1.47k likes | 3.83k Vues
MOBILE PHONE CLONING. Presented by: Sujit Majumdar Branch-IT Regd no-0801289042. Guided by: Nanigopal Dash. Introduction. What is cell phone cloning ? When did cell phone cloning start ? GSM CDMA Security functions of GSM and CDMA Cloning Fraud How the cell cloning done ?
E N D
MOBILE PHONE CLONING Presented by: SujitMajumdar Branch-IT Regd no-0801289042 Guided by: Nanigopal Dash
Introduction • What is cell phone cloning ? • When did cell phone cloning start ? • GSM • CDMA • Security functions of GSM and CDMA • Cloning Fraud • How the cell cloning done? • Are our cell phones secured? • EMIE and PIN • How to know the cell phones are cloned? • Can calls on cloned phone tracked? • How to prevent cell cloning • Authentication • Role of Service Provider • What can be done? • Conclusion
Cloning • Cloning in biology is the process of producing similar populations of genetically identical individuals Cell Phone Cloning • Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
When did cell phone cloning start ? • Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000.
BAG Phones BRICK Phones The pictures are for reference purpose only
GSM • Global System for Mobile Communication • It uses SIM(Subscriber Identity Module) • Immediately programmed • Providers-Airtel,Aircel
CDMA • Code Division Multiple Access • Uses shared portion of spectrum • No SIM is used • Provider-Reliance
Security Functions of GSM and CDMA • Access control by SIM and PIN • Session key • Encryption
Fixed telephone vs Mobile phone • Fixed Telephone is safer than Mobile phones
Cloning Fraud • Abroad • India • Stage of cloning fraud in India
How is cell cloning done? • Replacing the EPROM with a new chip • Configure ESN(Electronic Serial Number) • Change MIN(Mobile Identification Number) • Creation of ESN/MIN pair
Original Phone Cloned Phone . ESN MIN Configure Configure ESN/MIN ESN MIN Pairing Software
Way to create ESN/MIN pair • Sniffing the cellular • Trashing cellular companies • Hacking cellular companies
Are our cell phones secured? • Black market in stolen and cloned SIM • PIN locking • Recent market condition • Encryption
ESN • Electronic Serial Number • Loaded when the phone number is manufactured • ESN can not be tampered PIN • Personal Identification number • This is a unique number • The subscriber provides it to the user
How to know the cell phones are cloned? • Frequent wrong number phone calls or hang-ups • Difficulty in placing outgoing calls • Difficulty in retrieving voice mail messages • Busy signals
PATAGONIA • Used for cloning the CDMA phones
Can digital phones be cloned? • Yes, it is possible • Authentication
Can calls on cloned phone be tarcked? • Yes,it is possible • IMEI number plays a major role
How to prevent cell phone cloning? • ESN and MIN should be checked frequently • Avoid storing confidential information • Always set a PIN • Corporate security policy • Frequently check the bill • Changing number
Authentication • Authentication is a mathematical process by which identical calculations are performed in both the network and the mobile phone • Most robust and reliable method to avoid cloning • TDMA and CDMA digital radio
Role of Service Provider • RF fingerprinting • Subscriber behavior profiling
IS-41 • Interim Standard No. 41 • Document prescribing standards for communication between mobile networks • Developed by Telecommunications Industry Association (TIA) • Used primarily throughout North America, most of the Latin American countries and Asia. • It supports AMPS, NAMPS, TDMA, and CDMA radio technologies
What can be done? • Encryption • Blocking • Blacklisting • User verification • Traffic analysis
Conclusion • Common Law for frauds • The mobile crime in India • Anti hacking
Reference • Wireless A-Z-Nathan J.Muller. • Fundamentals of Mobile and Pervasive Computing-Frank Adelstein, Sandeep Gupta. • Wireless and Cellular Communication 3rdEdition-William C.Y.Lee. • 3G Networks 1stEdition-Clint Smith, Saniel Collins
Thank You………… Any queries??????