SlideShare uma empresa Scribd logo
1 de 7
Mobile Phone Cloning


             A.Shanmuga Sundaram                                              M.Adityan
     Electrical and Electronics Engineering                     Electrical and Electronics Engineering
     Sri Krishna College of Engineering and                     Sri Krishna College of Engineering and
                   Technology                                                 Technology
                Coimbatore, India                                          Coimbatore, India
         saishanmu20.12.92@gmail.com                                 adityanmurthi82@gmail.com


Abstract- Mobile communication has been readily            improve their technology. But the operators claim they
available for several years, and is major business         can't do much for now. "It's like stealing cars or
today. It provides a valuable service to its users who     duplicating credit card numbers. The service providers
are willing to pay a considerable premium over a fixed     cannot do much except keep track of the billing
line phone, to be able to walk and talk freely. Because    pattern of the users. But since the billing cycle is
of its usefulness and the money involved in the            monthly, the damage is done by the time we can detect
business, it is subject to fraud. Unfortunately, the       the mischief," says a Reliance executive.
advance of security standards has not kept pace with       Qualcomm, which develops CDMA technology
the dissemination of mobile communication.                 globally, says each instance of mobile hacking is
                                                           different and therefore there is very little an operator
Some of the features of mobile communication make it       can do to prevent hacking. "It's like a virus hitting the
an alluring target for criminals. It is a relatively new   computer. Each software used to hack into the network
invention, so not all people are quite familiar with its   is different, so operators can only keep upgrading their
possibilities, in good or in bad. Its newness also means   security firewall as and when the hackers strike," says
intense competition among mobile phone service             a Qualcomm executive.
providers as they are attracting customers. The major
threat to mobile phone is from cloning.
IndexTerms:
  Cell phone       cloning,GSM,CDMA,EMIE            and
PIN,Patagonia
Introduction :

While mobile cloning is an emerging threat for Indian
subscribers, it has been happening in other telecom
markets since the 1990s, though mostly with regard to
CDMA phones. Pleas in an US District Court in 1997
effectively ended West Texas authorities' first case of
`phone cloning.' Authorities in the case estimated the     What is mobile phone cloning?
loss at $3,000 to $4,000 for each number used.
Southwestern Bell claims wireless fraud costs the          When we look up the dictionary meaning of cloning it
industry $650 million each year in the US. Some            states, “ to create the exact replica or a mirror image of
federal agents in the US have called phone cloning an      an subject understudy. The subject can be any thing
especially `popular' crime because it is hard to trace.    living or non-living so here we take into consideration
Back home, police officers say the Yasin case is just      the cellular or mobile phones. So Mobile cloning is
the tip of the iceberg and have asked operators to         copying the identity of one mobile telephone to
                                                           another mobile telephone. Every electronic device has
                                                           a working frequency, which plays a crucial role in its
operation this we shall discuss later. Now the question      could listen in to nearly any analogue mobile phone
that arises is how is a mobile phone cloned. I shall be      call. As a result, Cabinet Ministers, company chiefs
discussing this in detail, because it is a very complex      and celebrities routinely found their most intimate
procedure in which we have to be familiar with the           conversations published in the next day's tabloids
following terms.                                             Cell phone cloning started with Motorola "bag"
                                                             phones and reached its peak in the mid 90's with a
                                                             commonly available modification for the Motorola
                                                             "brick" phones, such as the Classic, the Ultra Classic,
                                                             and the Model 8000.




