Posts Tagged ‘blackberry’

tv crime2

Before I start this guide, I would like to make one thing clear SIM CLONING is illegal. This tutorial should be used for educational purposes only.

First off a little introduction about SIM CARD:

Our SIM cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enables the billing to be made to that customer.

SIM cloning extracting these two secret codes from the SIM and programme it into a new blank smart card (often known as wafer) since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology

Now which SIM cards can be cloned?

SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP128v3. It is important note currently only COMP128v1 version SIM cards can be cloned, since this is the only algorithm, which has been cracked, bear in mind that 70% of all the SIM cards we use are COMP128v1.

Cloning a card:

1. Buy a SIM card Reader

2. Need a Blank SIM card or super SIM card

3. Download and install MagicSIM

4. Download and install USB SIM Card Reader Software3.0.1.5

6. Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code.

7 Call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.

8. Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.

9. Remove the SIM from your phone, place it in the card reader, click read from card in magic SIM the application.

10. When it displays ‘connected’, select crack SIM in the toolbar. Click strong ki and select all of the other find options and then click start.

11. Once your ki is found and the crack is finished, click file, save as and save your cracked SIM info to a file.

12. IMPORTANT!!! You must click disconnect from the file menu or you will ruin your SIM card.

Once it says disconnected, remove the SIM. Put the SIM in your phone and see if it still works, it should. (If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)

13. Insert blank 3g card USB SIM Card Reader Software3.0.1.5, not magic SIM at this point.

14. Click connect

15. It should say ‘No Info Found’ if it is truly blank.

16. Select write to SIM, it will prompt you to select a dat file, select the one you saved earlier. Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click finish.

17. Your card is now cloned.

It should be noted that if you try to make two calls at the same time, one will connect; the other will say call failed, both phones will get the same messages, text and voice, and both will receive the same calls, but only one can talk at a time.


tv crime2
So this post has come about by one of my friends posting the below video from LiveLeak on Facebook which is quite terrifying if you are a parent. But have no fear I will tell you how to stop people from tracking you or your child.

video pic

Some cameras, smartphones and tablets add location data to each picture you take. This means that anyone who wants to can see the exact longitude and latitude of the image. Geotagging data is wonderful for finding out where a picture was taken. However, it may not be obvious if you don’t know how to view it. For those who want to find out whether photos have been geotagged before posting them online, it is important to know how to check. The process is simple and helps to have better control over your pictures.

Is Your Camera Geotagging

Before viewing or checking for location data, you should know whether your camera is geotagging your pictures. Any camera you use must have GPS enabled in order for geotagging to occur. This is most common in smartphones, but some digital cameras have this capability as well. Without this feature, no location data is embedded in images. Remember that this data, called EXIF data, is invisible unless you know how to look for it.

What You Need

To view EXIF data, all you need is a web browser. There is no need to download extra software on your computer. Navigate to Jeffrey’s EXIF Viewer. Unlike many other tools available, this one keeps it simple and focuses on location information so you don’t have to sort through a lot of unnecessary data. Another benefit is the wide variety of file types that are supported. You would have to have some extremely rare file types for this tool not to work for you.

Using Jeffrey’s EXIF Viewer

This tool provides two different options for viewing geotagged images. The first allows you to view information from images already online. The second allows you to check images before they are posted online.

For online images, open the picture in your browser. Copy the URL of the image. The quick way is to highlight the URL and press Ctrl + C. Open the browser window with Jeffrey’s EXIF Viewer. Paste (Ctrl + V) the URL into the Image URL box. Press View Image At URL. You will see a few details about the camera, the date the image was taken and finally the location data along with a map.

For images stored on your computer, press Browse beside the Local Image File box. Choose the file in question and press View Image From File. You will see the same data the online option.

Testing it

Here is a picture I took in the summer of an exhibition about the activist group Anonymous

Post Picture

Now right click on the image and select ‘Copy Link Address’

Navigate to and pastie the link into the URL Image box

Hit ‘View Image at URL’ and there you go.


Although the image on the page is a bit small, you can see tones of data including an arrow pointing to the Museum of London in the UK which is correct.

Now just imagine if this was a picture of your child on a social media site and the person viewing wanted to track them or their school down. Have no fear the following steps will tell you how to stop this from happening.

What can you do to protect yourself from stalkers and other bad guys using geotags to track you down?

Consider turning off location services on some location sharing apps

Find the location sharing settings on your smartphone and turn off the ones that you think might pose a personal safety risk. You can always turn them back on later if you want to.

Most smartphones will let you turn off location sharing for individual apps as an alternative to turning them off globally.

There are some apps such as ‘Find My iPhone’ that you won’t want to disable location sharing on. If you do disable location sharing on apps like ‘Find My iPhone’, then your phone won’t be able to relay its position and you won’t be able to find it using the ‘Find My iPhone’ service should it get lost or stolen.

Remove geotags from your digital photos

If you want to remove geotag information from your image files then you can use an app such asdeGeo (iPhone) or Photo Privacy Editor (Android) to remove the geotag info from your photos.

