ppt of mobile phone cloning 1

Upload: khadar-basha

Post on 07-Apr-2018

239 views

Category:

Documents


2 download

TRANSCRIPT

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    1/16

    SREENIVASA INSTITUTE OF TECHNOLOGY AND

    MANAGEMENT STUDIES

    MOBILE PHONE CONING

    by

    A K BASHA

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    2/16

    INTRODUCTIONy WHAT IS CELL PHONE CLONING?

    y WHEN DID CELL CLONING START?

    y GSM

    y CDMA

    y SECURITY FUNCTIONS OF THE GSM AND CDMA

    y HOWBIG OF A PROBLEM IS CLONING FRAUD?

    y HOWIS CELL CLONING DONE?

    y ARE OUR CELL PHONES SECURED?

    y CAN DIGITAL PHONES BE CLONED?

    y HOWTO KNOWTHAT THE CELL HAS BEEN CLONED?

    y CAN CALLS ON CLONED PHONE BE TRACKED?

    y HOWTO PREVENT CELL CLONING?

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    3/16

    WHAT IS CELL PHONE CLONING?

    y Cell phone cloning is copying the identity of onemobile telephone to another mobile telephone.

    y The purpose of cell phone cloning is makingfraudulent telephone calls.

    y The bills for the calls go to the legitimate subscriber.

    y The cloner is also able to make effectively anonymous

    calls, which attracts another group of interestedusers.

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    4/16

    WHEN DID CELL CLONING START?

    y Cell phone cloning started with Motorola "bag" phonesand reached its peak in the mid 90's with a commonlyavailable modification for the Motorola "brick" phones,such as the Classic, the Ultra Classic, and the Model 8000.

    y The Cellular Telecommunications Industry Association(CTIA) estimates that financial losses in due to cloningfraud are between $600 million and $900 million in theUnited States. Some subscribers of Reliance had to sufferbecause their phone was cloned. Mobile Cloning Is ininitial stages in India so preventive steps should be taken

    by the network provider and the Government.

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    5/16

    GSM

    yGlobal System for Mobile Communications. Adigital cellular phone technology based onTDMA.

    y GSM phones use a Subscriber Identity Module

    (SIM) card that contains user accountinformation.yAny GSM phone becomes immediately

    programmed after plugging in the SIM card, thusallowing GSM phones to be easily rented orborrowed.

    yOperators who provide GSM service are Airtel,Vodafone etc.

    CS 640 5

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    6/16

    CDMA

    yCode Division Multiple Access.

    yA method for transmitting simultaneous

    signals over a shared portion of thespectrum.

    yThere is no Subscriber Identity Module

    (SIM) card like in GSM.yOperators who provide CDMA service in

    India are Reliance and Tata Indicom.

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    7/16

    THE GSM AND CDMA

    Access control by means of a SIM CARD andPIN,

    Authentication of the users towards thenetwork carrier

    Encryption of communication on the radio

    interface concealing the users identity on the radio

    interface,

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    8/16

    HOW BIG OF A PROBLEM IS

    CLONING FRAUD

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    9/16

    HOW IS CELL CLONING DONE?

    yCloning involved modifying or replacing theEPROM in the phone with a new chip which

    would allow you to configure an ESN(Electronic serial number) via software.

    yYou would also have to change the MIN(Mobile Identification Number).

    yWhen you had successfully changed theESN/MIN pair, your phone was an effectiveclone of the other phone.

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    10/16

    REQUIREMENTS

    y Cloning required access to ESN and MIN pairs.

    y ESN/MIN pairs were discovered in several ways:

    Sniffing the cellular,

    Trashing cellular companies,

    Hacking cellular companies.

    y Cloning has been successfully demonstrated underGSM.

    y But the process is not easy and it currently remains inthe realm of serious hobbyists and researchers.

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    11/16

    WHAT IS ESN NUMBER

    y ESN mean Electronic Serial Number.

    y This number is loaded when the phone number is

    manufactured.y This number cannot be tampered or changes by the

    user or subscriber.

    y If this number is known a mobile can be cloned easily.

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    12/16

    WHAT IS PIN NUMBERy Personal Identification Number (PIN).

    y Every subscriber provides a Personal IdentificationNumber (PIN) to its user.

    y This is a unique number. If PIN and ESN are know amobile phone can be cloned in seconds using somesoftware like PATAGONIA

    y Patagonia used to clone CDMA phones

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    13/16

    HOW TO KNOW THAT THE CELL HAS BEEN CLONED

    y Frequent wrong number phone calls to your phone, orhang-ups.

    y Difficulty in placing outgoing calls.y Difficulty in retrieving voice mail messages.

    y Incoming calls constantly receiving busy signals orwrong numbers. Unusual calls appearing on your

    phone bills

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    14/16

    HOW TO PREVENT CELL CLONING?

    y The MIN often can be dialed from other wireless or wireline networks.

    y The number differs from the electronic serial number(ESN), which is the unit number assigned by a phonemanufacturer. MINs and ESNs can be checkedelectronically to help prevent fraud.

    y Always set a Pin that's required before the phone can beused.

    y Check that all mobile devices are covered by a corporatesecurity policy.

    y Athetication

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    15/16

    WHAT EXACTLY IS AUTHENTICATION

    y Authentication is a mathematical process by which identicalcalculations are performed in both the network and the mobilephone.

    y These calculations use secret information preprogrammed into boththe mobile phone and the network before service is activated.

    y Cloners typically have no access to this secret information , andtherefore cannot obtain the same results to the calculations

    y . A legitimate mobile phone will produce the same calculated resultas the network. The mobile phone's result is sent to the network andcompared with the network's results. If they match, the phone is nota "clone."

    CS 640 15

  • 8/6/2019 Ppt of Mobile Phone Cloning 1

    16/16

    CONCLUSION:

    y Presently the cellular phone industry relies on common law(fraud and theft) and in-house counter measures to addresscellular phone fraud.

    y Mobile Cloning Is in initial stages in India so preventive stepsshould be taken by the network provider and the Government.

    y The enactment of legislation to prosecute crimes related to

    cellular phones is not viewed as a priority.y However. It is essential that intended mobile crime legislation

    be comprehensive enough to incorporate cellular phone fraud,in particular "cloning fraud" as a specific crime.

    CS 640 16