Академический Документы
Профессиональный Документы
Культура Документы
INDEX
INTRODUCTION. HOW IS A PHONE CLONED? METHODS TO DETECT CLONED PHONES SYMPTOMS OF PHONE CLONING. MEASURES TO BE TAKEN. ADVANTAGES AND DISADVANTAGES. VICTIMS OF PHONE CLONING. CONCLUSION.
REFERENCES
INTRODUCTION
CLONING: Cloning is the creation of an organism that is an exact genetic copy of another. PHONE CLONING: Phone cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.
Global
System
for
Mobile
Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks.
IMPORTANT TERMS
IMEI stands for International Mobile Equipment Identifier, this is a 15 digit universally unique number of the GSM handset.
SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information of three types:
1. Fixed data stored before the subscription is sold. 2. Temporary network data 3. Service related data.
ESN, stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets.
It is loaded when the phone is manufactured.
MIN ,stands for Mobile Identification Number, Its a 10 digit number used to identify a mobile phone.
devices. The cloner reprograms or alters the microchip of any wireless phone. The ESN/MINs are transferred using a computer to a device. These devices are connected to handsets. New information is entered into the phone. Thus a clone of the legitimate phone is thus obtained.
http://homesecurityandpersonalprotection.blogspot.in
CLONING
DEVICE
http://blog.dhs.gov/2012/02/secret-serviceinvestigates.html
be used to get pairs. Stolen ESN and MIN were then fed into a new CDMA handset.
DETECTION (Continued..)
RF (Radio Frequency) - Nominally identical radio equipment has a distinguishing ``fingerprint'', so the network software stores and compares fingerprints for all the phones that it sees.
Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are noticed, the customer is contacted.
DETECTION (Continued..)
Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual.
DETECTION(Continued..)
The best detection method available in CDMA is the
A KEY FEATURE.
Secret 20 digit number.
Number loaded in Authentication Centre. Cannot be copied.
hang-ups.
Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
CLONING STATISTICS
Victims percentage
Age
MEASURES TO BE TAKEN
Service providers have adopted certain measures to prevent cellular fraud. These include: Blacklisting of stolen phones is another mechanism to prevent unauthorized use. User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud
Encryption: Encryption is regarded as the effective way to prevent cellular fraud Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of
international calls.
Blocking: Blocking is used by service providers
ADVANTAGES
If your phone has been lost , you can use your cloned cell phone. 2. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.
1.
DISADVANTAGES
It can be used by the terrorists for criminal activities.
It can be used by the cloner for fraud calls. It can be used for illegal money transfer.
cell phone bill showed $3,151 worth of calls in one month, to Pakistan, Israel, Jordan, Africa, and other countries.
A Louisville woman was shocked when she got her February cell phone bill from T-Mobile. It was ten times higher than it's ever been before. Equally troubling, she didn't recognize most of the phone numbers on it.
CONCLUSION
Phone Cloning is in initial stages in India. Preventive steps should be taken by the network provider and the Government. The enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. The cloning of CDMA mobile
phones was possible because there was no protection to the identification information.
REFERENCES
http://www.cdmasoftware.com/eng.html
http://infotech.indiatimes.com http://www.hackinthebox.org/ Sankaranarayanan ,Mobile phone cloning, Wireless
And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.
THANK YOU...
ANY QUESTIONS?