You are on page 1of 17

MOBILE PHONE CLONING

Submitted By:
Richu Jain
13021262
Roll No: 42
S7, CSE

CONTENT
INTRODUCTION
GSM & CDMA MOBILE SETS
IMPORTANT TERMS
HOW IS A PHONE CLONED?
METHODS TO DETECT CLONED PHONES
IMPACT OF CLONING
HOW TO PREVENT CLONING?
FACTS & FIGURES
CONCLUSION

INTRODUCTION
MOBILE PHONE CLONING:
Copying the identity of one mobile telephone to

another.
Usually done for the purpose of making fraudulent

telephone calls.
Bills for the calls go to the legitimate subscriber.
Mobile Phone Cloning is in the initial stages in India.

Literature Review (Related Work)


Telephone Tapping
Telephone tapping is the monitoring of telephone and Internet

conversations by a third party, often by covert means.


Also defined as the activity of secretly fitting a special device

to someone's phone in order to listen to their phone


conversations without being noticed.
In American English, it is called Wire Tapping.

GSM & CDMA MOBILE SETS


CDMA(Code Division Multiple Access)
A method for transmitting simultaneous signals over a

shared portion of the spectrum.


No Subscriber Identity Module (SIM) card.
CDMA uses a Mobile Identification Number (MIN)
card.

GSM (Global System for Mobile)


GSM uses Subscriber Identity Module (SIM) card.
GSM phones can be easily rented or borrowed.

IMPORTANT TERMS
IMEI stands for International Mobile Equipment

Identifier, this is a 10 digit universally unique number


of the GSM handset.
SIM stands for Subscriber Identification Module

which contains related informations such as:


1. Fixed data stored before the subscription is sold.
2. Temporary network data.
3. Service related data.

CONT.
ESN stands for Electronic Serial Number. It is same

as the IMEI but is used in CDMA handsets


MIN stands for Mobile Identification Number, which

is the same as the SIM of GSM.


IMSI stands for International Mobile Subscriber

Identity which is used to identify the user of a cellular


network.

HOW IS A PHONE CLONED?


1.

Capture ESN/MINs using devices such as cell phone


ESN reader or digital data interpreters (DDI).

2.

The ESN/MIN pair can be cloned with the use of


electronic scanning devices.

3.

The cloner reprograms or alters the microchip of any


wireless phone to create a clone of the wireless
phone from which the ESN/MIN pair was stolen.

CLONING GSM PHONES


Every GSM phone has a 15 digit electronic serial number

(referred to as the IMEI).


The important information is the IMSI, which is stored on

the removable SIM card that carries all your subscriber


information.
GSM networks which are considered to be impregnable can

also be hacked.

CONT..
The process is simple:

A SIM card is inserted into a reader.


2. After connecting it to the computer using data cables,
the card details were transferred into the PC.
3. Then, using freely available encryption software on
the Net, the card details can be encrypted on to a
blank smart card.
RESULT: A cloned cell phone is ready for misuse.
1.

METHODS TO DETECT CLONED


PHONES
Duplicate detection
The network sees the same phone in several places at

the same time.


Reactions include shutting them all off.
Velocity trap
The mobile phone seems to be moving at impossible,

or most unlikely speeds.

IMPACT OF CLONING
Each year, the mobile phone industry loses millions of

dollars in revenue.
Many criminals use cloned cellular telephones for

illegal activities because it is very difficult to trace.

HOW TO PREVENT CLONING?


Blacklisting of stolen phones is a mechanism to prevent

unauthorized use.
User verification using Personal Identification Number
(PIN) codes is one method for customer protection against
cellular phone fraud.
Tests conducted have proved that United States found that
having a PIN code reduced fraud by more than 80%.
Traffic analysis detects cellular fraud by using artificial
intelligence software to detect suspicious calling patterns.

CONCLUSION
Mobile Cloning is in initial stages in India.
So preventive steps should be taken by the

network provider and the Government.


The enactment of legislation to prosecute crimes
related to cellular phones is not viewed as a
priority.
Existing cellular systems have a number of
potential weaknesses that were considered.

REFERENCE
Reference to a journal publication:
[1] International Journal of Computer Applications (0975 8887)
Volume 45 No.21, May 2012 15 The Approaches to Prevent Cell Phone
Cloning In Cdma Enviornment Aaruni Goel Madhup Sharma Paresh
Pathak

Reference to web sites:


[2]
http://www.seminarsonly.com/computer%20science/Mobile-PhoneCloning.php
[3]
http://www.seminarsonly.com/computer%20science/Mobile-PhoneCloning.php

THANK YOU

You might also like