You are on page 1of 28

PHONE CLONING TECHNOLOGY

GUIDED BY:Prof. Sunil Yadav

PRESENTED BY:JAGJIT SINGH KHALSA Roll no-3107

INDEX
INTRODUCTION. HOW IS A PHONE CLONED? METHODS TO DETECT CLONED PHONES SYMPTOMS OF PHONE CLONING. MEASURES TO BE TAKEN. ADVANTAGES AND DISADVANTAGES. VICTIMS OF PHONE CLONING. CONCLUSION.

REFERENCES

INTRODUCTION
CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.

CDMA MOBILE SETS


CDMA stands for Code Division Multiple Access.
A method for transmitting simultaneous signals over a

shared portion of the spectrum.


CDMA uses a Mobile Identification Number (MIN)

card that contains user account information.

GSM MOBILE SETS


GSM stands for Communications.

Global

System

for

Mobile

GSM uses a Subscriber Identity Module (SIM) card.


GSM is a standard set developed by the European

Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks.

IMPORTANT TERMS
IMEI stands for International Mobile Equipment Identifier, this is a 15 digit universally unique number of the GSM handset.

SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types:

1. Fixed data stored before the subscription is sold. 2. Temporary network data 3. Service related data.

ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets.
It is loaded when the phone is manufactured.

MIN ,stands for Mobile Identification Number, Its a 10 digit number used to identify a mobile phone.

HOW IS A PHONE CLONED?


Capture the ESN/MIN pair or SIM/IMEI pair.

Clone the ESN/MIN pair using electronic scanning


devices. The cloner reprograms or alters the microchip of any wireless phone. The ESN/MINs are transferred using a computer to a device. These devices are connected to handsets. New information is entered into the phone. Thus a clone of the legitimate phone is thus obtained.

HOW CLONING TAKES PLACE.

http://homesecurityandpersonalprotection.blogspot.in

CLONING

DEVICE

http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html

CLONING GSM PHONES


The important information is the IMSI, which is stored on the removable SIM card. SIM card inserted into a reader. Connect to computer and card details transferred. Use encrypted software to interpret details. The result: A cloned cell phone is ready for misuse.

CLONING CDMA PHONES


Cellular telephone thieves monitor the radio frequency spectrum. Steal the cell phone pair as it is being anonymously registered with a cell site.

Subscriber information is also encrypted and transmitted digitally.


A device called as DDI, Digital Data Interface can

be used to get pairs. Stolen ESN and MIN were then fed into a new CDMA handset.

DETECTION OF PHONE CLONING


Duplicate detection - The network sees the same phone in several places at the same time.

Velocity trap - The mobile phone seems to be moving

at impossible, or most unlikely speeds..

DETECTION (Continued..)
RF (Radio Frequency) - Nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees.
Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted.

DETECTION (Continued..)
Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual.

DETECTION(Continued..)
The best detection method available in CDMA is the

A KEY FEATURE.
Secret 20 digit number.
Number loaded in Authentication Centre. Cannot be copied.

PHONE CLONING SYMPTOMS


Frequent wrong number phone calls to your phone, or

hang-ups.
Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills

CLONING STATISTICS

Victims percentage

Age

MEASURES TO BE TAKEN
Service providers have adopted certain measures to prevent cellular fraud. These include: Blacklisting of stolen phones is another mechanism to prevent unauthorized use. User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud

Encryption: Encryption is regarded as the effective way to prevent cellular fraud Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of

international calls.
Blocking: Blocking is used by service providers

to protect themselves from high risk callers.

ADVANTAGES
If your phone has been lost , you can use your cloned cell phone. 2. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.
1.

DISADVANTAGES
It can be used by the terrorists for criminal activities.
It can be used by the cloner for fraud calls. It can be used for illegal money transfer.

VICTIMS OF PHONE CLONING


Anita Davis, a mobile clone victim. One month, her

cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.
A Louisville woman was shocked when she got her February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it.

CONCLUSION
Phone Cloning is in initial stages in India. Preventive steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile

phones was possible because there was no protection to the identification information.

REFERENCES
http://www.cdmasoftware.com/eng.html
http://infotech.indiatimes.com http://www.hackinthebox.org/ Sankaranarayanan ,Mobile phone cloning, Wireless

And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.

THANK YOU...

ANY QUESTIONS?

You might also like