Knowledge

Phone cloning

Source 📝

167: 25: 259:
by the Wireless Telephone Protection Act of 1998, which prohibits "knowingly using, producing, trafficking in, having control or custody of, or possessing hardware or software knowing that it has been configured to insert or modify telecommunication identifying information associated with or
231:
authentication algorithm used by these older SIM cards. By connecting the SIM card to a computer, the authentication procedure can be repeated many times in order to slowly leak information about the secret key. If this procedure is repeated enough times, it is possible to derive the
267:
in its transmission signal which remains unique to that mobile despite changes to the phone's ESN, IMEI, or MIN. Thus, cellular companies are often able to catch cloned phones when there are discrepancies between the fingerprint and the ESN, IMEI, or MIN.
150:(ESN) and Mobile Directory Numbers (MDN or CTN, the Cellular Telephone Number) over the air. The intercepted ESN/MDN pairs would be cloned onto another handset and used in other regions for making calls. Due to widespread fraud, some carriers required a 193:(MEID) of the mobile phone to be changed. To obtain the MEID of your phone, simply open your phone's dialler and type *#06# to get its MEID number. The ESN or MEID is typically transmitted to the cellular company's 239:
key. Later GSM SIMs have various mitigations built in, either by limiting the amount of authentications performed in a power on session, or by the manufacturer choosing resistant K
205:, or MIN, can pave the way for fraudulent calls, as the target telephone is now a clone of the telephone from which the original ESN and MIN data were obtained. 385: 440: 260:
contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization."
282: 224:(IMEI) number. There are various methods used to obtain the IMEI. The most common method is to eavesdrop on a cellular network. 221: 220:, typically not requiring any internal data from the handset (the phone itself). GSM handsets do not have ESN or MIN, only an 89: 142:
Analogue mobile telephones were notorious for their lack of security. Casual listeners easily heard conversations as plain
61: 243:
keys. However if it is known that a resistant key was used, it is possible to speed up the attack by eliminating weak K
194: 108: 68: 326: 137: 377: 151: 75: 46: 42: 174: 202: 197:(MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's 57: 190: 490: 433: 287: 186: 147: 35: 198: 264: 155: 143: 82: 8: 352: 378:"The evolution of cryptography in mobile networks and how to secure them in the future" 465: 307: 233: 227:
Older GSM SIM cards can be cloned by performing a cryptographic attack against the
177:(CDMA) mobile telephone cloning involves gaining access to the device's embedded 125: 485: 408: 479: 263:
The effectiveness of phone cloning is limited. Every mobile phone contains a
256: 178: 166: 466:"S.493 - 105th Congress (1997-1998): Wireless Telephone Protection Act" 146:; eavesdroppers with specialized equipment readily intercepted handset 327:"How to make sure your phone works on a prepaid alternative carrier" 24: 277: 217: 181:/nvm/num directory via specialized software or placing a modified 228: 182: 353:"What is Cell Phone Cloning - Everything You Need to Know" 213: 216:
cloning occurs by copying a secret key from the victim
16:
Copying of identity from one cellular device to another
