. . . "A system requiring no modification to the cellular telephone is most easily implemented but the security of such a system is not as great as when the cellular telephone is modified." .