SlideShare uma empresa Scribd logo
1 de 27
By
M.Sai Srinivas
15311A0568
CSE-B
 What is cellphone cloning?
 What is mobile cloning?
 When did cloning start?
 GSM
 CDMA
 How is a phone cloned?
 Some Methods to detect cloned phones.
 Symptoms of cloned mobile.
 How to prevent cloning.
 Conclusion.
 Cell Phone cloning is copying the identity of one
mobile phone to another mobile phone.
 The main purpose of Mobile cloning is making
fraudulent calls.
 The bills for the class goes to the legitimate
subscriber.
 The cloner also can also make anonymous calls
 Cell Phone cloning started with Motorola
“bag” phones and reached at their peak in mid
90’s.
 The Cellular Telecommunications Industry
Assoiciation(CTIA) estimates that financial
losses due to cloning fraud are around a billion
u.s.dollars.
 Mobile cloning is in initial stages in india
so preventive steps should be taken by network
provider and government
 Global System for Mobile Communication
.A cellular technology based on TDMA.
 GSM phones use a Subscriber Identity
Module(SIM) card that contains user info.
 Any GSM automatically programmed after
plugging in the SIM card.
 Code Division Multiple Access is a method of
transmitting simultaneously signals over shared
portion of spectrum.
 There is no SIM card in GSM.
 In India the major CDMA service providers are
Reliance and Tata Indicom.
 Electronic Serial Number(ESN).It is loaded when
the phone number is manufactured.
 This number cannot be tampered or changed by
the user or a subscriber.
 This is one of the essentials to be known for
cloning a mobile phone.
 Mobile Identification Number
 By Knowing ESN/MIN pairs cloning can be
Successfully done on any mobile phone.
 Cloning involves modifying or replacing the
EPROM in the phone with a new chip
 It would allow you to configure ESN via software
like PATAGONIA.
 You would also have to change MIN number too.
 When you had successfully changed ESN/MIN
pair, the phone was an effective clone of another
phone.
 Cloning is rare on the GSM ,one of the more
widely used mobile telephone communication
systems.
 However, cloning GSM Phones is achieved by
cloning the SIM card contained within , not
necessarily any of the phone’s internal data.
 The important information is IMSI stored in SIM
card.
 SIM card inserted to a reader
 Connect a computer and transfer the card
details.
 Use encrypted software to interpret details.
Duplicate detection.
Velocity trap.
Call counting
 The network shows the same mobile phone at
several places
 Reactions include shutting all them off so that the
real customer will contact the operator as he lost
the service
 The Mobile phone seems to be moving with
impossible speed or most unlikely speeds.
 For example one phone call is made at Vizag
and in another 5 minutes call is made at
Hyderabad.
 Both phone and network keep the track of calls
made with the phone.
 If they differ by each other the service to that
mobile is denied(denial of service).
 Frequent wrong calls to your phone , or hang-
ups.
 Difficulty in placing outgoing calls.
 Incoming calls constantly receiving busy signals
or wrong numbers. Unusual calls appearing on
phone bills.
 Blacklisting of stolen phones is one type of
mechanism to prevent unauthorized use. An
Equipment Identity Register enables network
operators to disable stolen cellular phones on
network.
 User verification using Personal Identification
Number(PIN) codes is one method for customer
protection against cellular phone fraud
 Tests conducted by USA found that having a PIN
code reduced fraud by more than 80%.
 Traffic Analysis detects cellular fraud by using
artificial intelligence software to detect
suspicious calling patterns , such as sudden
increase in the length of calls or a sudden
increase in number of international calls.
 Software also determines whether it is physically
possible for subscriber to make a call from
current location and the time of previous call
 Mobile cloning is in initial stages in India so
preventive steps should be taken by the network
provider.
 Though the mobile cloning has some uses in
fields like army it has many disadvantages
 Existing cellular systems have a number of
potential weakness . It is crucial that business
and staff take mobile phone security seriously.
Mobile cloning
Mobile cloning

