Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Phone cloning

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Mobile phone cloning
Mobile phone cloning
Chargement dans…3
×

Consultez-les par la suite

1 sur 23 Publicité

Plus De Contenu Connexe

Publicité

Plus récents (20)

Phone cloning

  1. 1. A Seminar Presentation on Phone Cloning Represented by Monodip Roy Chowdhury Prasun Mandal Sanghita Mukherjee Souvik kumar Guin Subhrajit Paul Sumit ghosh Mentor Prof. Somnath Patra 3rd Year 6th Semester
  2. 2. • What is cloning • Important terms • Phone cloning CDMA GSM • Software for cloning • Symptoms of phone cloning • Method to detect phone cloning • Impact of phone cloning • Prevent cloning • Future advantages • Conclusion • References Contents
  3. 3. Introduction What is cloning? •Cloning is a creation of an organism that is an exact genetic copy of another. •By other means every single DNA bit is same of two copy. What is Phone cloning? •Phone cloning is coping the specific identification one phone to another. •Coping can be done both CDMA and GSM services mobile phone. •The billing of calls will be paid by mother device subscriber. •What can mother device do the copy device can also do the same. •The purpose of doing this is to make fraudulent calls and for security reason it is done.
  4. 4. Some Important terms about Phone cloning
  5. 5. Some Important terms about Phone cloning
  6. 6. Some Important terms about Phone cloning GSM •GSM (Global System for Mobile communication) is a digital mobile telephony system that is widely used in world. •TDMA(time division multiplexing )system is used in this service. • It operates at either the 900 MHz or 1800 MHz frequency band. •It also provides GPRS, HSCSD, EDGE, UMTS services. SIM •SIM or Subscriber Identity Module is small card that contains a mobile network subscriber's account information •Available in GSM service only. •It provides mobile network. •At GSM cloning cloner mainly cloned the SIM card information.
  7. 7. How a phone cloned
  8. 8. How a phone cloned Incomin g Call Thief Intercepts The ESN and MIN Using a PC the thief reprogram a cellular phone to carry the stolen number And when the re program occurs the phone has cloned with that MIN and ESN Cell site
  9. 9. How a phone cloned GSM CLONING Remove the SIM card from mobile Insert the SIM into SIM card cloning device Connect SIM card duplicator application on your PC Locate IMSI number Extract Authentication Key Remove the SIM card and Inset a new SIM Now extract all the data to SIM
  10. 10. How a phone cloned GMS Cloner devices This device used to read the SIM card
  11. 11. How a phone cloned GSM Cloning Some screen shot for GSM cloning The software's used to import and export the data to original SIM to Cloned SIM
  12. 12. Software For Cloning CDMA Cloning 1.Patagonia GSM Cloning 1.SIM Card Reader tool 2.SIM card editor 3.SIM Cloning tool 4.Mobilledit also many more software are available for GSM cloning …
  13. 13. Symptoms of phone cloning Unfortunately, there is no way the subscriber can detect cloning. Events like call dropping or anomalies in monthly bills can act as tickers.  But some points mentioned below can help. •Frequent wrong number phone calls to your phone, or hang-ups. •Difficulty in placing outgoing calls. •Difficulty in retrieving voice mail messages. •Incoming calls constantly receiving busy signals or wrong numbers. •Unusual calls appearing on phone bills.
  14. 14. Methods to Detect Phone cloning
  15. 15. Methods to Detect Phone cloning The network sees the same phone in several places at the same time. Reaction include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for. The mobile phone seems to be moving at impossible, or most unlikely speeds. It can be done by the tracking the locations of call simultaneously. For example, if a call is first made at some place , and after five minutes, another call is made at another place and if travel between two places in that time is impossible. Duplicate Detection Velocity Trap
  16. 16. Methods to Detect Phone cloning By counting the monthly tariff of the calls. To gave a SIM PIN lock security To make a call by dialing a number followed by dialing SIM PIN Code If a call is still going after that then the SIM must be cloned Call Counting PIN Codes
  17. 17. Impact of Phone cloning Although the phone cloning is the huge problem in united state and europium countries but in India which is 2nd largest country in using mobile telephony, is in primary stage for mobile cloning crime. Very few Indians are aware about this and have knowledge about that. The Phone cloning has good impact and also have bad impact. •The phone cloning has done for security reason and military security purpose •Detectives also used this kind of technology •And for SIM losing the nowadays the company also provides a duplicate SIM to subscriber without loosing his number GOOD IMPACT
  18. 18. Impact of Phone cloning •Many criminals use cloned cellular telephones for illegal activities, because their calls are billed to them, and are therefore much more difficult to trace. •The bigger chance to subscribers security loss, banking details loss. •It is quite easy to monitory a person by that way •Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal action of person who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. BAD IMPACT
  19. 19. Prevent Cloning 1. Traffic analysis though artificial intelligence software 2. User verification using Personal Identification Number(PIN) codes is one method for customer protection against cellular phone fraud 3. Backlisting the stolen phone that will helping it to sorting the IMEI number 4. Do not receive the calls from suspicious number nowadays the fraud calls can track the unique id of phone by receiving it 5. Do not give phones IMEI number and SIM cards specific numbers to any persons
  20. 20. • It may be a great technology for detectives • The SIM owner can clone the SIM for multipurpose using by informing the company.(i.e for working place and one for home) • It is a valuable technology for militaries • the technology helps the company and also the subscriber they had less chance to loose their number. Future Aspects
  21. 21. Conclusion • Mobile Cloning is in initial stage in India • preventive steps should be taken by the network provider and Also by the Government by the enactment of legislation to prosecute crimes related to cellular phones. • However It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular “cloning fraud” as a specific crime. • Existing cellular system have a number of potential weakness that were considered. • It is crucial that business and staff take mobile phone security seriously. • However we have to throw out the negative part of this technology and try to use it worthily, as science and technology is not for a destruction rather it is for a blessing for human beings.
  22. 22. References • We took help from our friend and also we got great support from our mentor And also internet helped us like • google.co.in [2-21] • youtube.com [2-21] • wikipedia.org [2-21] • slideshare.net [2-8,12-21] • seminarsonly.com [5-7] • security.stackexchange.com [14-19] • ehow.com [8,9] • movzio.com [19] • ids.nic.in [5] • And many more……..
  23. 23. Thank you

×