Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

A TECHNICAL SEMINAR REPORT

On

MOBILE PHONE CLONING


Submitted in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING
By

GUDLA PHANINDRA KUMAR


17Q91A0558

Under the Esteemed Guidance of


Mr./Ms. YOUR PROJECT GUIDE NAME
Assistant Professor
Dept. of Computer Science & Engineering, MRCE

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

MALLA REDDY COLLEGE OF ENGINEERING


(Approved by AICTE- Permanently Affiliated to JNTU Hyderabad)
Accredited by NBA & NAAC, Recognized under section 2(f) &12(B) of
UGC New Delhi: ISO 9001:2015 certified Institution
Maisammaguda, Dhulapally (Post via Kompally), Secunderabad- 500100

2020 - 2021
MALLA REDDY COLLEGE OF ENGINEERING
(MALLA REDDY GROUP OF INSTITUTIONS)
(Approved by AICTE- Permanently Affiliated to JNTU Hyderabad)
Accredited by NBA & NAAC, Recognized under section 2(f) &12(B) of
UGC New Delhi: ISO 9001:2015 certified Institution
Maisammaguda, Dhulapally (Post via Kompally), Secunderabad- 500100

CERTIFICATE
This is to certify that the Technical Seminar title on“MOBILE PHONE CLONING”
is successfully done by MR.GUDLA PHANINDRA KUMAR 17Q91A0558 in partial
fulfillment of the requirement for the award of the degree in Bachelor of Technology in
Computer Science and Engineering submitted to the Jawaharlal Nehru Technology
University Hyderabad during the academic year 2020-2021

INTERNAL GUIDE HOD PRINCIPAL


Mr/Ms. Your Guide name Ms. Ch. VijayaKumari Dr. M.Sreedhar Reddy
Asst.Professor Assoc. Professor Professor
DECLARATION

I, Mr.Gudla Phanindra Kumar, bearing Reg. No. 17Q91A0558, here by declaring that the

Technical Seminar report entitled “MOBILE PHONECLONING” has done by me is submitted in

partial fulfilment of the requirements for the award of degree in BACHELOR OF TECHNOLOGY

in COMPUTER SCIENCE AND ENGINEERING is my original work. The Results embodied in

this project report have not been submitted to any other university or institute for the award of any

degree or diploma.

Signature of the Candidate

Gudla Phanindra Kumar


17Q91A0558
Date:
Place:Hyderabad
ACKNOWLEDGEMENT

First and foremost we would like to express our immense gratitude towards our
institution Malla Reddy College of Engineering, which helped us to attain profound
technical skills in the field of Computer Science & Engineering, there by fulfilling our most
cherishedgoal.
We are pleased to thank Sri Ch. Malla Reddy, our Founder, Chairman MRGI, Sri
Ch. Mahender Reddy, Secretary, MRGI for providing this opportunity and support
throughout the course.
It gives us immense pleasure to acknowledge the perennial inspiration of
Dr.M.Sreedhar Reddy our beloved principal for his kind co-operation and encouragement
in bringing out thistask.
We would like to thank Dr. T. V. Reddy our vice principal, Mrs. Ch.Vijaya
Kumari, HOD, CSE Department for their inspiration adroit guidance and constructive
criticism for successful completion of ourdegree.
We convey our gratitude to Mr.Gladson Mario Britto R & D Coordinator andMr.
Sayyad Rasheed uddin, & Mr. Ch. Vengaiah, Assistant Professor, our project
coordinators for their valuable guidance.
We would like to thank Mr (Internal Guide Name)………………….. Assistant
Professor our internal guide, for hisvaluable suggestions and guidance during the
exhibition and completion of thisproject.

Finally, we avail this opportunity to express our deep gratitude to all staff who have
contribute their valuable assistance and support making our seminar success.
INDEX
CHAPTERS PAGE.NO.