Mais conteúdo relacionado

Mais procurados

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

Mais procurados (20)

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 

Semelhante a Mobile cloning

Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
Jacqueline Fick
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
IAEME Publication
 

Semelhante a Mobile cloning (14)

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Clonning
ClonningClonning
Clonning
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Test
TestTest
Test
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 

Último

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Último (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

Mobile cloning

  • 2.  What is cellphone cloning?  What is mobile cloning?  When did cloning start?  GSM  CDMA  How is a phone cloned?  Some Methods to detect cloned phones.  Symptoms of cloned mobile.  How to prevent cloning.  Conclusion.
  • 3.  Cell Phone cloning is copying the identity of one mobile phone to another mobile phone.  The main purpose of Mobile cloning is making fraudulent calls.  The bills for the class goes to the legitimate subscriber.  The cloner also can also make anonymous calls
  • 4.  Cell Phone cloning started with Motorola “bag” phones and reached at their peak in mid 90’s.  The Cellular Telecommunications Industry Assoiciation(CTIA) estimates that financial losses due to cloning fraud are around a billion u.s.dollars.
  • 5.  Mobile cloning is in initial stages in india so preventive steps should be taken by network provider and government
  • 6.  Global System for Mobile Communication .A cellular technology based on TDMA.  GSM phones use a Subscriber Identity Module(SIM) card that contains user info.  Any GSM automatically programmed after plugging in the SIM card.
  • 7.  Code Division Multiple Access is a method of transmitting simultaneously signals over shared portion of spectrum.  There is no SIM card in GSM.  In India the major CDMA service providers are Reliance and Tata Indicom.
  • 8.  Electronic Serial Number(ESN).It is loaded when the phone number is manufactured.  This number cannot be tampered or changed by the user or a subscriber.  This is one of the essentials to be known for cloning a mobile phone.
  • 9.  Mobile Identification Number  By Knowing ESN/MIN pairs cloning can be Successfully done on any mobile phone.
  • 10.  Cloning involves modifying or replacing the EPROM in the phone with a new chip  It would allow you to configure ESN via software like PATAGONIA.  You would also have to change MIN number too.
  • 11.  When you had successfully changed ESN/MIN pair, the phone was an effective clone of another phone.
  • 12.  Cloning is rare on the GSM ,one of the more widely used mobile telephone communication systems.  However, cloning GSM Phones is achieved by cloning the SIM card contained within , not necessarily any of the phone’s internal data.
  • 13.  The important information is IMSI stored in SIM card.  SIM card inserted to a reader  Connect a computer and transfer the card details.  Use encrypted software to interpret details.
  • 14.
  • 16.  The network shows the same mobile phone at several places  Reactions include shutting all them off so that the real customer will contact the operator as he lost the service
  • 17.
  • 18.  The Mobile phone seems to be moving with impossible speed or most unlikely speeds.  For example one phone call is made at Vizag and in another 5 minutes call is made at Hyderabad.
  • 19.
  • 20.  Both phone and network keep the track of calls made with the phone.  If they differ by each other the service to that mobile is denied(denial of service).
  • 21.  Frequent wrong calls to your phone , or hang- ups.  Difficulty in placing outgoing calls.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on phone bills.
  • 22.  Blacklisting of stolen phones is one type of mechanism to prevent unauthorized use. An Equipment Identity Register enables network operators to disable stolen cellular phones on network.  User verification using Personal Identification Number(PIN) codes is one method for customer protection against cellular phone fraud
  • 23.  Tests conducted by USA found that having a PIN code reduced fraud by more than 80%.  Traffic Analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns , such as sudden increase in the length of calls or a sudden increase in number of international calls.
  • 24.  Software also determines whether it is physically possible for subscriber to make a call from current location and the time of previous call
  • 25.  Mobile cloning is in initial stages in India so preventive steps should be taken by the network provider.  Though the mobile cloning has some uses in fields like army it has many disadvantages  Existing cellular systems have a number of potential weakness . It is crucial that business and staff take mobile phone security seriously.