Phone monitoring, also called "tapping," and cloning are two examples of phone fraud. These processes involve an individual who hacks your phone from a close or remote location and then uses your cell phone number on his own phone to make calls and send text messages. This leads to outrageous phone bill charges, often reaching into the thousands of dollars, and theft of personal information from your phone. Although there are several ways to find out whether or not your phone is being tapped, the first step is to closely examine the details of your monthly cell phone bill.
Obtain a copy of your cell phone bill with text and voice details displayed. Do this by either logging on to your online phone bill account and viewing your usage, or by requesting a paper copy of your bill from your wireless provider.
Inspect your cell phone's bill usage details carefully. Look for indications your cell phone may be cloned or tapped. Characteristics of this on a phone bill include but are not limited to: spikes in voice, data or text usage, appearance of unfamiliar phone numbers and long-distance calls not made by you.
Note all instances on the phone bill that are suspicious and/or inconsistent with your usage. Record each inconsistency in a logbook with all the details of the suspicious activity, such as the phone numbers, talk times, dates, times and numbers (if available) to which the calls were made.
Notice particular times when your cell phone is unusable. Cloned phone numbers work by using the same phone number as yours, so it is likely you will receive messages on the phone saying the "number is already in use," or the phone may simply not dial out or receive calls or messages.
Log these "blackout" times in your logbook. If the problem persists, contact your wireless service provider immediately and let them know the problem. This usually results in an audit of your cell phone usage to determine and solve the issue.