Mob Phn Cloning

36
7/27/2019 Mob Phn Cloning http://slidepdf.com/reader/full/mob-phn-cloning 1/36 Abstract Introduction What is mobile phone Cloning? How it works? Security Vulnerabilities CDMA GSM Identifying ESN in phone Contents : 1

Transcript of Mob Phn Cloning

Page 1: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 1/36

AbstractIntroduction

What is mobile phone Cloning?How it works?Security VulnerabilitiesCDMAGSMIdentifying ESN in phone

Contents :

1

Page 2: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 2/36

How is a phone cloning?How cloning takes place?Detection of phone cloningSymptom’s ESN ReplacementMeasures to be takenHow can Organization help?Victims of phone Cloning

AdvantageDisadvantageConclusion

2

Page 3: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 3/36

It is a technique where security data from onecell phone is transferred into another phoneThe other phone becomes the exact replica ofthe original phone like a cloneCalls can be made from both phones,only theoriginal is billed

Communication channels are equipped withsecurity algorithm

Abstract:

3

Page 4: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 4/36

Introduction:

4

In 1997,a 6-yr old Dollyresearch at the RoslinInstitute in Scotland

Recently the Delhi policearrested a person with 20cell phones,laptop andSIM scanner

They used softwarenamed Patagonia andthey have cheapinternational calls

Page 5: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 5/36

What is mobile phone cloning

Copying the subscriber information from onephone into the other for obtaining free callsPurpose for makingFraudulent telephone calls

The bills for the calls go tolegitimate subscriber Cloning occurs mostfrequently in areas of highcell phone usage 5

Page 6: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 6/36

How it worksIt sends radio frequencytransmission through theair on two distinct channel:

Voice communicationControl signals

It makes a call,theynormally transmittESN,MIN,SCM and number called in a short burst ofdataReconigzed the cell sitewhich emits a controlsignal

6

Page 7: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 7/36

7

Page 8: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 8/36

What is ESN? The ESN (Electronic Serial Number) is the serial number of your

cellular phone. The ESN is transmitted to the cell site and used inconjunction with the NAM to verify the legitimate user of the

cellular system

What is MIN?The MIN(Mobile Identification Number) is simply the phonenumber of the cellular telephone

AMPSAMPS(Advanced Mobile Phone Service) was the first cellular

phone system in United states. AMPS operate as an analogsystem using 30 khz wide channels

8

Page 9: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 9/36

Security vulnerabilitiesYour cellular phone has 3majors are

a. Monitoring of your conservation while

using the phoneb. Your phone beingturned into amicrophone tomonitor conservation

c. Use of your phonenumber by other tomake calls that arecharged to your account

9

Page 10: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 10/36

Important terms:

10

Page 11: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 11/36

11

Page 12: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 12/36

How is a phone cloned ?Capture the ESN/MIN or SIM/IMEI pair It use a electronic scanningdeviceCloner reprograms or alters themicrochip of any wireless phoneIt is connected to handset

New information is entered intothe phone

12

Page 13: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 13/36

DIAGRMATIC REPRESENTATION OF

ACTUAL PROCESS

13

Page 14: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 14/36

CDMAIt uses spread-spectrumtechniques to store bands withmultiple conversationSubscriber information is alsoencrypted and transmitteddigitallyHandsets are particularlyvulnerable to cloningGet a pairs by simply makingdevice mobile and sitting in abusy traffic area

14

Page 15: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 15/36

15

Page 16: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 16/36

Identifying ESN in phone

16

Depending on what modelphone you have the ESNwill be located on a PROM

code on the PROM beobtained by unsolderingthe cellular phoneIt has 16 to 28 leads coming

from itIt is a bipolar EPROMThe majority of phones willaccept the NationalSemiconductor 32*8 PROM

Page 17: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 17/36

17

Page 18: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 18/36

18

Page 19: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 19/36

Page 20: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 20/36

20

Page 21: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 21/36

ESN ReplacementCellular service companyoffers PERSONALIDENTIFICATION NUMBER

and are effective for cloningThe Central ForensicLaboratory at Hyderabadhas developed software todetect cloned

Page 22: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 22/36

Uses of cell phone in daily life

22

Page 23: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 23/36

Page 24: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 24/36

24

Page 25: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 25/36

Mobile Communication

• Mobile Communication

25

Page 26: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 26/36

Page 27: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 27/36

Mobiles should never be trusted for communicationSet a screen that’s required before the screenCheck a device to all mobile which arecovered by Corporate Security PolicyOne person is responsible for keeping theupdate of central register

27

How can organized

Page 28: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 28/36

Future Threats

28

Difficult process for thevictim is ResolvingSubscriber Fraud

It take long time to discover and prove for debtsTo abuse the

telecommunication systemTo check out the weaknessand vulnerability of existingtelecom system

Page 29: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 29/36

Victim of mobile is developed Anita DavisCell phone was bill showed from one month $3151worth of calls at Pakistan, Israel, Jordan , Africa and

other countriesA Luisville women was shocked when she got her billfrom T-mobile

10 times higher than it’s even before Equally troubling they didn’t recognize most of thephone numbers on it

29

Victims of Phone Cloning

Page 30: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 30/36

Can digital phone can be cloned

30

Yes, digital phones can beclonedThe mobile phones employingdigital TDMA & CDMAtechnologyNewer model analog phonesalso haveAuthentication allows themobile server provider networkto determine the legitmacy

Page 31: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 31/36

Technology used to tacklethe Mence

31

Duplication detectionVelocity trap

User/Usage profilingCall CountingVoice Sampling

PIN Codes

Page 32: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 32/36

Application:

• Built in camera which is useto capture your favoritememories

Uploading photos to thecomputer allows to edit orsimply share with family andfriends

• It is compatible withWindows operating system

• Transfer the images to

computer using a USB cable 32

Page 33: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 33/36

Page 34: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 34/36

It can be used by the terrorits for criminalactivities

It can be used by the cloner for a fraud callsIt can be used for illegal money transfer Cloned organism always has a problem thatscientists can figure out

34

DISADVANTAGE

Page 35: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 35/36

Phone cloning is in intial stage in INDIA.Preventive steps should be taken by the

network provider and the Government. Theenactment of legislation to prosecute crimesrelated to cellular phones is not viewed as apriority.

The cloning of CDMA mobile phones waspossible because there was no protection to theidentifiction information

35

CONCLUSION

Page 36: Mob Phn Cloning

7/27/2019 Mob Phn Cloning

http://slidepdf.com/reader/full/mob-phn-cloning 36/36

36