Consider turning off the location sharing setting of your phone’s camera app as well so that the GPS info does not get recorded as part of the picture’s meta data, this will save you the hassle of having to strip out the location data later on.

How do I turn off Geotaging on my Smart phone

Android 4.2 phones

  1. Start camera application
  2. Hit the Settings button
  3. Scroll down and find the GPS Tag option and turn it off

In older versions, the option may be called “Store Location,” but is it essentially the same process.

BlackBerry 6.0 and 7.0

RIM suggests through the online documentation that disabling geotagging be done on BlackBerry Enterprise Server,  which would work from an admin’s point of view if an agency uses BES. If not, to turn the setting off on an individual BlackBerry  phone:

  1. Open Camera
  2. Set the Location icon to “Disabled”

For some earlier versions, hit the Menu and Option buttons before changing the setting.

iPhone 4 and 5

  1. Go to Settings
  2. Select General
  3. Select Location Services
  4. Set Camera to “Off”

For older versions users can’t really turn off geotagging for the camera without disabling it for all applications. But location warnings can be set to go off when an application is using them.

Windows Phone 7 and 8

  1. Go to Settings
  2. Navigate to Applications
  3. Scroll down to Pictures & Camera
  4. Set “include location (GPS) info in Pictures you take” to “Off”

I hope this has put your mind at ease, but if you do have any question please contact me. Also please share this on social media sites and on friends pages.


If you are a BlackBerry Enterprise Network user, here is something you need to be careful about. BlackBerry Enterprise Server (BES) users have been warned that an image-based exploit could allow hackers to access and execute code on the servers used to support corporate users of BlackBerry smartphones.

The flaw that been rated as high severity and actual vulnerability in BlackBerry Enterprise Servers resulted from how the server processes image files.

Scenario to Exploit Vulnerability: A malicious person writes a special code and then embeds it in a TIFF image file. The person then convinces a Blackberry smart phone user (whose phone is connected to a corporate BES) to view the TIFF file.

As soon as the image file loads on the phone, the code runs on the Blackberry Enterprise server and either opens up a back door in the network or causes the network to crash altogether as instructed in the basic code.

RIM is not aware of any attacks on or specifically targeting BlackBerry Enterprise Server customers, and recommends that affected customers update to the latest available software version to be fully protected from these vulnerabilities.” Blackberry said.

The exploit uses a TIFF image containing malicious code, and the dangerous image can either be linked to an email or attached directly to it. Depending on the privileges available to the configured BlackBerry Enterprise Server service account, the attacker might also be able to extend access to other non-segmented parts of the network.

BlackBerry Enterprise Server Express version 5.0.4 and earlier for Microsoft Exchange and IBM Lotus Domino and BlackBerry Enterprise Server version 5.0.4 and earlier for Microsoft Exchange, IBM Lotus Domino and Novell Groupwise are affected only.

For the full RIM statement, issue and resolution visit: Knowledge Base Article BSRT-2013-003

Blackberry maker Research In Motion had an awful 2011, losing three-quarters of its market value and further ground to competitors on Google, Apple and even Microsoft’s platform. But after founder/CEO Mike Lazaridis and co-CEO Jim Balsillie resisted public calls to change course or resign their posts for so long, now that they’ve done both, it’s still something of a surprise.

The formal announcement will come Monday, but it’s official, confirmed in an extended multi-party interview with Toronto’s The Globe and Mail: Lazaridis and Balsillie will resign as CEOs, making way for Thorsten Heins, currently RIM’s COO of Product Engineering.




After the recent antics at RIMs datacentre in Slough ( I have been asked about the difference acronyms used, BES and BIS so here is an explanation.

They both serve the same ultimate purpose: to deliver email (and data) to your handheld in a secure and reliable manner. So what’s the difference?

What is BIS?

BIS stands for BlackBerry Internet Service. It gives your BlackBerry access to the Internet. It’s like an ISP, but for your smart-phone instead of your home computer.  Every time your BlackBerry gets an email, or accesses a webpage, it does so through BIS (unless you’re using BES)

What is BES?

BES stands for BlackBerry Enterprise Server. It gives your BlackBerry access to a corporate intranet. The intranet is the private, internal, network within a company. It’s kind of like a mini-internet that is cut off from the rest of the world. Many intranets allow you to communicate with the Internet as well, but with added layers of security.

The Differences

Both BES and BIS allow your BlackBerry to get email, as well as retrieve webpages and use third-party applications (like WICKSoft Mobile Documents!). All traffic from your phone goes to the BES / BIS server, and then the BES / BIS server communicates with the world on your behalf.

The difference, ultimately, lies in where the server resides and the level of control and security you get.

In the case of BIS, your carrier operates the server. Everything from BIS to your handheld is encrypted, but that’s about the extent of the security features. The carrier can decide what applications run on your phone, and how applications communicate with the Internet.

For BES, your company operates the server, and usually has it sitting somewhere within the corporate network. The IT department controls all aspect of the BES server, and it’s likely sitting in a nice and secure location.

So really, what does this mean?

