What is cell phone cloning?
When did cloning start?
GSM
CDMA
How is a phone cloned?
Some Methods to detect cloned phones.
Symptoms of cloned mobile.
How to prevent cloning.
Conclusion.
Cell Phone cloning is copying the identity of one
mobile phone to another mobile phone.
The main purpose of Mobile cloning is making
fraudulent calls.
The bills for the calls goes to the legitimate
subscriber.
The cloner also can also make anonymous calls
Cell Phone cloning started with Motorola
“bag” phones and reached at their peak in mid
90’s.
The Cellular Telecommunications Industry
Association(CTIA) estimates that financial losses
due to cloning fraud are around a billion
u.s.dollars.
Mobile cloning is in initial stages in India
so preventive steps should be taken by network
provider and government
Global System for Mobile Communication
.A cellular technology based on TDMA.
GSM phones use a Subscriber Identity
Module(SIM) card that contains user info.
Any GSM automatically programmed after
plugging in the SIM card.
Code Division Multiple Access is a method of
transmitting simultaneously signals over shared
portion of spectrum.
There is a built in UICC (Universal Integrated
Circuit Card) card in CDMA i.e., they are hand
set based mobiles.
In India the major CDMA service providers are
Reliance and Tata Indicom.
Electronic Serial Number(ESN).It is loaded when
the phone number is manufactured.
This number cannot be tampered or changed by
the user or a subscriber.
This is one of the essentials to be known for
cloning a mobile phone.
Mobile Identification Number
By Knowing ESN/MIN pairs cloning can be
Successfully done on any mobile phone.
It is nothing but your mobile number.
Cloning involves modifying or replacing the
EPROM in the phone with a new chip
It would allow you to configure ESN via software
like PATAGONIA.
You would also have to change MIN number too.
When you had successfully changed ESN/MIN
pair, the phone was an effective clone of another
phone.
Cloning is rare on the GSM ,one of the more
widely used mobile telephone communication
systems.
However, cloning GSM Phones is achieved by
cloning the SIM card contained within , not
necessarily any of the phone’s internal data.
The important information is IMSI stored in SIM
card.
SIM card inserted to a reader
Connect a computer and transfer the card
details.
Use encrypted software to interpret details.
The network shows the same mobile phone at
several places
Reactions include shutting all them off so that the
real customer will contact the operator as he lost
the service
The Mobile phone seems to be moving with
impossible speed or most unlikely speeds.
For example one phone call is made at Vizag
and in another 5 minutes call is made at
Hyderabad.
Both phone and network keep the track of calls
made with the phone.
If they differ by each other the service to that
mobile is denied(denial of service).
Frequent wrong calls to your phone , or hang-
ups.
Difficulty in placing outgoing calls.
Incoming calls constantly receiving busy signals
or wrong numbers. Unusual calls appearing on
phone bills.
Blacklisting of stolen phones is one type of
mechanism to prevent unauthorized use. An
Equipment Identity Register enables network
operators to disable stolen cellular phones on
network.
User verification using Personal Identification
Number(PIN) codes is one method for customer
protection against cellular phone fraud
Tests conducted by USA found that having a PIN
code reduced fraud by more than 80%.
Traffic Analysis detects cellular fraud by using
artificial intelligence software to detect
suspicious calling patterns , such as sudden
increase in the length of calls or a sudden
increase in number of international calls.
Software also determines whether it is physically
possible for subscriber to make a call from
current location and the time of previous call
Mobile cloning is in initial stages in India so
preventive steps should be taken by the network
provider.
Though the mobile cloning has some uses in
fields like army it has many disadvantages
Existing cellular systems have a number of
potential weakness . It is crucial that business
and staff take mobile phone security seriously.