Accustomed to a monthly cell phone that rarely reaches 100 dollars a day you are faced with an absurd charge of two thousand dollars in bonds. The numbers reported are the most varied, even including some located in the United States - looks and you barely scratches and never spoke English with a foreigner.
Unless you have your phone stolen (or a relative who took the secret), chances are that the cell has gone through a cloning process.
Evil twin brother
A cloned cell phone it is a faithful copy of a device, which has exactly the same "DNA" of a device legalized - in this case, both share the same dial-in number and identification number used by the manufacturer. The difference lies in the fact that the person using the cloned device does not have to worry about bills that are sent only to the legal owner of the line.
Devices with this feature are used by fraudsters as a way to make expensive phone calls, leaving the issue to bear the costs for the person who had copied the information from the device.
CDMA: the great danger
Cloning of numbers proves more successful in devices that rely on CDMA technology, and, although it also affects devices with GSM technology, it shows much more rare here.
While CDMA phones have an electronic serial number (ESN) and a mobile identification number (MIN), those with GSM technology are identified only by the IMEI (International Mobile Equipment Identity) number of globally-unique identification for each cell , which shows a major barrier to counterfeiters.
To capture the information on a laptop, criminals often use a device known as a scanner capable of detecting and recording information of the devices in the vicinity. In the case of GSM phones, the cloning is done by copying the SIM card used by the user - a process more difficult to achieve and that discourages criminal activity.
The position of the operators
In a statement sent to Tecmundo, Vivo reports that, currently, the cloning of mobile lines is related exclusively to the use of phones in the CDMA network. According to the operator for more than one year is not detected this type of fraud among the company's customers.
Still, the company says it monitors the situation steadily and, if cloning proves the occurrence of the equipment, return the amounts charged to the customer. If the customer has had his suspicions that cloned device should open a protocol through the Call Center * 8486 or in stores Vivo.
Also got in touch with TIM for clarification of the problem. However, until the time of closing this article, we did not get a response regarding the positioning of the operator.
Symptoms of infection
Like most diseases, you can only suspect that the phone was cloned when they start seeing the first symptoms. Among the most common problems is the difficulty of completing phone calls and receiving calls from distant cities by unknown persons.
Another problem is the interception of calls made by friends who, despite dialing the correct number, just talking to a stranger. Moreover, the difficulties are common to complete calls, which tend to be marked by the fall in frequent communication.
The clearest sign that there is a problem is the emergence of telephone bills inconsistent with normal use. Although not always a wrong charge means that there is a copy floating around the device, such an occurrence is the strongest indication that the consumer can have that there is something wrong with the signature line.
Actions to be taken
The first step to follow if you suspect of cloning is to contact the service provider and request use of the blockade line. This should be done immediately when there is so much suspicion of fraud in the event of loss or misplacement of the device.
According to Anatel, when a complaint is made by telephone, it is essential to note the store clerk's full name, date, time and number of the report generated at the time of termination. If the complaint was made directly by the customer must obtain a printed copy of the recorded occurrence.
How to protect yourself from scam
Although anyone is susceptible to having your phone cloned, some simple measures can make it difficult for fraudsters to access information on the equipment used:
If you have an old phone, try to replace it with one compatible with newer technologies;
In case of damage to the appliance, look for manufacturers or authorized representatives workshops known for integrity;
Review monthly invoice sent by the service provider and, if possible, avoid opting for debit account;
When you receive calls from people identified as employees of the operators, shut down automatically if requested pressing a few keys;
Avoid connecting the phone in roads and airports, major sites of action of fraudsters equipped with scanners. If the appliance from roaming, communication can be made with the central through unencrypted FM waves, which facilitates the capture of sensitive information;