AGENDA INTRODUCTION GSM & CDMA MOBILE PHONES HOW IS A PHONE CLONED? METHODS TO DETECT CLONED PHONES IMPACT OF CLONING HOW TO PREVENT CLONING? CONCLUSION
WHAT IS MOBILE PHONE CLONING? Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone. The purpose of mobile phone cloning is making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber.
GSM Global system for Mobile Communications is a digital cellular phone technology. GSM phones use a Subscriber Identity Module (SIM) card that contains user account info. Any GSM phone becomes immediately programmed after plugging in the SIM card.
CDMA CDMA stands for Code Division Multiple Access. A method for transmitting simultaneous signals over a shared portion of the spectrum. There is no subscriber Identity Module (SIM) card unlike in GSM. Operators who provide CDMA service in India are Reliance, Tata Indicom etc.
HOW CLONING IS DONE? Cloning involves modifying as replacing the EPROM in the phones with a new chip, which would allow you to configure ESN via software. You would also have to change the MIN. When you has successfully changed ESN/MIN pair, your phone was an effective clone of the other phone.
METHODS TO DETECT CLONED PHONES Frequent wrong number phone calls to your phone, or hang-ups. Difficult in placing outgoing calls. Difficult in retrieving voice mail messages. Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.
IMPACT OF CLONING Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third-persons. Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to their, and are therefore much more difficult to trace.
HOW TO PREVENT CLONING? Service providers have adopted measures like blocking, blacklisting & user verification to prevent cellular fraud. Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An equipment Identity Register (IR) enables network operators to disable stolen cellular phones on networks around the world. User verification using personal Identification Number (PIN) code is one method for customer protection against cellular phone fraud.
CONCLUSION Preventive steps to be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority. Keep in touch with your bill details. Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.