SlideShare a Scribd company logo
APPROACHES TO PREVENT CELL PHONE
CLONING IN CDMA
ENVIRONMENT
ANISHA JOHNY
S7 CS A
RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD
12/13/2015
1
Introduction
 The rapid growth of mobile communication has changed the vision of cellular phones
security.
 An easy accessibility condition causes cellular phones to be vulnerable against
numerous and potentially devastating threats from hackers.
 In this seminar I presents an overview of cellular phones security based upon CDMA
technology specially on cell phone cloning.
12/13/2015 2
CDMA ???
12/13/2015 3
CDMA Technology
 CDMA- Code Division Multiple Access :uses spread spectrum technique.
 Enables many wireless devices to transmit at the same time and on the same frequency.
 2G and 3G mobile telecommunications standard.
 Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata
Indicom
 Utilized to send and receive voice transmission, data transmission and various other
types signalling managements.
 Working: unique precise identity
12/13/2015 4
Advantages of CDMA Technology
 Phone call clarity is better.
 Call rates are low as in comparison with existing GSM technology.
 Well matched with other cellular technologies
 Helpful in national and international roaming.
 Prevents interference and destruction of service caused due to multipath
 Engages in Soft hand-off 12/13/2015 5
Disadvantages of CDMA Technology
 Security flaws:
 Cell phone tracking and interception is easier.
 A cell phone can be turned on without the knowledge of customer.
 A cell phone can be cloned by anybody so that one pretend himself
to be genuine.
 Phones cannot be swapped
12/13/2015 6
Cell phone working
 When a call is done through cell phone four important components
are transmitted:
 Radio frequencies with the help of two separate channels one for
voice and another for control signalling information.
 Electronic Serial Number (ESN)
 Mobile Identification Number(MIN)
 Station Class mark(SCM)
12/13/2015 7
Cell phone working(Cont..)
 After receiving this ESN and MIN, cell service provider verifies them
with their genuine subscriber list.
 If this pair is genuine then a control signal is generated and permits the
customer to make the call.
 The successfully registering this way is known as Anonymous
Registration.
12/13/2015 8
Cell Phone Cloning ???
12/13/2015 9
Cell Phone Cloning
 Cell phone cloning is copying the identity of one mobile phone to another mobile
phone.
 Process of taking the programmed information that is stored in a legitimate mobile
phone and illegally programming the identical information into another mobile
phone.
 Thus, "cloned" phone can make and receive anonymous calls and the charges for
those calls are billed to the legitimate subscriber.
 The service provider network does not have a way to differentiate between the
legitimate phone and the "cloned" phone.
12/13/2015 10
Cloning methodology
 Alteration of EPROM that help to configure ESN/MIN via software
 By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers
during anonymous registration. These are used to make calls by cloner even while the
actual user makes a call.
 Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM
characteristics is cloned during a call
 Station Class Mark(SCM)
 System IDentification for Home System(SIDH): Part of NAM module that can be
changed to decide where the billing has to be forwarded.12/13/2015 11
Preventive Measures
 Operator knows if there is same ESN/MIN combinations are traced from
different places. If so happens operator should switch off all phones having
same pairs.
 Frequent checking of monthly bills
 Distance is another important factor to identify threats.
 Radio Frequency Fingerprinting(RFF)
 Cellular Authentication and Voice Encryption(CAVE) security protocols
12/13/2015 12
Preventive Measures(Cont..)
 Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls
by hackers using a scanner , which registers the frequency in which mobile phones operate
in its immediate surroundings.
 User authentication using Personal Identification Number(PIN): secret numeric password
between user and MSC.
 Pattern recognition techniques: used to classify the cell phone according to their usage logs.
Such logs contain the relevant characteristics for every call made by the user. From this, it
is easier to identify if a call does not correspond to the patterns of a specific user .
 Pattern Recognition techniques are used by the Mat Lab tool employment.
12/13/2015
13
Preventive Measures(Cont..)
 Advices for subscribers as a sign of caution includes:
 Difficulty in placing outgoing calls
 Difficulty in retrieving voice mail messages
 Incoming calls constantly receiving busy signals or wrong numbers
 Frequent wrong number phone calls
 Unusual calls appearing on phone bills
12/13/2015 14
Conclusion
 Existing cellular systems have a number of potential weaknesses that need to be
considered.
 Awareness and a few sensible precautions will stop these criminal activities to an
extent.
 Keep in mind that technique which is safe today can be the most unsecured one
in future
 So it’s important to check function of a security system once a year and update it
or replace it
12/13/2015 15
References
 International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012
 International Journal of advances in computing & communications, Volume 1, 2013
 Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital
DeviceForensicsJournal, 3(1). Available from
http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.
 Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17,
2003
 Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L.
Milstein, IEEE Communication Magazine, Jan. 1995.
12/13/2015 16
Thank You!!!
12/13/2015 17
Questions???
12/13/2015 18

