Date post: | 23-Jan-2017 |
Category: |
Technology |
Upload: | gudia-khan |
View: | 202 times |
Download: | 0 times |
Cell Phone CloningCell Phone Cloning
Presented By:Presented By:GudiaGudia
ContentsContents IntroductionIntroduction Mobile Phone CloningMobile Phone Cloning HistoryHistory How cell Phone clonedHow cell Phone cloned Types of cloningTypes of cloning Process of cloningProcess of cloning Detection of cloningDetection of cloning Prevention of cloningPrevention of cloning Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone? Examples and figuresExamples and figures Impact Impact ConclusionConclusion
IntroductionIntroduction
So some of the features of So some of the features of mobile communication mobile communication make it an target make it an target for criminals.many people for criminals.many people are not concerned with that are not concerned with that wrong use of a wrong use of a phone.basically today phone.basically today mobile have big threat of mobile have big threat of cloning. cloning.
Mobile Phone CloningMobile Phone CloningMobile Cloning:Mobile Cloning: is copying is copying
the identity of one mobile the identity of one mobile telephone to another. In telephone to another. In simple words, while the simple words, while the illegal user 'uses' the illegal user 'uses' the cellphone, the original cellphone, the original cellphone user pays for it. cellphone user pays for it. Mobile Cloning is an easy Mobile Cloning is an easy crime to commit due to crime to commit due to the easy availability of the easy availability of the cloning software. the cloning software.
HistoryHistory
Cell phone cloning Cell phone cloning started with started with Motorola Motorola "bag""bag" phones and reached phones and reached its peak in the its peak in the mid 90'smid 90's with a commonly with a commonly available modification for available modification for the Motorola "brick" the Motorola "brick" phones, such as the phones, such as the Classic, the Ultra Classic, Classic, the Ultra Classic, and the Model 8000.and the Model 8000.
How Cell Phone ClonedHow Cell Phone Cloned
Cloning involved Cloning involved modifying or replacing the EPROM in modifying or replacing the EPROM in the phone withthe phone with a new chip which would allow you to a new chip which would allow you to configure an ESN via some software. configure an ESN via some software.
You would also have to change the MIN.When you had You would also have to change the MIN.When you had successfully successfully changed the ESN/MINchanged the ESN/MIN pair, your phone was pair, your phone was an effective clone of the other phone. an effective clone of the other phone.
Types of cloningTypes of cloning
Cloning can be divided into following types:-Cloning can be divided into following types:- AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system) CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access) GSM Cloning(GSM Cloning(Global System for Mobile Global System for Mobile
communication )communication )
AMPS, CDMA, GSM PhonesAMPS, CDMA, GSM Phones
Process of CloningProcess of Cloning
For cloning a Cell Phone there is need to hack the Sim Card of For cloning a Cell Phone there is need to hack the Sim Card of the Cell Phone.the Cell Phone.
Things Required :Things Required : Blank SIM Programmable Cards Blank SIM Programmable Cards A SIM Firmware Writer A SIM Firmware Writer Software For Reading : Woron Scan Software For Reading : Woron Scan
Detection of cloningDetection of cloning
Duplicate DetectionDuplicate Detection Velocity TrapVelocity Trap Usage Profiling Usage Profiling Call Counting Call Counting PIN CodesPIN Codes Difficulty in retrieving voice mail messages. Difficulty in retrieving voice mail messages. Incoming call constantly receiving busy signals. Incoming call constantly receiving busy signals. Increased bill amount. Increased bill amount.
Prevention of cloningPrevention of cloning
Preventive measures MOBILE & SIM CLONING Always set a PIN in the SIM card.
Always set up security code in the phone. Switch to 3G SIM card which are more secured then 2G. Don’t store confidential information in phones. Min and ESN numbers checked. corporate security policy
Is fixed telephone network safer than Is fixed telephone network safer than mobile phone?mobile phone?
ExamplesExamples and figuresand figures Mohammad Yaseen, alias Monu, allegedly ran an illegal Mohammad Yaseen, alias Monu, allegedly ran an illegal
mobile phone exchange racket in New Delhi. mobile phone exchange racket in New Delhi. 1,301,3000cases of IMEI cloning found in India between cases of IMEI cloning found in India between 2009-2009-
20122012.. It affect 750 million users around the world.It affect 750 million users around the world. Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning. It process take very less time.It process take very less time. Practically no solution.Only prevention.Practically no solution.Only prevention. Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.
Impact Impact
Mobile phone industry loses millions of dollars .Mobile phone industry loses millions of dollars . Used for illegal activitiesUsed for illegal activities . . It include drug crimes.It include drug crimes. Traffickers acquire cloned phonesTraffickers acquire cloned phones
ConclusionConclusion
To conclude, cell phone communication is one of the most To conclude, cell phone communication is one of the most reliable, efficient and widespread. Cloning methodology is reliable, efficient and widespread. Cloning methodology is widespread and can be implemented easily. Hence, it must be widespread and can be implemented easily. Hence, it must be considered that the security system which was implemented considered that the security system which was implemented lately must not be fruitful enough to secure the system in lately must not be fruitful enough to secure the system in future. future.
Let’s make a crime free WORLDLet’s make a crime free WORLD THINK POSITIVE THINK POSITIVE