This document discusses vulnerabilities in smartphone International Mobile Equipment Identity (IMEI) numbers and methods for detecting and reporting changed IMEI numbers. It provides background on IMEI structure and numbers, how they uniquely identify devices. It also describes common methods hackers use to change IMEI numbers, such as hardware and software tools available online, to avoid detection of lost or stolen phones. The document proposes potential methods to prevent IMEI number changes and locate lost/stolen devices.