PHONE CLONING TECHNOLOGY

Slides:



Advertisements
Similar presentations
GSM AND CDMA (WIRELESS & MOBILE COMMN.) ECE-6TH SEM.
Advertisements

Mobile Cellular Networks Evolution –1st generation, 1980s analogue voice –2nd generation 1990s digital Voice, fax data 95% coverage of UK by 1991 –3rd.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.
CELL PHONE CLONING Presented by: NAVRATNA OJHA EC IIIrd YEAR
British Computer Society Presents Mobile Telecommunication By Nadine Mouali Technical Presentation Monday 17 June, 2002.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
GSM Global System for Mobile Communications
Presentation On Study Of GSM BTS Guided by :- Mr. Suresh Dhruwey JTO(CMTS), Bhilai. Submitted By:- Amit Kumar Singh Priya Rajput Soumya Vaishnava Amit.
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
GSM—Global System for Mobile. 2 How does GSM handle multiple users The 1G cellular systems used FDMA. The first cellular standard adopting TDMA was GSM,
1G PERSONAL COMMUNICATION SYSTEMS: AMPS (PART III) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION Debby Nahl Fall 2004.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
SAMEER NETAM RAHUL GUPTA PAWAN KUMAR SINGH ONKAR BAGHEL OM PANKAJ EKKA Submitted By:
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
IT TECHNOLOGIES By :Garcia, Nikko Shawn M.. Mobile Phone Cloning How is it Done ?
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Cyber Crimes.
Mobile Phone Networks Dr. Hassan Nojumi1 MOBLIE PHONE NETWORKS Dr. Hassan Nojumi.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
ZAC Technical Institute GSM Foundation Course Prepared by Syed Amir Abbas.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM Network Structure Lance Westberg.
Cellular Mobile Communication Systems Lecture 8
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
 No mobility  Security problem  High call failure rate (line disconnection)  Delay in getting new connections  Limited value added services.
GSM – formerly: Groupe Spéciale Mobile (founded 1982) – now: Global System for Mobile Communication – Pan-European standard (ETSI, European Telecommunications.
GSM Network Architecture
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Overview of cellular system
COMT 3911 Cellular/PCS, Wireless Data Technical Issues COMT 391 Wireless.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
COMPUTER NETWORKING 2 LECTURE : CELLULAR NETWORKS.
Sniffer for Detecting Lost Mobiles
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
Information Systems Design and Development Security Precautions Computing Science.
Sniffer for Detecting Lost Mobile Created By:. Contents Introduction What Sniffer is ? IMEI Design Working Advantages Conclusion References.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Presented by Sandeep Kumar IT Final Year 08ESOIT048.
Mobile communication methods
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM SECURITY AND ENCRYPTION
Mobile communication methods
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Global system for Mobile Communications
What is Machine to Machine (M2M) communication?
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Dept. of Business Administration
Security in Wide Area Networks
Presentation transcript:

PHONE CLONING TECHNOLOGY GUIDED BY:- PRESENTED BY:- Prof. Sunil Yadav JAGJIT SINGH KHALSA Roll no-3107

INDEX INTRODUCTION. HOW IS A PHONE CLONED? METHODS TO DETECT CLONED PHONES SYMPTOMS OF PHONE CLONING. MEASURES TO BE TAKEN. ADVANTAGES AND DISADVANTAGES. VICTIMS OF PHONE CLONING. CONCLUSION. REFERENCES

INTRODUCTION CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.

CDMA MOBILE SETS CDMA stands for Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. CDMA uses a Mobile Identification Number (MIN) card that contains user account information.

GSM MOBILE SETS GSM stands for Global System for Mobile Communications. GSM uses a Subscriber Identity Module (SIM) card. GSM is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks.

IMPORTANT TERMS IMEI stands for International Mobile Equipment Identifier, this is a 15 digit universally unique number of the GSM handset.

SIM, which stands for Subscriber Identification Module SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types: 1. Fixed data stored before the subscription is sold. 2. Temporary network data 3. Service related data.

ESN, stands for Electronic Serial Number ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets. It is loaded when the phone is manufactured. MIN ,stands for Mobile Identification Number, It’s a 10 digit number used to identify a mobile phone.

HOW IS A PHONE CLONED? Capture the ESN/MIN pair or SIM/IMEI pair. Clone the ESN/MIN pair using electronic scanning devices. The cloner reprograms or alters the microchip of any wireless phone. The ESN/MINs are transferred using a computer to a device. These devices are connected to handsets. New information is entered into the phone. Thus a clone of the legitimate phone is thus obtained.

HOW CLONING TAKES PLACE. http://homesecurityandpersonalprotection.blogspot.in

CLONING DEVICE http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html

CLONING GSM PHONES The important information is the IMSI, which is stored on the removable SIM card. SIM card inserted into a reader. Connect to computer and card details transferred. Use encrypted software to interpret details. The result: A cloned cell phone is ready for misuse.

CLONING CDMA PHONES Cellular telephone thieves monitor the radio frequency spectrum. Steal the cell phone pair as it is being anonymously registered with a cell site. Subscriber information is also encrypted and transmitted digitally. A device called as DDI, Digital Data Interface can be used to get pairs. Stolen ESN and MIN were then fed into a new CDMA handset.

DETECTION OF PHONE CLONING Duplicate detection - The network sees the same phone in several places at the same time. Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds..

DETECTION (Continued..) RF (Radio Frequency) - Nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees. Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted.

DETECTION (Continued..) Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied. PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual.

DETECTION(Continued..) The best detection method available in CDMA is the A KEY FEATURE. Secret 20 digit number. Number loaded in Authentication Centre. Cannot be copied.

PHONE CLONING SYMPTOMS Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills

CLONING STATISTICS Victims percentage Age

MEASURES TO BE TAKEN Service providers have adopted certain measures to prevent cellular fraud. These include: Blacklisting of stolen phones is another mechanism to prevent unauthorized use. User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud

Encryption: Encryption is regarded as the effective way to prevent cellular fraud Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls. Blocking: Blocking is used by service providers to protect themselves from high risk callers.

ADVANTAGES If your phone has been lost , you can use your cloned cell phone. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.

DISADVANTAGES It can be used by the terrorists for criminal activities. It can be used by the cloner for fraud calls. It can be used for illegal money transfer.

VICTIMS OF PHONE CLONING Anita Davis, a mobile clone victim. One month, her cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.  A Louisville woman was shocked when she got her February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it.  

CONCLUSION Phone Cloning is in initial stages in India. Preventive steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile phones was possible because there was no protection to the identification information.

REFERENCES http://www.cdmasoftware.com/eng.html http://infotech.indiatimes.com http://www.hackinthebox.org/  Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.

THANK YOU...

ANY QUESTIONS?