mobile cloning technology

Post on 14-Apr-2017

195 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Mobile Cloning Technology

Submitted By :- HEERA TAZEEN (3KC12CS007)

In The Name Of ALLAH Most Beneficent Most Merciful

CONTENTS• INTRODUCTION• HISTORY• GSM AND CDMA• IMPORTANT TERMS• HOW A CELL PHONE IS CLONED?• HOW TO KNOW THAT THE CELL PHONE HAS BEEN CLONED?• DETECTION OF A CLONED CELL PHONE IN A NETWORK• HOW TO PREVENT CELL PHONE CLONING?• ADVANTAGES AND DISADVANTAGES• CONCLUSION• REFERENCES

INTRODUCTION

CELL PHONE CLONING

• The result of that is a "cloned" phone.

• Taking the programmed information from mobile phone and programming the identical information into another mobile phone.

HISTORY

• In 1990s cell phone Cloning started with Motorola “bag” phones.

• In mid 90’s they are commonly available by Motorola Co such as the classic, the ultra classic, and the model 8000.

GSM AND CDMAGSM• A digital cellular phone technology based

on TDMA.• GSM phones use a SIM card that contains

user account information.

CDMA• Transmitting simultaneous signals over a

shared portion of the spectrum. • There is no SIM card unlike in GSM.

IMPORTANT TERMS

IMEI (International Mobile Station Equipment Identity)

• Helps to identify valid devices.• Used for stopping a stolen phone from

accessing the network.

ESN (Electronic Serial Number)

• Used to uniquely identify a mobile phone operating on CDMA network.

MIN (Mobile Identification Number)

• MIN is a number that is derived from the 10 -digit directory telephone number assigned to a mobile station.

HOW IS CELL CLONING DONE?

• Modifying or replacing the EPROM in the phone with a new chip which allow to configure an ESN via software.

• We have to change the MIN. • Cloning require access to ESN and MIN

pairs.• ESN/MIN pairs can be discovered in several

ways:

CONTD… • Sniffing the cellular.• Trashing cellular companies or cellular

resellers.• Hacking cellular companies or cellular

resellers.• Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).

• After the ESN/MIN pair is captured, the cloner reprograms the microchip of any wireless phone.

WHAT IS PATAGONIA?

• Used to clone CDMA phones.• Using this software a cloner can

modify the ESN/MIN of any CDMA phone.

• After we have modified the EEPROM of our device, it can be used as a cloned device.

• Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.

HOW TO KNOW THAT THE CELL HAS BEEN CLONED?

• Frequent wrong number phone calls to your phone, or busy.

• Difficulty in placing outgoing calls.• Difficulty in retrieving voice mail

messages.• Incoming calls constantly receiving busy

signals or wrong numbers. • Unusual calls appearing on your phone

bills.

DETECTION OF A CLONED PHONE IN A NETWORK

• Duplicate Detection• Velocity Trap• Usage Profiling• Call Counting

DUPLICATE DETECTION

• The network sees the same phone in several places at the same time.

• Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for.

DUPLICATE DETECTION

VELOCITY TRAP• It notices when the mobile phone seems

to be moving at impossible, or most unlikely speeds.

• So service will be terminated until the real user is verified.USAGE PROFILING

• Profiles of customers phone usage are kept, and when discrepancies are noticed, the customer is contacted.

CALL COUNTING

• Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.

HOW TO PREVENT PHONE CLONING?

• User verification using PIN(Personal Identification Number)

• Blacklisting of stolen phones

• Traffic analysis

• Electrically checking the ESN/MIN

ADVANTAGES

• If your phone has been lost , you can use your cloned cell phone.

• If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.

DISADVANTAGES

• It can be used by the terrorists for criminal activities.

• It can be used by the cloner for fraud calls.

• It can be used for illegal money transfer.

CONCLUSION

To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems.

REFERENCES

http://www.hackinthebox.org

http://realhackerspoint.blogspoint.in

http://www.google.com

http://www.Wikipedia.org

 Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.

http://www.Slideshare.net

ANY QUERIES

top related