Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
Old November 2nd 03, 01:49 AM
Phil Kane
 
Posts: n/a
Default

On 31 Oct 2003 17:35:18 -0800, Brian wrote:

That's why you find guys at the other end of the tunnel standing by
with computer controlled "law enforcement" scanners logging all the
codes as you pop out the other side and handshake with the local cell
site.

Then they sell them to Taliban operatives and drug dealers.


And they sell then to the guys who sell them to other guys who clone
cellphones which are sold to still other guys who set up curbside
"telephone booths" in immigrant neighborhoods to call relatives in
foreign countries at "discount rates".

At least they did have been doing those things for the last 10 years.

--
73 de K2ASP - Phil Kane


  #2   Report Post  
Old November 4th 03, 10:11 PM
Dennis Ferguson
 
Posts: n/a
Default

Phil Kane wrote:
On 31 Oct 2003 17:35:18 -0800, Brian wrote:

That's why you find guys at the other end of the tunnel standing by
with computer controlled "law enforcement" scanners logging all the
codes as you pop out the other side and handshake with the local cell
site.

Then they sell them to Taliban operatives and drug dealers.


And they sell then to the guys who sell them to other guys who clone
cellphones which are sold to still other guys who set up curbside
"telephone booths" in immigrant neighborhoods to call relatives in
foreign countries at "discount rates".

At least they did have been doing those things for the last 10 years.


I don't think this happens very often any more, however. All the digital
phone standards I know about (CDMA, TDMA and GSM, I don't know about iDEN)
use encryption, both on the control channel and for the voice payload.
While I've seen academic criticism of the algorithms they use, I don't
think there is a practical way for a guy with a scanner hearing the
signals to crack this. Digital mobile phone service is still secure for
practical purposes.

The cellphone cloners used to get their data from the AMPS control
channel, which was unencrypted, but I'm pretty sure there are no cell
phone companies left which sell exclusively analog phone service (it has
probably been 5 years or more since you could buy an analog-only phone).
AMPS support continues to exist, by FCC mandate, only to support
off-network roaming, which means that pretty much the only AMPS users
you're likely to find are people away from home in rural areas not covered
by their provider's digital service. This is a small enough population
that the reduced opportunities for fraud of this type hardly justify
the cost of the equipment for programming the phones.

I think these days the bulk of cell phone fraud is subscriber fraud,
where service is obtained using someone else's name and personal
information.

Dennis Ferguson
  #3   Report Post  
Old November 5th 03, 05:09 AM
Phil Kane
 
Posts: n/a
Default

On 4 Nov 2003 21:11:38 GMT, Dennis Ferguson wrote:

I think these days the bulk of cell phone fraud is subscriber fraud,
where service is obtained using someone else's name and personal
information.


That's what my sources tell me.

--
73 de K2ASP - Phil Kane


Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Governmental activities. Boston Public Library. Don Saklad Boatanchors 0 January 24th 04 07:04 AM
Bush's policies send state finances into the toilet Killa T General 5 August 7th 03 07:32 PM


All times are GMT +1. The time now is 08:11 PM.

Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright ©2004-2025 RadioBanter.
The comments are property of their posters.
 

About Us

"It's about Radio"

 

Copyright © 2017