the radio wave transmissions from the cell phones of legitimate subscribers. After cloning, both the legitimate and the fraudulent cell phones have the same ESN/MIN combination and cellular systems cannot distinguish the cloned cell phone from the legitimate one. The legitimate phone user then gets billed for the cloned phone's calls. Call your carrier if you think you have been a victim of cloning fraud. The fraudster can make calls on your behalf or send messages etc and it would be easy to tarnish your reputation in this manner. For cell phone cloning fraud, the cellular equipment manufacturing industry has deployed authentication systems that have proven to be a very effective countermeasure to cloning, however it still does happen.
There is another interesting method. There are chips available which can be set into a cell phone, you can then gift this cell phone to an unsuspecting victim, provided you know him. Perhaps you can make him win a contest of some sort. The cell phone now becomes your bug, something that the user is sure to carry around with him. You activate it by simply calling this fellow from a preset number. What happens is that he get no inkling that a call is being received, the phone automatically picks it u, there is no change in the display or any indication that the cell phone is now transmitting everything to the person at the other end. So if you are paranoid enough, it makes sense to not accept such gifts from people. If you don’t have any security threat then chances are no ones going to gift you one either! Of course to counter the threat of electronic eavesdropping there are counter measures available such as encryption. Again its not for the usual people, wont be cost effective that way, but you can always find more details. It is an entirely different topic per se and would make material for another article. So keep coming back!
Saturday, August 27, 2005
What Is Cell Phone Cloning Fraud?
the radio wave transmissions from the cell phones of legitimate subscribers. After cloning, both the legitimate and the fraudulent cell phones have the same ESN/MIN combination and cellular systems cannot distinguish the cloned cell phone from the legitimate one. The legitimate phone user then gets billed for the cloned phone's calls. Call your carrier if you think you have been a victim of cloning fraud. The fraudster can make calls on your behalf or send messages etc and it would be easy to tarnish your reputation in this manner. For cell phone cloning fraud, the cellular equipment manufacturing industry has deployed authentication systems that have proven to be a very effective countermeasure to cloning, however it still does happen.
There is another interesting method. There are chips available which can be set into a cell phone, you can then gift this cell phone to an unsuspecting victim, provided you know him. Perhaps you can make him win a contest of some sort. The cell phone now becomes your bug, something that the user is sure to carry around with him. You activate it by simply calling this fellow from a preset number. What happens is that he get no inkling that a call is being received, the phone automatically picks it u, there is no change in the display or any indication that the cell phone is now transmitting everything to the person at the other end. So if you are paranoid enough, it makes sense to not accept such gifts from people. If you don’t have any security threat then chances are no ones going to gift you one either! Of course to counter the threat of electronic eavesdropping there are counter measures available such as encryption. Again its not for the usual people, wont be cost effective that way, but you can always find more details. It is an entirely different topic per se and would make material for another article. So keep coming back!
Cell Phone Tapping
Considering that we use a cell phone even in the presence of a land line now that call rates are mostly on par, perhaps we should be evaluating security concerns about this risk. While it is common knowledge that authorities have had access to our calls, we were satisfied by the fact that this capability could not be mis-used. Even the authorities needed to get permission from a court of law with specific reasons for their wanting to do so. (Of course I assume that you did nothing to piss off the CBI or an agency on that level. In case you already did then God Help You, those people have technology which would leave you dumbstruck, as well as a free hand to use it when they think necessary).
With landlines, it was difficult to tap the phone, especially since they would need to put a physical bug on the wires which meant access to the lines and a kind of sophistication which would not be easily learnt. However with things going wireless, it becomes easier. Interception devices are now available that can record conversations. If you suspected the presence of these things and sent confidential data by SMS, then it was in vain since these things are powerful enough to get these too. To add salt to the wounds, the conversations and messages are neatly indexed and stored in a data base for future reference. These interceptors are cleverly disguised in
forms of briefcases, suitcases or perhaps even a rugged outdoor case (cant be smaller than those since a particular size is required to be effective, maybe with more advances in technology we will have smaller ones.) While they do have their own power units which could last for some time, its better if you gave them a power supply since spying on someone is not something you do for an hour or two. Days of patience are required before you can have results. Don’t worry about power points though, these things are designed to be inconspicuous; you are ready to go even with a car cigarette lighter point.
These portable interception devices cost someplace between 20,000 dollars upwards depending on the features but they do come with a guarantee of getting you behind bars if you are not a law enforcing agent. Another option is to use the cell phone cloning or SIM card cloning method. However this requires you to have access to the device for some time.
IPOD Killers!
Songs on cell phones are just one way in which the "handys" are taking over the world. Perhaps this is what was thought when Sci-Fi writers envisioned a product that would allow humans to be reachable anywhere on the planet (via video calls or voice calls), carry their data with them which would include music, work related stuff as well as emergency tracing service. Undoubtedly cell phones are not just iPod killers but are eating away into competiting devices at a phenomenal rate.