SlideShare une entreprise Scribd logo
1  sur  30
TOPIC: MOBILE PHONE CLONING

Presented By:
Ritik Nagar
ECE 3rd Year
* WHAT IS CELL PHONE CLONING?
* GSM
* CDMA
* IMEI, ESN, MIN
* HOW IS CELL PHONE CLONING DONE?
* ARE OUR CELL PHONES SECURED?
* HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
* DETECTION OF A CLONED PHONE IN A NETWORK
* IMPACTS OF CELL PHONE CLONING
* HOW TO PREVENT CELL CLONING?
* CONCLUSION
Cell phone cloning is copying the identity
of one mobile telephone to another mobile
telephone.
It is the process of taking the programmed
information that is stored in a legitimate
mobile phone and illegally programming the
identical information into another mobile
phone.
The result is that the "cloned" phone can
make and receive calls and the charges for
those calls are billed to the legitimate
subscriber. The service provider network
does not have a way to differentiate
between the legitimate phone and the
"cloned" phone.
Global System for Mobile Communications.
A digital cellular phone technology based
on TDMA GSM phones use a Subscriber
Identity Module (SIM) card that contains
user account information. Any GSM phone
becomes immediately programmed after
plugging in the SIM card, thus allowing
GSM phones to be easily rented or
borrowed. Operators who provide GSM
service are Airtel, Idea etc.
Code Division Multiple Access. A method
for transmitting simultaneous signals
over a shared portion of the spectrum.
There is no Subscriber Identity Module
(SIM) card unlike in GSM. Operators who
provides CDMA service in India are
Reliance and Tata Indicom.
IMEI (International Mobile Station
Equipment Identity)
The IMEI number is used by a GSM network to
identify valid
devices and therefore can
be used for stopping a stolen phone from
accessing that network.
ESN (Electronic Serial Number)
ESN number is used to uniquely identify a mobile
phone operating on CDMA network.

MIN (Mobile Identification Number)
MIN is a number that is derived from the 10digit directory telephone number assigned to a
mobile station.
Cloning involves modifying or replacing
the EPROM in the phone with a new chip
which would allow you to configure an ESN
(Electronic serial number) via software.
You would also have to change the MIN
(Mobile Identification Number). Cloning
require access to ESN and MIN pairs.
ESN/MIN pairs can be discovered in
several ways:
*Sniffing
*Trashing

the cellular
cellular companies or cellular

resellers

*Hacking

cellular companies or cellular
resellers
Cellular

thieves can capture ESN/MINs using
devices such as cell phone ESN reader or
digital data interpreters (DDI). DDIs are
devices specially manufactured to intercept
ESN/MINs.

Numbers

can be recorded by hand, one-byone, or stored in the box and later downloaded
to a computer.

After

the ESN/MIN pair is captured, the cloner
reprograms or alters the microchip of any
wireless phone to create a clone of the
wireless phone from which the ESN/MIN pair was
Patagonia is a software available in the
market which is used to clone CDMA phones.
Using this software a cloner can modify the
ESN/MIN of any CDMA phone.
Once we have the ESN/MIN of the target cell
phone, we can clone them to another phone
using this software.
*

After we have modified the EEPROM of our
device, it can be used as a cloned device.

*

Now we can use our phone for making
fraudulent telephone calls but the bills for
the calls will go to the legitimate
subscriber.
*We

have seen that CDMA phones can easily be
cloned but when it comes to GSM ,the task is
tougher but not impossible for expert hackers.

*With

the shift to GSM digital, the phone
companies assure us that the bad old days are
over and mobile phones are secure and privacy
friendly. But this not entirely true so we
still need to be careful about this matter.
*Frequent

wrong number phone calls to your
phone, or hang-ups.

*Difficulty in placing outgoing calls.
*Difficulty in retrieving voice mail messages.
*Incoming calls constantly receiving busy
signals or wrong numbers. Unusual calls
appearing on your phone bills
*Duplicate Detection
*Velocity Trap
*Usage Profiling
*Call Counting
*The

network sees the same phone in several
places at the same time.