CHAPTER 1
INTRODUCTION 1
1.1 Introduction to Mobile phone cloning
1.2 History & Motivation

CHAPTER 2
HARDWARE AND WORKING 7
2.1 GSM
2.2 Cloning GSM phone
2.3 How is Cloning done?
2.4 Loop hole cell phone

CHAPTER 3
METHODS AND PREVENTIONS 14
3.1 Methods to detect cloning
3.2 Impact of Cloning
3.3Prevention

CHAPTER 4
MERITS & DEMERITS 16
CONCLUSION 18
REFERENCES 19
CHAPTER -1
INTRODUCTION
INTRODUCTION
MOBILE PHONE CLONING

Cell phone cloning refers to the act of copying the identity of one mobile
telephone to another. This is usually done to make fraudulent telephone calls. The bill for
the calls go to the legitimate subscriber. This made cloning very popular in areas with large
immigrant populations, where the cost to “call home” was very steep. The cloner is also able
to make effectively anonymous calls, which attracts another group of interested law
breakers. Cell phone cloning started with Motorola “bag” phones and reached its peak in the
mid 90’s with a commonly available modification for Motorola “brick” phones such as the
Classic, the Ultra Classic, and the Model 8000. Cloning involved modifying or replacing the
EPROM in the phone with a new chip, which would allow one to configure an ESN
(Electronic Serial Number) via software.
The MIN (Mobile Identification Number) would also have to be changed. After
successfully changing the ESN/MIN pair, the phone would become an effective clone of the
other phone. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were
discovered in several ways: Sniffing the cellular network
 Trashing cellular companies or cellular
 resellers Hacking cellular companies or cellular
 resellers Cloning still works under the AMPS/NAMPS system, but has fallen in popularity
as older phones that can be cloned are more difficult to find and newer phones have not been
successfully reverse engineered. Cloning has been successfully demonstrated under GSM,
but the process is not easy and currently remains in the realm of serious hobbyists and
researchers. Furthermore, cloning as a means of escaping the law is difficult because of the
additional feature of a radio fingerprint that is present in every mobile phone’s transmission
signal. This fingerprint remains the same even if the ESN or MIN are changed. Mobile
phone companies can use the mismatch in the fingerprints and the ESN and MIN to identify
fraud cases.
Blocking is used by service providers to protect themselves from high risk callers. For
example, international calls can be made only with prior approval. In some countries only
users with major credit cards and good credit ratings are allowed to make long distance
calls. • Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An
Equipment Identity Register (EIR) enables network operators to disable stolen cellular
phones on networks around the world. • User verification using Personal Identification
Number (PIN) codes is one method for customer protection against cellular phone fraud. • 
Tests conducted have proved that United States found that having a PIN code reduced fraud
by more than 80%. • Traffic analysis detects cellular fraud by using artificial intelligence
software to detect suspicious calling patterns, such as a sudden increase in the length of calls
or a sudden increase in the number of international calls.
History and Motivation

WHEN DID MOBILE CLONING START?

The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100

Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result, Cabinet

Ministers, company chiefs and celebrities routinely found their most intimate conversations

published in the next day's tabloids Cell phone cloning started with Motorola "bag" phones

and reached its peak in the mid 90's with a commonly available modification for the

Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000.

Southwestern Bell claims wireless fraud costs the industry $650 million each year in

the US.More than 1500 telephone calls were placed in a single day.Estimated loss at $3000

to $4000 for each.Telecom regulatory authority of India should issue directive, which holds

the operators responsible for duplications.


CHAPTER -2
HARDWARE AND WORKING
CHAPTER-2

HARDWARE AND WORKING

GSM :
Global System for Mobile Communications. A digital cellular phone technology based on
TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user
account information. Any GSM phone becomes immediately programmed after plugging in
the SIM card, thus allowing GSM phones to be easily rented or borrowed.Operators who
provide GSM service are Airtel,Hutch etc.
CDMA :
Code Division Multiple Access. A method for transmitting simultaneous signals over a
shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in
GSM.Operators who provides CDMA service in India are Reliance and Tata indicom.
MIN:
The MIN (Mobile Identification Number) is a number that interestingly recognizes a cell
phone endorser. MINs are 34- bits long. The initial 10 bits are in some cases known as
MIN2, while the last 24 bits are alluded to as MIN1. Together they are basically known as
the MIN.
AMPS:
ADVANCED MOBILE PHONE SERVICE. It is a standard framework for simple flag cell
telephone utility in the Joined States and is likewise utilized as a part of other nations. An AMP
dispenses recurrence ranges inside the 800 and 900 Megahertz (MHz) range to cell phone. The
groups are isolated into 30 kHz sub-groups, called channels. The getting channels are called switch
channels and the sending channels are called forward channels. The division of the range into sub-
band channels is accomplished by utilizing recurrence division various access (FDMA).

HOW CDMA WORKS?


IS-95 is a standard for CDMA (Code Division Multiple Access) Digital Cellular. In a
CDMA framework, your encoded voice is digitized and separated into parcels. These
bundles are labelled with "codes." The bundles at that point blend with the majority of the
other parcels of activity in the nearby CDMA arrange as they are steered towards their goal.
The getting framework as it were acknowledges the parcels with the codes foreordained for
it

CLONING GSM PHONES


Each GSM telephone has a 15 digit electronic serial number (alluded to as the IMEI).
It isn't an especially mystery bit of data and you don't have to take any care to keep it
private. The vital data is the IMSI, which is put away on the removable SIM card that
conveysall your endorser data.
GSM systems which are considered to be invulnerable can likewise be hacked. The
process is straightforward: a SIM card is embedded into a per user. In the wake of
interfacing it to the PC utilizing information links, the card points of interest were moved
into the PC. At that point, utilizing openly accessible encryption programming on the Net,
the card points of interest can be scrambled on to a clear keen card. The outcome: A cloned
mobile phone is prepared for abuse.

Fig 2:- Cellular Phone Cloning

Fig 3:- Cellular Counterfeiting/Cloning Fraud

HOW IS MOBILE CLONING DONE?


Cloning involved modifying or replacing the EPROM in the phone with a new chip
which would allow you to configure an ESN (Electronic serial number) via software. You
would also have to change the MIN (Mobile Identification Number). When you had
successfully changed the ESN/MIN pair, your phone was an effective clone of the other
phone. Cloning required access to ESN and MIN pairs.
ESN/MIN pairs were discovered in several ways: Sniffing the cellular Trashing
cellular companies or cellular resellers Hacking cellular companies or cellular resellers
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older
clone able phones are more difficult to find and newer phones have not been successfully
reverse-engineered. Cloning has been successfully demonstrated under GSM, but the
process is not easy and it currently remains in the realm of serious hobbyists and
researchers.
LOOP HOLES IN CELL PHONE NETWORKS
ESN/MIN pair is not encrypted while using the phone to the MSC (Mobile
Switching Centre) for further authentication. Hence just by scanning the data i.e. ESN/MIN
pair, the phone can be very vell be cloned. By changing ESN and MIN, the Service provider
will accept the call and bill it to the legitimate user or provide service unaware of the fact
that it is not a disconnected receiver
The Station Class Mark (SCM) can also be changed. By providing the cellular tower
with a false SCM, the Service Provider , or whoever happens to pursue this fraud is often
looking for a particular phone which in reality is not the phone they are looking for. 3.3. The
SIDH (System Identification for Home System) is also programmed in Number Assignment
Module (NAM). The allowance of the SIDH number tells the carrier where to forward the
billing information to in case the user is "roaming". Changing an SIDH is programming job
that takes only minutes.

CREATING A CDMA CELL PHONE FRATERNAL CLONE


The aim of CDMA Clone is to transfer all of the user settings and user created data from the
original legitimate phone into a fraudulent phone that is indistinguishable in make, model
and firmware version. The Fraternal Clone is so named because the data in the clone will be
the same to that in the legitimate phone but some extra files can be present in the clone
phone.

CDMA cloning involves gaining access to the devices Embedded File System
/nvm/num directory via specialized software or placing a modified EEPROM into the target
mobile telephone, allowing the electronic serial number (ESN) & or Mobile Equipment
Identifier (MEID) of the mobile phone to be changed. The ESN or MEID is typically
transmitted to the cellular company's MTSO in order to authenticate device onto the mobile
network. Modifying this, as well as the phones PRL & number itself (known as the mobile
identification number, or MIN) can pave the way for fraudulent calls, as the target telephone
is now a clone of the telephone from which the original ESN and MIN numbers
CHAPTER-3
METHODS TO DETECT CLONING AND PREVENTION
CHAPTER-3

METHODS TO DETECT CLONED PHONES

1.Copy discovery:
The system sees a similar telephone in a few spots at the same time. Responses incorporate closing
them all off with the goal that the genuine client will contact the administrator since he lost the
benefit he is paying for, or tearing down associations so the clone clients will change to another
clone however the genuine client will contact the administrator.

2.Velocity trap :
The cell phone appears to move at unthinkable or most far-fetched speeds. For instance, if a call is
to begin with made in Helsinki, and five minutes afterward, another call is set aside a few minutes in
Tampere, there must be two telephones with a similar personality on the system.

3.RF (Radio Frequency) :


Fingerprinting is initially a military innovation. Indeed ostensibly indistinguishable radio hardware
has a recognizing ``fingerprint'', so the arrange programming stores and looks at fingerprints for
every one of the telephones that it sees. Along these lines, it will detect the clones with a similar
character yet unique fingerprints.

