SlideShare a Scribd company logo
1 of 18
APPROACHES TO PREVENT CELL PHONE
CLONING IN CDMA
ENVIRONMENT
ANISHA JOHNY
S7 CS A
RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD
12/13/2015
1
Introduction
 The rapid growth of mobile communication has changed the vision of cellular phones
security.
 An easy accessibility condition causes cellular phones to be vulnerable against
numerous and potentially devastating threats from hackers.
 In this seminar I presents an overview of cellular phones security based upon CDMA
technology specially on cell phone cloning.
12/13/2015 2
CDMA ???
12/13/2015 3
CDMA Technology
 CDMA- Code Division Multiple Access :uses spread spectrum technique.
 Enables many wireless devices to transmit at the same time and on the same frequency.
 2G and 3G mobile telecommunications standard.
 Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata
Indicom
 Utilized to send and receive voice transmission, data transmission and various other
types signalling managements.
 Working: unique precise identity
12/13/2015 4
Advantages of CDMA Technology
 Phone call clarity is better.
 Call rates are low as in comparison with existing GSM technology.
 Well matched with other cellular technologies
 Helpful in national and international roaming.
 Prevents interference and destruction of service caused due to multipath
 Engages in Soft hand-off 12/13/2015 5
Disadvantages of CDMA Technology
 Security flaws:
 Cell phone tracking and interception is easier.
 A cell phone can be turned on without the knowledge of customer.
 A cell phone can be cloned by anybody so that one pretend himself
to be genuine.
 Phones cannot be swapped
12/13/2015 6
Cell phone working
 When a call is done through cell phone four important components
are transmitted:
 Radio frequencies with the help of two separate channels one for
voice and another for control signalling information.
 Electronic Serial Number (ESN)
 Mobile Identification Number(MIN)
 Station Class mark(SCM)
12/13/2015 7
Cell phone working(Cont..)
 After receiving this ESN and MIN, cell service provider verifies them
with their genuine subscriber list.
 If this pair is genuine then a control signal is generated and permits the
customer to make the call.
 The successfully registering this way is known as Anonymous
Registration.
12/13/2015 8
Cell Phone Cloning ???
12/13/2015 9
Cell Phone Cloning
 Cell phone cloning is copying the identity of one mobile phone to another mobile
phone.
 Process of taking the programmed information that is stored in a legitimate mobile
phone and illegally programming the identical information into another mobile
phone.
 Thus, "cloned" phone can make and receive anonymous calls and the charges for
those calls are billed to the legitimate subscriber.
 The service provider network does not have a way to differentiate between the
legitimate phone and the "cloned" phone.
12/13/2015 10
Cloning methodology
 Alteration of EPROM that help to configure ESN/MIN via software
 By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers
during anonymous registration. These are used to make calls by cloner even while the
actual user makes a call.
 Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM
characteristics is cloned during a call
 Station Class Mark(SCM)
 System IDentification for Home System(SIDH): Part of NAM module that can be
changed to decide where the billing has to be forwarded.12/13/2015 11
Preventive Measures
 Operator knows if there is same ESN/MIN combinations are traced from
different places. If so happens operator should switch off all phones having
same pairs.
 Frequent checking of monthly bills
 Distance is another important factor to identify threats.
 Radio Frequency Fingerprinting(RFF)
 Cellular Authentication and Voice Encryption(CAVE) security protocols
12/13/2015 12
Preventive Measures(Cont..)
 Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls
by hackers using a scanner , which registers the frequency in which mobile phones operate
in its immediate surroundings.
 User authentication using Personal Identification Number(PIN): secret numeric password
between user and MSC.
 Pattern recognition techniques: used to classify the cell phone according to their usage logs.
Such logs contain the relevant characteristics for every call made by the user. From this, it
is easier to identify if a call does not correspond to the patterns of a specific user .
 Pattern Recognition techniques are used by the Mat Lab tool employment.
12/13/2015
13
Preventive Measures(Cont..)
 Advices for subscribers as a sign of caution includes:
 Difficulty in placing outgoing calls
 Difficulty in retrieving voice mail messages
 Incoming calls constantly receiving busy signals or wrong numbers
 Frequent wrong number phone calls
 Unusual calls appearing on phone bills
12/13/2015 14
Conclusion
 Existing cellular systems have a number of potential weaknesses that need to be
considered.
 Awareness and a few sensible precautions will stop these criminal activities to an
extent.
 Keep in mind that technique which is safe today can be the most unsecured one
in future
 So it’s important to check function of a security system once a year and update it
or replace it
12/13/2015 15
References
 International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012
 International Journal of advances in computing & communications, Volume 1, 2013
 Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital
DeviceForensicsJournal, 3(1). Available from
http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.
 Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17,
2003
 Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L.
Milstein, IEEE Communication Magazine, Jan. 1995.
12/13/2015 16
Thank You!!!
12/13/2015 17
Questions???
12/13/2015 18

More Related Content

What's hot

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

What's hot (20)

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 

Viewers also liked

Basic command ppt
Basic command pptBasic command ppt
Basic command ppt
Rohit Kumar
 

Viewers also liked (18)