More Related Content

PPTX
Mobile cloning modified with images and bettermented
DOCX
Clonning
PPTX
Mobile Cloning Technology
PPTX
Mobile phone-cloning
DOCX
Mobile Cloning Technology Report
DOCX
Mobile cloning paper
PPTX
Mobile cloning
PPTX
Mobile cloning
Mobile cloning modified with images and bettermented
Clonning
Mobile Cloning Technology
Mobile phone-cloning
Mobile Cloning Technology Report
Mobile cloning paper
Mobile cloning
Mobile cloning

What's hot (20)

PDF
52 mobile phone cloning
PPTX
Mobile Phone Cloning
PPTX
Cell phone cloning
PPTX
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
PPT
Phone cloning
PPTX
Mobile Phone and SIM card cloning
PPT
Mobile cloning
PPTX
Mobile phone cloning
PPT
Mobile Cloning
PPTX
Mobile Cloning
PPTX
Mobile phone cloning
PPTX
Cloning. (4)
PPTX
Cse mobile phone cloning ppt
PPT
52 mobile phone cloning
PDF
Mobile cloning
PDF
Mobile phone technology
PPTX
Mobile Phone Cloning
PPT
Cell phone cloning
PPTX
Mobile Phone Cloning By: Ritik Nagar
DOC
Mobile cloning report
52 mobile phone cloning
Mobile Phone Cloning
Cell phone cloning
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
Phone cloning
Mobile Phone and SIM card cloning
Mobile cloning
Mobile phone cloning
Mobile Cloning
Mobile Cloning
Mobile phone cloning
Cloning. (4)
Cse mobile phone cloning ppt
52 mobile phone cloning
Mobile cloning
Mobile phone technology
Mobile Phone Cloning
Cell phone cloning
Mobile Phone Cloning By: Ritik Nagar
Mobile cloning report
Ad

Viewers also liked (18)

PDF
Zoho Mail On Linode
PDF
Deploying to Ubuntu on Linode
PPTX
Mobile Cloning Technology
PPTX
Secure SHell
PPTX
Linux administration
PPTX
3D internet
PDF
SSH - Secure Shell
PPT
3D PASSWORD
PPT
3D Password
PPTX
Communicating in Today's Workplace
PPT
3D Internet
PPT
Basic command ppt
PPT
Linux Administration
ODP
An Introduction to Linux
PPTX
Effective communication in the workplace
PPT
Linux command ppt
PPTX
Linux.ppt
PDF
Architecture Of The Linux Kernel
Zoho Mail On Linode
Deploying to Ubuntu on Linode
Mobile Cloning Technology
Secure SHell
Linux administration
3D internet
SSH - Secure Shell
3D PASSWORD
3D Password
Communicating in Today's Workplace
3D Internet
Basic command ppt
Linux Administration
An Introduction to Linux
Effective communication in the workplace
Linux command ppt
Linux.ppt
Architecture Of The Linux Kernel
Ad

Similar to MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT (10)

PPTX
mobile-phone-cloning-8886-hNyjka1.pptx
PPTX
mobile-phone-cloning-8886-hNyjka1.pptx
PPT
Cell phone cloning
PPTX
Cell phone cloning seminar
PDF
14A81A05B5
PPTX
muthyam seminarppt.pptx12345678900000000
PPTX
mobile jammer ppt.pptx
PPTX
shubhadappt(3273)
PPTX
PDF
2600 v10 n1 (spring 1993)
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
Cell phone cloning
Cell phone cloning seminar
14A81A05B5
muthyam seminarppt.pptx12345678900000000
mobile jammer ppt.pptx
shubhadappt(3273)
2600 v10 n1 (spring 1993)

Recently uploaded (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
additive manufacturing of ss316l using mig welding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Construction Project Organization Group 2.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Welding lecture in detail for understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
additive manufacturing of ss316l using mig welding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Construction Project Organization Group 2.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lecture Notes Electrical Wiring System Components
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Welding lecture in detail for understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
OOP with Java - Java Introduction (Basics)
Operating System & Kernel Study Guide-1 - converted.pdf

