory telephone number assigned to a mobile
station.
8. HOW IS CELL CLONING DONE?
• Modifying or replacing the EPROM in the phone with
a new chip which allow to configure an ESN via
software.
• We have to change the MIN.
• Cloning require access to ESN and MIN pairs.
• ESN/MIN pairs can be discovered in several ways:
9. CONTD…
• Sniffing the cellular.
• Trashing cellular companies or cellular resellers.
• Hacking cellular companies or cellular resellers.
• Cellular thieves can capture ESN/MINs using
devices such as cell phone ESN reader or digital
data interpreters (DDI).
• After the ESN/MIN pair is captured, the cloner
reprograms the microchip of any wireless phone.
10.
11. WHAT IS PATAGONIA?
• Used to clone CDMA phones.
• Using this software a cloner can modify the
ESN/MIN of any CDMA phone.
12.
13. • After we have modified the EEPROM of our
device, it can be used as a cloned device.
• Now we can use our phone for making fraudulent
telephone calls but the bills for the calls will go to
the legitimate subscriber.
14. HOW TO KNOW THAT THE CELL
HAS BEEN CLONED?
• Frequent wrong number phone calls to your phone,
or busy.
• Difficulty in placing outgoing calls.
• Difficulty in retrieving voice mail messages.
• Incoming calls constantly receiving busy signals or
wrong numbers.
• Unusual calls appearing on your phone bills.
15. DETECTION OF A CLONED PHONE
IN A NETWORK
• Duplicate Detection
• Velocity Trap
• Usage Profiling
• Call Counting
16. DUPLICATE DETECTION
• The network sees the same phone in several places
at the same time.
• Reactions include shutting them all off so that the
real customer will contact the operator because he
lost the service he is paying for.
18. VELOCITY TRAP
• It notices when the mobile phone seems to be
moving at impossible, or most unlikely speeds.
• So service will be terminated until the real user is
verified.
USAGE PROFILING
• Profiles of customers phone usage are kept,
and when discrepancies are noticed, the
customer is contacted.
19. CALL COUNTING
• Both the phone and the network keep track of
calls made with the phone, and should they
differ more than the usually allowed one call,
service is denied.
20. HOW TO PREVENT PHONE
CLONING?
• User verification using PIN(Personal
Identification Number)
• Blacklisting of stolen phones
• Traffic analysis
• Electrically checking the ESN/MIN
21. ADVANTAGES
• If your phone has been lost , you can use your
cloned cell phone.
• If your phone got damaged or if you forgot your
phone at home or any other place . Cloned phone
can be helpful.
22. DISADVANTAGES
• It can be used by the terrorists for criminal
activities.
• It can be used by the cloner for fraud calls.
• It can be used for illegal money transfer.
23. CONCLUSION
To avoid such abuse to telecommunication
system it is absolutely necessary to check
out the weakness and vulnerability of
existing telecom systems.