Cellular phone security has come a long way since the days when the old analog networks were in place. Cellular fraud became a serious problem which occurred at a rather high rate. Although today's modern digital networks and cell handset manufacturers have taken extraordinary steps toward making cell phone fraud more difficult, there are some ill-intentioned individuals who continue to find ways to circumvent even the highest state of modern technology. Cell phone cloning is one of the most notorious methods of cell phone fraud, and the customer must monitor cellular usage on a regular basis. Thankfully, cellular providers keep excellent records of all numbers called from your handset on a monthly basis.
Video of the Day
Use a computer connected to the Internet and visit your cellular provider's website. Sign up for your provider's online account management system so you can have immediate access to your billing and use information, even before your paper bill arrives by mail.
Take special note of any times where you may be unable to use your phone. Since a cloned cell phone appears identical to yours, you may discover that you are given messages stating that the mobile number is already in use, or you may find that you are unable to initiate or receive calls while the clone is being used by the perpetrator.
Record the times, dates and frequency of these "cell usage blackouts" you may be experiencing and, if they are occurring for long durations and repeatedly throughout each day, contact your cellular provider with your concerns that you feel your phone may have been cloned.
Cooperate with your cellular provider if asked for your permission for the company to initiate a detailed audit of your cell usage. The company will send you a highly detailed list of phone calls sent or received on your account over the month, and your provider will most likely ask that you highlight all numbers, dates and times which you are unfamiliar with.