Top Banner
C L M O I L E N I N G
17

Mobile Cloning

Nov 21, 2014

Download

Documents

Rimika Datta

It is our final year presentation;presented by Rimika datta,Piyali mukherjee,Anup saha & Nazmin sultana sarkar,students of computer science & engineering.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobile Cloning

CL

M O B I L E

NING

Page 2: Mobile Cloning

What is Mobile cloning?

Page 3: Mobile Cloning

Background

Cellularphone cloning started with

Motorola ‘brick’

phones in the early 1990’s

Page 4: Mobile Cloning

ESN : The serial number of a

cellular phones

MIN : The phone no of the

cellular phone

WHAT IS AN ESN/MIN PAIR?

Page 5: Mobile Cloning

How mobile Cloning is Done?

Requires ESN/MIN pair

Modification of EPROM

Page 6: Mobile Cloning

Procedure of CloningRead files from master phone

Modify Data of Clone Phone with respect to master phone

Compute & Insert checksum into Clone File

Install modified data into Clone Phone

Page 7: Mobile Cloning

Cloning

GSM Access the sim card of the master

phone

Locate master phone’s IMEI

Clone the sim card & get

authetication key

Replace no. of the clone phone with that of the master

phone

Insert the duplicated sim in the clone phone

Page 8: Mobile Cloning

Cloning

CDMAMonitor RF spectrum

Acquire cellphone subscription data

using DDI

Erase existing programs of the

clone phone

ESN and EMIN are fed into new CDMA

handset

Install programs of the master phone to the clone phone

Page 9: Mobile Cloning

Cloning tools and Softwares

Datopal 12 in One SIM Card Cloner

Multi Slots USB 2.0 SIM Card SD MMC Card Reader Writer

Techie Warehouse SIM Card Backup

Patagonia (for CDMA)

Page 10: Mobile Cloning

Some Facts & Figures

25 million Cellphones with false IMEI

clone fraud costs theIndustry $650 million/year

3000 Cell Phones

Cloned

/month

Page 11: Mobile Cloning

Duplicate detection Detecting phones having same MIN/ESN

no. at different places at same time

Velocity trap Trap mobile phone ,seems to be moving at impossible or most unlikely speeds

continue...

detect clone phones Methods to

Page 12: Mobile Cloning

Methods todetect clone phones

Call counting Unusual number of calls are denied by the service provider

PIN code Lock the mobile by using PIN code when it is not in use

Page 13: Mobile Cloning

Impact of Cloning

Positive Impact :

Negative Impact :

Backup Device

Loss Of Revenue Illegal Activities

Page 14: Mobile Cloning

How to Prevent Mobile Cloning

Encryption of Confidential Information

Always set a PIN

Apply Corporate Security Policy

Page 15: Mobile Cloning

Role of service provider

Radio frequency

Usage profiling

Authentication

Page 16: Mobile Cloning

FUTURE THREATS

Weakness and

vulnerability of existing

telecom systems

Algorithms used are

not strong enough to

prevent cloning

Page 17: Mobile Cloning

Conclusion