*Reactions

include shutting them all off so
that the real customer will contact the
operator because he lost the service he is
paying for.

*After

verification the service will be
provided only to the real subscriber.
*

It notices when the mobile phone seems to be
moving at impossible, or most unlikely speeds.

*For

example, if a call is first made in Delhi,
and five minutes later, another call is made
from the same number but this time in Mumbai
then it is obvious that there must be two
phones with the same identity on the network.

*So

service will be terminated until the real
user is verified.
*Profiles

of customers' phone usage are kept,
and when discrepancies are noticed, the
customer is contacted.

*For

example, if a customer normally makes only
local network calls but is suddenly placing
calls to foreign countries for hours of
airtime, it indicates a possible clone
*Both

the phone and the network keep track of
calls made with the phone, and should they
differ more than the usually allowed one call,
service is denied.
*Each

year, the mobile phone industry loses
millions of dollars in revenue because of the
cloned phones as their calls are billed to
other phones owned by innocent third persons.

*Many

criminals like drug dealers use cloned
cellular telephones for illegal activities.

*Terrorists

have been known to use cloned
phones to escape law enforcement efforts aimed
at tracking their whereabouts.
*User

verification using PIN(Personal
Identification Number)

*Blacklisting

*Traffic

of stolen phones

analysis

*Electrically

checking the ESN/MIN
To avoid such abuse to telecommunication system
it is absolutely necessary to check out the
weakness and vulnerability of existing telecom
systems.

If it is planned to invest in new telecom
equipment, a security plan should be made and
the system should be tested before being
implemented.
*http://www.hackinthebox.org
*http://realhackerspoint.blogspot.in
*http://www.google.com

*http://www.wikipedia.com
Mobile Phone Cloning By: Ritik Nagar

Contenu connexe

Tendances

Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principles
Supper Mario
 
Réseau GSM, installation de BTS (DBS3900)
Réseau GSM, installation de BTS (DBS3900)Réseau GSM, installation de BTS (DBS3900)
Réseau GSM, installation de BTS (DBS3900)
Vicheka Phor
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
Tempus Telcosys
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
Muhammad Uzair Rasheed
 

Tendances (20)

The GSM Technology
The GSM TechnologyThe GSM Technology
The GSM Technology
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
GSM Network Architecture
GSM Network ArchitectureGSM Network Architecture
GSM Network Architecture
 
9.3 sistemas de senalizacion
9.3 sistemas de senalizacion9.3 sistemas de senalizacion
9.3 sistemas de senalizacion
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Basic gsm principles
Basic gsm principlesBasic gsm principles
Basic gsm principles
 
Réseau GSM, installation de BTS (DBS3900)
Réseau GSM, installation de BTS (DBS3900)Réseau GSM, installation de BTS (DBS3900)
Réseau GSM, installation de BTS (DBS3900)
 
Modul 3 gsm procedures
Modul 3   gsm proceduresModul 3   gsm procedures
Modul 3 gsm procedures
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Tema 6-gsm
Tema 6-gsmTema 6-gsm
Tema 6-gsm
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
 
International roaming technical view
International roaming technical viewInternational roaming technical view
International roaming technical view
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Tecnología GSM
Tecnología GSMTecnología GSM
Tecnología GSM
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 

En vedette

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 

En vedette (20)

Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
cdma by svr
cdma  by svrcdma  by svr
cdma by svr
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Cdma 101
Cdma 101Cdma 101
Cdma 101
 
Cdma by svr
Cdma by svrCdma by svr
Cdma by svr
 
Wi DI
Wi DIWi DI
Wi DI
 

Similaire à Mobile Phone Cloning By: Ritik Nagar

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

Similaire à Mobile Phone Cloning By: Ritik Nagar (17)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Fdp
FdpFdp
Fdp
 
