mobile phone cloning full report
Thread Rating:
  • 2 Vote(s) - 3.5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
26-04-2010, 10:35 AM



.doc   Mobile phone cloning.doc (Size: 54.5 KB / Downloads: 1,328)


MOBILE PHONE CLONING

ABSTRACT:
Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication.
Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning.

Presented By:
S AMARENDER SINGH,II YR E.C.E
RAHUL VERMA,II YR E.C.E
GURUNANAK ENGG COLLEGE



INTRODUCTION
WHAT IS CELL PHONE CLONING?
WHEN DID CELL CLONING START?
GSM
CDMA
SECURITY FUNCTIONS OF THE GSM AND CDMA
HOW BIG OF A PROBLEM IS CLONING FRAUD?
HOW IS CELL CLONING DONE?
ARE OUR CELL PHONES SECURED?
CAN DIGITAL PHONES BE CLONED?
HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
CAN CALLS ON CLONED PHONE BE TRACKED?
HOW TO PREVENT CELL CLONING?
WHAT IS CELL PHONE CLONING?

Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.
Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users.
Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.
WHEN DID CELL CLONING START?
The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100 Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result, Cabinet Ministers, company chiefs and celebrities routinely found their most intimate conversations published in the next day's tabloids
Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000.
GSM
Global System for Mobile Communications. A digital cellular phone technology based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM service are Airtel,Hutch etc.
CDMA
Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in GSM.Operators who provides CDMA service in India are Reliance and Tata Indicom.
IS FIXED TELEPHONE NETWORK SAFER THAN MOBILE PHONE?
The answer is yes. In spite of this, the security functions which prevent eavesdropping and Unauthorized uses are emphasized by the mobile phone companies. The existing mobile communication networks are not safer than the fixed Telephone networks. They only offer protection against the new forms of abuse
SECURITY FUNCTIONS OF THE GSM AND CDMA
As background to a better understanding of the attacks on the GSM and CDMA network The following gives a brief introduction to the Security functions available in GSM. The following functions exist: ¢ Access control by means of a personal smart card (called subscriber Identity module, SIM) and PIN (personal identification number), ¢ Authentication of the users towards the network carrier and generation of A session key in order to prevent abuse. ¢ Encryption of communication on the radio interface, i.e. between mobile Station and base station, ¢ concealing the users™ identity on the radio interface, i.e. a temporary valid Identity code (TMSI) is used for the identification of a mobile user instead Of the IMSI.
HOW BIG OF A PROBLEM IS CLONING FRAUD?
The Cellular Telecommunications Industry Association (CTIA) estimates that financial losses in due to cloning fraud are between $600 million and $900 million in the United States. Some subscribers of Reliance had to suffer because their phone was cloned. Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government.
HOW IS CELL CLONING DONE?
Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). When you had successfully changed the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:
Sniffing the cellular
Trashing cellular companies or cellular resellers
Hacking cellular companies or cellular resellers
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone able phones are more difficult to find and newer phones have not been successfully reverse-engineered.
Cloning has been successfully demonstrated under GSM, but the process is not easy and it currently remains in the realm of serious hobbyists and researchers.
ARE OUR CELL PHONES SECURED?
Too many users treat their mobile phones as gadgets rather than as business assets covered by corporate security policy. Did you realize there's a lucrative black market in stolen and "cloned" Sim cards? This is possible because Sims are not network specific and, though tamper-proof, their security is flawed. In fact, a Sim can be cloned many times and the resulting cards used in numerous phones, each feeding illegally off the same bill.
But there are locking mechanisms on the cellular phones that require a PIN to access the phone. This would dissuade some attackers, foil others, but might not work against a well financed and equipped attacker. An 8-digit PIN requires approximately 50,000,000 guesses, but there may be ways for sophisticated attackers to bypass it.
With the shift to GSM digital - which now covers almost the entire UK mobile sector - the phone companies assure us that the bad old days are over. Mobile phones, they say, are secure and privacy friendly.
This is not entirely true. While the amateur scanner menace has been largely exterminated, there is now more potential than ever before for privacy invasion.
The alleged security of GSM relies on the myth that encryption - the mathematical scrambling of our conversations - makes it impossible for anyone to intercept and understand our words. And while this claim looks good on paper, it does not stand up to scrutiny.
The reality is that the encryption has deliberately been made insecure. Many encrypted calls can therefore be intercepted and decrypted with a laptop computer.
WHAT ARE EMIE AND PIN?
ESN mean Electronic Serial Number. This number is loaded when the phone number is manufactured. this number cannot be tampered or changes by the user or subscriber. if this number is known a mobile can be cloned easily.
Personal Identification Number (PIN).every subscriber provides a Personal Identification Number (PIN) to its user. This is a unique number. If PIN and ESN are know a mobile phone can be cloned in seconds using some softwareâ„¢s like Patagonia. Which is used to clone CDMA phones.
WHAT IS PATAGONIA?
Patagonia is software available in the market which is used to clone CDMA phone. Using this software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other Softwareâ„¢s available in the market to clone GSM phone. This softwareâ„¢s are easily available in the market. A SIM can be cloned again and again and they can be used at different places. Messages and calls sent by cloned phones can be tracked. However, if the accused manages to also clone the IMEI number of the handset, for which softwareâ„¢s are available, there is no way he can be traced.
CAN DIGITAL PHONES BE CLONED?
Yes. Digital phones can be cloned however; the mobile phones employing digital TDMA and CDMA technology are equipped with a feature known as "Authentication." Some newer model analog phones also have this feature. Authentication allows the mobile service provider network to determine the legitimacy of a mobile phone. Phones determined to be "clones" can be instantly denied access to service before any calls are made or received.
HOW TO KNOW THAT THE CELL HAS BEEN CLONED?
