- Shopping Bag ( 0 items )
Ships from: Orlando, FL
Usually ships in 1-2 business days
About the Author:
Penelope Stetz has worked in the wireless industry for over ten years selling cellular phones directly to end-users. As one of Motorola's top cellular salesmen, she was nominated in 1993 for Salesman of the Year for all Pan American Cellular Sales. She also helped develop Motorola's Data-on-Cellular training manual, video and CD-ROM as contributing editor. Today, Penny operates her consulting firm, PhoneTech Wireless Consultants (http://www.phonetech.cc), and resides in Euclid, Ohio.
You know you've been cloned when you see an outrageous phone bill, where your mastery of space/time travel is evidenced by the fact that you placed roaming calls from two different markets at the same time! It is also obvious to the carrier that your phone was cloned; it can recognize the patterns. The carrier credits you for the fraudulent charges, which then become a fraud write-off to the carrier. You are issued a new phone number, and your phone is reprogrammed with this new number. This breaks the mobile number/ESN combination by matching a new mobile number to your ESN and renders the old mobile number/ESN combination useless. If keeping your mobile number is important to you, see if you can arrange to have your ESN changed.
The FCC made cloning illegal, and, in 1995, it also made altering theESN by anyone other than the manufacturer illegal. Now, the government has taken another step to crack down on cloning. In the spring of 1998, the Wireless Telephone Protection Act (H.R. 2460) passed, making it illegal to "knowingly use, produce, traffic in, have control or custody of, or possess hardware or software, knowing it has been configured for altering or modifying a telecommunications instrument so that such instrument may be used to obtain unauthorized access to telecommunications services." This means that both the customers who are buying illegally altered equipment, as well as the people who actually do the cloning, are subject to prosecution. First-time convictions are punishable by fine and/or imprisonment up to 15 years. Second convictions are punishable by fine and/or imprisonment up to 20 years.
The magnitude of fraud charges written off by carriers in the United States exceeds $1 million a day! Carriers have taken proactive approaches to reduce fraud write-offs, such as implementing usage profiles. This is a measure that raises a flag if your usage deviates from your established profile. Say, for example, you usually don't roam, or very little, and your normal usage averages 10 minutes a day. If your phone is used 60 minutes a day in a roaming market, you will probably get a call from the carrier asking if the usage is legitimate. If the carrier can't reach you, your phone number may be suspended, requiring you to call your service provider to get your phone working again. Profiling isn't limited to roaming activity. It applies to usage in your home market, as well.
Radio frequency (RF) fingerprinting
In addition to profiling, the carriers are implementing RF fingerprinting (which is switch dependent) and authentication (which is phone and switch dependent). With RF fingerprinting, each wireless phone has a unique and distinguishable RF signature. Cell site RF fingerprinting units build a wireless phone RF fingerprint of your phone by collecting data from several transmissions. This RF fingerprint is stored at the MTSO. Then, all subsequent calls you place are validated with the stored RF fingerprint information to determine if you are a legitimate subscriber. This validation process takes place before the call is actually processed so that a thief using your mobile number/ESN combination in another phone will not be able to place a call.
Authentication is being implemented on analog equipment, but it is built into digital systems. Authentication uses an A-key, which is 26 characters in length. Only the phone and the switch know the A-key. Think of it as a numeric version of your mother's maiden name. If only you and I know your mother's maiden name, and I ask you what the fifth letter is, you can tell me. A thief may have your mobile number/ESN combination, but as the Akey is never transmitted, he is unable to obtain this vital element to respond to the challenge and, therefore, is unable to place a call. Because the Akey is 26 characters long and contains numbers, the switch has an endless variety of challenges for the phone. The challenge occurs when you initiate a call and takes only seconds to complete.
A fraud deterrent that has been around for a few years is the use of a PIN code. PIN codes can be used several ways. Some carriers require you to dial the PIN code immediately following your outbound number each time you place a call, so your dialing sequence will be: 1-800-555-1212 SEND (stuttered dial tone) 1234 (PIN code) SEND.
Other carriers require you to "open" your phone use by dialing *560-XXXX (the Xs are your fourdigit PIN) SEND. Then you "close" your usage when you are finished making calls by dialing *56 SEND. Sometimes carriers require you to establish a PIN code that will be used only when you roam. Usually, you are prompted for the PIN code the first time you try to place a call in the roaming market. Depending on the market and the relationship between the carriers, this may be the only time you are prompted to enter your PIN code for the duration of your visit. On the other hand, you may need to reenter it with the first call you make each day you are roaming.
