Upload
rimika-datta
View
55
Download
8
Tags:
Embed Size (px)
DESCRIPTION
It is our final year presentation;presented by Rimika datta,Piyali mukherjee,Anup saha & Nazmin sultana sarkar,students of computer science & engineering.
Citation preview
CL
M O B I L E
NING
What is Mobile cloning?
Background
Cellularphone cloning started with
Motorola ‘brick’
phones in the early 1990’s
ESN : The serial number of a
cellular phones
MIN : The phone no of the
cellular phone
WHAT IS AN ESN/MIN PAIR?
How mobile Cloning is Done?
Requires ESN/MIN pair
Modification of EPROM
Procedure of CloningRead files from master phone
Modify Data of Clone Phone with respect to master phone
Compute & Insert checksum into Clone File
Install modified data into Clone Phone
Cloning
GSM Access the sim card of the master
phone
Locate master phone’s IMEI
Clone the sim card & get
authetication key
Replace no. of the clone phone with that of the master
phone
Insert the duplicated sim in the clone phone
Cloning
CDMAMonitor RF spectrum
Acquire cellphone subscription data
using DDI
Erase existing programs of the
clone phone
ESN and EMIN are fed into new CDMA
handset
Install programs of the master phone to the clone phone
Cloning tools and Softwares
Datopal 12 in One SIM Card Cloner
Multi Slots USB 2.0 SIM Card SD MMC Card Reader Writer
Techie Warehouse SIM Card Backup
Patagonia (for CDMA)
Some Facts & Figures
25 million Cellphones with false IMEI
clone fraud costs theIndustry $650 million/year
3000 Cell Phones
Cloned
/month
Duplicate detection Detecting phones having same MIN/ESN
no. at different places at same time
Velocity trap Trap mobile phone ,seems to be moving at impossible or most unlikely speeds
continue...
detect clone phones Methods to
Methods todetect clone phones
Call counting Unusual number of calls are denied by the service provider
PIN code Lock the mobile by using PIN code when it is not in use
Impact of Cloning
Positive Impact :
Negative Impact :
Backup Device
Loss Of Revenue Illegal Activities
How to Prevent Mobile Cloning
Encryption of Confidential Information
Always set a PIN
Apply Corporate Security Policy
Role of service provider
Radio frequency
Usage profiling
Authentication
FUTURE THREATS
Weakness and
vulnerability of existing
telecom systems
Algorithms used are
not strong enough to
prevent cloning
Conclusion