by b216 christian jødal o’keeffe, nicolai kjær skovhus, dag toft børresen pedersen, stefan...
TRANSCRIPT
![Page 1: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/1.jpg)
IMEI abuse on Android smartphones
By B216Christian Jødal O’Keeffe,
Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen,
Stefan Mathias Holst Christiansen, Thais Alexander Jones,
and Rasmus Fischer GadensgaardPage 1 of 13
![Page 2: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/2.jpg)
DispositionShort introduction & Problem analysisTheory of IMEI, IMSI, and AndroidTheft of cellphones and IMEILegal and illegal usage of IMEIConclusion & process analysis
Page 2 of 13
![Page 3: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/3.jpg)
Introduction IMEI and IMSI abuse on Android smartphones
Why did we choose this topic
400.000 Android phones are activated every day
Android Applications can read the IMEI and IMSI numbers
But the problem is writing new IMEI and IMSI numbers to a phone.
Our problem statement:
Why can apps on Android-phones get the IMEI, and what consequences can it have?
Page 3 of 13
![Page 4: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/4.jpg)
IMEI, IMSI and AndroidIMEI is the identity number of the phoneIMSI is the identity number of the SIM
Android is an operating system to smartphones and tablets
Page 4 of 13
![Page 5: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/5.jpg)
Theft of cellphones and IMEI
Cellphone TheftLegal salesIllegal salesFakes
IMEI TheftSpiderman kit
Page 5 of 13
![Page 6: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/6.jpg)
Legal usage of IMEI• Law of IMEI• Legal use
• What does the user use the IMEI number to?• What can apps use IMEI to?
Page 6 of 13
![Page 7: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/7.jpg)
Illegal usePopular among criminalsUsed to track, therefor used as disguiseCopy of identity
IMEI and IMSI is neededTelephonyManager library use getSubscriberIdIdentity copied by obtaining IMEI & IMSITrojans used to obtain the IMEI & IMSI
Page 7 of 13
![Page 8: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/8.jpg)
Illegal IMEI implantsChina phones made without ore with zero
IMEI’sIndian market affected due to acts against
terrorExamples of IMEI abuse
CloningFake IMEI
Consequences of an stolen/copied IMEI
Page 8 of 13
![Page 9: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/9.jpg)
ConclusionIMEI and IMSI numbers can be obtained by
Android apps.IMEI number is a great way to uniquely
identify the phone.These numbers can be sent to a third part.It is possible to copy the identity of a phone.
Page 9 of 13
![Page 10: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/10.jpg)
ConclusionSurveillance through the IMEI number is
possible.
We still have to find a reason for the IMEI and IMSI numbers not to be encrypted.
Google needs find a solution
Page 10 of 13
![Page 11: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/11.jpg)
Process analysisDiscussed and choose a subject.Researching for good/reliable sources.Divided parts which each other should write.Corrections to streamline the work.We stayed within our working schedule, and
kept our promises.Our supervisor was a big help
Page 11 of 13
![Page 12: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/12.jpg)
Process analysis - SynthesisWhat we need to do better: What we should keep doing:
We need to get better at meeting at the same time.
We need to discuss the level of ambition.
We need to have a meeting every morning, and write down what we have done, and what we will do for the rest of the day.
We need a written time schedule.
We also need to be better prepared for the meetings with our supervisor.
We should keep dividing subjects out to write individually.
We should still have no specific team leader.
Page 12 of 13
![Page 13: By B216 Christian Jødal O’Keeffe, Nicolai Kjær Skovhus, Dag Toft Børresen Pedersen, Stefan Mathias Holst Christiansen, Thais Alexander Jones, and Rasmus](https://reader036.vdocuments.site/reader036/viewer/2022082710/56649da65503460f94a916f1/html5/thumbnails/13.jpg)
Questions?
Page 13 of 13