                Cellular phone cloning

What are GSM and CDMS mobile phone
sets?
CDMA is one of the newer digital technologies used
in Canada, the US, Australia, and some South-eastern
Asian countries (e.g. Hong Kong and South Korea).            GSM:
CDMA differs from GSM and TDMA (Time Division
                                                             Global System for Mobile Communications. A digital
Multiple Access) by its use of spread spectrum
                                                             cellular phone technology based on TDMA GSM
techniques for transmitting voice or data over the air.
                                                             phones use a Subscriber Identity Module (SIM) card
Rather than dividing the radio frequency spectrum into
                                                             that contains user account information. Any GSM
separate user channels by frequency slices or time
                                                             phone becomes immediately programmed after
slots, spread spectrum technology separates users by
                                                             plugging in the SIM card, thus allowing GSM phones
assigning them digital codes within the same broad
                                                             to be easily rented or borrowed.Operators who provide
spectrum. Advantages of CDMA include higher user
                                                             GSM service are Airtel,Hutch etc.
capacity and immunity from interference by other
signals.
                                                             CDMA:
GSM is a digital mobile telephone system that is             Code Division Multiple Access. A method for
widely used in Europe and other parts of the world.
                                                             transmitting simultaneous signals over a shared
GSM uses a variation of TDMA and is the most                 portion of the spectrum. There is no Subscriber
widely used of the three digital wireless telephone
                                                             Identity Module (SIM) card unlike in GSM.Operators
technologies. GSM digitizes and compresses data, then
                                                             who provides CDMA service in India are Reliance and
sends it down a channel with two other streams of user
                                                             Tata Indicom.
data, each in its own time slot. It operates at either the
900 MHz or 1,800 MHz frequency band.
                                                             Mobile Phone Cloning Software:
Rise of Cell Cloning:
                                                             Cloning involved modifying or replacing the EPROM
                                                             in the phone with a new chip which would allow you
The early 1990s were boom times for eavesdroppers.           to configure an ESN (Electronic serial number) via
Any curious teenager with a £100 Tandy Scanner               software. You would also have to change the MIN
(Mobile Identification Number). When you had              is entered into the phone. There are also more discreet,
successfully changed the ESN/MIN pair, your phone         concealable devices used to clone cellular phones.
was an effective clone of the other phone. Cloning        Plugs and ES-Pros, which are about the size of a pager
required access to ESN and MIN pairs. ESN/MIN             or small calculator, do not require computers or
pairs were discovered in several ways:                    copycat boxes for cloning. The entire programming
        Sniffing the cellular                             process takes ten-15 minutes per phone.
        Trashing cellular companies or cellular
        resellers
        Hacking cellular companies or cellular
        resellers


Cloning still works under the AMPS/NAMPS system,
but has fallen in popularity as older clone able phones
are more difficult to find and newer phones have not
been successfully reverse-engineered.Cloning has
been successfully demonstrated under GSM, but the
process is not easy and it currently remains in the
realm of serious hobbyists and researchers.
How is a phone cloned?
Cellular thieves can capture ESN/MINs using devices
such as cell phone ESN reader or digital data             This was how CDMA handsets are cloned but now we
interpreters (DDI). DDIs are devices specially            face a question that being: -Do GSM sets run the risk
manufactured to intercept ESN/MINs. By simply             of‘’cloning’?
sitting near busy roads where the volume of cellular      Looking at the recent case, it is quite possible to clone
traffic is high, cellular thieves monitoring the radio    both GSM and CDMA sets. The accused in the Delhi
wave transmissions from the cell phones of legitimate     case used software called Patagonia to clone only
subscribers can capture ESN/MIN pair. Numbers can         CDMA phones (Reliance and Tata Indicom).
be recorded by hand, one-by-one, or stored in the box     However, there are software packages that can be used
and later downloaded to a computer. ESN/MIN               to clone even GSM phones (e.g. Airtel, BSNL, Hutch,
readers can also be used from inside an offender’s        Idea). In order to clone a GSM phone, knowledge of
home, office, or hotel room, increasing the difficulty    the International Mobile Equipment Identity (IMEI) or
of detection.                                             instrument number is sufficient.
                                                          But the GSM-based operators maintain that the fraud
 The ESN/MIN pair can be cloned in a number of            is happening on CDMA, for now, and so their
ways without the knowledge of the carrier or              subscribers wouldn't need to worry. Operators in other
subscriber through the use of electronic scanning         countries have deployed various technologies to tackle
devices. After the ESN/MIN pair is captured, the          this menace. They are: -
cloner reprograms or alters the microchip of any
wireless phone to create a clone of the wireless phone    1) There's the duplicate detection method where the
from which the ESN/MIN pair was stolen. The entire        network sees the same phone in several places at the
programming process takes 10-15 minutes per phone.        same time. Reactions include shutting them all off, so
Any call made with cloned phone are billed to and         that the real customer will contact the operator because
traced to a legitimate phone account. Innocent citizens   he has lost the service he is paying for.
end up with unexplained monthly phone bills. To           2) Velocity trap is another test to check the situation,
reprogram a phone, the ESN/MINs are transferred           whereby the mobile phone seems to be moving at
using a computer loaded with specialized software, or     impossible, or most unlikely speeds. For example, if a
a “copycat” box, a device whose sole purpose is to        call is first made in Delhi, and five minutes later,
clone phones. The devices are connected to the            another call is made but this time in Chennai, there
cellular handsets and the new identifying information
must be two phones with the same identity on the
network.                                                  Impact of cloning:
3) Some operators also use Radio Frequency                Each year, the mobile phone industry loses millions of
fingerprinting, originally a military technology. Even    dollars in revenue because of the criminal actions of
identical radio equipment has a distinguishing            persons who are able to reconfigure mobile phones so
`fingerprint', so the network software stores and         that their calls are billed to other phones owned by
compares fingerprints for all the phones that it sees.    innocent third persons. Often these cloned phones are
This way, it will spot the clones with the same           used to place hundreds of calls, often long distance,
identity, but different fingerprints.                     even to foreign countries, resulting in thousands of
                                                          dollars in airtime and long distance charges. Cellular
4) Usage profiling is another way wherein profiles of     telephone companies do not require their customers to
customers' phone usage are kept, and when                 pay for any charges illegally made to their account, no
discrepancies are noticed, the customer is contacted.     matter how great the cost. But some portion of the cost
For example, if a customer normally makes only local      of these illegal telephone calls is passed along to
network calls but is suddenly placing calls to foreign    cellular telephone consumers as a whole.
countries for hours of airtime, it indicates a possible
clone.                                                    Many criminals use cloned cellular telephones for
                                                          illegal activities, because their calls are not billed to
What is Patagonia?                                        them, and are therefore much more difficult to trace.
                                                          His phenomenon is especially prevalent in drug
Patagonia is a software available in the market which     crimes. Drug dealers need to be in constant contact
is used to clone CDMA phone.Using this software a         with their sources of supply and their confederates on
cloner can take over the control of a CDMA phone i.e.     the streets. Traffickers acquire cloned phones at a
cloning of phone.There are other Software’s avai;able     minimum cost, make dozens of calls, and then throw
in the market to clone GSM phone.This software’s are      the phone away after as little as a days' use. In the
easily available in the market.A SIM can be cloned        same way, criminals who pose a threat to our national
again and again and they can be used at different         security, such as terrorists, have been known to use
places.Messages and calls sent by cloned phones can       cloned phones to thwart law enforcement efforts
be tracked.However,if the accuses manages to also         aimed at tracking their whereabouts.
clone the IMEI number of the handset,for which
software’s are available,there is no way he can be        Methods To Detect Cloned Phones In A
traced.                                                   Network:
                                                          Several countermeasures were taken with varying
                                                          success. Here are various methods to detect cloned
                                                          phones on the network:

                                                          Duplicate detection - The network sees the same
                                                          phone in several places at the same time. Reactions
                                                          include shutting them all off so that the real customer
                                                          will contact the operator because he lost the service he
                                                          is paying for, or tearing down connections so that the
                                                          clone users will switch to another clone but the real
                                                          user will contact the operator.

                                                          Velocity trap - The mobile phone seems to be
                                                          moving at impossible, or most unlikely speeds. For
                                                          example, if a call is first made in Helsinki, and five
                   Cellular cloning                       minutes later, another call is made but this time in
Tampere, there must be two phones with the same            How To Know That The Cell Has Been
identity on the network.                                   Cloned?
RF (Radio Frequency) - fingerprinting is                       1. Frequent wrong number phone calls to your
originally a military technology. Even nominally                  phone, or hang-ups.
identical radio equipment has a distinguishing                 2. Difficulty in placing outgoing calls.
``fingerprint'', so the network software stores and            3. Difficulty in retrieving voice mail messages.
compares fingerprints for all the phones that it sees.         4. Incoming calls constantly receiving busy
This way, it will spot the clones with the same identity          signals or wrong numbers. Unusual calls
but different fingerprints.                                       appearing on your phone bills

Usage profiling - Profiles of customers' phone
usage are kept, and when discrepancies are noticed,
the customer is contacted. Credit card companies use
the same method. For example, if a customer normally
makes only local network calls but is suddenly placing
calls to foreign countries for hours of airtime, it
indicates a possible clone.

Call counting - Both the phone and the network
keep track of calls made with the phone, and should
they differ more than the usually allowed one call,
service is denied.

PIN codes - Prior to placing a call, the caller
unlocks the phone by entering a PIN code and then          Prevention for Cloning?
calls as usual. After the call has been completed, the
user locks the phone by entering the PIN code again.       Uniquely identifies a mobile unit within a wireless
Operators may share PIN information to enable safer        carrier's network. The MIN often can be dialed from
roaming.                                                   other wireless or wire line networks. The number
                                                           differs from the electronic serial number (ESN), which
                                                           is the unit number assigned by a phone manufacturer.
                                                           MINs and ESNs can be checked electronically to help
                                                           prevent fraud.Mobiles should never be trusted for
                                                           communicating/storing confidential information.
                                                           Always set a Pin that's required before the phone can
                                                           be used. Check that all mobile devices are covered by
                                                           a corporate security policy.Ensure one person is
                                                           responsible for keeping tabs on who has what
                                                           equipment and that they update the central register.
                                                           How do service providers handle reports of cloned
                                                           phones?Legitimate subscribers who have their phones
                                                           cloned will receive bills with charges for calls they
                                                           didn't make. Sometimes these charges amount to
                                                           several thousands of dollars in addition to the
                                                           legitimate charges. Typically, the service provider will
                                                           assume the cost of those additional fraudulent calls.
                                                           However, to keep the cloned phone from continuing to
                 Duplicate Detection
                                                           receive service, the service provider will terminate the
                                                           legitimate phone subscription. The subscriber is then
                                                           required to activate a new subscription with a different
phone number requiring reprogramming of the phone,          weakness and vulnerability of existing telecom
along with the additional headaches that go along with      systems. If it is planned to invest in new telecom
phone number changes.                                       equipment, a security plan should be made and the
                                                            system tested before being implemented. It is therefore
Solution to this problem:                                   mandatory to keep in mind that a technique which is
                                                            described as safe today can be the most unsecured
Cloning, as the crime branch detectives divulge, starts     technique in the future.
when some one, working for a mobile phone service
provider, agrees to sell the security numbers to gray       CONCLUSION:
market operators. Every mobile handset has a unique
factory-coded electronic serial number and a mobile         Presently the cellular phone industry relies on
identification number. The buyer can then program           common law (fraud and theft) and in-house counter
these security numbers into new handsets.                   measures to address cellular phone fraud.Is in initial
                                                            stages in India so preventive steps should be taken by
The onus to check the misuse of mobile cloning              the network provider and the Government the
phenomenon falls on the subscriber himself. The             enactment of legislation to prosecute crimes related to
subscribers, according to the officials, should be on the   cellular phones is not viewed as a priority, however. It
alert and inform the police on suspecting any foul          is essential that intended mobile crime legislation be
play. It would be advisable for them to ask for the list    comprehensive enough to incorporate cellular phone
of outgoing calls, as soon as they realize that they've     fraud, in particular "cloning fraud" as a specific crime.
been overcharged. Meanwhile, the crime branch is            Existing cellular systems have a number of potential
hopeful to find out away to stop the mobile cloning         weaknesses that were considered. It is crucial that
phenomenon.                                                 businesses and staff take mobile phone security
                                                            seriously.
For example
                                                            Awareness and a few sensible precautions as part of
The Central Forensic Laboratory at Hyderabad has            the overall enterprise security policy will deter all but
reportedly developed software that would detect             the most sophisticated criminal. It is also mandatory to
cloned mobile phones. Called the Speaker                    keep in mind that a technique which is described as
Identification Technique, the software enables one to       safe today can be the most unsecured technique in the
recognize the voice of a person by acoustics analysis.      future. Therefore it is absolutely important to check
These methods are only good at detecting cloning, not       the function of a security system once a year and if
preventing damage.        A better       solution is        necessary update or replace it. Finally, cell-phones
to add authentication to the system. But this means         have to go a long way in security before they can be
upgrading the software of the operators' network, and       used in critical applications like m-commerce.
renewing the SIM-cards, which is not an easy or a
cheap task.                                                 Reference:
This initiative by the Forensic Laboratory had to be        [1]http://www.cdmasoftware.com/eng.html
taken up in the wake of more and more reports of
misuse of cloned mobiles.                                   [2] http://wiretap.spies.com

                                                            [3]http://www.hackinthebox.org/
FUTURE THREATS:
                                                            [4]http://www.google.com
Resolving subscriber fraud can be a long and difficult
process for the victim. It may take time to discover        [5]http://www.wikipedia.com
that subscriber fraud has occurred and an even longer
time to prove that you did not incur the debts. As
described in this article there are many ways to abuse
telecommunication system, and to prevent abuse from
occurring it is absolutely necessary to check out the
Mobile cloning paper

Mais conteúdo relacionado

Mais procurados

Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning774474
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 

Mais procurados (20)

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 

Destaque

Icloud computing seminar
Icloud computing seminarIcloud computing seminar
Icloud computing seminarmunaani
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
speed detection camera
speed detection cameraspeed detection camera
speed detection cameraAkhil Kc
 
Digital Photography basics
Digital Photography basicsDigital Photography basics
Digital Photography basicsChris Snider
 
Speed detection using camera
Speed detection using cameraSpeed detection using camera
Speed detection using cameraBinumon Joseph
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & TrackingAkshay Gujarathi
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEAswinraj Manickam
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Motion sensing and detection
Motion sensing and detectionMotion sensing and detection
Motion sensing and detectionNirav Soni
 
Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Ashutosh Upadhayay
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasVIKAS SINGH BHADOURIA
 
Vehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniquesVehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniquesBharath Chapala
 

Destaque (17)

Icloud computing seminar
Icloud computing seminarIcloud computing seminar
Icloud computing seminar
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
Initial pages
Initial pagesInitial pages
Initial pages
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Technical seminor
Technical seminorTechnical seminor
Technical seminor
 
speed detection camera
speed detection cameraspeed detection camera
speed detection camera
 
Digital Photography basics
Digital Photography basicsDigital Photography basics
Digital Photography basics
 
Speed detection using camera
Speed detection using cameraSpeed detection using camera
Speed detection using camera
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Motion sensing and detection
Motion sensing and detectionMotion sensing and detection
Motion sensing and detection
 
Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7
 
Speed cameras ppt full ...
Speed cameras ppt full ...Speed cameras ppt full ...
Speed cameras ppt full ...
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-cameras
 
Vehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniquesVehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniques
 

Semelhante a Mobile cloning paper

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Project gsm
Project gsmProject gsm
Project gsmKIIT
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Managerial economics presentation
Managerial economics presentationManagerial economics presentation
Managerial economics presentationPurav Shah
 
Pakdo life ka har signal
Pakdo life ka har signalPakdo life ka har signal
Pakdo life ka har signalabhilashshah12
 
Business prospect of launching blackberry with video calling in CDMA
Business prospect of launching blackberry with video calling in CDMABusiness prospect of launching blackberry with video calling in CDMA
Business prospect of launching blackberry with video calling in CDMAPranita Mehta
 
2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2m2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2mIrfan Ahmad
 
Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)Ali Usman
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 

Semelhante a Mobile cloning paper (20)

14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Cdma Vs Gsm1
Cdma Vs Gsm1Cdma Vs Gsm1
Cdma Vs Gsm1
 
C D M A Vs Gsm1
C D M A Vs  Gsm1C D M A Vs  Gsm1
C D M A Vs Gsm1
 
Gsmcdma
GsmcdmaGsmcdma
Gsmcdma
 
Gsm
Gsm    Gsm
Gsm
 
Gsmcdma
GsmcdmaGsmcdma
Gsmcdma
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Project gsm
Project gsmProject gsm
Project gsm
 
Gsm&cdma
Gsm&cdmaGsm&cdma
Gsm&cdma
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Managerial economics presentation
Managerial economics presentationManagerial economics presentation
Managerial economics presentation
 
Pakdo life ka har signal
Pakdo life ka har signalPakdo life ka har signal
Pakdo life ka har signal
 
Business prospect of launching blackberry with video calling in CDMA
Business prospect of launching blackberry with video calling in CDMABusiness prospect of launching blackberry with video calling in CDMA
Business prospect of launching blackberry with video calling in CDMA
 
2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2m2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2m
 
Clonning
ClonningClonning
Clonning
 
Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 

Mobile cloning paper

  • 1. Mobile Phone Cloning A.Shanmuga Sundaram M.Adityan Electrical and Electronics Engineering Electrical and Electronics Engineering Sri Krishna College of Engineering and Sri Krishna College of Engineering and Technology Technology Coimbatore, India Coimbatore, India saishanmu20.12.92@gmail.com adityanmurthi82@gmail.com Abstract- Mobile communication has been readily improve their technology. But the operators claim they available for several years, and is major business can't do much for now. "It's like stealing cars or today. It provides a valuable service to its users who duplicating credit card numbers. The service providers are willing to pay a considerable premium over a fixed cannot do much except keep track of the billing line phone, to be able to walk and talk freely. Because pattern of the users. But since the billing cycle is of its usefulness and the money involved in the monthly, the damage is done by the time we can detect business, it is subject to fraud. Unfortunately, the the mischief," says a Reliance executive. advance of security standards has not kept pace with Qualcomm, which develops CDMA technology the dissemination of mobile communication. globally, says each instance of mobile hacking is different and therefore there is very little an operator Some of the features of mobile communication make it can do to prevent hacking. "It's like a virus hitting the an alluring target for criminals. It is a relatively new computer. Each software used to hack into the network invention, so not all people are quite familiar with its is different, so operators can only keep upgrading their possibilities, in good or in bad. Its newness also means security firewall as and when the hackers strike," says intense competition among mobile phone service a Qualcomm executive. providers as they are attracting customers. The major threat to mobile phone is from cloning. IndexTerms: Cell phone cloning,GSM,CDMA,EMIE and PIN,Patagonia Introduction : While mobile cloning is an emerging threat for Indian subscribers, it has been happening in other telecom markets since the 1990s, though mostly with regard to CDMA phones. Pleas in an US District Court in 1997 effectively ended West Texas authorities' first case of `phone cloning.' Authorities in the case estimated the What is mobile phone cloning? loss at $3,000 to $4,000 for each number used. Southwestern Bell claims wireless fraud costs the When we look up the dictionary meaning of cloning it industry $650 million each year in the US. Some states, “ to create the exact replica or a mirror image of federal agents in the US have called phone cloning an an subject understudy. The subject can be any thing especially `popular' crime because it is hard to trace. living or non-living so here we take into consideration Back home, police officers say the Yasin case is just the cellular or mobile phones. So Mobile cloning is the tip of the iceberg and have asked operators to copying the identity of one mobile telephone to another mobile telephone. Every electronic device has a working frequency, which plays a crucial role in its
  • 2. operation this we shall discuss later. Now the question could listen in to nearly any analogue mobile phone that arises is how is a mobile phone cloned. I shall be call. As a result, Cabinet Ministers, company chiefs discussing this in detail, because it is a very complex and celebrities routinely found their most intimate procedure in which we have to be familiar with the conversations published in the next day's tabloids following terms. Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000. Cellular phone cloning What are GSM and CDMS mobile phone sets? CDMA is one of the newer digital technologies used in Canada, the US, Australia, and some South-eastern Asian countries (e.g. Hong Kong and South Korea). GSM: CDMA differs from GSM and TDMA (Time Division Global System for Mobile Communications. A digital Multiple Access) by its use of spread spectrum cellular phone technology based on TDMA GSM techniques for transmitting voice or data over the air. phones use a Subscriber Identity Module (SIM) card Rather than dividing the radio frequency spectrum into that contains user account information. Any GSM separate user channels by frequency slices or time phone becomes immediately programmed after slots, spread spectrum technology separates users by plugging in the SIM card, thus allowing GSM phones assigning them digital codes within the same broad to be easily rented or borrowed.Operators who provide spectrum. Advantages of CDMA include higher user GSM service are Airtel,Hutch etc. capacity and immunity from interference by other signals. CDMA: GSM is a digital mobile telephone system that is Code Division Multiple Access. A method for widely used in Europe and other parts of the world. transmitting simultaneous signals over a shared GSM uses a variation of TDMA and is the most portion of the spectrum. There is no Subscriber widely used of the three digital wireless telephone Identity Module (SIM) card unlike in GSM.Operators technologies. GSM digitizes and compresses data, then who provides CDMA service in India are Reliance and sends it down a channel with two other streams of user Tata Indicom. data, each in its own time slot. It operates at either the 900 MHz or 1,800 MHz frequency band. Mobile Phone Cloning Software: Rise of Cell Cloning: Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you The early 1990s were boom times for eavesdroppers. to configure an ESN (Electronic serial number) via Any curious teenager with a £100 Tandy Scanner software. You would also have to change the MIN
  • 3. (Mobile Identification Number). When you had is entered into the phone. There are also more discreet, successfully changed the ESN/MIN pair, your phone concealable devices used to clone cellular phones. was an effective clone of the other phone. Cloning Plugs and ES-Pros, which are about the size of a pager required access to ESN and MIN pairs. ESN/MIN or small calculator, do not require computers or pairs were discovered in several ways: copycat boxes for cloning. The entire programming Sniffing the cellular process takes ten-15 minutes per phone. Trashing cellular companies or cellular resellers Hacking cellular companies or cellular resellers Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone able phones are more difficult to find and newer phones have not been successfully reverse-engineered.Cloning has been successfully demonstrated under GSM, but the process is not easy and it currently remains in the realm of serious hobbyists and researchers. How is a phone cloned? Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data This was how CDMA handsets are cloned but now we interpreters (DDI). DDIs are devices specially face a question that being: -Do GSM sets run the risk manufactured to intercept ESN/MINs. By simply of‘’cloning’? sitting near busy roads where the volume of cellular Looking at the recent case, it is quite possible to clone traffic is high, cellular thieves monitoring the radio both GSM and CDMA sets. The accused in the Delhi wave transmissions from the cell phones of legitimate case used software called Patagonia to clone only subscribers can capture ESN/MIN pair. Numbers can CDMA phones (Reliance and Tata Indicom). be recorded by hand, one-by-one, or stored in the box However, there are software packages that can be used and later downloaded to a computer. ESN/MIN to clone even GSM phones (e.g. Airtel, BSNL, Hutch, readers can also be used from inside an offender’s Idea). In order to clone a GSM phone, knowledge of home, office, or hotel room, increasing the difficulty the International Mobile Equipment Identity (IMEI) or of detection. instrument number is sufficient. But the GSM-based operators maintain that the fraud The ESN/MIN pair can be cloned in a number of is happening on CDMA, for now, and so their ways without the knowledge of the carrier or subscribers wouldn't need to worry. Operators in other subscriber through the use of electronic scanning countries have deployed various technologies to tackle devices. After the ESN/MIN pair is captured, the this menace. They are: - cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone 1) There's the duplicate detection method where the from which the ESN/MIN pair was stolen. The entire network sees the same phone in several places at the programming process takes 10-15 minutes per phone. same time. Reactions include shutting them all off, so Any call made with cloned phone are billed to and that the real customer will contact the operator because traced to a legitimate phone account. Innocent citizens he has lost the service he is paying for. end up with unexplained monthly phone bills. To 2) Velocity trap is another test to check the situation, reprogram a phone, the ESN/MINs are transferred whereby the mobile phone seems to be moving at using a computer loaded with specialized software, or impossible, or most unlikely speeds. For example, if a a “copycat” box, a device whose sole purpose is to call is first made in Delhi, and five minutes later, clone phones. The devices are connected to the another call is made but this time in Chennai, there cellular handsets and the new identifying information
  • 4. must be two phones with the same identity on the network. Impact of cloning: 3) Some operators also use Radio Frequency Each year, the mobile phone industry loses millions of fingerprinting, originally a military technology. Even dollars in revenue because of the criminal actions of identical radio equipment has a distinguishing persons who are able to reconfigure mobile phones so `fingerprint', so the network software stores and that their calls are billed to other phones owned by compares fingerprints for all the phones that it sees. innocent third persons. Often these cloned phones are This way, it will spot the clones with the same used to place hundreds of calls, often long distance, identity, but different fingerprints. even to foreign countries, resulting in thousands of dollars in airtime and long distance charges. Cellular 4) Usage profiling is another way wherein profiles of telephone companies do not require their customers to customers' phone usage are kept, and when pay for any charges illegally made to their account, no discrepancies are noticed, the customer is contacted. matter how great the cost. But some portion of the cost For example, if a customer normally makes only local of these illegal telephone calls is passed along to network calls but is suddenly placing calls to foreign cellular telephone consumers as a whole. countries for hours of airtime, it indicates a possible clone. Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to What is Patagonia? them, and are therefore much more difficult to trace. His phenomenon is especially prevalent in drug Patagonia is a software available in the market which crimes. Drug dealers need to be in constant contact is used to clone CDMA phone.Using this software a with their sources of supply and their confederates on cloner can take over the control of a CDMA phone i.e. the streets. Traffickers acquire cloned phones at a cloning of phone.There are other Software’s avai;able minimum cost, make dozens of calls, and then throw in the market to clone GSM phone.This software’s are the phone away after as little as a days' use. In the easily available in the market.A SIM can be cloned same way, criminals who pose a threat to our national again and again and they can be used at different security, such as terrorists, have been known to use places.Messages and calls sent by cloned phones can cloned phones to thwart law enforcement efforts be tracked.However,if the accuses manages to also aimed at tracking their whereabouts. clone the IMEI number of the handset,for which software’s are available,there is no way he can be Methods To Detect Cloned Phones In A traced. Network: Several countermeasures were taken with varying success. Here are various methods to detect cloned phones on the network: Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator. Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five Cellular cloning minutes later, another call is made but this time in
  • 5. Tampere, there must be two phones with the same How To Know That The Cell Has Been identity on the network. Cloned? RF (Radio Frequency) - fingerprinting is 1. Frequent wrong number phone calls to your originally a military technology. Even nominally phone, or hang-ups. identical radio equipment has a distinguishing 2. Difficulty in placing outgoing calls. ``fingerprint'', so the network software stores and 3. Difficulty in retrieving voice mail messages. compares fingerprints for all the phones that it sees. 4. Incoming calls constantly receiving busy This way, it will spot the clones with the same identity signals or wrong numbers. Unusual calls but different fingerprints. appearing on your phone bills Usage profiling - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. Credit card companies use the same method. For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone. Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied. PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then Prevention for Cloning? calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Uniquely identifies a mobile unit within a wireless Operators may share PIN information to enable safer carrier's network. The MIN often can be dialed from roaming. other wireless or wire line networks. The number differs from the electronic serial number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can be checked electronically to help prevent fraud.Mobiles should never be trusted for communicating/storing confidential information. Always set a Pin that's required before the phone can be used. Check that all mobile devices are covered by a corporate security policy.Ensure one person is responsible for keeping tabs on who has what equipment and that they update the central register. How do service providers handle reports of cloned phones?Legitimate subscribers who have their phones cloned will receive bills with charges for calls they didn't make. Sometimes these charges amount to several thousands of dollars in addition to the legitimate charges. Typically, the service provider will assume the cost of those additional fraudulent calls. However, to keep the cloned phone from continuing to Duplicate Detection receive service, the service provider will terminate the legitimate phone subscription. The subscriber is then required to activate a new subscription with a different
  • 6. phone number requiring reprogramming of the phone, weakness and vulnerability of existing telecom along with the additional headaches that go along with systems. If it is planned to invest in new telecom phone number changes. equipment, a security plan should be made and the system tested before being implemented. It is therefore Solution to this problem: mandatory to keep in mind that a technique which is described as safe today can be the most unsecured Cloning, as the crime branch detectives divulge, starts technique in the future. when some one, working for a mobile phone service provider, agrees to sell the security numbers to gray CONCLUSION: market operators. Every mobile handset has a unique factory-coded electronic serial number and a mobile Presently the cellular phone industry relies on identification number. The buyer can then program common law (fraud and theft) and in-house counter these security numbers into new handsets. measures to address cellular phone fraud.Is in initial stages in India so preventive steps should be taken by The onus to check the misuse of mobile cloning the network provider and the Government the phenomenon falls on the subscriber himself. The enactment of legislation to prosecute crimes related to subscribers, according to the officials, should be on the cellular phones is not viewed as a priority, however. It alert and inform the police on suspecting any foul is essential that intended mobile crime legislation be play. It would be advisable for them to ask for the list comprehensive enough to incorporate cellular phone of outgoing calls, as soon as they realize that they've fraud, in particular "cloning fraud" as a specific crime. been overcharged. Meanwhile, the crime branch is Existing cellular systems have a number of potential hopeful to find out away to stop the mobile cloning weaknesses that were considered. It is crucial that phenomenon. businesses and staff take mobile phone security seriously. For example Awareness and a few sensible precautions as part of The Central Forensic Laboratory at Hyderabad has the overall enterprise security policy will deter all but reportedly developed software that would detect the most sophisticated criminal. It is also mandatory to cloned mobile phones. Called the Speaker keep in mind that a technique which is described as Identification Technique, the software enables one to safe today can be the most unsecured technique in the recognize the voice of a person by acoustics analysis. future. Therefore it is absolutely important to check These methods are only good at detecting cloning, not the function of a security system once a year and if preventing damage. A better solution is necessary update or replace it. Finally, cell-phones to add authentication to the system. But this means have to go a long way in security before they can be upgrading the software of the operators' network, and used in critical applications like m-commerce. renewing the SIM-cards, which is not an easy or a cheap task. Reference: This initiative by the Forensic Laboratory had to be [1]http://www.cdmasoftware.com/eng.html taken up in the wake of more and more reports of misuse of cloned mobiles. [2] http://wiretap.spies.com [3]http://www.hackinthebox.org/ FUTURE THREATS: [4]http://www.google.com Resolving subscriber fraud can be a long and difficult process for the victim. It may take time to discover [5]http://www.wikipedia.com that subscriber fraud has occurred and an even longer time to prove that you did not incur the debts. As described in this article there are many ways to abuse telecommunication system, and to prevent abuse from occurring it is absolutely necessary to check out the