top of page
griffin jd.jpg

PROJECT: CELL PHONE CLONING

PLEASE SHARE THIS PUBLIC DOCUMENT

 

While specific statistics on cell phone cloning in South Africa are scarce, identity fraud, which encompasses activities

like cell phone cloning, has seen a significant rise. According to the Southern African Fraud Prevention Service (SAFPS), impersonation fraud surged by 400% between April 2023 and April 2024.

This alarming increase highlights the growing threat of identity-related crimes in the country.

 

Please read the relevant eNCA-article of 21 February 2025:

 

In the financial sector, identity fraud has been particularly prevalent. SAFPS reported that 43.47%

of the 8,521 fraud cases opened with the Ombudsman for Banking Services in 2023 involved identity fraud.

This underscores the substantial impact of such fraudulent activities on the banking industry and its customers.


Additionally, a study by LexisNexis revealed that for every rand lost to fraud in South Africa, businesses incur

an additional R3.64 in associated costs. The study also noted that fraud increased for 49% of South African

organisations year-on-year, with digital channels accounting for more fraud losses than physical channels.

 

These statistics emphasise the need for heightened awareness

and robust security measures to combat identity fraud and

related crimes in South Africa.

 

DEFINITION:

  • Cell phone cloning is when criminals copy a phone's identity, including its SIM card details and unique identifiers, to create a duplicate.

  • This allows them to make calls, receive messages, and access accounts as if they were the actual owner.

 

FREQUENCY:

  • It is more common than people think, but exact numbers are hard to track because cases often go unreported.

  • High-profile cases, like government officials having their phones cloned, show that this is a real and growing threat.

 

CELLPHONE CLONING WITH REGARDS TO IDENTITY THEFT:

  • Once a phone is cloned, criminals can impersonate the victim.

  • They can access bank accounts, reset passwords, and even trick friends and family into sending money or sharing sensitive information.

 

TECHNOLOGY OR METHODS USED BY CRIMINALS TO CLONE A CELLPHONE:

  • One common method is SIM card cloning, where criminals copy the SIM data onto another card.

  • Another is phishing—sending fake messages or emails to trick people into giving away personal information.

  • Some hackers even use special devices to intercept signals and steal phone details remotely.

 

SIGNS THAT A PHONE IS CLONED:

  • Look out for unusual activity—calls or texts you did not send, strange charges on your bill, difficulty making calls, or receiving two-factor authentication codes you did not request.

 

ONCE A PHONE IS CLONED, CRIMINALS CAN DO THE FOLLOWING:

  • They can make expensive calls;

    • access your banking apps;

    • scam people in your contact list;

    • or even commit fraud in your name.

  • It can take weeks or months to fix the damage.

 

CELL PHONE CLONING WITH REGARDS TO FINANCIAL FRAUD AND SCAMS:

  • It is a goldmine for criminals.

  • By intercepting SMS-based banking codes, criminals can drain accounts.

  • They also use cloned phones to impersonate people in WhatsApp scams, asking friends and family for money.

 

SAFETY MEASURES TO AVOID BECOMING A VICTIM:

  • Use strong passwords and change them regularly.

  • Enable two-factor authentication using an authenticator app, not SMS.

  • Be careful where you share personal information.

  • Check your phone bill for unknown charges.

  • Do not click on suspicious links in emails or messages.

 

WHAT TO DO WHEN YOU SUSPECT YOUR CELLPHONE HAS BEEN CLONED:

  • Call your network provider to block your SIM.

  • Change all passwords linked to your phone.

  • Report the fraud to the police and your bank if financial information was accessed.

 

LAWS COMBATTING CELLPHONE CLONING AND IDENTITY THEFT IN SOUTH AFRICA:

  • The Electronic Communications and Transactions Act (ECTA) and the Protection of Personal Information Act (POPIA) help protect people, making it illegal to clone phones and steal personal data.

 

LAW ENFORCEMENT'S EFFECTIVENESS IN COMBATTING THESE CRIMES:

  • Police and cybercrime units are improving, but it is still a challenge.

  • These crimes require advanced tech skills to investigate, and criminals often operate from outside the country.

  • Prevention is key.

 

Stay alert! If something feels off with your phone, act fast.

Protect your personal information, and never share sensitive details over the phone or email.

 

PREVIOUS PROJECTS:

 

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

 
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
 

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

 
SSS TASK TEAM:
 
 

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

951 views0 comments

Recent Posts

See All

Comments


CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
Mike Bolhuis WhatsApp contact

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page