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

  • 1. APPROACHES TO PREVENT CELL PHONE CLONING IN CDMA ENVIRONMENT ANISHA JOHNY S7 CS A RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD 12/13/2015 1
  • 2. Introduction  The rapid growth of mobile communication has changed the vision of cellular phones security.  An easy accessibility condition causes cellular phones to be vulnerable against numerous and potentially devastating threats from hackers.  In this seminar I presents an overview of cellular phones security based upon CDMA technology specially on cell phone cloning. 12/13/2015 2
  • 4. CDMA Technology  CDMA- Code Division Multiple Access :uses spread spectrum technique.  Enables many wireless devices to transmit at the same time and on the same frequency.  2G and 3G mobile telecommunications standard.  Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata Indicom  Utilized to send and receive voice transmission, data transmission and various other types signalling managements.  Working: unique precise identity 12/13/2015 4
  • 5. Advantages of CDMA Technology  Phone call clarity is better.  Call rates are low as in comparison with existing GSM technology.  Well matched with other cellular technologies  Helpful in national and international roaming.  Prevents interference and destruction of service caused due to multipath  Engages in Soft hand-off 12/13/2015 5
  • 6. Disadvantages of CDMA Technology  Security flaws:  Cell phone tracking and interception is easier.  A cell phone can be turned on without the knowledge of customer.  A cell phone can be cloned by anybody so that one pretend himself to be genuine.  Phones cannot be swapped 12/13/2015 6
  • 7. Cell phone working  When a call is done through cell phone four important components are transmitted:  Radio frequencies with the help of two separate channels one for voice and another for control signalling information.  Electronic Serial Number (ESN)  Mobile Identification Number(MIN)  Station Class mark(SCM) 12/13/2015 7
  • 8. Cell phone working(Cont..)  After receiving this ESN and MIN, cell service provider verifies them with their genuine subscriber list.  If this pair is genuine then a control signal is generated and permits the customer to make the call.  The successfully registering this way is known as Anonymous Registration. 12/13/2015 8
  • 9. Cell Phone Cloning ??? 12/13/2015 9
  • 10. Cell Phone Cloning  Cell phone cloning is copying the identity of one mobile phone to another mobile phone.  Process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.  Thus, "cloned" phone can make and receive anonymous calls and the charges for those calls are billed to the legitimate subscriber.  The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone. 12/13/2015 10
  • 11. Cloning methodology  Alteration of EPROM that help to configure ESN/MIN via software  By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers during anonymous registration. These are used to make calls by cloner even while the actual user makes a call.  Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM characteristics is cloned during a call  Station Class Mark(SCM)  System IDentification for Home System(SIDH): Part of NAM module that can be changed to decide where the billing has to be forwarded.12/13/2015 11
  • 12. Preventive Measures  Operator knows if there is same ESN/MIN combinations are traced from different places. If so happens operator should switch off all phones having same pairs.  Frequent checking of monthly bills  Distance is another important factor to identify threats.  Radio Frequency Fingerprinting(RFF)  Cellular Authentication and Voice Encryption(CAVE) security protocols 12/13/2015 12
  • 13. Preventive Measures(Cont..)  Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls by hackers using a scanner , which registers the frequency in which mobile phones operate in its immediate surroundings.  User authentication using Personal Identification Number(PIN): secret numeric password between user and MSC.  Pattern recognition techniques: used to classify the cell phone according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. From this, it is easier to identify if a call does not correspond to the patterns of a specific user .  Pattern Recognition techniques are used by the Mat Lab tool employment. 12/13/2015 13
  • 14. Preventive Measures(Cont..)  Advices for subscribers as a sign of caution includes:  Difficulty in placing outgoing calls  Difficulty in retrieving voice mail messages  Incoming calls constantly receiving busy signals or wrong numbers  Frequent wrong number phone calls  Unusual calls appearing on phone bills 12/13/2015 14
  • 15. Conclusion  Existing cellular systems have a number of potential weaknesses that need to be considered.  Awareness and a few sensible precautions will stop these criminal activities to an extent.  Keep in mind that technique which is safe today can be the most unsecured one in future  So it’s important to check function of a security system once a year and update it or replace it 12/13/2015 15
  • 16. References  International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012  International Journal of advances in computing & communications, Volume 1, 2013  Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital DeviceForensicsJournal, 3(1). Available from http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.  Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17, 2003  Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L. Milstein, IEEE Communication Magazine, Jan. 1995. 12/13/2015 16