Mob Phn Cloning

Preview:

Citation preview

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 1/36

AbstractIntroduction

What is mobile phone Cloning?How it works?Security VulnerabilitiesCDMAGSMIdentifying ESN in phone

Contents :

1

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 2/36

How is a phone cloning?How cloning takes place?Detection of phone cloningSymptom’s ESN ReplacementMeasures to be takenHow can Organization help?Victims of phone Cloning

AdvantageDisadvantageConclusion

2

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 3/36

It is a technique where security data from onecell phone is transferred into another phoneThe other phone becomes the exact replica ofthe original phone like a cloneCalls can be made from both phones,only theoriginal is billed

Communication channels are equipped withsecurity algorithm

Abstract:

3

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 4/36

Introduction:

4

In 1997,a 6-yr old Dollyresearch at the RoslinInstitute in Scotland

Recently the Delhi policearrested a person with 20cell phones,laptop andSIM scanner

They used softwarenamed Patagonia andthey have cheapinternational calls

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 5/36

What is mobile phone cloning

Copying the subscriber information from onephone into the other for obtaining free callsPurpose for makingFraudulent telephone calls

The bills for the calls go tolegitimate subscriber Cloning occurs mostfrequently in areas of highcell phone usage 5

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 6/36

How it worksIt sends radio frequencytransmission through theair on two distinct channel:

Voice communicationControl signals

It makes a call,theynormally transmittESN,MIN,SCM and number called in a short burst ofdataReconigzed the cell sitewhich emits a controlsignal

6

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 7/36

7

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 8/36

What is ESN? The ESN (Electronic Serial Number) is the serial number of your

cellular phone. The ESN is transmitted to the cell site and used inconjunction with the NAM to verify the legitimate user of the

cellular system

What is MIN?The MIN(Mobile Identification Number) is simply the phonenumber of the cellular telephone

AMPSAMPS(Advanced Mobile Phone Service) was the first cellular

phone system in United states. AMPS operate as an analogsystem using 30 khz wide channels

8

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 9/36

Security vulnerabilitiesYour cellular phone has 3majors are

a. Monitoring of your conservation while

using the phoneb. Your phone beingturned into amicrophone tomonitor conservation

c. Use of your phonenumber by other tomake calls that arecharged to your account

9

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 10/36

Important terms:

10

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 11/36

11

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 12/36

How is a phone cloned ?Capture the ESN/MIN or SIM/IMEI pair It use a electronic scanningdeviceCloner reprograms or alters themicrochip of any wireless phoneIt is connected to handset

New information is entered intothe phone

12

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 13/36

DIAGRMATIC REPRESENTATION OF

ACTUAL PROCESS

13

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 14/36

CDMAIt uses spread-spectrumtechniques to store bands withmultiple conversationSubscriber information is alsoencrypted and transmitteddigitallyHandsets are particularlyvulnerable to cloningGet a pairs by simply makingdevice mobile and sitting in abusy traffic area

14

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 15/36

15

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 16/36

Identifying ESN in phone

16

Depending on what modelphone you have the ESNwill be located on a PROM

code on the PROM beobtained by unsolderingthe cellular phoneIt has 16 to 28 leads coming

from itIt is a bipolar EPROMThe majority of phones willaccept the NationalSemiconductor 32*8 PROM

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 17/36

17

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 18/36

18

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 19/36

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 20/36

20

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 21/36

ESN ReplacementCellular service companyoffers PERSONALIDENTIFICATION NUMBER

and are effective for cloningThe Central ForensicLaboratory at Hyderabadhas developed software todetect cloned

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 22/36

Uses of cell phone in daily life

22

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 23/36

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 24/36

24

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 25/36

Mobile Communication

• Mobile Communication

25

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 26/36

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 27/36

Mobiles should never be trusted for communicationSet a screen that’s required before the screenCheck a device to all mobile which arecovered by Corporate Security PolicyOne person is responsible for keeping theupdate of central register

27

How can organized

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 28/36

Future Threats

28

Difficult process for thevictim is ResolvingSubscriber Fraud

It take long time to discover and prove for debtsTo abuse the

telecommunication systemTo check out the weaknessand vulnerability of existingtelecom system

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 29/36

Victim of mobile is developed Anita DavisCell phone was bill showed from one month $3151worth of calls at Pakistan, Israel, Jordan , Africa and

other countriesA Luisville women was shocked when she got her billfrom T-mobile

10 times higher than it’s even before Equally troubling they didn’t recognize most of thephone numbers on it

29

Victims of Phone Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 30/36

Can digital phone can be cloned

30

Yes, digital phones can beclonedThe mobile phones employingdigital TDMA & CDMAtechnologyNewer model analog phonesalso haveAuthentication allows themobile server provider networkto determine the legitmacy

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 31/36

Technology used to tacklethe Mence

31

Duplication detectionVelocity trap

User/Usage profilingCall CountingVoice Sampling

PIN Codes

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 32/36

Application:

• Built in camera which is useto capture your favoritememories

Uploading photos to thecomputer allows to edit orsimply share with family andfriends

• It is compatible withWindows operating system

• Transfer the images to

computer using a USB cable 32

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 33/36

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 34/36

It can be used by the terrorits for criminalactivities

It can be used by the cloner for a fraud callsIt can be used for illegal money transfer Cloned organism always has a problem thatscientists can figure out

34

DISADVANTAGE

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 35/36

Phone cloning is in intial stage in INDIA.Preventive steps should be taken by the

network provider and the Government. Theenactment of legislation to prosecute crimesrelated to cellular phones is not viewed as apriority.

The cloning of CDMA mobile phones waspossible because there was no protection to theidentifiction information

35

CONCLUSION

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 36/36

36