By,
Adishree
What is Cell Phone Cloning?
Cell phone cloning, usually defined as
copying the identity of one mobile phone to another mobile
phone. Purpose of this is usually to make fraudulent telephone calls.
The bills are thus created in the name of the legitimate subscriber. The
one who clones is able to make effectively anonymous calls, which
attracts other group of interested users. Cloning is defined as the
process of taking the programmed information, stored in a legitimate
mobile phone and illegally programs the identical information into other
mobile phone. The result is that the "cloned" phone can make and
receive calls and the charges for those calls are billed in the name of
the legitimate subscriber. The service provider network does not have
any way out to differentiate between the legitimate phone and the
"cloned" phone
How is Cell Phone Cloning Done?
Cell cloning process involves modifying/replacing the EPROM (Erasable Programmable Read-Only Memory) in the phone with a new chip which allows the person to configure an ESN (Electronic serial number) via software. You also need to change the MIN (Mobile Identification Number).
When you successfully change the ESN/MIN pair, your phone has an
effective clone of the other phone. Cloning requires access to ESN and
MIN pairs. ESN/MIN pairs are discovered in several ways. Some of them
are:
- Sniffing the cellular
- Trashing cellular companies or cellular resellers
- Hacking cellular companies or cellular resellers
Cloning works under the AMPS (Advanced Mobile Phone System)/NAMPS (Narrowband Advanced Mobile Phone Service)
system, but has become popular, as older clone able phones have become
more difficult to find and newer phones have not been successfully
reverse-engineered. Cloning is been successfully demonstrated under GSM,
but the process is very difficult.
How to Prevent Cell Phone Cloning?
The MINs and ESNs can
be electronically verified to help prevent frauds. One should never use
Mobile Phone for communicating or storing confidential
information. Always Mobiles should be secured using a Pin for security
purposes. Check that all mobile devices are covered by a security
policy. Always ensure that one person is responsible for keeping tabs on
who has what equipment and that they update the central register
periodically.
How do service providers handle reports related to cloned cell phones?
Legitimate subscribers whose phones have
been cloned will receive bills with charges for calls they didn't make.
Sometimes these charges amount to several thousands of rupees in
addition to the charges.
To Read More Click on.... Cell Phone Cloning
To Read More Click on.... Cell Phone Cloning
No comments:
Post a Comment