It’s all about privacy. In the case of BIS, everything operates on a public network.  Data from your phone to your carrier is encrypted, but ultimately your carrier is communicating with the Internet, which isn’t exactly the pinnacle of a secure environment. The odds of somebody intercepting your data, or worse, compromising the different systems you access, are much higher. I don’t want to scare anyone though: BIS is typically more secure than accessing the Internet from home using an ISP, and is WAY more secure than using WiFi or BlueTooth.

With BES, most of your data remains in a private, closed network.  Your BlackBerry has a secure link directly to the corporate environment, because the BES server is located in the office somewhere. The only way for someone to monitor or intercept your data would be for them to infiltrate your organization.

So think of it like this: In the BIS case, a guy with an envelope (your data / email) is running around New York City trying to deliver the package to you—hopefully you can trust him, and hopefully nobody thumps him over the head and takes the envelope.   For BES, the guy delivering the envelope is walking around inside a secure compound, among trusted people who have proper security clearance, and cameras are monitoring his every move as he travels the 50 feet from his desk to your desk.

Wait, there’s more!

I’ve been overly simplistic in my description of BES.  BES really does a whole lot more than just fetch email.  For one, it acts just like a VPN in the sense that in makes sure ALL data travelling between your BlackBerry and your office is encrypted.

Also, BES provides tools to publish applications, and define how those applications can interact with the phone and the network.

Imagine that you have 500 BlackBerrys in your organization, and you want to install an application (like WICKSoft Mobile Documents) on each of the phones.  BES will let you ‘push’ a copy of the application to each of the phones without ever having to physically touch a single device. You don’t have to worry about an end-user making a configuration mistake, or forgetting to install the application.  It’s all done automatically, and securely.

BES also lets you remotely wipe and lock a device.  This is very useful for those cases where people forget their BlackBerrys in the back of a taxi, or have them stolen.


Not all wireless carriers offer the same level of BIS service. Some of you are unlucky enough to be stuck with one that restricts third-party applications from accessing the Internet. This means that a lot of excellent third-party applications for the BlackBerry are simply unavailable.

With BES there are no inherent restrictions, because your company gets to decide all of these things.  Want GoogleTalk to work, but not Yahoo! Messenger? No problem: BES lets your company enable one, and cripple the other.

In conclusion

BIS provides a direct link between your phone and your wireless provider, but after that all traffic essentially goes out over the Internet.  Any and all security becomes the responsibility of the BlackBerry application in question, so there are no security guarantees.  That said, BIS does a good job at providing Internet and email support and, best of all– you don’t have to set anything up.

BES provides what is essentially a direct link between your phone and your office environment.  It’s very secure, flexible, and gives your company control over all aspects of the BlackBerry.  There is a certain ‘baseline’ security inherent in all data transactions, and your IT department can always disable your BlackBerry if it’s been compromised.

Smaller companies, or individuals, are well served by BIS—it provides you with almost everything you need.  Larger organizations, with their own internal mail systems and other infrastructure, should definitely be using BES.

Just 490,000 Research in Motion PlayBooks sold in the device’s first quarter compared to 9.25 million iPads sold over the same period, according to a report.

Bloomberg cites a survey of analysts for the figure, who predict RIM will sell around 2.2 million PlayBooks for the full year. Michael Walkley, an analyst with Canaccord Genuity, estimates RIM will ship 1.5 million tablets in 2011, according to the report.

RIM introduced PlayBook, priced at $500, in the U.S. and Canada in April. The device, which targets the corporate market, sports a 7-inch screen compared to the iPad’s 10-inch screen. Apple’s former CEO Steve Jobs has called such 7-inch tablets “tweeners,” because they’re too large to be a smartphone and too small to be a tablet.

Jobs’s opinion about the small-sized tablet’s viability may be confirmed by RIM’s poor success with PlayBook. RIM, of course, isn’t the only manufacturer to have trouble gaining traction with a non-Apple tablet device. Most famously, Hewlett-Packard pulled out of the market entirely after its TouchPad experienced dismal sales.

BlackBerry Playbook users have one more reason to cheer up as RIM or Research in Motion recently announced software update for their tablet OS. It is v1.0.7.2942 and has brought differential updates to this tablet.

The feature of differential updates lets users update only the sections of the tablet that needs to be updated. This means that the updates will be smaller in size and hence the update process will be completed faster. The download costs too will be reduced.

The Wi-Fi connectivity to the WEP or Wired Equivalent Privacy networks has been updated for providing better security. This update also gives you faster pairing between BlackBerry smartphone and PlayBook tablet through BlackBerry Bridge app.

For making optimum use of BlackBerry PlayBook update, the manufacturer has given an update for BlackBerry Bridge app too. It is recommended that you install it on the smartphone too for better compatibility. You can get this update in App World or you can click here for it.

BlackBerry PlayBook tablet users must have BlackBerry Tablet OS v1.0.7.2670 installed for getting the differential updates. If you haven’t updated your device yet, you can click here for doing it.

Existing users can upgrade their BlackBerry PlayBook tablet OS to v1.0.7.2942 over the air or it can be done from here . Users who are buying BlackBerry PlayBook from now will get a prompt for installing the update automatically on their tablet.