cell phone cloning
DESCRIPTION
created by Jashir....TRANSCRIPT
![Page 1: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/1.jpg)
CELL PHONE CLONING
JASHIR C.K S7 CSE
Rollno:28
![Page 2: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/2.jpg)
INDEX• INTRODUCTION• HISTORY• GSM • CDMA• IMPORTANT TERMS• HOW IS A PHONE CLONED?• METHODS TO DETECT CLONED PHONES• IMPACT OF CLONING• HOW TO PREVENT CLONING?• CONCLUSION
![Page 3: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/3.jpg)
INTRODUCTIONCELL PHONE CLONING:
– copying the identity of one to another– For making fraudulent calls
– security data transferred– Other cell phone become exact replica of original
![Page 4: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/4.jpg)
INTRODUCTION– Calls can be made from both
– Original is billed
– One get huge bill, possibility of cloning
– No way the subscriber can detect
– Taking programmed information
– Service provider has no way to differentiate
![Page 5: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/5.jpg)
WHEN DID CELL CLONING START?
• In telecom market since 1990’s-mostly CDMA• Started with Motorola “bag” phones.• Motorola brick-
– classic, model 800,ultra classic
![Page 6: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/6.jpg)
GSM
– Global System for Mobile Communications.
– A digital cellular phone technology based on TDMA
– Europe, other part of world
– Use SIM contain user account information
![Page 7: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/7.jpg)
GSM
– Immediately programmed after plugging in the SIM card
– Numerous handsets and service providers available in the market
– They comes with cheaper call rate, free message facility
– Airtel,vodafone
![Page 8: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/8.jpg)
CDMA– Code Division Multiple Access.
– Newer technology used in USA,Canada,Australia
– Method for transmitting simultaneous signals over a shared portion of the spectrum.
– No SIM card
– Call cost cheaper
– Call quality better
– Reliance,tata indicom
![Page 9: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/9.jpg)
GSM vs. CDMA
• Both handsets are prone to cloning
• it is easier to clone a CDMA
handset over a GSM one
• Though cloning a GSM cell phone
is not impossible
![Page 10: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/10.jpg)
IMPORTANT TERMS
• ESN, which stands for
Electronic Serial Number.
– It is same as the IMEI but is used in CDMA handsets
– loaded when the phone number is manufactured
– Can’t be change by user or subscriber
– If this is known, easily cloned
![Page 11: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/11.jpg)
IMPORTANT TERMS
• MIN stands for Mobile Identification Number,
– which is the same as the SIM of GSM, can’t be replaced
– Min chip is embedded in CDMA handset
![Page 12: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/12.jpg)
HOW IS A PHONE CLONED?
• ESN/MIN pair discovered via
– Sniffing the cellular
– Trashing cellular companies
– Hacking cellular companies
![Page 13: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/13.jpg)
HOW IS A PHONE CLONED?
• Each phone has MIN/ESN for identify the phone
• While placing a call, phone transmit both MSN/ESN to n/w
![Page 14: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/14.jpg)
![Page 15: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/15.jpg)
HOW IS A PHONE CLONED?• Cellular thieves capture MSN/ESN
– cell phone ESN reader
– digital data interpreters (DDI)
Specially manufactured to intercept ESN/MIN pair
![Page 16: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/16.jpg)
HOW IS A PHONE CLONED?
• MSN/ESN can be cloned– electronic scanning device
• Cloned one is ready
![Page 17: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/17.jpg)
METHODS TO DETECT CLONED PHONES ON NETWORK
• Duplicate detection • Velocity trap • Radio Frequency• Usage profiling • Call counting • PIN codes
![Page 18: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/18.jpg)
METHODS TO DETECT CLONED PHONES ON NETWORK
• Duplicate detection
– Same phone at several place at same time
– Shutting down all of them
– Real customer will contact
– Cloned user switch to another clone
![Page 19: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/19.jpg)
Duplicate detection
![Page 20: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/20.jpg)
METHODS TO DETECT CLONED PHONES
• Velocity trap
– Mobile moving at impossible speeds
– Example(Idk (5min)Trv)
– Must be two phone with same identity on n/w
![Page 21: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/21.jpg)
METHODS TO DETECT CLONED PHONES
• RF (Radio Frequency)
– Even Nominally identical radio equipment has distinguishing fingerprint,
– n/w s/w stores and compares fingerprints of all phones that it sees
– This way, it will spot the clones with the same identity but different fingerprints.
![Page 22: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/22.jpg)
METHODS TO DETECT CLONED PHONES
• Usage profiling – Keep customer phone usage profile
– Discrepancies noticed ,customer is contacted
– Example(local call -) foreign )
– Indicates a possible clone
![Page 23: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/23.jpg)
METHODS TO DETECT CLONED PHONES
• Call counting – Phone and n/w keep track of call made
– If they differ from usually allowed one ,service denied
![Page 24: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/24.jpg)
METHODS TO DETECT CLONED PHONES
• PIN codes – to placing a call, the caller unlocks the phone by
PIN
– After the call completed, the user locks
– Operators may share PIN information to enable safer roaming
![Page 25: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/25.jpg)
IMPACT OF CLONING
• Loss of revenue• CTIA estimates that financial losses
– b/w $600million to $800 million in US
![Page 26: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/26.jpg)
IMPACT OF CLONING
• Illegal activities– This phenomenon is especially prevalent in drug crimes
![Page 27: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/27.jpg)
HOW TO PREVENT CLONING?
• Uniquely identifies a mobile unit within a wireless carrier's network.
• MINs and ESNs can be checked electronically to help prevent fraud.
• Service providers have adopted certain measures to prevent fraud, includes– Encryption,blocking,blacklisting,user verification, traffic
analysis
![Page 28: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/28.jpg)
HOW TO PREVENT CLONING?
• User verification using PIN is one of the customer verification method
• Check that all mobile devices are covered by a corporate security policy
![Page 29: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/29.jpg)
CONCLUSION
• Presently the cellular phone industry relies on common law – fraud and theft and in-house counter measures
to address cellular phone fraud.
• Mobile Cloning Is in initial stages in India– Preventive step taken by govt & n/w provider
![Page 30: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/30.jpg)
CONCLUSION
• Existing cellular systems have a number of potential weaknesses
• It is crucial that businesses and staff take mobile phone security seriously.
![Page 31: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/31.jpg)
REFERENCE
• IEEE journal for mobile communication
• www.google.com
• wikipedia.org
• www.1000project.org
• www.seminaronly.com
![Page 32: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/32.jpg)
QUESTIONS???
![Page 33: Cell phone cloning](https://reader033.vdocuments.us/reader033/viewer/2022052200/554a03e8b4c905557a8b52d4/html5/thumbnails/33.jpg)
THANK YOU