Mobile communication has been readily available for several
years, and is major business today. It provides a valuable service to its users
who are willing to pay a considerable premium over a fixed line phone, to be
able to walk and talk freely. Because of its usefulness and the money involved
in the business, it is subject to fraud. Unfortunately, the advance of security
standards has not kept pace with the dissemination of mobile communication.
Some of the features of mobile communication make it an
alluring target for criminals. It is a relatively new invention, so not all
people are quite familiar with its possibilities, in good or in bad. Its
newness also means intense competition among mobile phone service providers as
they are attracting customers. The major threat to mobile phone is from
cloning.
Cell phone cloning is
copying the identity of one mobile telephone to another mobile telephone. Usually
this is done for the purpose of making fraudulent telephone calls. The bills
for the calls go to the legitimate subscriber. The cloner is also able to make
effectively anonymous calls, which attracts another group of interested users. Cloning
is the process of taking the programmed information that is stored in a
legitimate mobile phone and illegally programming the identical information
into another mobile phone. The result is that the "cloned" phone can
make and receive calls and the charges for those calls are billed to the legitimate
subscriber. The service provider network does not have a way to differentiate
between the legitimate phone and the "cloned" phone.
• Blacklisting of
stolen phones is another mechanism to prevent unauthorized use. An Equipment
Identity Register (EIR) enables network operators to disable stolen cellular
phones on networks around the world.
• User
verification using Personal Identification Number (PIN) codes is one method for
customer protection against cellular phone fraud.
• Tests conducted
have proved that United States found that having a PIN code reduced fraud by
more than 80%.
• Traffic analysis
detects cellular fraud by using artificial intelligence software to detect
suspicious calling patterns, such as a sudden increase in the length of calls
or a sudden increase in the number of international calls.
Presently the cellular phone industry relies on common law
(fraud and theft) and in-house counter measures to address cellular phone
fraud. Mobile Cloning is in initial stages in India so preventive steps should be
taken by the network provider and the Government the enactment of legislation
to prosecute crimes related to cellular phones is not viewed as a priority,
however. It is essential that intended mobile crime legislation be
comprehensive enough to incorporate cellular phone fraud, in particular
"cloning fraud" as a specific crime.
0 comments: