SlideShare una empresa de Scribd logo
1 de 20
MOBILE PHONE
CLONING
BY:

SIMRANDEEP SINGH-1315970
STEGIN JOY-1315972
things we are going to present……
 HOW CELL PHONE WORKS?
 HISTORY OF MOBILE CLONING
 CLONING CDMA CELL PHONE


CLONING GSM CELL PHONE

 PATAGONIA

 PROCESS OF CLONING
 IMPACT OF CLONING
 DETECTION OF CLONED PHONES ON NETWORK
 PREVENTION
 FUTURE THREATS
 CONCLUSION
INTRODUCTION

Mobile phone cloning is
basically a technique where in the
transfer or copying the identity or
security data of one cellular phone
to another is done.
o The other cell phone becomes the
exact replica of the original cell
phone like a clone. As a result,
while calls can be made from both
phones and only the original
phone is billed.
o
HOW CELLPHONE WORKS?

Cell phones send radio frequency transmissions through the air on two
distinct channels, one for voice communications and the other for control
signals. When a cellular phone makes a call, it normally transmits its
Electronic Security Number (ESN), Mobile Identification Number (MIN),
its Station Class Mark (SCM) and the number called in a short burst of
data. This burst is the short buzz you hear after you press the SEND button
and before the tower catches the data
BACK TO

HISTORY
In 1990’s. Cell phone cloning started
with Motorola “bag” phones and
reached its peak in the mid 90’s with
a commonly available modification
for the Motorola “brick” phones,
such as the classic, the Ultra classic.
Both GSM and CDMA handsets are
Cloning CDMA
phones code division multiple
 It stands for
access

 In CDMA system, your encoded voice
is digitalized and divided into packets.

 These packets are tagged with “codes”.
the packets then mix with all of the
other packets of traffic in the local
CDMA networks as they are routed
towards their destination. The receiving
system only accepts the packets with
the codes destined for it.
CLONING

GSM CELL PHONE

Global system for
communication, A digital
cellular phone technology
based on TDMA
GSM phones use a subscriber
identify module (SIM) card that
contains user account
information
Any GSM phone becomes
immediately programmed after
plugging in the SIM card
IMPORTANT TERMS

 IMEI stands for International Mobile equipment
Identifier,this is a 10 digit universally unique number of
our GSM handset, I use the term universally unique
because there cannot be 2 mobile phones having the
same IMEI no.this is very valuable number and used in
tracking mobile phones

 SIM,which stands for Subscriber Identification Module.
basically the SIM provides storage of subscriber
related information
PATAGONIA
 Patagonia is software available in the market which is used to
clone CDMA phone.
 this software a cloner can take over the control of a CDMA
phone i.e. cloning of phone. There are other software’s available
in the market to clone GSM phone. This software’s are easily
available in the market.
 A SIM can be cloned again and again and they can be used at
different places. Messages and phone calls sent by the cloned
phones can be tracked. However, if the accused manages to
also clone the IMEI number of the handset for which software’s
are available, there is no way he can be traced.
Process of cloning
 Cloning involves modifying or replacing the EPROM in the
phone with a new chip which would allow you to configure an
ESN (Electronic Serial Number) via software. MIN (Mobile
Identification Number) should also have to change. When the
ESN/MIN pair had changed successfully then an effective
clone of the original phone has created. Cloning required
access to ESN and MIN pairs. ESN/MIN pairs were discovered in
several ways:
 1. Sniffing the cellular.

 2. Trashing cellular companies or cellular resellers.
 3. Hacking cellular companies or cellular resellers
IMPACTS OF CLONING
DETECTION OF CLONED
PHONES ON NETWORK
 1. Duplicate Detection
 2. Velocity Trap

 3. RF (Radio Frequency):
 4. Usage Profiling:
 5. Call Counting:
 6. PIN Codes
 RF(RADIO FREQUENCY)
Fingerprinting is originally a
military technology.so the network
software stores and compares
fingerprints for all the phones
that it sees. this way, it will spot
HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?

 1. Frequent wrong number phone calls to your phone or
hang ups.
 2. Difficulty in placing outgoing calls.
 3. Difficulty in retrieving voice mail messages.
 4. Incoming calls constantly receiving busy signals or
wrong numbers. Unusual call appearing on your phone
bills.
HOW TO PREVENT
PHONE CLONING ??
There are some prevention methods by which we can prevent our
cell phone from cloning:
 1. Mobile should never be trusted for storing confidential
information. So any secret information should not be kept in
mobile.
 2. Always set a pin that is required before the phone can be
used. This will help in
 preventing mobile from cloning to a great extent.

