mob phn cloning
TRANSCRIPT
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 1/36
AbstractIntroduction
What is mobile phone Cloning?How it works?Security VulnerabilitiesCDMAGSMIdentifying ESN in phone
Contents :
1
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 2/36
How is a phone cloning?How cloning takes place?Detection of phone cloningSymptom’s ESN ReplacementMeasures to be takenHow can Organization help?Victims of phone Cloning
AdvantageDisadvantageConclusion
2
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 3/36
It is a technique where security data from onecell phone is transferred into another phoneThe other phone becomes the exact replica ofthe original phone like a cloneCalls can be made from both phones,only theoriginal is billed
Communication channels are equipped withsecurity algorithm
Abstract:
3
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 4/36
Introduction:
4
In 1997,a 6-yr old Dollyresearch at the RoslinInstitute in Scotland
Recently the Delhi policearrested a person with 20cell phones,laptop andSIM scanner
They used softwarenamed Patagonia andthey have cheapinternational calls
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 5/36
What is mobile phone cloning
Copying the subscriber information from onephone into the other for obtaining free callsPurpose for makingFraudulent telephone calls
The bills for the calls go tolegitimate subscriber Cloning occurs mostfrequently in areas of highcell phone usage 5
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 6/36
How it worksIt sends radio frequencytransmission through theair on two distinct channel:
Voice communicationControl signals
It makes a call,theynormally transmittESN,MIN,SCM and number called in a short burst ofdataReconigzed the cell sitewhich emits a controlsignal
6
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 7/36
7
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 8/36
What is ESN? The ESN (Electronic Serial Number) is the serial number of your
cellular phone. The ESN is transmitted to the cell site and used inconjunction with the NAM to verify the legitimate user of the
cellular system
What is MIN?The MIN(Mobile Identification Number) is simply the phonenumber of the cellular telephone
AMPSAMPS(Advanced Mobile Phone Service) was the first cellular
phone system in United states. AMPS operate as an analogsystem using 30 khz wide channels
8
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 9/36
Security vulnerabilitiesYour cellular phone has 3majors are
a. Monitoring of your conservation while
using the phoneb. Your phone beingturned into amicrophone tomonitor conservation
c. Use of your phonenumber by other tomake calls that arecharged to your account
9
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 10/36
Important terms:
10
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 11/36
11
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 12/36
How is a phone cloned ?Capture the ESN/MIN or SIM/IMEI pair It use a electronic scanningdeviceCloner reprograms or alters themicrochip of any wireless phoneIt is connected to handset
New information is entered intothe phone
12
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 13/36
DIAGRMATIC REPRESENTATION OF
ACTUAL PROCESS
13
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 14/36
CDMAIt uses spread-spectrumtechniques to store bands withmultiple conversationSubscriber information is alsoencrypted and transmitteddigitallyHandsets are particularlyvulnerable to cloningGet a pairs by simply makingdevice mobile and sitting in abusy traffic area
14
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 15/36
15
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 16/36
Identifying ESN in phone
16
Depending on what modelphone you have the ESNwill be located on a PROM
code on the PROM beobtained by unsolderingthe cellular phoneIt has 16 to 28 leads coming
from itIt is a bipolar EPROMThe majority of phones willaccept the NationalSemiconductor 32*8 PROM
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 17/36
17
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 18/36
18
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 19/36
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 20/36
20
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 21/36
ESN ReplacementCellular service companyoffers PERSONALIDENTIFICATION NUMBER
and are effective for cloningThe Central ForensicLaboratory at Hyderabadhas developed software todetect cloned
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 22/36
Uses of cell phone in daily life
22
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 23/36
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 24/36
24
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 25/36
Mobile Communication
• Mobile Communication
25
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 26/36
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 27/36
Mobiles should never be trusted for communicationSet a screen that’s required before the screenCheck a device to all mobile which arecovered by Corporate Security PolicyOne person is responsible for keeping theupdate of central register
27
How can organized
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 28/36
Future Threats
28
Difficult process for thevictim is ResolvingSubscriber Fraud
It take long time to discover and prove for debtsTo abuse the
telecommunication systemTo check out the weaknessand vulnerability of existingtelecom system
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 29/36
Victim of mobile is developed Anita DavisCell phone was bill showed from one month $3151worth of calls at Pakistan, Israel, Jordan , Africa and
other countriesA Luisville women was shocked when she got her billfrom T-mobile
10 times higher than it’s even before Equally troubling they didn’t recognize most of thephone numbers on it
29
Victims of Phone Cloning
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 30/36
Can digital phone can be cloned
30
Yes, digital phones can beclonedThe mobile phones employingdigital TDMA & CDMAtechnologyNewer model analog phonesalso haveAuthentication allows themobile server provider networkto determine the legitmacy
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 31/36
Technology used to tacklethe Mence
31
Duplication detectionVelocity trap
User/Usage profilingCall CountingVoice Sampling
PIN Codes
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 32/36
Application:
• Built in camera which is useto capture your favoritememories
•
Uploading photos to thecomputer allows to edit orsimply share with family andfriends
• It is compatible withWindows operating system
• Transfer the images to
computer using a USB cable 32
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 33/36
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 34/36
It can be used by the terrorits for criminalactivities
It can be used by the cloner for a fraud callsIt can be used for illegal money transfer Cloned organism always has a problem thatscientists can figure out
34
DISADVANTAGE
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 35/36
Phone cloning is in intial stage in INDIA.Preventive steps should be taken by the
network provider and the Government. Theenactment of legislation to prosecute crimesrelated to cellular phones is not viewed as apriority.
The cloning of CDMA mobile phones waspossible because there was no protection to theidentifiction information
35
CONCLUSION
7/27/2019 Mob Phn Cloning
http://slidepdf.com/reader/full/mob-phn-cloning 36/36
36