167:
25:
259:
by the
Wireless Telephone Protection Act of 1998, which prohibits "knowingly using, producing, trafficking in, having control or custody of, or possessing hardware or software knowing that it has been configured to insert or modify telecommunication identifying information associated with or
231:
authentication algorithm used by these older SIM cards. By connecting the SIM card to a computer, the authentication procedure can be repeated many times in order to slowly leak information about the secret key. If this procedure is repeated enough times, it is possible to derive the
267:
in its transmission signal which remains unique to that mobile despite changes to the phone's ESN, IMEI, or MIN. Thus, cellular companies are often able to catch cloned phones when there are discrepancies between the fingerprint and the ESN, IMEI, or MIN.
150:(ESN) and Mobile Directory Numbers (MDN or CTN, the Cellular Telephone Number) over the air. The intercepted ESN/MDN pairs would be cloned onto another handset and used in other regions for making calls. Due to widespread fraud, some carriers required a
193:(MEID) of the mobile phone to be changed. To obtain the MEID of your phone, simply open your phone's dialler and type *#06# to get its MEID number. The ESN or MEID is typically transmitted to the cellular company's
239:
key. Later GSM SIMs have various mitigations built in, either by limiting the amount of authentications performed in a power on session, or by the manufacturer choosing resistant K
205:, or MIN, can pave the way for fraudulent calls, as the target telephone is now a clone of the telephone from which the original ESN and MIN data were obtained.
385:
440:
260:
contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization."
282:
224:(IMEI) number. There are various methods used to obtain the IMEI. The most common method is to eavesdrop on a cellular network.
221:
220:, typically not requiring any internal data from the handset (the phone itself). GSM handsets do not have ESN or MIN, only an
89:
142:
Analogue mobile telephones were notorious for their lack of security. Casual listeners easily heard conversations as plain
61:
243:
keys. However if it is known that a resistant key was used, it is possible to speed up the attack by eliminating weak K
194:
108:
68:
326:
137:
377:
151:
75:
46:
42:
174:
202:
197:(MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's
57:
190:
490:
433:
287:
186:
147:
35:
198:
264:
155:
143:
82:
8:
352:
378:"The evolution of cryptography in mobile networks and how to secure them in the future"
465:
307:
233:
227:
Older GSM SIM cards can be cloned by performing a cryptographic attack against the
177:(CDMA) mobile telephone cloning involves gaining access to the device's embedded
125:
485:
408:
479:
263:
The effectiveness of phone cloning is limited. Every mobile phone contains a
256:
178:
166:
466:"S.493 - 105th Congress (1997-1998): Wireless Telephone Protection Act"
146:; eavesdroppers with specialized equipment readily intercepted handset
327:"How to make sure your phone works on a prepaid alternative carrier"
24:
277:
217:
181:/nvm/num directory via specialized software or placing a modified
228:
182:
353:"What is Cell Phone Cloning - Everything You Need to Know"
213:
216:
cloning occurs by copying a secret key from the victim
16:
Copying of identity from one cellular device to another
49:. Unsourced material may be challenged and removed.
477:
250:
185:into the target mobile telephone, allowing the
170:A selection of mobile phones that can be cloned
375:
300:
138:Advanced Mobile Phone System § Cloning
109:Learn how and when to remove this message
165:
154:before making calls or used a system of
431:
283:International Mobile Equipment Identity
222:International Mobile Equipment Identity
478:
406:
388:from the original on 21 December 2022
376:Preuβ Mattsson, John (Jun 29, 2021).
324:
247:keys from the pool of possible keys.
124:is the copying of identity from one
47:adding citations to reliable sources
18:
350:
13:
409:"The Truth About SIM Card Cloning"
14:
502:
255:Phone cloning is outlawed in the
195:Mobile Telephone Switching Office
446:from the original on 6 June 2023
325:Bader, Daniel (March 21, 2017).
23:
161:
131:
34:needs additional citations for
458:
432:Brumley, Billy (18 Nov 2004).
425:
400:
369:
344:
318:
208:
1:
293:
251:Effectiveness and legislation
175:Code-Division Multiple Access
203:mobile identification number
7:
407:Cycle, Janus (2023-01-13).
271:
191:Mobile Equipment Identifier
10:
507:
288:Subscriber identity module
135:
351:Gor, Mosam (2016-05-20).
312:www.isaac.cs.berkeley.edu
187:Electronic Serial Number
148:Electronic Serial Numbers
199:Preferred Roaming List
171:
158:to detect the clones.
434:"A3/A8 & COMP128"
169:
156:radio fingerprinting
43:improve this article
172:
491:Mobile technology
265:radio fingerprint
119:
118:
111:
93:
498:
470:
469:
468:. 24 April 1998.
462:
456:
455:
453:
451:
445:
438:
429:
423:
422:
420:
419:
404:
398:
397:
395:
393:
373:
367:
366:
364:
363:
348:
342:
341:
339:
337:
322:
316:
315:
304:
114:
107:
103:
100:
94:
92:
51:
27:
19:
506:
505:
501:
500:
499:
497:
496:
495:
476:
475:
474:
473:
464:
463:
459:
449:
447:
443:
436:
430:
426:
417:
415:
405:
401:
391:
389:
374:
370:
361:
359:
349:
345:
335:
333:
323:
319:
306:
305:
301:
296:
274:
253:
246:
242:
237:
211:
164:
140:
134:
126:cellular device
115:
104:
98:
95:
58:"Phone cloning"
52:
50:
40:
28:
17:
12:
11:
5:
504:
494:
493:
488:
472:
471:
457:
424:
399:
368:
343:
317:
298:
297:
295:
292:
291:
290:
285:
280:
273:
270:
252:
249:
244:
240:
235:
210:
207:
201:(PRL) and the
163:
160:
136:Main article:
133:
130:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
503:
492:
489:
487:
484:
483:
481:
467:
461:
442:
435:
428:
414:
410:
403:
387:
383:
379:
372:
358:
354:
347:
332:
328:
321:
313:
309:
308:"GSM Cloning"
303:
299:
289:
286:
284:
281:
279:
276:
275:
269:
266:
261:
258:
257:United States
248:
238:
230:
225:
223:
219:
215:
206:
204:
200:
196:
192:
189:(ESN) and/or
188:
184:
180:
176:
168:
159:
157:
153:
149:
145:
144:narrowband FM
139:
129:
127:
123:
122:Phone cloning
113:
110:
102:
99:February 2014
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
460:
448:. Retrieved
427:
416:. Retrieved
412:
402:
390:. Retrieved
381:
371:
360:. Retrieved
356:
346:
334:. Retrieved
330:
320:
311:
302:
262:
254:
226:
212:
173:
162:CDMA cloning
141:
132:AMPS cloning
128:to another.
121:
120:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
336:October 24,
209:GSM cloning
179:file system
480:Categories
418:2023-07-23
362:2019-04-05
294:References
69:newspapers
441:Archived
386:Archived
382:Ericsson
278:Dual SIM
272:See also
218:SIM card
413:YouTube
392:26 July
229:COMP128
83:scholar
450:26 Jul
357:MovZio
183:EEPROM
85:
78:
71:
64:
56:
486:Fraud
444:(PDF)
437:(PDF)
331:iMore
90:JSTOR
76:books
452:2023
394:2023
338:2017
62:news
214:GSM
152:PIN
45:by
482::
439:.
411:.
384:.
380:.
355:.
329:.
310:.
454:.
421:.
396:.
365:.
340:.
314:.
245:i
241:i
236:i
234:K
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.