Activities involving access devices and equipment

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Activities involving access devices and equipment

Cellular telephone cloning activities, involving use of electronic scanning and computer programming equipment to erase and reprogram electronic chips containing a cellular phone's electronic serial number and mobile identification number with the account number of another user, such that calls made on modified phone would be charged to other user's account, violates the statute prohibiting knowing possession, production, use, and trafficking of counterfeit access devices and access device equipment. This was true, even before the statute was amended to specifically address cellular telephone cloning.FN53