SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Cell Phone CloningCell Phone Cloning
Presented By:Presented By:
GudiaGudia
ContentsContents
 IntroductionIntroduction
 Mobile Phone CloningMobile Phone Cloning
 HistoryHistory
 How cell Phone clonedHow cell Phone cloned
 Types of cloningTypes of cloning
 Process of cloningProcess of cloning
 Detection of cloningDetection of cloning
 Prevention of cloningPrevention of cloning
 Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone?
 Examples and figuresExamples and figures
 ImpactImpact
 ConclusionConclusion
IntroductionIntroduction
 So some of the features ofSo some of the features of
mobile communicationmobile communication
make it an targetmake it an target
for criminals.many peoplefor criminals.many people
are not concerned with thatare not concerned with that
wrong use of awrong use of a
phone.basically todayphone.basically today
mobile have big threat ofmobile have big threat of
cloning.cloning.
Mobile Phone CloningMobile Phone Cloning
Mobile Cloning:Mobile Cloning: is copyingis copying
the identity of one mobilethe identity of one mobile
telephone to another. Intelephone to another. In
simple words, while thesimple words, while the
illegal user 'uses' theillegal user 'uses' the
cellphone, the originalcellphone, the original
cellphone user pays for it.cellphone user pays for it.
Mobile Cloning is an easyMobile Cloning is an easy
crime to commit due tocrime to commit due to
the easy availability ofthe easy availability of
the cloning software.the cloning software.
HistoryHistory
 Cell phone cloningCell phone cloning
started withstarted with MotorolaMotorola
"bag""bag" phones andphones and
reached its peak in thereached its peak in the
mid 90'smid 90's with awith a
commonly availablecommonly available
modification for themodification for the
Motorola "brick"Motorola "brick"
phones, such as thephones, such as the
Classic, the UltraClassic, the Ultra
Classic, and the ModelClassic, and the Model
8000.8000.
How Cell Phone ClonedHow Cell Phone Cloned
 Cloning involvedCloning involved modifying or replacing the EPROM inmodifying or replacing the EPROM in
the phone withthe phone with a new chip which would allow you toa new chip which would allow you to
configure an ESN via some software.configure an ESN via some software.
 You would also have to change the MIN.When you hadYou would also have to change the MIN.When you had
successfullysuccessfully changed the ESN/MINchanged the ESN/MIN pair, your phone waspair, your phone was
an effective clone of the other phone.an effective clone of the other phone.
Cell phone cloning
Types of cloningTypes of cloning
Cloning can be divided into following types:-Cloning can be divided into following types:-
 AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system)
 CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access)
 GSM Cloning(GSM Cloning(Global System for MobileGlobal System for Mobile
communication )communication )
AMPS, CDMA, GSM PhonesAMPS, CDMA, GSM Phones
Process of CloningProcess of Cloning
For cloning a Cell Phone there is need to hack the Sim Card ofFor cloning a Cell Phone there is need to hack the Sim Card of
the Cell Phone.the Cell Phone.
Things Required :Things Required :
 Blank SIM Programmable CardsBlank SIM Programmable Cards
 A SIM Firmware WriterA SIM Firmware Writer
 Software For Reading : Woron ScanSoftware For Reading : Woron Scan
Detection of cloningDetection of cloning
 Duplicate DetectionDuplicate Detection

Velocity TrapVelocity Trap
 Usage ProfilingUsage Profiling
 Call CountingCall Counting

PIN CodesPIN Codes
 Difficulty in retrieving voice mail messages.Difficulty in retrieving voice mail messages.
 Incoming call constantly receiving busy signals.Incoming call constantly receiving busy signals.
 Increased bill amount.Increased bill amount.
Prevention of cloningPrevention of cloning
 Preventive measures MOBILE & SIM CLONING Always set
a PIN in the SIM card.
 Always set up security code in the phone.
 Switch to 3G SIM card which are more secured then 2G.
 Don’t store confidential information in phones.
 Min and ESN numbers checked.
 corporate security policy
Is fixed telephone network safer thanIs fixed telephone network safer than
mobile phone?mobile phone?
ExamplesExamples and figuresand figures
 Mohammad Yaseen, alias Monu, allegedly ran an illegalMohammad Yaseen, alias Monu, allegedly ran an illegal
mobile phone exchange racket in New Delhi.mobile phone exchange racket in New Delhi.
 1,301,3000cases of IMEI cloning found in India betweencases of IMEI cloning found in India between 2009-2009-
20122012..
 It affect 750 million users around the world.It affect 750 million users around the world.
 Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning.
 It process take very less time.It process take very less time.
 Practically no solution.Only prevention.Practically no solution.Only prevention.
 Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.
ImpactImpact
 Mobile phone industry loses millions of dollars .Mobile phone industry loses millions of dollars .
 Used for illegal activitiesUsed for illegal activities ..
 It include drug crimes.It include drug crimes.

