TUCoPS :: Phreaking Cellular - Misc. :: celtheft.txt

Cellular scam facts & stats

     One of every 10 Americans now has a cellular telephone. And the number
is growing fast: Every day, 28,000 more are hooked up. 
     First of two parts

     That's 28,000 more people vulnerable to high- tech highway robbery.
     The Cellular Telecommunications Industry Association (CTIA) reports a
total of $482 million in fraud for 1994, or about 3.7% of total industry
revenues, up from $365 million in 1993.
     The industry is adopting new technology in its effort to stay one step
ahead of cellular thieves. You can help, by adopting your own fraud
prevention techniques.
     First, it helps to understand how cellular phones work. With today's
technology, small geographic areas or ''cells'' each have a tower with a
transmitter and receiver. As you drive from one cell to another, your call is
handed over to the next tower and the channel you were on can then be used by
someone else.
     There are three types of cellular phones. Mobile phones are installed in
automobiles and operate off of the car battery. Transportable phones plug
into the cigarette battery in your car or can be taken with you. And small
hand-held portables - the smallest weigh only about four ounces - can fit in
your briefcase or purse and travel wherever you go.
     Every cellular phone has two identification numbers. The manufacturer
installs an electronic serial number, referred to as the ESN, and the carrier
assigns a mobile identification number, or the MIN, similar to the telephone
number on your home phone.
     The ESN is supposed to be fixed and unchangeable. The MIN can change,
since the phone itself could change hands or a customer could move to another
city.
     When an account is activated, the two numbers are paired and stored in
the cellular carrier's computer switch. But the numbers are vulnerable.
     The first massive wave of cellular fraud involved ''tumbling,'' or using
a random series of electronic serial numbers so that calls appeared to be
made by new customers or by customers outside their local calling area. The
industry effectively put a stop to tumbling by moving to pre- call
verification. Now calls do not go through unless both numbers match.
     Today's big problem is ''cloning,'' in which thieves use software to
reprogram stolen numbers into a cellular phone so that the phone, and the
caller, appear legitimate.
     Numbers are easily stolen. Since signals are blocked in underpasses and
most tunnels, and then must be re-sent, criminals often stand on an overpass
or just beyond a tunnel exit to pick up cellular numbers with high-tech
scanning devices. Another popular location, according to Michael Houghton of
CTIA, is outside airport terminals, where arriving passengers frequently turn
on their cellular phones.
     This type of fraud used to be discovered only when a customer complained
about a bill loaded with calls to unfamiliar numbers. Today carriers are
trying to stop cloning before it starts.
     Some carriers are using personal identification numbers, although users
often find it a nuisance to enter another set of digits.
     On another front, less visible to customers, more than a dozen vendors
are developing monitoring systems to be used by cellular carriers. Cellular
Technical Services of Seattle, for example, is marketing software that, in
the words of Cellular's president Bob Dahut, ''puts up a wall between the
thieves and the carrier's cellular system.''

     The system, called Blackbird, uses radio fingerprinting plus other
distinctive characteristics to identify each telephone. When the software is
in use, the carrier's system can shut down a cloned phone as soon as the
caller presses the ''send'' button.
     As the cellular industry moves to digital phones, which will code
conversations into a stream of data bits instead of directly transmitting
voices, new technological forms of authentication will be employed and
numbers will be harder to steal.
     Most of the anti-fraud war, as Houghton puts it, ''is being waged behind
the scenes by the carriers.'' But customers can help by alerting carriers to
anything unusual. CTIA lists the following protective measures you can take
as a cellular customer:

Lock the phone or, if it's removable, take it with you when you leave your
car, even if it's in an attended garage or with a mechanic.

Be careful with your paperwork, which contains your electronic serial
numbers. Don't leave documents in your glove compartment.

If you are in an area where the signal must be re-sent, either coming out of
a tunnel or leaving an airport, wait a few minutes before turning on your
phone. The delay, says Houghton, lets you get away from the area where
thieves might be scanning.

Watch out for unusual activity on your monthly cellular phone bill, and
report suspicious calls to your carrier. (Some carriers are now monitoring
calling patterns and may detect unusual calls before you do.)

If you don't plan to use your cellular phone to make long-distance calls in
general, or international calls in particular, ask your carrier to shut down
this service. ''Call-selling'' operations frequently use counterfeit cellular
phones to provide international calling service to customers throughout North
America.

Don't assume frequent hang-ups or wrong numbers are the result of simple
error on a caller's part. They should be reported to your carrier because
they may indicate that someone else is using your mobile number.

If you become aware of illegal wireless phone activity, you can report it to
CTIA's Fraud Task Force via the Internet. The E-mail address is:
cell-fraud@tmn.com. Tipsters who wish to remain anonymous can type:
an205326@anon.penet.fi.
     Tuesday's News For You will discuss other types of phone fraud,
including ''slamming,'' the unauthorized switching of long-distance services.


////////////////////////////////////////////////////////////
Copyright (c)  1995 Investors Business Daily, All rights reserved.
Investor's Business Daily - Investor's Corner (04/24/95)
Arm Yourself Against The Cellular Bandits
By Grace W. Weinstein


Transmitted: 95-04-21 22:25:08 EDT (aaaa4opv)


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH