HOME

TheInfoList



OR:

Phone cloning is the copying of identity from one cellular device to another.


AMPS cloning

Analogue mobile telephones were notorious for their lack of security. Casual listeners easily heard conversations as plain
narrowband FM Frequency modulation (FM) is the encoding of information in a carrier wave by varying the instantaneous frequency of the wave. The technology is used in telecommunications, radio broadcasting, signal processing, and Run-length limited#FM: .280. ...
; eavesdroppers with specialized equipment readily intercepted handset Electronic Serial Numbers (ESN) and Mobile Directory Numbers (MDN or CTN, the Cellular Telephone Number) over the air. The intercepted ESN/MDN pairs would be cloned onto another handset and used in other regions for making calls. Due to widespread fraud, some carriers required a
PIN A pin is a device used for fastening objects or material together. Pin or PIN may also refer to: Computers and technology * Personal identification number (PIN), to access a secured system ** PIN pad, a PIN entry device * PIN, a former Dutch ...
before making calls or used a system of radio fingerprinting to detect the clones.


CDMA cloning

Code-Division Multiple Access Code-division multiple access (CDMA) is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communicatio ...
(CDMA) mobile telephone cloning involves gaining access to the device's embedded
file system In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one lar ...
/nvm/num directory via specialized software or placing a modified
EEPROM EEPROM (also called E2PROM) stands for electrically erasable programmable read-only memory and is a type of non-volatile memory used in computers, usually integrated in microcontrollers such as smart cards and remote keyless systems, or as ...
into the target mobile telephone, allowing the Electronic Serial Number (ESN) and/or
Mobile Equipment Identifier A mobile equipment identifier (MEID) is a globally unique number identifying a physical piece of CDMA2000 mobile station equipment. The number format is defined by th3GPP2 report S.R0048but in practical terms, it can be seen as an IMEI but with he ...
(MEID) of the mobile phone to be changed. To obtain the MEID of your phone, simply open your phone's dialler and type *#06# to get its MEID number. The ESN or MEID is typically transmitted to the cellular company's
Mobile Telephone Switching Office {{Refimprove, date=May 2015 The Mobile Telephone Switching Office (MTSO) is the mobile equivalent of a PSTN Central Office. The MTSO contains the switching equipment or Mobile Switching Center (MSC) for routing mobile phone calls. It also contains ...
(MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's Preferred Roaming List (PRL) and the mobile identification number, or MIN, can pave the way for fraudulent calls, as the target telephone is now a clone of the telephone from which the original ESN and MIN data were obtained.


GSM cloning

GSM cloning occurs by copying a secret key from the victim SIM card, typically not requiring any internal data from the handset (the phone itself). GSM handsets do not have ESN or MIN, only an
International Mobile Equipment Identity The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone but can also ...
(IMEI) number. There are various methods used to obtain the IMEI. The most common methods are to hack into the cellular company, or to eavesdrop on the cellular network. A GSM SIM card is copied by removing the SIM card and placing a device between the handset and the SIM card and allowing it to operate for a few minutes and extracting the Ki, or secret code. This is normally done with handsets that have the option of an "extended battery" by placing the normal size battery in the handset and the Ki in the now vacant extra space. This is done by allowing the device to log the interaction between the mobile telephone switching office and the handset.


Effectiveness and legislation

Phone cloning is outlawed in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
by the Wireless Telephone Protection Act of 1998, which prohibits "knowingly using, producing, trafficking in, having control or custody of, or possessing hardware or software knowing that it has been configured to insert or modify telecommunication identifying information associated with or contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization." The effectiveness of phone cloning is limited. Every mobile phone contains a radio fingerprint in its transmission signal which remains unique to that mobile despite changes to the phone's ESN, IMEI, or MIN. Thus, cellular companies are often able to catch cloned phones when there are discrepancies between the fingerprint and the ESN, IMEI, or MIN.


See also

*
Dual SIM Some mobile phones support use of two SIM cards, described as dual SIM operation. When a second SIM card is installed, the phone either allows users to switch between two separate mobile network services manually, has hardware support for keeping ...
*
International Mobile Equipment Identity The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone but can also ...
*
Subscriber identity module A typical SIM card (mini-SIM with micro-SIM cutout) A file:Simkarte NFC SecureElement.jpg">thumb"> thumb">A TracFone Wireless SIM card has no distinctive carrier markings and is only marked as a "SIM card" A SIM card (full form Subscriber Ide ...


References

{{Reflist Fraud Mobile technology