Frequent wrong number phone calls to your phone, or hang-ups.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills
CAN CALLS ON CLONED PHONE BE TRACKED?
Yes. A SIM can be cloned again and again and they can be used at different places. Messages and calls can track sent by cloned phones. However, if the accused manages to also clone the IMEI number of the handset, for which softwareâ„¢s are available, there is no way the cell can be traced.
HOW TO PREVENT CELL CLONING?
Uniquely identifies a mobile unit within a wireless carrier's network. The MIN often can be dialed from other wireless or wire line networks. The number differs from the electronic serial number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can be checked electronically to help prevent fraud.
.Mobiles should never be trusted for communicating/storing confidential information.
Always set a Pin that's required before the phone can be used.
Check that all mobile devices are covered by a corporate security policy.
Ensure one person is responsible for keeping tabs on who has what equipment and that they update the central register. How do service providers handle reports of cloned phones?
Legitimate subscribers who have their phones cloned will receive bills with charges for calls they didn't make. Sometimes these charges amount to several thousands of dollars in addition to the legitimate charges.
Typically, the service provider will assume the cost of those additional fraudulent calls. However, to keep the cloned phone from continuing to receive service, the service provider will terminate the legitimate phone subscription. The subscriber is then required to activate a new subscription with a different phone number requiring reprogramming of the phone, along with the additional headaches that go along with phone number changes.
WHAT EXACTLY IS AUTHENTICATION?
Authentication is a mathematical process by which identical calculations are performed in both the network and the mobile phone. These calculations use secret information (known as a "key") preprogrammed into both the mobile phone and the network before service is activated. Cloners typically have no access to this secret information (i.e., the key), and therefore cannot obtain the same results to the calculations.
A legitimate mobile phone will produce the same calculated result as the network. The mobile phone's result is sent to the network and compared with the network's results. If they match, the phone is not a "clone."
ARE THESE METHODS EFFECTIVE?
Yes, for the most part. However, Authentication is the most robust and reliable method for preventing cloning fraud and it is the only industry "standard" method for eliminating cloning. The fact that it is standardized means that all mobile telecommunications networks using IS-41 can support Authentication. There is no need to add proprietary equipment, software, or communications protocols to the networks to prevent cloning fraud.
IS MY PHONE AUTHENTICATION CAPABLE?
If the phone supports TDMA or CDMA digital radio, then yes. Otherwise, it depends on how old the phone is and the make and model. Almost all phones manufactured since the beginning of 1996 support the Authentication function. The best bet is to check with your service
ROLE OF SERVICE PROVIDER TO COMBAT CLONING FRAUD?
They are using many methods such as RF Fingerprinting, subscriber behavior profiling, and Authentication. RF Fingerprinting is a method to uniquely identify mobile phones based on certain unique radio frequency transmission characteristics that are essentially "fingerprints" of the radio being used. Subscriber behavior profiling is used to predict possible fraudulent use of mobile service based on the types of calls previously made by the subscriber.
Calls that are not typical of the subscriber's past usage are flagged as potentially fraudulent and appropriate actions can be taken.
Authentication has advantages over these technologies in that it is the only industry standardized procedure that is transparent to the user, a technology that can effectively combat roamer fraud, and is a prevention system as opposed to a detection system.
WHAT IS IS-41?
IS-41(Interim Standard No. 41) is a document prescribing standards for communications between mobile networks. The standard was developed by the Telecommunications Industry Association (TIA) and is used primarily throughout North America as well as many Latin American countries and Asia.
The IS-41 network communications standard supports AMPS, NAMPS, TDMA, and CDMA radio technologies. IS-41 is the standard that defines the methods for automatic roaming, handoff between systems, and for performing Authentication.
WHAT CAN BE DONE?
With technically sophisticated thieves, customers are relatively helpless against cellular phone fraud. Usually they became aware of the fraud only once receiving their phone bill.
Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis: Encryption is regarded as the most effective way to prevent cellular fraud as it prevents eavesdropping on cellular calls and makes it nearly impossible for thieves to steal Electronic Serial Number (ESN) and Personal Identification Number (PIN) pairs. Blocking is used by service providers to protect themselves from high risk callers. For example, international calls can be made only with prior approval. In some countries only users with major credit cards and good credit ratings are allowed to make long distance calls.
Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register (EIR) enables network operators to disable stolen cellular phones on networks around the world.
User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.
Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.
The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call. Currently, South Africa™s two service providers, MTN and Vodacom, use traffic analysis with the International Mobile Equipment Identity (IMEI) ” a 15 digit number which acts as a unique identifier and is usually printed on the back of the phone underneath the battery ” to trace stolen phones.
Other warning signs that subscribers should watch out for to detect fraudulent activity include:
Frequent wrong number phone calls to your phone, or hang-ups.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming calls constantly receiving busy signals or wrong numbers.
Unusual calls appearing on your phone bills.
CONCLUSION
Presently the cellular phone industry relies on common law (fraud and theft) and in-house counter measures to address cellular phone fraud. Mobile Cloning
Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime.
REFERENCES
Wireless A-Z
Nathan J.Muller.
Fundamentals of Mobile and Pervasive Computing
Frank Adelstein, Sandeep Gupta.
Wireless and Cellular Communication 3rd Edition
William C.Y.Lee.
Introduction to Telecom Communication Converging Technologies 1st Edition
Kimberly Massey.
3G Networks 1st Edition
Clint Smith, Saniel Collins



Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#2
29-09-2010, 04:23 PM


.doc   Mobile Cloning.doc (Size: 42.5 KB / Downloads: 427)
Mobile Cloning


ABSTRACT

Are your mobile phone bills unexpectedly high? There’s a chance you are the victim of ‘‘mobile cloning’’. It is also known as cell phone piracy and has been taking place throughout the world since decades. Recently this crime has come to India.
Mobile phones have become a major part of our everyday life. On the one hand, India’s mobile phone market has grown rapidly in the last few years on the back of falling phone tariffs and handset prices, making it one of the fastest growing markets globally. On the other the number of mobile phone subscribers is exceeding that of fixed-line users. The mobile phone subscriber base has already crossed the 50-mn mark.
Today millions of mobile phones users, be it Global System for Mobile communication (GSM) or Code Division Multiple Access (CDMA), run the risk of having their phones cloned. And the worst part is that there isn’t much that you can do to prevent this.
Such crime first came to light in January 2005 when the Delhi police arrested a person with 20 cell phones, a laptop, a SIM scanner, and a writer. The accused was running an exchange illegally wherein he cloned CDMA-based mobile phones. He used software for the cloning and provided cheap international calls to Indian immigrants in West Asia. A similar racket came to light in Mumbai resulting in the arrest of four mobile dealers
Reply
NIKHIL.PATIL
Active In SP
**

Posts: 1
Joined: Jan 2011
#3
07-01-2011, 05:07 PM

I WANT FULL REPORT ON TOPIC MOBILE CLONING WITH PPT'S
Reply
priyabart
Active In SP
**

Posts: 1
Joined: Jan 2011
#4
23-01-2011, 10:33 PM

please can send me full seminar and presentation report of moile cloning with ppt i will be very thank ful to you
Reply
summer project pal
Active In SP
**

Posts: 308
Joined: Jan 2011
#5
01-02-2011, 05:28 PM

A SEMINAR ON MOBILE CLONING:

Introduction:
_TEchnical revolution
-two faces of technology
-the risk factor

What is mobile cloning:
It essentially involves the copying the identity of one mobile phone to another mobile phone. The frauds use it for making fraudulent telephone calls.

How it is done
The EPROM in the mobile phone is replaced with a chip which allows the modification of the ESN via the software.
The the MIN is also changed. When the ESN/MIN pair has been successfuly changed, the new mobile phone becomes the clone of the other.

ESN/MIN pair
The ESN is the serial number of the mobile phone and the MIN is the telephone number of the phone. The cellphone reader or the digital data interpreter can be used to capture the ESN/MIN of the phone.

Fraud examples
-TEchnical method
-Criminal users
-roaming fraud.

Download the ppt here:
authorstreamPresentation/sorabh2312-354796-mobile-cloning-1-communication-science-technology-ppt-powerpoint/
and the report is available here:
scribddoc/24825475/Mobile-cloning
Reply
singhvp90
Active In SP
**

Posts: 1
Joined: Feb 2011
#6
07-02-2011, 02:05 AM

plz send the full report.
Reply
SUMAN434
Active In SP
**

Posts: 2
Joined: Feb 2011
#7
14-02-2011, 10:03 AM

hi ! guys this is suman .if u want any doubt about clonning just contact me

sumankumar.reddy434@gmail.com
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#8
23-02-2011, 02:37 PM

presented by:
S AMARENDER SINGH
RAHUL VERMA,


.doc   Mobile phone cloning.doc (Size: 51 KB / Downloads: 124)
ABSTRACT:
Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication.
Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning.
Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.
Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users.
Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.
WHEN DID CELL CLONING START?
The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100 Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result, Cabinet Ministers, company chiefs and celebrities routinely found their most intimate conversations published in the next day's tabloids
Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000.
GSM
Global System for Mobile Communications. A digital cellular phone technology based on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account information. Any GSM phone becomes immediately programmed after plugging in the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM service are Airtel,Hutch etc.
CDMA
Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in GSM.Operators who provides CDMA service in India are Reliance and Tata Indicom.
IS FIXED TELEPHONE NETWORK SAFER THAN MOBILE PHONE?
The answer is yes. In spite of this, the security functions which prevent eavesdropping and Unauthorized uses are emphasized by the mobile phone companies. The existing mobile communication networks are not safer than the fixed Telephone networks. They only offer protection against the new forms of abuse
SECURITY FUNCTIONS OF THE GSM AND CDMA
As background to a better understanding of the attacks on the GSM and CDMA network The following gives a brief introduction to the Security functions available in GSM. The following functions exist: • Access control by means of a personal smart card (called subscriber Identity module, SIM) and PIN (personal identification number), • Authentication of the users towards the network carrier and generation of A session key in order to prevent abuse. • Encryption of communication on the radio interface, i.e. between mobile Station and base station, • concealing the users’ identity on the radio interface, i.e. a temporary valid Identity code (TMSI) is used for the identification of a mobile user instead Of the IMSI.
HOW BIG OF A PROBLEM IS CLONING FRAUD?
The Cellular Telecommunications Industry Association (CTIA) estimates that financial losses in due to cloning fraud are between $600 million and $900 million in the United States. Some subscribers of Reliance had to suffer because their phone was cloned. Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government.
HOW IS CELL CLONING DONE?
Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). When you had successfully changed the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:
Sniffing the cellular
Trashing cellular companies or cellular resellers
Hacking cellular companies or cellular resellers
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone able phones are more difficult to find and newer phones have not been successfully reverse-engineered.
Cloning has been successfully demonstrated under GSM, but the process is not easy and it currently remains in the realm of serious hobbyists and researchers.
ARE OUR CELL PHONES SECURED?
Too many users treat their mobile phones as gadgets rather than as business assets covered by corporate security policy. Did you realize there's a lucrative black market in stolen and "cloned" Sim cards? This is possible because Sims are not network specific and, though tamper-proof, their security is flawed. In fact, a Sim can be cloned many times and the resulting cards used in numerous phones, each feeding illegally off the same bill.
But there are locking mechanisms on the cellular phones that require a PIN to access the phone. This would dissuade some attackers, foil others, but might not work against a well financed and equipped attacker. An 8-digit PIN requires approximately 50,000,000 guesses, but there may be ways for sophisticated attackers to bypass it.
Reply
avinashenugala
Active In SP
**

Posts: 1
Joined: Mar 2011
#9
21-03-2011, 11:29 PM

please send me doccumentation of this atleast 20 pages
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#10
22-03-2011, 02:49 PM

presented by:
Aneesha


.docx   cloning-report.docx (Size: 65.54 KB / Downloads: 114)
ABSTRACT
You might have read news of the cloning of sheep or cattle with amused interest. But how would you feel if somebody `cloned' your mobile phone? Technology is finally rearing up its dark side. Along with the proliferation of technological innovations, this era also marks the birth of the new-age IT criminals in a big way, with the latest technology fraud being cell phone cloning.
Cell phone cloning is a technique wherein security data from one cell phone is transferred into another phone. The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from both phones, only the original is billed. Though communication channels are equipped with security algorithms, yet cloners get away with the help of loop holes in systems. So when one gets huge bills, the chances are that the phone is being cloned.
This paper describes about the cell phone cloning with implementation in GSM and CDMA technology phones. It gives an insight into the security mechanism in CDMA and GSM phones along with the loop holes in the systems and discusses on the different ways of preventing this cloning. Moreover, the future threat of this fraud is being elaborated
1. INTRODUCTION.
Remember Dolly the lamb, cloned from a six-year-old ewe in 1997, by a group of researchers at the Roslyn Institute in Scotland? While the debate on the ethics of cloning continues, human race, for the first time, are faced with a more tangible and harmful version of cloning and this time it is your cell phone that is the target.
Millions of cell phones users, be it GSM or CDMA, run at risk of having their phones cloned. As a cell phone user if you have been receiving exorbitantly high bills for calls that were never placed, chances are that your cell phone could be cloned. Unfortunately, there is no way the subscriber can detect cloning. Events like call dropping or anomalies in monthly bills can act as tickers.
According to media reports, recently the Delhi (India) police arrested a person with 20 cell- phones, a laptop, a SIM scanner, and a writer. The accused was running an exchange illegally wherein he cloned CDMA based cell phones. He used software named Patagonia for the cloning and provided cheap international calls to Indian immigrants in West Asia.
2. WHAT ARE GSM AND CDMA MOBILE PHONE SETS?
CDMA is one of the newer digital technologies used in Canada, the US, Australia, and some South-eastern Asian countries (e.g. Hong Kong and South Korea). CDMA differs from GSM and TDMA (Time Division Multiple Access) by its use of spread spectrum techniques for transmitting voice or data over the air. Rather than dividing the radio frequency spectrum into separate user channels by frequency slices or time slots, spread spectrum technology separates users by assigning them digital codes within the same broad spectrum. Advantages of CDMA include higher user capacity and immunity from interference by other signals.
GSM is a digital mobile telephone system that is widely used in Europe and other parts of the world. GSM uses a variation of TDMA and is the most widely used of the three digital wireless telephone technologies. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1,800 MHz frequency band.
Some other important terms whose knowledge is necessary are
 IMEI
 SIM
 ESN
 MIN
So, first things first, the IMEI is an abbreviation for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones.
Second comes SIM, which stands for Subscriber Identification Module. The sim has survived and evolved. Earlier the mobiles had the entire sim card to be inserted in them such sim’s are called IDG-1 Sims. The other in which we small part of the card which has the chip is inserted in the mobile and is known as PLUG-IN Sims.
Basically the SIM provides storage of subscriber related information of three types:
 Fixed data stored before the subscription is sold
 Temporary network data
 Service related data.
ESN mean Electronic Serial Number. This number is loaded when the phone number is manufactured. This number cannot be tampered or changes by the user or subscriber. if this number is known a mobile can be cloned easily.
Personal Identification Number (PIN). Every subscriber provides a Personal Identification Number (PIN) to its user. This is a unique number. If PIN and ESN are known a mobile phone can be cloned in seconds using some software’s like Patagonia, which is used to clone CDMA phones. ESN is same as the IMEI but is used in CDMA handsets. MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
The basic difference between a CDMA handset and a GSM handset is that a CDMA handset has no sim i.e. the CDMA handset uses MIN as its Sim, which cannot be replaced as in GSM. The MIN chip is embedded in the CDMA hand set.
3. HOW CELL PHONE WORKS?
Cell phones send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular phone makes a call, it normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN), its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short buzz you hear after you press the SEND button and before the tower catches the data. These four things are the components the cellular provider uses to ensure that the phone is programmed to be billed and that it also has the identity of both the customer and the phone. MIN and ESN is collectively known as the ‘Pair’ which is used for the cell phone identification.
When the cell site receives the pair signal, it determines if the requester is a legitimate registered user by comparing the requestor's pair to a cellular subscriber list. Once the cellular telephone's pair has been recognized, the cell site emits a control signal to permit the subscriber to place calls at will. This process, known as Anonymous Registration, is carried out each time the telephone is turned on or picked up by a new cell site.
4. SECURITY VULNERABILITIES IN CELL PHONE.
Your cellular telephone has three major security vulnerabilities:
• Monitoring of your conversations while using the phone.
• Your phone being turned into a microphone to monitor conversations in the vicinity of your phone while the phone is inactive.
• Cloning or the use of your phone number by others to make calls that are charged to your account.

