MOBILE PHONE [email protected]
-
Upload
googlecom -
Category
Technology
-
view
113 -
download
2
description
Transcript of MOBILE PHONE [email protected]
![Page 1: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/1.jpg)
MOBILE PHONE CLONING
BY:
SIMRANDEEP SINGH-1315970
STEGIN JOY-1315972
![Page 2: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/2.jpg)
things we are going to present……
HOW CELL PHONE WORKS?
HISTORY OF MOBILE CLONING
CLONING CDMA CELL PHONE
CLONING GSM CELL PHONE
PATAGONIA
PROCESS OF CLONING
IMPACT OF CLONING
DETECTION OF CLONED PHONES ON NETWORK
PREVENTION
FUTURE THREATS
CONCLUSION
![Page 3: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/3.jpg)
INTRODUCTIONo Mobile phone cloning is basically a
technique where in the transfer or copying the identity or security data of one cellular phone to another is done.
oThe other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones and only the original phone is billed.
oThis is usually done for the purpose of making fraudulent phone calls. The bills for the calls go to the legitimate subscriber.
![Page 4: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/4.jpg)
HOW CELLPHONE WORKS?
Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data
![Page 5: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/5.jpg)
BACK TO
HISTORY
In 1990’s. Cell phone cloning started with Motorola “bag” phones and reached its peak in the mid 90’s with a commonly available modification for the Motorola “brick” phones, such as the classic, the Ultra classic. Both GSM and CDMA handsets are prone to cloning.
![Page 6: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/6.jpg)
Cloning CDMA phones It stands for code division multiple access
In CDMA system, your encoded voice is digitalized and divided into packets.
These packets are tagged with “codes”. the packets then mix with all of the other packets of traffic in the local CDMA networks as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.
Operators who provide CDMA service in India are reliance, Tata Indicom
![Page 7: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/7.jpg)
CLONING GSM CELL PHONE
Global system for communication, A digital cellular phone technology based on TDMA
GSM phones use a subscriber identify module (SIM) card that contains user account information
Any GSM phone becomes immediately programmed after plugging in the SIM card
Operators who provide GSM service are AIRTEL,Vodafone,Idea etc.
![Page 8: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/8.jpg)
![Page 9: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/9.jpg)
IMPORTANT TERMS
IMEI stands for International Mobile equipment Identifier,this is a 10 digit universally unique number of our GSM handset, I use the term universally unique because there cannot be 2 mobile phones having the same IMEI no.this is very valuable number and used in tracking mobile phones
SIM,which stands for Subscriber Identification Module.
basically the SIM provides storage of subscriber
related information
![Page 10: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/10.jpg)
PATAGONIA
Patagonia is software available in the market which is used to clone CDMA phone.
this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other software’s available in the market to clone GSM phone. This software’s are easily available in the market.
A SIM can be cloned again and again and they can be used at different places. Messages and phone calls sent by the cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset for which software’s are available, there is no way he can be traced.
![Page 11: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/11.jpg)
Process of cloning
Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. MIN (Mobile Identification Number) should also have to change. When the ESN/MIN pair had changed successfully then an effective clone of the original phone has created. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:
1. Sniffing the cellular.
2. Trashing cellular companies or cellular resellers.
3. Hacking cellular companies or cellular resellers
![Page 12: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/12.jpg)
![Page 13: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/13.jpg)
IMPACTS OF CLONING
![Page 14: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/14.jpg)
DETECTION OF CLONED PHONES ON NETWORK
1. Duplicate Detection
2. Velocity Trap
3. RF (Radio Frequency):
4. Usage Profiling:
5. Call Counting:
6. PIN Codes
![Page 15: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/15.jpg)
![Page 16: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/16.jpg)
RF(RADIO FREQUENCY)Fingerprinting is originally a military technology.so the network software stores and compares fingerprints for all the phones that it sees. this way, it will spot the clones with the same identity but fingerprints.
![Page 17: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/17.jpg)
HOW WE CAN UNDERSTAND CELL PHONE IS CLONED?
1. Frequent wrong number phone calls to your phone or hang ups.
2. Difficulty in placing outgoing calls.
3. Difficulty in retrieving voice mail messages.
4. Incoming calls constantly receiving busy signals or wrong numbers. Unusual call appearing on your phone bills.
![Page 18: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/18.jpg)
HOW TO PREVENT PHONE CLONING ??
There are some prevention methods by which we can prevent our cell phone from cloning:
1. Mobile should never be trusted for storing confidential information. So any secret information should not be kept in mobile.
2. Always set a pin that is required before the phone can be used. This will help in
preventing mobile from cloning to a great extent.
4. Always keep in touch with monthly mobile bills. Any unexpected increase in bill can cause threat to mobile cloning.
![Page 19: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/19.jpg)
CONCLUSION Preventive steps should be
taken by the network provider and the government the enactment of legislation to prosecute crime related to cellular phones is not viewed as a priority
Existing cellular systems have a number of potential weakness were considered.it is a crucial business and staff take mobile phone security seriously
![Page 20: MOBILE PHONE CLONING-Steginjoy2013@gmail.com](https://reader034.fdocuments.in/reader034/viewer/2022051210/54c726264a7959c6198b459e/html5/thumbnails/20.jpg)
THANK YOU