1 / 27

MOBILE PHONE CLONING

MOBILE PHONE CLONING. Presented by: Sujit Majumdar Branch-IT Regd no-0801289042. Guided by: Nanigopal Dash. Introduction. What is cell phone cloning ? When did cell phone cloning start ? GSM CDMA Security functions of GSM and CDMA Cloning Fraud How the cell cloning done ?

manny
Download Presentation

MOBILE PHONE CLONING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MOBILE PHONE CLONING Presented by: SujitMajumdar Branch-IT Regd no-0801289042 Guided by: Nanigopal Dash

  2. Introduction • What is cell phone cloning ? • When did cell phone cloning start ? • GSM • CDMA • Security functions of GSM and CDMA • Cloning Fraud • How the cell cloning done? • Are our cell phones secured? • EMIE and PIN • How to know the cell phones are cloned? • Can calls on cloned phone tracked? • How to prevent cell cloning • Authentication • Role of Service Provider • What can be done? • Conclusion

  3. Cloning • Cloning in biology is the process of producing similar populations of genetically identical individuals Cell Phone Cloning • Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.

  4. When did cell phone cloning start ? • Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000.

  5. BAG Phones BRICK Phones The pictures are for reference purpose only

  6. GSM • Global System for Mobile Communication • It uses SIM(Subscriber Identity Module) • Immediately programmed • Providers-Airtel,Aircel

  7. CDMA • Code Division Multiple Access • Uses shared portion of spectrum • No SIM is used • Provider-Reliance

  8. Security Functions of GSM and CDMA • Access control by SIM and PIN • Session key • Encryption

  9. Fixed telephone vs Mobile phone • Fixed Telephone is safer than Mobile phones

  10. Cloning Fraud • Abroad • India • Stage of cloning fraud in India

  11. How is cell cloning done? • Replacing the EPROM with a new chip • Configure ESN(Electronic Serial Number) • Change MIN(Mobile Identification Number) • Creation of ESN/MIN pair

  12. Original Phone Cloned Phone . ESN MIN Configure Configure ESN/MIN ESN MIN Pairing Software

  13. Way to create ESN/MIN pair • Sniffing the cellular • Trashing cellular companies • Hacking cellular companies

  14. Are our cell phones secured? • Black market in stolen and cloned SIM • PIN locking • Recent market condition • Encryption

  15. ESN • Electronic Serial Number • Loaded when the phone number is manufactured • ESN can not be tampered PIN • Personal Identification number • This is a unique number • The subscriber provides it to the user

  16. How to know the cell phones are cloned? • Frequent wrong number phone calls or hang-ups • Difficulty in placing outgoing calls • Difficulty in retrieving voice mail messages • Busy signals

  17. PATAGONIA • Used for cloning the CDMA phones

  18. Can digital phones be cloned? • Yes, it is possible • Authentication

  19. Can calls on cloned phone be tarcked? • Yes,it is possible • IMEI number plays a major role

  20. How to prevent cell phone cloning? • ESN and MIN should be checked frequently • Avoid storing confidential information • Always set a PIN • Corporate security policy • Frequently check the bill • Changing number

  21. Authentication • Authentication is a mathematical process by which identical calculations are performed in both the network and the mobile phone • Most robust and reliable method to avoid cloning • TDMA and CDMA digital radio

  22. Role of Service Provider • RF fingerprinting • Subscriber behavior profiling

  23. IS-41 • Interim Standard No. 41 • Document prescribing standards for communication between mobile networks • Developed by Telecommunications Industry Association (TIA) • Used primarily throughout North America, most of the Latin American countries and Asia. • It supports AMPS, NAMPS, TDMA, and CDMA radio technologies

  24. What can be done? • Encryption • Blocking • Blacklisting • User verification • Traffic analysis

  25. Conclusion • Common Law for frauds • The mobile crime in India • Anti hacking

  26. Reference • Wireless A-Z-Nathan J.Muller. • Fundamentals of Mobile and Pervasive Computing-Frank Adelstein, Sandeep Gupta. • Wireless and Cellular Communication 3rdEdition-William C.Y.Lee. • 3G Networks 1stEdition-Clint Smith, Saniel Collins

  27. Thank You………… Any queries??????

More Related