Traffickers acquire cloned phonesTraffickers acquire cloned phones
ConclusionConclusion
To conclude, cell phone communication is one of the mostTo conclude, cell phone communication is one of the most
reliable, efficient and widespread. Cloning methodology isreliable, efficient and widespread. Cloning methodology is
widespread and can be implemented easily. Hence, it must bewidespread and can be implemented easily. Hence, it must be
considered that the security system which was implementedconsidered that the security system which was implemented
lately must not be fruitful enough to secure the system inlately must not be fruitful enough to secure the system in
future.future.
Cell phone cloning
Let’s make a crime free WORLDLet’s make a crime free WORLD
THINK POSITIVETHINK POSITIVE

Contenu connexe

Tendances

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning774474
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

Tendances (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile ph cloning
Mobile ph cloningMobile ph cloning
Mobile ph cloning
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 

En vedette

Session #7 - Pedestrian & Bicycle Counting Tips - Schneider
Session #7 - Pedestrian & Bicycle Counting Tips - SchneiderSession #7 - Pedestrian & Bicycle Counting Tips - Schneider
Session #7 - Pedestrian & Bicycle Counting Tips - SchneiderSharon Roerty
 
Rolls Royce Phantom.
Rolls Royce Phantom.Rolls Royce Phantom.
Rolls Royce Phantom.Saqlain Akram
 
Anti-Lock Braking System (ABS) - An Overview
Anti-Lock Braking System (ABS) - An OverviewAnti-Lock Braking System (ABS) - An Overview
Anti-Lock Braking System (ABS) - An OverviewDarshan Rajagopal
 
When Your Internet Things Know How You Feel
When Your Internet Things Know How You FeelWhen Your Internet Things Know How You Feel
When Your Internet Things Know How You FeelPamela Pavliscak
 
Exploring VR
 Exploring VR Exploring VR
Exploring VRFITC
 
Wearable Tech - Trends for 2016
Wearable Tech - Trends for 2016Wearable Tech - Trends for 2016
Wearable Tech - Trends for 2016Scott Eggertsen
 
The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!Paul Brown
 
The Cars In Fast And Furious 7
The Cars In Fast And Furious 7The Cars In Fast And Furious 7
The Cars In Fast And Furious 7Jodie Harper
 
Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan Shahinhussan
 
The Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The FutureThe Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The FutureArturo Pelayo
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

En vedette (12)

Session #7 - Pedestrian & Bicycle Counting Tips - Schneider
Session #7 - Pedestrian & Bicycle Counting Tips - SchneiderSession #7 - Pedestrian & Bicycle Counting Tips - Schneider
Session #7 - Pedestrian & Bicycle Counting Tips - Schneider
 
BMW i8 Review
BMW i8 ReviewBMW i8 Review
BMW i8 Review
 
Rolls Royce Phantom.
Rolls Royce Phantom.Rolls Royce Phantom.
Rolls Royce Phantom.
 
Anti-Lock Braking System (ABS) - An Overview
Anti-Lock Braking System (ABS) - An OverviewAnti-Lock Braking System (ABS) - An Overview
Anti-Lock Braking System (ABS) - An Overview
 
When Your Internet Things Know How You Feel
When Your Internet Things Know How You FeelWhen Your Internet Things Know How You Feel
When Your Internet Things Know How You Feel
 
Exploring VR
 Exploring VR Exploring VR
Exploring VR
 
Wearable Tech - Trends for 2016
Wearable Tech - Trends for 2016Wearable Tech - Trends for 2016
Wearable Tech - Trends for 2016
 
The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!
 
The Cars In Fast And Furious 7
The Cars In Fast And Furious 7The Cars In Fast And Furious 7
The Cars In Fast And Furious 7
 
Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan
 
The Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The FutureThe Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The Future
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similaire à Cell phone cloning

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
TwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without BoundariesTwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without BoundariesAndrew Jordan
 
Cellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsCellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsSai Srinivas
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)securitySoftware Guru
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyDavid Rogers
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Mobilesecurity unit4-converted
Mobilesecurity unit4-convertedMobilesecurity unit4-converted
Mobilesecurity unit4-convertedDileepEsther
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 

Similaire à Cell phone cloning (17)

Clonning
ClonningClonning
Clonning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
TwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without BoundariesTwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without Boundaries
 
Cellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsCellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@students
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Mobilesecurity unit4-converted
Mobilesecurity unit4-convertedMobilesecurity unit4-converted
Mobilesecurity unit4-converted
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 

Dernier

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 

Dernier (20)

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 

Cell phone cloning

  • 1. Cell Phone CloningCell Phone Cloning Presented By:Presented By: GudiaGudia
  • 2. ContentsContents  IntroductionIntroduction  Mobile Phone CloningMobile Phone Cloning  HistoryHistory  How cell Phone clonedHow cell Phone cloned  Types of cloningTypes of cloning  Process of cloningProcess of cloning  Detection of cloningDetection of cloning  Prevention of cloningPrevention of cloning  Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone?  Examples and figuresExamples and figures  ImpactImpact  ConclusionConclusion
  • 3. IntroductionIntroduction  So some of the features ofSo some of the features of mobile communicationmobile communication make it an targetmake it an target for criminals.many peoplefor criminals.many people are not concerned with thatare not concerned with that wrong use of awrong use of a phone.basically todayphone.basically today mobile have big threat ofmobile have big threat of cloning.cloning.
  • 4. Mobile Phone CloningMobile Phone Cloning Mobile Cloning:Mobile Cloning: is copyingis copying the identity of one mobilethe identity of one mobile telephone to another. Intelephone to another. In simple words, while thesimple words, while the illegal user 'uses' theillegal user 'uses' the cellphone, the originalcellphone, the original cellphone user pays for it.cellphone user pays for it. Mobile Cloning is an easyMobile Cloning is an easy crime to commit due tocrime to commit due to the easy availability ofthe easy availability of the cloning software.the cloning software.
  • 5. HistoryHistory  Cell phone cloningCell phone cloning started withstarted with MotorolaMotorola "bag""bag" phones andphones and reached its peak in thereached its peak in the mid 90'smid 90's with awith a commonly availablecommonly available modification for themodification for the Motorola "brick"Motorola "brick" phones, such as thephones, such as the Classic, the UltraClassic, the Ultra Classic, and the ModelClassic, and the Model 8000.8000.
  • 6. How Cell Phone ClonedHow Cell Phone Cloned  Cloning involvedCloning involved modifying or replacing the EPROM inmodifying or replacing the EPROM in the phone withthe phone with a new chip which would allow you toa new chip which would allow you to configure an ESN via some software.configure an ESN via some software.  You would also have to change the MIN.When you hadYou would also have to change the MIN.When you had successfullysuccessfully changed the ESN/MINchanged the ESN/MIN pair, your phone waspair, your phone was an effective clone of the other phone.an effective clone of the other phone.
  • 8. Types of cloningTypes of cloning Cloning can be divided into following types:-Cloning can be divided into following types:-  AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system)  CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access)  GSM Cloning(GSM Cloning(Global System for MobileGlobal System for Mobile communication )communication )
  • 9. AMPS, CDMA, GSM PhonesAMPS, CDMA, GSM Phones
  • 10. Process of CloningProcess of Cloning For cloning a Cell Phone there is need to hack the Sim Card ofFor cloning a Cell Phone there is need to hack the Sim Card of the Cell Phone.the Cell Phone. Things Required :Things Required :  Blank SIM Programmable CardsBlank SIM Programmable Cards  A SIM Firmware WriterA SIM Firmware Writer  Software For Reading : Woron ScanSoftware For Reading : Woron Scan
  • 11. Detection of cloningDetection of cloning  Duplicate DetectionDuplicate Detection  Velocity TrapVelocity Trap  Usage ProfilingUsage Profiling  Call CountingCall Counting  PIN CodesPIN Codes  Difficulty in retrieving voice mail messages.Difficulty in retrieving voice mail messages.  Incoming call constantly receiving busy signals.Incoming call constantly receiving busy signals.  Increased bill amount.Increased bill amount.
  • 12. Prevention of cloningPrevention of cloning  Preventive measures MOBILE & SIM CLONING Always set a PIN in the SIM card.  Always set up security code in the phone.  Switch to 3G SIM card which are more secured then 2G.  Don’t store confidential information in phones.  Min and ESN numbers checked.  corporate security policy
  • 13. Is fixed telephone network safer thanIs fixed telephone network safer than mobile phone?mobile phone?
  • 14. ExamplesExamples and figuresand figures  Mohammad Yaseen, alias Monu, allegedly ran an illegalMohammad Yaseen, alias Monu, allegedly ran an illegal mobile phone exchange racket in New Delhi.mobile phone exchange racket in New Delhi.  1,301,3000cases of IMEI cloning found in India betweencases of IMEI cloning found in India between 2009-2009- 20122012..  It affect 750 million users around the world.It affect 750 million users around the world.  Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning.  It process take very less time.It process take very less time.  Practically no solution.Only prevention.Practically no solution.Only prevention.  Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.
  • 15. ImpactImpact  Mobile phone industry loses millions of dollars .Mobile phone industry loses millions of dollars .  Used for illegal activitiesUsed for illegal activities ..  It include drug crimes.It include drug crimes.  Traffickers acquire cloned phonesTraffickers acquire cloned phones
  • 16. ConclusionConclusion To conclude, cell phone communication is one of the mostTo conclude, cell phone communication is one of the most reliable, efficient and widespread. Cloning methodology isreliable, efficient and widespread. Cloning methodology is widespread and can be implemented easily. Hence, it must bewidespread and can be implemented easily. Hence, it must be considered that the security system which was implementedconsidered that the security system which was implemented lately must not be fruitful enough to secure the system inlately must not be fruitful enough to secure the system in future.future.
  • 18. Let’s make a crime free WORLDLet’s make a crime free WORLD THINK POSITIVETHINK POSITIVE