Top Banner
CELL PHONE CLONING JASHIR C.K S7 CSE
33

Cell phone cloning

May 06, 2015

Download

Education

Jashi Ahamed

created by Jashir....
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cell phone cloning

CELL PHONE CLONING

JASHIR C.K S7 CSE

Rollno:28

Page 2: Cell phone cloning

INDEX• INTRODUCTION• HISTORY• GSM • CDMA• IMPORTANT TERMS• HOW IS A PHONE CLONED?• METHODS TO DETECT CLONED PHONES• IMPACT OF CLONING• HOW TO PREVENT CLONING?• CONCLUSION

Page 3: Cell phone cloning

INTRODUCTIONCELL PHONE CLONING:

– copying the identity of one to another– For making fraudulent calls

– security data transferred– Other cell phone become exact replica of original

Page 4: Cell phone cloning

INTRODUCTION– Calls can be made from both

– Original is billed

– One get huge bill, possibility of cloning

– No way the subscriber can detect

– Taking programmed information

– Service provider has no way to differentiate

Page 5: Cell phone cloning

WHEN DID CELL CLONING START?

• In telecom market since 1990’s-mostly CDMA• Started with Motorola “bag” phones.• Motorola brick-

– classic, model 800,ultra classic

Page 6: Cell phone cloning

GSM

– Global System for Mobile Communications.

– A digital cellular phone technology based on TDMA

– Europe, other part of world

– Use SIM contain user account information

Page 7: Cell phone cloning

GSM

– Immediately programmed after plugging in the SIM card

– Numerous handsets and service providers available in the market

– They comes with cheaper call rate, free message facility

– Airtel,vodafone

Page 8: Cell phone cloning

CDMA– Code Division Multiple Access.

– Newer technology used in USA,Canada,Australia

– Method for transmitting simultaneous signals over a shared portion of the spectrum.

– No SIM card

– Call cost cheaper

– Call quality better

– Reliance,tata indicom

Page 9: Cell phone cloning

GSM vs. CDMA

• Both handsets are prone to cloning

• it is easier to clone a CDMA

handset over a GSM one

• Though cloning a GSM cell phone

is not impossible

Page 10: Cell phone cloning

IMPORTANT TERMS

• ESN, which stands for

Electronic Serial Number.

– It is same as the IMEI but is used in CDMA handsets

– loaded when the phone number is manufactured

– Can’t be change by user or subscriber

– If this is known, easily cloned

Page 11: Cell phone cloning

IMPORTANT TERMS

• MIN stands for Mobile Identification Number,

– which is the same as the SIM of GSM, can’t be replaced

– Min chip is embedded in CDMA handset

Page 12: Cell phone cloning

HOW IS A PHONE CLONED?

• ESN/MIN pair discovered via

– Sniffing the cellular

– Trashing cellular companies

– Hacking cellular companies

Page 13: Cell phone cloning

HOW IS A PHONE CLONED?

• Each phone has MIN/ESN for identify the phone

• While placing a call, phone transmit both MSN/ESN to n/w

Page 14: Cell phone cloning
Page 15: Cell phone cloning

HOW IS A PHONE CLONED?• Cellular thieves capture MSN/ESN

– cell phone ESN reader

– digital data interpreters (DDI)

Specially manufactured to intercept ESN/MIN pair

Page 16: Cell phone cloning

HOW IS A PHONE CLONED?

• MSN/ESN can be cloned– electronic scanning device

• Cloned one is ready

Page 17: Cell phone cloning

METHODS TO DETECT CLONED PHONES ON NETWORK

• Duplicate detection • Velocity trap • Radio Frequency• Usage profiling • Call counting • PIN codes

Page 18: Cell phone cloning

METHODS TO DETECT CLONED PHONES ON NETWORK

• Duplicate detection

– Same phone at several place at same time

– Shutting down all of them

– Real customer will contact

– Cloned user switch to another clone

Page 19: Cell phone cloning

Duplicate detection

Page 20: Cell phone cloning

METHODS TO DETECT CLONED PHONES

• Velocity trap

– Mobile moving at impossible speeds

– Example(Idk (5min)Trv)

– Must be two phone with same identity on n/w

Page 21: Cell phone cloning

METHODS TO DETECT CLONED PHONES

• RF (Radio Frequency)

– Even Nominally identical radio equipment has distinguishing fingerprint,

– n/w s/w stores and compares fingerprints of all phones that it sees

– This way, it will spot the clones with the same identity but different fingerprints.

Page 22: Cell phone cloning

METHODS TO DETECT CLONED PHONES

• Usage profiling – Keep customer phone usage profile

– Discrepancies noticed ,customer is contacted

– Example(local call -) foreign )

– Indicates a possible clone

Page 23: Cell phone cloning

METHODS TO DETECT CLONED PHONES

• Call counting – Phone and n/w keep track of call made

– If they differ from usually allowed one ,service denied

Page 24: Cell phone cloning

METHODS TO DETECT CLONED PHONES

• PIN codes – to placing a call, the caller unlocks the phone by

PIN

– After the call completed, the user locks

– Operators may share PIN information to enable safer roaming

Page 25: Cell phone cloning

IMPACT OF CLONING

• Loss of revenue• CTIA estimates that financial losses

– b/w $600million to $800 million in US

Page 26: Cell phone cloning

IMPACT OF CLONING

• Illegal activities– This phenomenon is especially prevalent in drug crimes

Page 27: Cell phone cloning

HOW TO PREVENT CLONING?

• Uniquely identifies a mobile unit within a wireless carrier's network.

• MINs and ESNs can be checked electronically to help prevent fraud.

• Service providers have adopted certain measures to prevent fraud, includes– Encryption,blocking,blacklisting,user verification, traffic

analysis

Page 28: Cell phone cloning

HOW TO PREVENT CLONING?

• User verification using PIN is one of the customer verification method

• Check that all mobile devices are covered by a corporate security policy

Page 29: Cell phone cloning

CONCLUSION

• Presently the cellular phone industry relies on common law – fraud and theft and in-house counter measures

to address cellular phone fraud.

• Mobile Cloning Is in initial stages in India– Preventive step taken by govt & n/w provider

Page 30: Cell phone cloning

CONCLUSION

• Existing cellular systems have a number of potential weaknesses

• It is crucial that businesses and staff take mobile phone security seriously.

Page 31: Cell phone cloning

REFERENCE

• IEEE journal for mobile communication

• www.google.com

• wikipedia.org

• www.1000project.org

• www.seminaronly.com

Page 32: Cell phone cloning

QUESTIONS???

Page 33: Cell phone cloning

THANK YOU