GSM cloning occurs by copying a secret key from the victim
SIM card, typically not requiring any internal data from the handset (the phone itself). GSM handsets do not have ESN or MIN, only an
International Mobile Equipment Identity (IMEI) number. There are various methods used to obtain the IMEI. The most common method is to eavesdrop on a cellular network. Older GSM SIM cards can be cloned by performing a cryptographic attack against the
COMP128 authentication algorithm used by these older SIM cards. By connecting the SIM card to a computer, the authentication procedure can be repeated many times in order to slowly leak information about the secret key. If this procedure is repeated enough times, it is possible to derive the
Ki key. Later GSM SIMs have various mitigations built in, either by limiting the number of authentications performed in a power on session, or by the manufacturer choosing resistant Ki keys. However if it is known that a resistant key was used, it is possible to speed up the attack by eliminating weak Ki keys from the pool of possible keys. == Effectiveness and legislation ==