4.Use profiling :
Profiles of clients' telephone use are kept, and when errors are seen, the client is reached. Charge
card organizations utilize the same strategy. For instance, if a client typically makes just
neighborhood organize calls yet, is abruptly setting calls to remote nations for quite a long time of
broadcast appointment, it demonstrates a conceivable clone.

6.Call tallying :
Both the telephone and the arrange monitor calls made with the telephone, and should they vary
more than the for the most part permitted one call, benefit is denied.

7.PIN codes :
Prior to setting a call, the guest opens the telephone by entering a PIN code and after that calls of
course. After the call has been finished, the client bolts the telephone by entering the PIN code once
more. Administrators may share PIN data to empower more secure meandering

IMPACT OF CLONING
Every year, the cell phone industry loses a great many dollars in income in view of the
criminal activities of people who can reconfigure cell phones so their calls are charged to
different telephones possessed by blameless third people.
Many crooks utilize cloned cell phones for illicit exercises, in light of the fact that their calls
are not charged to them, and are along these lines significantly harder to follow.
This marvel is particularly predominant in medicate wrongdoings. Street pharmacists should
be in steady contact with their wellsprings of supply and their confederates on the avenues.
Traffickers gain cloned telephones at any rate cost, make many calls, and after that discard
the telephone after as little as a days' utilization. Similarly, lawbreakers who represent a
danger to our national security, for example, psychological militants, have been known to
utilize cloned telephones to obstruct law authorization endeavors went for following their
whereabouts

PREVENTIONS AND COUNTERMEASURES FROM CELL PHONE CLONING.

Following are some avoidance methods by which we can avoid phone from cloning:
1. Confidential information should never be saved in mobiles.
2. A password protected phone locking system may prevent the cloning to certain extent.
3. All devices should be covered by a company policy.
4. Review your monthly usage periodically.
Report to service provider for discrepancies in servise.

Uniquely identifies a mobile unit within a wireless carrier's network. The MIN often
can be dialed from other wireless or wire line networks. The number differs from the
electronic serial number (ESN), which is the unit number assigned by a phone manufacturer.
MINs and ESNs can be checked electronically to help prevent fraud.
Mobiles should never be trusted for communicating/storing confidential information.
Always set a Pin that's required before the phone can be used.Check that all mobile devices
are covered by a corporate security policy.
Ensure one person is responsible for keeping tabs on who has what equipment and
that they update the central register. How do service providers handle reports of cloned
phones?Legitimate subscribers who have their phones cloned will receive bills with charges
for calls they didn't make. Sometimes these charges amount to several thousands of dollars
in addition to the legitimate charges.
Typically, the service provider will assume the cost of those additional fraudulent
calls. However, to keep the cloned phone from continuing to receive service, the service
provider will terminate the legitimate phone subscription. The subscriber is then required to
activate a new subscription with a different phone number requiring reprogramming of the
phone, along with the additional headaches that go along with phone number changes.
CHAPTER -4
MERITS AND DEMERITS
CHAPTER-4
MERITS

*If your phone is been lost ,you can use your cloned cell phone.
*If your phone get damaged, your cloned phone can be helpful.
*Advancement itself of being able to clone an organism.

DEMERITS

*Terrorist for criminal activities.


*Used by the cloner for a fraud calls.
*Used for illegal money transfer.
CONCLUSION

Mobile phone Cloning Is in starting stages in India so preventive advances ought to be taken
by the arrange supplier and the Government the order of enactment to indict violations identified
with PDAs isn't seen as a need, nonetheless. It is fundamental that proposed versatile wrongdoing
enactment be sufficiently exhaustive to join wireless extortion, specifically "cloning
misrepresentation" as a particular wrongdoing. Existing cell frameworks have various potential
shortcomings that were considered.
It is critical that organizations and staff take portable telephone security genuinely. Be that
as it may, misrepresentation in itself is a social issue. In that capacity, it might be briefly countered
with mechanical implies yet they seldom work for all time. Cell phones are a generally new wonder
and social standards to its utilization have not been framed. A few administrators have attempted the
“If you can't beat them, go along with them” approach and gave administrations that would
generally be accomplished by extortion. As portable correspondence develops, both socially and
innovatively, extortion will settle to a few level. Until at that point, it is a race between the
administrators, gear makers and the fraudsters.

You might also like