phone cloning

advertisement
PHONE CLONING TECHNOLOGY
GUIDED BY:Prof. Sunil Yadav
PRESENTED BY:JAGJIT SINGH KHALSA
Roll no-3107
INDEX
 INTRODUCTION.
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 SYMPTOMS OF PHONE CLONING.
 MEASURES TO BE TAKEN.
 ADVANTAGES AND DISADVANTAGES.
 VICTIMS OF PHONE CLONING.
 CONCLUSION.
 REFERENCES
INTRODUCTION
CLONING: Cloning is the creation of an organism that
is an exact genetic copy of another.
PHONE CLONING: Phone cloning is the process of
taking the programmed information that is stored in
a legitimate mobile phone and illegally programming
the identical information into another mobile phone.
CDMA MOBILE SETS
 CDMA stands for Code Division Multiple Access.
 A method for transmitting simultaneous signals over a
shared portion of the spectrum.
 CDMA uses a Mobile Identification Number (MIN)
card that contains user account information.
GSM MOBILE SETS
 GSM stands for
Communications.
Global
System
for
Mobile
 GSM uses a Subscriber Identity Module (SIM) card.
 GSM is a standard set developed by the European
Telecommunications Standards Institute (ETSI) to
describe technologies for second generation (2G)
digital cellular networks.
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
Identifier, this is a 15 digit universally unique number
of the GSM handset.
 SIM, which stands for Subscriber Identification
Module. Basically the SIM provides storage of
subscriber related information of three types:
1. Fixed data stored before the subscription is sold.
2. Temporary network data
3. Service related data.
 ESN, stands for Electronic Serial Number. It is
same as the IMEI but is used in CDMA handsets.
 It is loaded when the phone is manufactured.
 MIN ,stands for Mobile Identification Number,
It’s a 10 digit number used to identify a mobile
phone.
HOW IS A PHONE CLONED?
 Capture the ESN/MIN pair or SIM/IMEI pair.
 Clone the ESN/MIN pair using electronic scanning




devices.
The cloner reprograms or alters the microchip of any
wireless phone.
The ESN/MINs are transferred using a computer to a
device.
These devices are connected to handsets.
New information is entered into the phone.
Thus a clone of the legitimate phone is thus obtained.
HOW CLONING TAKES PLACE.
http://homesecurityandpersonalprotection.blogspot.in
• CLONING
DEVICE
http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html
CLONING GSM PHONES
 The important information is the IMSI, which is
stored on the removable SIM card.
 SIM card inserted into a reader.
 Connect to computer and card details transferred.
 Use encrypted software to interpret details.
 The result: A cloned cell phone is ready for misuse.
CLONING CDMA PHONES
 Cellular telephone thieves monitor the radio
frequency spectrum.
 Steal the cell phone pair as it is being anonymously
registered with a cell site.
 Subscriber information is also encrypted and
transmitted digitally.
 A device called as DDI, Digital Data Interface can
be used to get pairs.
 Stolen ESN and MIN were then fed into a new
CDMA handset.
DETECTION OF PHONE
CLONING
 Duplicate detection - The network sees the same
phone in several places at the same time.
 Velocity trap - The mobile phone seems to be moving
at impossible, or most unlikely speeds..
DETECTION (Continued..)
 RF (Radio Frequency) - Nominally identical radio
equipment has a distinguishing ``fingerprint'', so the
network software stores and compares fingerprints for
all the phones that it sees.
 Usage profiling. - Profiles of customers' phone usage
are kept, and when discrepancies are noticed, the
customer is contacted.
DETECTION (Continued..)
 Call counting - Both the phone and the network keep
track of calls made with the phone, and should they
differ more than the usually allowed one call, service
is denied.
 PIN codes - Prior to placing a call, the caller unlocks
the phone by entering a PIN code and then calls as
usual.
DETECTION(Continued..)
 The best detection method available in CDMA is the
A KEY FEATURE.
• Secret 20 digit number.
• Number loaded in Authentication Centre.
• Cannot be copied.
PHONE CLONING
SYMPTOMS
 Frequent wrong number phone calls to your phone, or
hang-ups.
 Difficulty in placing outgoing calls.
 Difficulty in retrieving voice mail messages.
 Incoming calls constantly receiving busy signals or
wrong numbers.
 Unusual calls appearing on your phone bills
CLONING STATISTICS
Victims
percentage
Age
MEASURES TO BE TAKEN
 Service providers have adopted certain measures to
prevent cellular fraud.
 These include:
 Blacklisting of stolen phones is another mechanism to
prevent unauthorized use.
 User verification using Personal Identification
Number (PIN) codes is one method for customer
protection against cellular phone fraud
 Encryption: Encryption is regarded as the effective
way to prevent cellular fraud
 Traffic analysis detects cellular fraud by using
artificial intelligence software to detect suspicious
calling patterns, such as a sudden increase in the
length of calls or a sudden increase in the number of
international calls.
 Blocking: Blocking is used by service providers
to protect themselves from high risk callers.
ADVANTAGES
If your phone has been lost , you can use your cloned
cell phone.
2. If your phone got damaged or if you forgot your
phone at home or any other place . Cloned phone
can be helpful.
1.
DISADVANTAGES
 It can be used by the terrorists for criminal activities.
 It can be used by the cloner for fraud calls.
 It can be used for illegal money transfer.
VICTIMS OF PHONE CLONING
 Anita Davis, a mobile clone victim. One month, her
cell phone bill showed $3,151 worth of calls in one
month, to Pakistan, Israel, Jordan, Africa, and other
countries.
 A Louisville woman was shocked when she got her
February cell phone bill from T-Mobile. It was ten
times higher than it's ever been before. Equally
troubling, she didn't recognize most of the phone
numbers on it.
CONCLUSION
 Phone Cloning is in initial stages in India. Preventive
steps should be taken by the network provider and the
Government. The enactment of legislation to
prosecute crimes related to cellular phones is not
viewed as a priority. The cloning of CDMA mobile
phones was possible because there was no protection
to the identification information.
REFERENCES
 http://www.cdmasoftware.com/eng.html
 http://infotech.indiatimes.com
 http://www.hackinthebox.org/
 Sankaranarayanan ,“Mobile phone cloning”, Wireless
And Optical Communications Networks (WOCN),
2010 Seventh International Conference in Sept,2010.
THANK YOU...
ANY QUESTIONS?
Download