Test
TestTest
Test
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
 

Dernier

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Dernier (20)

Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 

Mobile Phone Cloning By: Ritik Nagar

  • 1. TOPIC: MOBILE PHONE CLONING Presented By: Ritik Nagar ECE 3rd Year
  • 2. * WHAT IS CELL PHONE CLONING? * GSM * CDMA * IMEI, ESN, MIN * HOW IS CELL PHONE CLONING DONE? * ARE OUR CELL PHONES SECURED? * HOW TO KNOW THAT THE CELL HAS BEEN CLONED? * DETECTION OF A CLONED PHONE IN A NETWORK * IMPACTS OF CELL PHONE CLONING * HOW TO PREVENT CELL CLONING? * CONCLUSION
  • 3. Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. It is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
  • 4. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.
  • 5.
  • 6. Global System for Mobile Communications. A digital cellular phone technology based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed. Operators who provide GSM service are Airtel, Idea etc.
  • 7. Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in GSM. Operators who provides CDMA service in India are Reliance and Tata Indicom.
  • 8. IMEI (International Mobile Station Equipment Identity) The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network.
  • 9. ESN (Electronic Serial Number) ESN number is used to uniquely identify a mobile phone operating on CDMA network. MIN (Mobile Identification Number) MIN is a number that is derived from the 10digit directory telephone number assigned to a mobile station.
  • 10.
  • 11. Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). Cloning require access to ESN and MIN pairs. ESN/MIN pairs can be discovered in several ways:
  • 12. *Sniffing *Trashing the cellular cellular companies or cellular resellers *Hacking cellular companies or cellular resellers
  • 13. Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI). DDIs are devices specially manufactured to intercept ESN/MINs. Numbers can be recorded by hand, one-byone, or stored in the box and later downloaded to a computer. After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was
  • 14.
  • 15. Patagonia is a software available in the market which is used to clone CDMA phones. Using this software a cloner can modify the ESN/MIN of any CDMA phone. Once we have the ESN/MIN of the target cell phone, we can clone them to another phone using this software.
  • 16.
  • 17. * After we have modified the EEPROM of our device, it can be used as a cloned device. * Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.
  • 18. *We have seen that CDMA phones can easily be cloned but when it comes to GSM ,the task is tougher but not impossible for expert hackers. *With the shift to GSM digital, the phone companies assure us that the bad old days are over and mobile phones are secure and privacy friendly. But this not entirely true so we still need to be careful about this matter.
  • 19. *Frequent wrong number phone calls to your phone, or hang-ups. *Difficulty in placing outgoing calls. *Difficulty in retrieving voice mail messages. *Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
  • 20. *Duplicate Detection *Velocity Trap *Usage Profiling *Call Counting
  • 21. *The network sees the same phone in several places at the same time. *Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. *After verification the service will be provided only to the real subscriber.
  • 22.
  • 23. * It notices when the mobile phone seems to be moving at impossible, or most unlikely speeds. *For example, if a call is first made in Delhi, and five minutes later, another call is made from the same number but this time in Mumbai then it is obvious that there must be two phones with the same identity on the network. *So service will be terminated until the real user is verified.
  • 24. *Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted. *For example, if a customer normally makes only local network calls but is suddenly placing calls to foreign countries for hours of airtime, it indicates a possible clone
  • 25. *Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
  • 26. *Each year, the mobile phone industry loses millions of dollars in revenue because of the cloned phones as their calls are billed to other phones owned by innocent third persons. *Many criminals like drug dealers use cloned cellular telephones for illegal activities. *Terrorists have been known to use cloned phones to escape law enforcement efforts aimed at tracking their whereabouts.
  • 27. *User verification using PIN(Personal Identification Number) *Blacklisting *Traffic of stolen phones analysis *Electrically checking the ESN/MIN
  • 28. To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems. If it is planned to invest in new telecom equipment, a security plan should be made and the system should be tested before being implemented.