{"id":176765,"date":"2017-02-11T08:31:16","date_gmt":"2017-02-11T13:31:16","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/phone-cloning-wikipedia\/"},"modified":"2017-02-11T08:31:16","modified_gmt":"2017-02-11T13:31:16","slug":"phone-cloning-wikipedia","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/phone-cloning-wikipedia\/","title":{"rendered":"Phone cloning &#8211; Wikipedia"},"content":{"rendered":"<p><p>    Phone cloning is the transfer of identity from one    cellular device to another.  <\/p>\n<p>    Analogue mobile telephones were notorious for their lack of    security. Casual listeners easily heard conversations as plain    narrowband FM; eavesdroppers with    specialized equipment readily intercepted handset Electronic Serial Numbers (ESN)    and Mobile Directory Numbers (MDN or CTN, the Cellular    Telephone Number) over the air. The intercepted ESN\/MDN pairs    would be cloned onto another handset and used in other regions    for making calls. Due to widespread fraud, some carriers    required a PIN before making    calls or used a system of radio fingerprinting to detect    the clones.  <\/p>\n<p>    Code Division Multiple    Access (CDMA) mobile telephone cloning involves gaining    access to the device's embedded file system \/nvm\/num directory via    specialized software or placing a modified EEPROM into the target mobile    telephone, allowing the Electronic serial number (ESN)    and\/or Mobile Equipment Identifier    (MEID) of the mobile phone to be changed. The ESN or MEID is    typically transmitted to the cellular company's Mobile Telephone Switching    Office (MTSO) in order to authenticate a device onto the    mobile network. Modifying these, as well as the phone's    Preferred Roaming List (PRL) and    the mobile identification    number, or MIN, can pave the way for fraudulent calls, as    the target telephone is now a clone of the telephone from which    the original ESN and MIN data were obtained.  <\/p>\n<p>    Cloning has been shown to be successful on CDMA, but rare on    GSM. However, cloning of a    GSM phone is achieved by cloning the SIM card contained within,    but not necessarily any of the phone's internal data. GSM    phones do not have ESN or MIN, only an International    Mobile Station Equipment Identity (IMEI) number. There are    various methods used to obtain the IMEI. The most common    methods are to hack into the cellular company, or to eavesdrop    on the cellular network.  <\/p>\n<p>    A GSM SIM card is copied by removing the SIM card and placing a    device between the handset and the SIM card and allowing it to    operate for a few days and extracting the KI, or secret    code.[citation    needed] This is normally done with    handsets that have the option of an \"extended battery\" by    placing the normal size battery in the handset and the    KI[clarification    needed] in the now vacant extra space.    This is done by allowing the device to log the interaction    between the mobile telephone switching office and the handset.  <\/p>\n<p>    Phone cloning is outlawed in the United States by the Wireless    Telephone Protection Act of 1998, which prohibits \"knowingly    using, producing, trafficking in, having control or custody of,    or possessing hardware or software knowing that it has been    configured to insert or modify telecommunication identifying    information associated with or contained in a    telecommunications instrument so that such instrument may be    used to obtain telecommunications service without    authorization.\"[1]  <\/p>\n<p>    The effectiveness of phone cloning is limited. Every mobile    phone contains a radio fingerprint in its    transmission signal which remains unique to that mobile despite    changes to the phone's ESN, IMEI, or MIN. Thus, cellular    companies are often able to catch cloned phones when there are    discrepancies between the fingerprint and the ESN, IMEI, or    MIN.[citation    needed]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/en.wikipedia.org\/wiki\/Phone_cloning\" title=\"Phone cloning - Wikipedia\">Phone cloning - Wikipedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Phone cloning is the transfer of identity from one cellular device to another. Analogue mobile telephones were notorious for their lack of security. Casual listeners easily heard conversations as plain narrowband FM; eavesdroppers with specialized equipment readily intercepted handset Electronic Serial Numbers (ESN) and Mobile Directory Numbers (MDN or CTN, the Cellular Telephone Number) over the air <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/phone-cloning-wikipedia\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187749],"tags":[],"class_list":["post-176765","post","type-post","status-publish","format-standard","hentry","category-cloning"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176765"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176765"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176765\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}