 4. Always keep in touch with monthly mobile bills. Any
unexpected increase in bill can cause threat to mobile
cloning.
CONCLUSION
 Preventive steps should be taken by the network
provider and the government the enactment of
legislation to prosecute crime related to cellular
phones is not viewed as a priority
 Existing cellular systems have a number of
potential weakness were considered.it is a crucial
business and staff take mobile phone security
seriously
THANK YOU

Más contenido relacionado

La actualidad más candente

Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

La actualidad más candente (20)

Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

Destacado

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
Skinput technology
Skinput technologySkinput technology
Skinput technologyneha pevekar
 
Seminar (VK)
Seminar (VK)Seminar (VK)
Seminar (VK)S P ROHIT
 
Google classroom intro
Google classroom introGoogle classroom intro
Google classroom introjkeben
 

Destacado (9)

Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Wi DI
Wi DIWi DI
Wi DI
 
Seminar (VK)
Seminar (VK)Seminar (VK)
Seminar (VK)
 
Google classroom intro
Google classroom introGoogle classroom intro
Google classroom intro
 
Emospark
EmosparkEmospark
Emospark
 

Similar a MOBILE PHONE CLONING-Steginjoy2013@gmail.com

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 

Similar a MOBILE PHONE CLONING-Steginjoy2013@gmail.com (13)

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Clonning
ClonningClonning
Clonning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Test
TestTest
Test
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 

Más de christ university

Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)christ university
 
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inPOVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inchrist university
 
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inDESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inchrist university
 
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.inchrist university
 

Más de christ university (6)

Stegin
SteginStegin
Stegin
 
Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.inPOVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
POVERTY IN INDIA-Stegin.joy@bca.christuniversity.in
 
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.inDESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
DESKTOP V/S LAPTOP - Stegin.joy@bca.christuniversity.in
 
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
DESTOP COMPUTER V/S LAPTOPS - Stegin.joy@bca.christuniversity.in
 

Último

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

MOBILE PHONE CLONING-Steginjoy2013@gmail.com

  • 2. things we are going to present……  HOW CELL PHONE WORKS?  HISTORY OF MOBILE CLONING  CLONING CDMA CELL PHONE  CLONING GSM CELL PHONE  PATAGONIA  PROCESS OF CLONING  IMPACT OF CLONING  DETECTION OF CLONED PHONES ON NETWORK  PREVENTION  FUTURE THREATS  CONCLUSION
  • 3. INTRODUCTION Mobile phone cloning is basically a technique where in the transfer or copying the identity or security data of one cellular phone to another is done. o The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed. o
  • 4. HOW CELLPHONE WORKS? Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data
  • 5. BACK TO HISTORY In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are
  • 6. Cloning CDMA phones code division multiple  It stands for access  In CDMA system, your encoded voice is digitalized and divided into packets.  These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
  • 7. CLONING GSM CELL PHONE Global system for communication, A digital cellular phone technology based on TDMA GSM phones use a subscriber identify module (SIM) card that contains user account information Any GSM phone becomes immediately programmed after plugging in the SIM card
  • 8.
  • 9. IMPORTANT TERMS  IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones  SIM,which stands for Subscriber Identification Module. basically the SIM provides storage of subscriber related information
  • 10. PATAGONIA  Patagonia is software available in the market which is used to clone CDMA phone.  this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.  A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.
  • 11. Process of cloning  Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:  1. Sniffing the cellular.  2. Trashing cellular companies or cellular resellers.  3. Hacking cellular companies or cellular resellers
  • 12.
  • 14. DETECTION OF CLONED PHONES ON NETWORK  1. Duplicate Detection  2. Velocity Trap  3. RF (Radio Frequency):  4. Usage Profiling:  5. Call Counting:  6. PIN Codes
  • 15.
  • 16.  RF(RADIO FREQUENCY) Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot
  • 17. HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?  1. Frequent wrong number phone calls to your phone or hang ups.  2. Difficulty in placing outgoing calls.  3. Difficulty in retrieving voice mail messages.  4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.
  • 18. HOW TO PREVENT PHONE CLONING ?? There are some prevention methods by which we can prevent our cell phone from cloning:  1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.  2. Always set a pin that is required before the phone can be used. This will help in  preventing mobile from cloning to a great extent.  4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.
  • 19. CONCLUSION  Preventive steps should be taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority  Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously