SlideShare uma empresa Scribd logo
1 de 20
INDEX
 INTRODUCTION
 IMPORTANT TERMS
 HOW A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 IMPACT OF CLONING
 HOW TO KNOW THAT A PHONE IS CLONED
 HOW TO PREVENT CLONING?
 FACTS & FIGURES
 CONCLUSION
INTRODUCTION
CLONING:
 Cloning is the creation of an organism that is an exact genetic copy of
another.
 This means that every single bit of DNA is the same between the two!
CELL PHONE CLONING:
 Cell phone cloning is copying the identity of one mobile telephone to
another mobile telephone.
 Usually this is done for the purpose of making fraudulent telephone
calls.
The bills for the calls go to the legitimate subscriber. The cloner is also
able to make effectively anonymous calls.
Cloning is the process of taking the programmed information that is
stored in a legitimate mobile phone and illegally programming the
identical information into another mobile phone.
The service provider network does not have a way to differentiate
between the legitimate phone and the clone phone. .
IMEI
Stands for International Mobile Equipment Identifier, this is a 10 digit
universally unique number of our GSM handset.
I use the term Universally Unique because there cannot be 2 mobile
phones having the same IMEI no.
This is a very valuable number and used in tracking mobile phones.
SIM
 which stands for Subscriber Identification Module. Basically the SIM
provides storage of subscriber related information of three types:
IMPORTANT TERMS
1. Fixed data stored before the subscription is sold
2. Temporary network data
3. Service related data.
ESN
which stands for Electronic Serial Number. It is same as the IMEI but is
used in CDMA handsets
MIN
stands for Mobile Identification Number, which is the same as the SIM
of GSM.
HOW A PHONE IS CLONED
 Cellular thieves can capture ESN/MINs using devices
such as cell phone ESN reader or digital data interpreters
(DDI).
 The ESN/MIN pair can be cloned in a number of ways
without the knowledge of the carrier or subscriber through
the use of electronic scanning devices.
 After the ESN/MIN pair is captured, the cloner
reprograms or alters the microchip of any wireless phone
to create a clone of the wireless phone from which the
ESN/MIN pair was stolen.
PATAGONIA
 Patagonia is software available in the market
which is used to clone CDMA phone. Using
this software a cloner can take over the control
of a CDMA phone i.e. cloning of phone.
Duplicate detection - The network sees the same phone in several places
at the same time. Reactions include shutting them all off so that the real
customer will contact the operator because he lost the service he is
paying for, or tearing down connections so that the clone users will
switch to another clone but the real user will contact the operator.
Velocity trap - The mobile phone seems to be moving at impossible, or
most unlikely speeds. For example, if a call is first made in Helsinki, and
five minutes later, another call is made but this time in Tampere, there
must be two phones with the same identity on the network.
METHODS TO DETECT CLONED PHONES
RF (Radio Frequency) - fingerprinting is originally a military
technology. Even nominally identical radio equipment has a
distinguishing ``fingerprint'', so the network software stores and
compares fingerprints for all the phones that it sees. This way, it will spot
the clones with the same identity but different fingerprints.
Usage profiling. - Profiles of customers' phone usage are kept, and
when discrepancies are noticed, the customer is contacted. Credit card
companies use the same method. For example, if a customer normally
makes only local network calls but is suddenly placing calls to foreign
countries for hours of airtime, it indicates a possible clone.
Call counting - Both the phone and the network keep track of calls
made with the phone, and should they differ more than the usually
allowed one call, service is denied.
PIN codes - Prior to placing a call, the caller unlocks the phone by
entering a PIN code and then calls as usual. After the call has been
completed, the user locks the phone by entering the PIN code again.
Operators may share PIN information to enable safer roaming.
Each year, the mobile phone industry loses millions of dollars in
revenue because of the criminal actions of persons who are able to
reconfigure mobile phones so that their calls are billed to other
phones owned by innocent third persons.
Many criminals use cloned cellular telephones for illegal activities,
because their calls are not billed to them, and are therefore much
more difficult to trace.
IMPACT OF CLONING
Frequent wrong number phone calls to your phone, or hang-ups.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals or wrong
numbers.
Unusual calls appearing on your phone bills.
By this we can know that the cell has been cloned.
HOW TO KNOW THAT THE CELL HAS
BEEN CLONED?
The MIN often can be dialed from other wireless or wire line
networks.
The number differs from the electronic serial number (ESN),
which is the unit number assigned by a phone manufacturer.
MINs and ESNs can be checked electronically to help prevent
fraud.
Always set a Pin that's required before the phone can be used.
Check that all mobile devices are covered by a corporate security
policy.
HOW TO PREVENT CELL CLONING?
oSouthwestern Bell claims wireless fraud costs the industry $650 million
each year in the US.
o Some federal agents in the US have called phone cloning an especially
`popular' crime because it is hard to trace.
oIn one case, more than 1,500 telephone calls were placed in a single
day by cellular phone thieves using the number of a single unsuspecting
owner.
oA Home Office report in 2002 revealed that in London around 3,000
mobile phones were stolen in one month alone which were used for cell
phone cloning
FACTS & FIGURES
Therefore it is absolutely important to check the function of a
security system once a year and if necessary update or replace it.
Preventive steps should be taken by the network provider and the
Government the enactment of legislation to prosecute crimes.
CONCLUSION
Referenceshttp://www.cdmasoftware.com/eng.html
http://www.victorgsm.com/products/msl/
http://www.unlocker.ru/cdma_soft.php
http://www.cxotoday.com
http://infotech.indiatimes.coM
http://wiretap.spies.com
http://www.hackinthebox.org/
http://www.google.com
http://www.wikipedia.com
Mobile phone cloning

Mais conteúdo relacionado

Mais procurados

Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobileshome
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammerakash roy
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSeminar Links
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesakhila immadisetty
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptasmita tarar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptAmar Raj
 
Optical mouse working principle
Optical mouse working principleOptical mouse working principle
Optical mouse working principleanasibrahim2011411
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESChaitanya Ram
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesAbhishek Abhi
 

Mais procurados (20)

Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost Mobile
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Optical mouse working principle
Optical mouse working principleOptical mouse working principle
Optical mouse working principle
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 

Destaque

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 
Sim cards
Sim cardsSim cards
Sim cardsfaizlap
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
E-WASTE POWERPOINT PRESENTATION
E-WASTE POWERPOINT PRESENTATIONE-WASTE POWERPOINT PRESENTATION
E-WASTE POWERPOINT PRESENTATIONAditya Raman
 

Destaque (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Sim cards
Sim cardsSim cards
Sim cards
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
E-WASTE POWERPOINT PRESENTATION
E-WASTE POWERPOINT PRESENTATIONE-WASTE POWERPOINT PRESENTATION
E-WASTE POWERPOINT PRESENTATION
 
E waste management
E waste managementE waste management
E waste management
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 

Semelhante a Mobile phone cloning

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsPaul Parke
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentationremiwanless
 

Semelhante a Mobile phone cloning (16)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Test
TestTest
Test
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
 

Último

9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Servicenishacall1
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfCWS Technology
 

Último (6)

9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 

Mobile phone cloning

  • 1.
  • 2. INDEX  INTRODUCTION  IMPORTANT TERMS  HOW A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO KNOW THAT A PHONE IS CLONED  HOW TO PREVENT CLONING?  FACTS & FIGURES  CONCLUSION
  • 3. INTRODUCTION CLONING:  Cloning is the creation of an organism that is an exact genetic copy of another.  This means that every single bit of DNA is the same between the two! CELL PHONE CLONING:  Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.  Usually this is done for the purpose of making fraudulent telephone calls.
  • 4. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls. Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The service provider network does not have a way to differentiate between the legitimate phone and the clone phone. .
  • 5. IMEI Stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones. SIM  which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: IMPORTANT TERMS
  • 6. 1. Fixed data stored before the subscription is sold 2. Temporary network data 3. Service related data. ESN which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
  • 7. HOW A PHONE IS CLONED  Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).  The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices.  After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
  • 8. PATAGONIA  Patagonia is software available in the market which is used to clone CDMA phone. Using this software a cloner can take over the control of a CDMA phone i.e. cloning of phone.
  • 9.
  • 10. Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator. Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network. METHODS TO DETECT CLONED PHONES
  • 11.
  • 12. RF (Radio Frequency) - fingerprinting is originally a military technology. Even nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees. This way, it will spot the clones with the same identity but different fingerprints. Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. Credit card companies use the same method. For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone.
  • 13. Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied. PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 14. Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace. IMPACT OF CLONING
  • 15. Frequent wrong number phone calls to your phone, or hang-ups. Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills. By this we can know that the cell has been cloned. HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
  • 16. The MIN often can be dialed from other wireless or wire line networks. The number differs from the electronic serial number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can be checked electronically to help prevent fraud. Always set a Pin that's required before the phone can be used. Check that all mobile devices are covered by a corporate security policy. HOW TO PREVENT CELL CLONING?
  • 17. oSouthwestern Bell claims wireless fraud costs the industry $650 million each year in the US. o Some federal agents in the US have called phone cloning an especially `popular' crime because it is hard to trace. oIn one case, more than 1,500 telephone calls were placed in a single day by cellular phone thieves using the number of a single unsuspecting owner. oA Home Office report in 2002 revealed that in London around 3,000 mobile phones were stolen in one month alone which were used for cell phone cloning FACTS & FIGURES
  • 18. Therefore it is absolutely important to check the function of a security system once a year and if necessary update or replace it. Preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes. CONCLUSION