So some of the features of mobile communication make it an target for criminals.many people are not concerned with that wrong use of a phone.basically today mobile have big threat of cloning.
2. ContentsContents
IntroductionIntroduction
Mobile Phone CloningMobile Phone Cloning
HistoryHistory
How cell Phone clonedHow cell Phone cloned
Types of cloningTypes of cloning
Process of cloningProcess of cloning
Detection of cloningDetection of cloning
Prevention of cloningPrevention of cloning
Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone?
Examples and figuresExamples and figures
ImpactImpact
ConclusionConclusion
3. IntroductionIntroduction
So some of the features ofSo some of the features of
mobile communicationmobile communication
make it an targetmake it an target
for criminals.many peoplefor criminals.many people
are not concerned with thatare not concerned with that
wrong use of awrong use of a
phone.basically todayphone.basically today
mobile have big threat ofmobile have big threat of
cloning.cloning.
4. Mobile Phone CloningMobile Phone Cloning
Mobile Cloning:Mobile Cloning: is copyingis copying
the identity of one mobilethe identity of one mobile
telephone to another. Intelephone to another. In
simple words, while thesimple words, while the
illegal user 'uses' theillegal user 'uses' the
cellphone, the originalcellphone, the original
cellphone user pays for it.cellphone user pays for it.
Mobile Cloning is an easyMobile Cloning is an easy
crime to commit due tocrime to commit due to
the easy availability ofthe easy availability of
the cloning software.the cloning software.
5. HistoryHistory
Cell phone cloningCell phone cloning
started withstarted with MotorolaMotorola
"bag""bag" phones andphones and
reached its peak in thereached its peak in the
mid 90'smid 90's with awith a
commonly availablecommonly available
modification for themodification for the
Motorola "brick"Motorola "brick"
phones, such as thephones, such as the
Classic, the UltraClassic, the Ultra
Classic, and the ModelClassic, and the Model
8000.8000.
6. How Cell Phone ClonedHow Cell Phone Cloned
Cloning involvedCloning involved modifying or replacing the EPROM inmodifying or replacing the EPROM in
the phone withthe phone with a new chip which would allow you toa new chip which would allow you to
configure an ESN via some software.configure an ESN via some software.
You would also have to change the MIN.When you hadYou would also have to change the MIN.When you had
successfullysuccessfully changed the ESN/MINchanged the ESN/MIN pair, your phone waspair, your phone was
an effective clone of the other phone.an effective clone of the other phone.
8. Types of cloningTypes of cloning
Cloning can be divided into following types:-Cloning can be divided into following types:-
AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system)
CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access)
GSM Cloning(GSM Cloning(Global System for MobileGlobal System for Mobile
communication )communication )
10. Process of CloningProcess of Cloning
For cloning a Cell Phone there is need to hack the Sim Card ofFor cloning a Cell Phone there is need to hack the Sim Card of
the Cell Phone.the Cell Phone.
Things Required :Things Required :
Blank SIM Programmable CardsBlank SIM Programmable Cards
A SIM Firmware WriterA SIM Firmware Writer
Software For Reading : Woron ScanSoftware For Reading : Woron Scan
11. Detection of cloningDetection of cloning
Duplicate DetectionDuplicate Detection
Velocity TrapVelocity Trap
Usage ProfilingUsage Profiling
Call CountingCall Counting
PIN CodesPIN Codes
Difficulty in retrieving voice mail messages.Difficulty in retrieving voice mail messages.
Incoming call constantly receiving busy signals.Incoming call constantly receiving busy signals.
Increased bill amount.Increased bill amount.
12. Prevention of cloningPrevention of cloning
Preventive measures MOBILE & SIM CLONING Always set
a PIN in the SIM card.
Always set up security code in the phone.
Switch to 3G SIM card which are more secured then 2G.
Don’t store confidential information in phones.
Min and ESN numbers checked.
corporate security policy
13. Is fixed telephone network safer thanIs fixed telephone network safer than
mobile phone?mobile phone?
14. ExamplesExamples and figuresand figures
Mohammad Yaseen, alias Monu, allegedly ran an illegalMohammad Yaseen, alias Monu, allegedly ran an illegal
mobile phone exchange racket in New Delhi.mobile phone exchange racket in New Delhi.
1,301,3000cases of IMEI cloning found in India betweencases of IMEI cloning found in India between 2009-2009-
20122012..
It affect 750 million users around the world.It affect 750 million users around the world.
Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning.
It process take very less time.It process take very less time.
Practically no solution.Only prevention.Practically no solution.Only prevention.
Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.
15. ImpactImpact
Mobile phone industry loses millions of dollars .Mobile phone industry loses millions of dollars .
Used for illegal activitiesUsed for illegal activities ..
It include drug crimes.It include drug crimes.
Traffickers acquire cloned phonesTraffickers acquire cloned phones
16. ConclusionConclusion
To conclude, cell phone communication is one of the mostTo conclude, cell phone communication is one of the most
reliable, efficient and widespread. Cloning methodology isreliable, efficient and widespread. Cloning methodology is
widespread and can be implemented easily. Hence, it must bewidespread and can be implemented easily. Hence, it must be
considered that the security system which was implementedconsidered that the security system which was implemented
lately must not be fruitful enough to secure the system inlately must not be fruitful enough to secure the system in
future.future.
18. Let’s make a crime free WORLDLet’s make a crime free WORLD
THINK POSITIVETHINK POSITIVE