+ All Categories
Home > Technology > Cell phone cloning

Cell phone cloning

Date post: 23-Jan-2017
Category:
Upload: gudia-khan
View: 202 times
Download: 0 times
Share this document with a friend
18
Presented By: Presented By: Gudia Gudia
Transcript
Page 1: Cell phone cloning

Cell Phone CloningCell Phone Cloning

Presented By:Presented By:GudiaGudia

Page 2: Cell phone cloning

ContentsContents IntroductionIntroduction Mobile Phone CloningMobile Phone Cloning HistoryHistory How cell Phone clonedHow cell Phone cloned Types of cloningTypes of cloning Process of cloningProcess of cloning Detection of cloningDetection of cloning Prevention of cloningPrevention of cloning Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone? Examples and figuresExamples and figures Impact Impact ConclusionConclusion

Page 3: Cell phone cloning

IntroductionIntroduction

So some of the features of So some of the features of mobile communication mobile communication make it an target make it an target for criminals.many people for criminals.many people are not concerned with that are not concerned with that wrong use of a wrong use of a phone.basically today phone.basically today mobile have big threat of mobile have big threat of cloning. cloning.

Page 4: Cell phone cloning

Mobile Phone CloningMobile Phone CloningMobile Cloning:Mobile Cloning:  is copying is copying

the identity of one mobile the identity of one mobile telephone to another. In telephone to another. In simple words, while the simple words, while the illegal user 'uses' the illegal user 'uses' the cellphone, the original cellphone, the original cellphone user pays for it. cellphone user pays for it. Mobile Cloning is an easy Mobile Cloning is an easy crime to commit due to crime to commit due to the easy availability of the easy availability of the cloning software. the cloning software. 

Page 5: Cell phone cloning

HistoryHistory

Cell phone cloning Cell phone cloning started with started with Motorola Motorola "bag""bag" phones and reached phones and reached its peak in the its peak in the mid 90'smid 90's with a commonly with a commonly available modification for available modification for the Motorola "brick" the Motorola "brick" phones, such as the phones, such as the Classic, the Ultra Classic, Classic, the Ultra Classic, and the Model 8000.and the Model 8000.

Page 6: Cell phone cloning

How Cell Phone ClonedHow Cell Phone Cloned

Cloning involved Cloning involved modifying or replacing the EPROM in modifying or replacing the EPROM in the phone withthe phone with a new chip which would allow you to a new chip which would allow you to configure an ESN via some software. configure an ESN via some software.

You would also have to change the MIN.When you had You would also have to change the MIN.When you had successfully successfully changed the ESN/MINchanged the ESN/MIN pair, your phone was pair, your phone was an effective clone of the other phone. an effective clone of the other phone.

Page 7: Cell phone cloning
Page 8: Cell phone cloning

Types of cloningTypes of cloning

Cloning can be divided into following types:-Cloning can be divided into following types:- AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system) CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access) GSM Cloning(GSM Cloning(Global System for Mobile Global System for Mobile

communication )communication )

Page 9: Cell phone cloning

AMPS, CDMA, GSM PhonesAMPS, CDMA, GSM Phones

Page 10: Cell phone cloning

Process of CloningProcess of Cloning

For cloning a Cell Phone there is need to hack the Sim Card of For cloning a Cell Phone there is need to hack the Sim Card of the Cell Phone.the Cell Phone.

Things Required :Things Required : Blank SIM Programmable Cards Blank SIM Programmable Cards A SIM Firmware Writer A SIM Firmware Writer Software For Reading : Woron Scan Software For Reading : Woron Scan

Page 11: Cell phone cloning

Detection of cloningDetection of cloning

Duplicate DetectionDuplicate Detection Velocity TrapVelocity Trap Usage Profiling Usage Profiling Call Counting Call Counting PIN CodesPIN Codes Difficulty in retrieving voice mail messages. Difficulty in retrieving voice mail messages. Incoming call constantly receiving busy signals. Incoming call constantly receiving busy signals. Increased bill amount. Increased bill amount.

Page 12: Cell phone cloning

Prevention of cloningPrevention of cloning

  Preventive measures MOBILE & SIM CLONING Always set a PIN in the SIM card.

Always set up security code in the phone. Switch to 3G SIM card which are more secured then 2G. Don’t store confidential information in phones. Min and ESN numbers checked. corporate security policy

Page 13: Cell phone cloning

Is fixed telephone network safer than Is fixed telephone network safer than mobile phone?mobile phone?

Page 14: Cell phone cloning

ExamplesExamples and figuresand figures Mohammad Yaseen, alias Monu, allegedly ran an illegal Mohammad Yaseen, alias Monu, allegedly ran an illegal

mobile phone exchange racket in New Delhi. mobile phone exchange racket in New Delhi. 1,301,3000cases of IMEI cloning found in India between cases of IMEI cloning found in India between 2009-2009-

20122012.. It affect 750 million users around the world.It affect 750 million users around the world. Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning. It process take very less time.It process take very less time. Practically no solution.Only prevention.Practically no solution.Only prevention. Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.

Page 15: Cell phone cloning

Impact Impact

Mobile phone industry loses millions of dollars .Mobile phone industry loses millions of dollars . Used for illegal activitiesUsed for illegal activities . . It include drug crimes.It include drug crimes. Traffickers acquire cloned phonesTraffickers acquire cloned phones

Page 16: Cell phone cloning

ConclusionConclusion

To conclude, cell phone communication is one of the most To conclude, cell phone communication is one of the most reliable, efficient and widespread. Cloning methodology is reliable, efficient and widespread. Cloning methodology is widespread and can be implemented easily. Hence, it must be widespread and can be implemented easily. Hence, it must be considered that the security system which was implemented considered that the security system which was implemented lately must not be fruitful enough to secure the system in lately must not be fruitful enough to secure the system in future. future.

Page 17: Cell phone cloning
Page 18: Cell phone cloning

Let’s make a crime free WORLDLet’s make a crime free WORLD THINK POSITIVE THINK POSITIVE


Recommended