Reply
rekhapr
Active In SP
**

Posts: 1
Joined: Apr 2011
#11
14-04-2011, 09:10 AM

please send me the report for mobile cloning
Reply
seminar project
Active In SP
**

Posts: 1,080
Joined: Apr 2011
#12
21-04-2011, 04:37 PM

hi
you can refer these pages to get the details on mobile phone cloning


topicideashow-to-mobile-phone-cloning-full-report

topicideashow-to-mobile-phone-cloning-full-report?page=2
Reply
gpushpalatha
Active In SP
**

Posts: 3
Joined: Apr 2011
#13
21-04-2011, 08:59 PM

plz provide me mobile phone cloning ppt.....id-pushpa_89@yahoo.co.in
Reply
balaraju15
Active In SP
**

Posts: 1
Joined: Feb 2012
#14
04-02-2012, 09:19 PM

Please upload full project and implimentation with coding....
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#15
06-02-2012, 12:43 PM

to get information about the topic mobile phone cloning full report ,ppt and related topic refer the link bellow
topicideashow-to-mobile-phone-cloning-full-report

topicideashow-to-mobile-phone-cloning-full-report?page=3

topicideashow-to-mobile-phone-cloning--29413?pid=63981

topicideashow-to-mobile-phone-cloning-full-report?page=4

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 64 33,863 12-04-2016, 03:24 PM
Last Post: mkaasees
  Report on Mobile TV study tips 1 451 11-04-2016, 10:14 AM
Last Post: mkaasees
  MOBILE TV PPT project girl 1 1,119 11-04-2016, 10:14 AM
Last Post: mkaasees
  AN OVERVIEW OF SMART ANTENNA TECHNOLOGY FOR MOBILE COMMUNICATIONS SYSTEMS seminar addict 3 1,536 07-04-2016, 11:24 AM
Last Post: mkaasees
  MOBILE TRAIN RADIO COMMUNICATION REPORT study tips 1 597 06-04-2016, 03:47 PM
Last Post: mkaasees
  6g mobile technology pdf jaseelati 0 345 22-01-2015, 02:00 PM
Last Post: jaseelati
  witricity full report project report tiger 28 38,165 30-08-2014, 02:26 AM
Last Post: radiopodarok.ru
  ACCIDENT PREVENTION USING WIRELESS COMMUNICATION full report computer science topics 5 7,599 17-04-2014, 11:07 AM
Last Post: seminar project topic
  silicon on plastic full report computer science technology 2 2,949 13-04-2014, 10:34 PM
Last Post: 101101
  TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS seminar flower 4 2,320 24-03-2014, 04:35 PM
Last Post: seminar project topic