49:. Unsourced material may be challenged and removed. 477: 250: 185:into the target mobile telephone, allowing the 170:A selection of mobile phones that can be cloned 375: 300: 138:Advanced Mobile Phone System § Cloning 109:Learn how and when to remove this message 165: 154:before making calls or used a system of 431: 283:International Mobile Equipment Identity 222:International Mobile Equipment Identity 478: 406: 388:from the original on 21 December 2022 376:Preuβ Mattsson, John (Jun 29, 2021). 324: 247:keys from the pool of possible keys. 124:is the copying of identity from one 47:adding citations to reliable sources 18: 350: 13: 409:"The Truth About SIM Card Cloning" 14: 502: 255:Phone cloning is outlawed in the 195:Mobile Telephone Switching Office 446:from the original on 6 June 2023 325:Bader, Daniel (March 21, 2017). 23: 161: 131: 34:needs additional citations for 458: 432:Brumley, Billy (18 Nov 2004). 425: 400: 369: 344: 318: 208: 1: 293: 251:Effectiveness and legislation 175:Code-Division Multiple Access 203:mobile identification number 7: 407:Cycle, Janus (2023-01-13). 271: 191:Mobile Equipment Identifier 10: 507: 288:Subscriber identity module 135: 351:Gor, Mosam (2016-05-20). 312:www.isaac.cs.berkeley.edu 187:Electronic Serial Number 148:Electronic Serial Numbers 199:Preferred Roaming List 171: 158:to detect the clones. 434:"A3/A8 & COMP128" 169: 156:radio fingerprinting 43:improve this article 172: 491:Mobile technology 265:radio fingerprint 119: 118: 111: 93: 498: 470: 469: 468:. 24 April 1998. 462: 456: 455: 453: 451: 445: 438: 429: 423: 422: 420: 419: 404: 398: 397: 395: 393: 373: 367: 366: 364: 363: 348: 342: 341: 339: 337: 322: 316: 315: 304: 114: 107: 103: 100: 94: 92: 51: 27: 19: 506: 505: 501: 500: 499: 497: 496: 495: 476: 475: 474: 473: 464: 463: 459: 449: 447: 443: 436: 430: 426: 417: 415: 405: 401: 391: 389: 374: 370: 361: 359: 349: 345: 335: 333: 323: 319: 306: 305: 301: 296: 274: 253: 246: 242: 237: 211: 164: 140: 134: 126:cellular device 115: 104: 98: 95: 58:"Phone cloning" 52: 50: 40: 28: 17: 12: 11: 5: 504: 494: 493: 488: 472: 471: 457: 424: 399: 368: 343: 317: 298: 297: 295: 292: 291: 290: 285: 280: 273: 270: 252: 249: 244: 240: 235: 210: 207: 201:(PRL) and the 163: 160: 136:Main article: 133: 130: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 503: 492: 489: 487: 484: 483: 481: 467: 461: 442: 435: 428: 414: 410: 403: 387: 383: 379: 372: 358: 354: 347: 332: 328: 321: 313: 309: 308:"GSM Cloning" 303: 299: 289: 286: 284: 281: 279: 276: 275: 269: 266: 261: 258: 257:United States 248: 238: 230: 225: 223: 219: 215: 206: 204: 200: 196: 192: 189:(ESN) and/or 188: 184: 180: 176: 168: 159: 157: 153: 149: 145: 144:narrowband FM 139: 129: 127: 123: 122:Phone cloning 113: 110: 102: 99:February 2014 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 460: 448:. Retrieved 427: 416:. Retrieved 412: 402: 390:. Retrieved 381: 371: 360:. Retrieved 356: 346: 334:. Retrieved 330: 320: 311: 302: 262: 254: 226: 212: 173: 162:CDMA cloning 141: 132:AMPS cloning 128:to another. 121: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 336:October 24, 209:GSM cloning 179:file system 480:Categories 418:2023-07-23 362:2019-04-05 294:References 69:newspapers 441:Archived 386:Archived 382:Ericsson 278:Dual SIM 272:See also 218:SIM card 413:YouTube 392:26 July 229:COMP128 83:scholar 450:26 Jul 357:MovZio 183:EEPROM 85:  78:  71:  64:  56:  486:Fraud 444:(PDF) 437:(PDF) 331:iMore 90:JSTOR 76:books 452:2023 394:2023 338:2017 62:news 214:GSM 152:PIN 45:by 482:: 439:. 411:. 384:. 380:. 355:. 329:. 310:. 454:. 421:. 396:. 365:. 340:. 314:. 245:i 241:i 236:i 234:K 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Phone cloning"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
cellular device
Advanced Mobile Phone System § Cloning
narrowband FM
Electronic Serial Numbers
PIN
radio fingerprinting

Code-Division Multiple Access
file system
EEPROM
Electronic Serial Number
Mobile Equipment Identifier
Mobile Telephone Switching Office
Preferred Roaming List
mobile identification number
GSM
SIM card
International Mobile Equipment Identity
COMP128

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.