Zoho Mail On Linode
Zoho Mail On LinodeZoho Mail On Linode
Zoho Mail On Linode
 
Deploying to Ubuntu on Linode
Deploying to Ubuntu on LinodeDeploying to Ubuntu on Linode
Deploying to Ubuntu on Linode
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Linux administration
Linux administrationLinux administration
Linux administration
 
3D internet
3D  internet3D  internet
3D internet
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's Workplace
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Basic command ppt
Basic command pptBasic command ppt
Basic command ppt
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
An Introduction to Linux
An Introduction to LinuxAn Introduction to Linux
An Introduction to Linux
 
Effective communication in the workplace
Effective communication in the workplaceEffective communication in the workplace
Effective communication in the workplace
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 

Similar to MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
ardhita banu adji
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
Droidcon Berlin
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
IAEME Publication
 

Similar to MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT (17)

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Test
TestTest
Test
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Method to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has FailedMethod to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has Failed
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 

Recently uploaded

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

  • 1. APPROACHES TO PREVENT CELL PHONE CLONING IN CDMA ENVIRONMENT ANISHA JOHNY S7 CS A RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD 12/13/2015 1
  • 2. Introduction  The rapid growth of mobile communication has changed the vision of cellular phones security.  An easy accessibility condition causes cellular phones to be vulnerable against numerous and potentially devastating threats from hackers.  In this seminar I presents an overview of cellular phones security based upon CDMA technology specially on cell phone cloning. 12/13/2015 2
  • 4. CDMA Technology  CDMA- Code Division Multiple Access :uses spread spectrum technique.  Enables many wireless devices to transmit at the same time and on the same frequency.  2G and 3G mobile telecommunications standard.  Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata Indicom  Utilized to send and receive voice transmission, data transmission and various other types signalling managements.  Working: unique precise identity 12/13/2015 4
  • 5. Advantages of CDMA Technology  Phone call clarity is better.  Call rates are low as in comparison with existing GSM technology.  Well matched with other cellular technologies  Helpful in national and international roaming.  Prevents interference and destruction of service caused due to multipath  Engages in Soft hand-off 12/13/2015 5
  • 6. Disadvantages of CDMA Technology  Security flaws:  Cell phone tracking and interception is easier.  A cell phone can be turned on without the knowledge of customer.  A cell phone can be cloned by anybody so that one pretend himself to be genuine.  Phones cannot be swapped 12/13/2015 6
  • 7. Cell phone working  When a call is done through cell phone four important components are transmitted:  Radio frequencies with the help of two separate channels one for voice and another for control signalling information.  Electronic Serial Number (ESN)  Mobile Identification Number(MIN)  Station Class mark(SCM) 12/13/2015 7
  • 8. Cell phone working(Cont..)  After receiving this ESN and MIN, cell service provider verifies them with their genuine subscriber list.  If this pair is genuine then a control signal is generated and permits the customer to make the call.  The successfully registering this way is known as Anonymous Registration. 12/13/2015 8
  • 9. Cell Phone Cloning ??? 12/13/2015 9
  • 10. Cell Phone Cloning  Cell phone cloning is copying the identity of one mobile phone to another mobile phone.  Process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.  Thus, "cloned" phone can make and receive anonymous calls and the charges for those calls are billed to the legitimate subscriber.  The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone. 12/13/2015 10
  • 11. Cloning methodology  Alteration of EPROM that help to configure ESN/MIN via software  By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers during anonymous registration. These are used to make calls by cloner even while the actual user makes a call.  Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM characteristics is cloned during a call  Station Class Mark(SCM)  System IDentification for Home System(SIDH): Part of NAM module that can be changed to decide where the billing has to be forwarded.12/13/2015 11
  • 12. Preventive Measures  Operator knows if there is same ESN/MIN combinations are traced from different places. If so happens operator should switch off all phones having same pairs.  Frequent checking of monthly bills  Distance is another important factor to identify threats.  Radio Frequency Fingerprinting(RFF)  Cellular Authentication and Voice Encryption(CAVE) security protocols 12/13/2015 12
  • 13. Preventive Measures(Cont..)  Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls by hackers using a scanner , which registers the frequency in which mobile phones operate in its immediate surroundings.  User authentication using Personal Identification Number(PIN): secret numeric password between user and MSC.  Pattern recognition techniques: used to classify the cell phone according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. From this, it is easier to identify if a call does not correspond to the patterns of a specific user .  Pattern Recognition techniques are used by the Mat Lab tool employment. 12/13/2015 13
  • 14. Preventive Measures(Cont..)  Advices for subscribers as a sign of caution includes:  Difficulty in placing outgoing calls  Difficulty in retrieving voice mail messages  Incoming calls constantly receiving busy signals or wrong numbers  Frequent wrong number phone calls  Unusual calls appearing on phone bills 12/13/2015 14
  • 15. Conclusion  Existing cellular systems have a number of potential weaknesses that need to be considered.  Awareness and a few sensible precautions will stop these criminal activities to an extent.  Keep in mind that technique which is safe today can be the most unsecured one in future  So it’s important to check function of a security system once a year and update it or replace it 12/13/2015 15
  • 16. References  International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012  International Journal of advances in computing & communications, Volume 1, 2013  Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital DeviceForensicsJournal, 3(1). Available from http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.  Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17, 2003  Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L. Milstein, IEEE Communication Magazine, Jan. 1995. 12/13/2015 16