As fraud-deterrent measures are implemented in analog cellular and as digital service becomes more available, cloning is less accessible to the thief. A growing kind of fraud being perpetrated on wireless carriers is subscriber fraud. In this case, someone subscribes to a carrier for wireless service with no intention of paying for his or her airtime charges. This is accomplished through the deliberate use of invalid or false credentials such as name, address, social security number, tax ID, etc.
There are several steps you can take to reduce or prevent your chances of being cloned. First, pay attention to your phone bill. Sometimes cloning fraud goes on for months, gradually building up. Noticing fraudulent activity on your phone bill and report it promptly should reduce the amount of fraud charges, but won't necessarily eliminate the need to change your phone number. Second, if you are replacing your old phone and buying an analog phone, ask if it is capable of authentication and whether or not the carrier supports authentication. If it fits into your budget, consider buying a digital phone, which all but eliminates your risk of being cloned.
More information about carrier solutions to fraud can be found at CTIA's Web site (www.wow-com.com /professional/fraud)....
Three Types of Wireless Phones
Getting the Most Out of This Book
How To Use This Book
From Car Phones To Cellular Phones
2. HOW WIRELESS TELEPHONY WORKS
Basic Concepts of Wireless Telephony
3. ACQUIRING WIRELESS EQUIPMENT AND SERVICE
Where Do I Buy It?
What Is Roaming?
Making and Receiving Calls While Roaming
6. USING WIRELESS PHONES FOR DATA
Wireless Phone Etiquette
One Phone, One Number, Anywhere!
Equal Access For Long Distance
North American Numbering Plan
Local Number Portability
9. FREQUENTLY ASKED QUESTIONS-FAQs
Are cellular phones safe to use (for my health)?
How can I prevent my wireless phone number from being read on caller ID devices?
What is a NAM (number assignment module)?
What information should I know about my wireless phone, and why?
What should I do if I lose my phone?
What is a SID?
How does my phone know that I am in my home market?
Why does my phone say NO SERVICE when I first turn it on?
Why do my calls drop?
Why doesn't my phone retain the feature changes I made?
Why do I lose my signal when I go into a building or drive into a garage or valley?
Why do I get a system-busy indication when I should have service (or have had service in the same area before)?
Sometimes my call gets very staticky, and then it clears up. What happened here?
How can I have a digital phone on an analog system?
How does cellular compare to the new PCS services available?
Why can't I use my phone out of town?
What is dual NAM?
Subscribing to more than one system-why would I want to?
Which carrier is offering dual NAM in my market?
Can I have one number on two phones?
How do I erase a stored number?
My car kit drains my car's battery. Why?
What can I do about it?
What about cellular in other countries?
Can I use a wireless phone on an airplane?
Where can I rent a wireless phone?
Appendix A-Equipment Manufacturers
Posted May 8, 2000
A MUST read for anyone who wants to know a little or a lot about cellular service. The Cell Phone Handbook can give you all the information, (and then some,) that you need to become a knowledgeable member of the wireless phenom. If you happen to be in the cellular industry then as a reference guide it can't be beat as it is also more than the basics. From basics to advanced the education you gain from this book will make it well worth the money. Well written and succinct. The GLOSSARY alone makes this book a bargain!Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted February 23, 2000
Penelope Stetz ably covers a lot of ground, clearly describing cell phone technology as well as the pros and cons of various types of wireless equipment and services. This book is a model of how to explain a technical subject for both beginners and experienced users.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted December 9, 1999
This book is a very well written and in-depth treatment of cellular telephony technology. Not only does it provide extensive coverage of the basics of cell phone technology, it also covers more advanced topics such as roaming and zoning. If you've been unfortunate enough to fall into the trap of a cell phone service provider with a '$20/month' plan and soon realized that you're trapping footing $60/month bills for your service, you'll soon realize why this book is is also very practical. I love the way the author discusses (p.75) the process of making service choices using an interactive worksheet. Having taught classes on telecommunications in a business school at the university level, and having gone through the proces of making a book choice for my entire classes, I truly believe that this book is the best I've seen on the topic. A comprehensive index, a fun to read FAQ chapter (that answers questions that are sometimes even embarrasing to ask), and a clear writing stuyle make this a cool addition to my book shelf. For sure, this book is worth every dollar.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.