12
Presented By T Karteek reddy 11881A1221 Department of Information Technology VARHAMAN COLLEGE OF ENGINEERING

Mobile Cloning

Embed Size (px)

Citation preview

Page 1: Mobile Cloning

Presented By

T Karteek reddy

11881A1221

Department of Information Technology

VARHAMAN COLLEGE OF ENGINEERING

Page 2: Mobile Cloning

Definition of Mobile Cloning Mobile cloning is copying the identity of one mobile telephone

to another mobile telephone. Usually this is done for the purpose of making fraudulent

telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users.

Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone

Page 3: Mobile Cloning

HOW IS CELL CLONING DONE

Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). When you had successfully changed the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:

Sniffing the cellularTrashing cellular companies or cellular resellersHacking cellular companies or cellular resellers

Cloning has been successfully demonstrated under GSM, but the process is not easy and it currently remains in the realm of serious hobbyists and researchers.

Page 4: Mobile Cloning
Page 5: Mobile Cloning

How Wireless Technology WorksCellular thieves can capture ESN/MINs using devices suchas cell phone ESN reader or digital data interpreters (DDI).DDIs are devices specially manufactured to interceptESN/MINs.

By simply sitting near busy roads where the volume of cellular traffic is high, cellular thieves monitoring the radio wave transmissions from the cell phones of legitimate subscribers can capture ESN/MIN pair.

Numbers can be recorded by hand, one-by-one, or stored in the box and later downloaded to a computer. ESN/MIN readers can also be used from inside an offender’s home, office, or hotel room, increasing the difficulty of detection.

Page 6: Mobile Cloning

ESN/MIN PAIR Each cellular phone has a unique pair of identifying numbers: the

electronic serial number(“ESN”) and the mobile identification number (“MIN”). The ESN is programmed into the wireless phone’s microchip by the manufacturer at the time of production.

The MIN is a ten-digit phone number that is assigned by the wireless carrier to a customer when an account is opened. The MIN can be changed by the carrier, but the ESN, by law, cannot be altered.

When a cellular phone is first turned on, it emits a radio signal that broadcasts these numbers to the nearest cellular tower. The phone will continue to emit these signals at regular intervals, remaining in contact with the nearest cellular tower. These emissions (called autonomous registration) allow computers at the cellular carrier to know how to route incoming calls to that phone, to verify that the account is valid so that outgoing calls can be made, and to provide the foundation for proper billing of calls. This autonomous registration occurs whenever the phone is on, regardless of whether a call is actually in progress.

Page 7: Mobile Cloning

Methods To Detect Cloned Phones Duplicate detection - The network sees the same phone in

several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator.

Velocity trap - The mobile phone seems to be moving at impossible , or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network.

RF (Radio Frequency)

Page 8: Mobile Cloning

Usage profiling - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. Credit card companies use the same method. For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone.

Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.

PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the pin code again.

Page 9: Mobile Cloning

MEASURES TO BE TAKEN Service providers have adopted certain measures to prevent

cellular fraud. These include:

Blacklisting of stolen phones is another mechanism to prevent unauthorized use.

User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud

Encryption: Encryption is regarded as the effective way to prevent cellular fraud

Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.

Blocking: Blocking is used by service providers to protect themselves from high risk callers.

Page 10: Mobile Cloning

ADVANTAGES• If a user’s personal phone is lost, mobile cloning thus

serves in a effective way

• If a phone is damaged, the mobile cloning ensures receiving and calling through the same number, thus helpful in buisness processes.

Page 11: Mobile Cloning

DISADVANTAGES It can be used for terrorist activities

Illegal transfer of money

It can be used by cloner for fraud calls

National Threat

Page 12: Mobile Cloning

Thank You