Newsletters
Technology, Discovery & Innovation NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Computing Digital Life Discovery Space More Topics...
Digital Life
Average Rating:
Rate this article:  
FCC Unveils Initiative To Thwart Mobile Device Theft

FCC Unveils Initiative To Thwart Mobile Device Theft
By Mark Long

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

"We're sending a message to consumers that we've got your back, and a message to criminals that we're cracking down on the stolen phone and tablet resale market and making smartphone theft a crime that doesn't pay," said FCC Chairman Julius Genachowski. A new database will halt reuse of stolen mobile devices on GSM networks.
 

Related Topics

FCC
CTIA
Mobile Device Theft


The Federal Communications Commission is spearheading an effort to crack down on the theft of smartphones and tablets, which account for roughly 40 percent of all theft-related crimes in major metropolitan markets such as New York City and Washington, D.C.

Among other things, the new Protects Initiative will establish a national database that will enable wireless carriers and consumers to reduce the black market value of stolen devices by turning them off. Other elements of the new program include providing consumers with the requisite tools for locking a lost or stolen mobile device or remotely erasing personal data.

Through the CTIA wireless trade association, major mobile device makers and the major U.S. network operators have agreed to ensure that devices they sell include automatic prompts to make consumers aware that they need to set up passwords.

"We're sending a message to consumers that we've got your back, and a message to criminals that we're cracking down on the stolen phone and tablet resale market and making smartphone theft a crime that doesn't pay," said FCC Chairman Julius Genachowski on Tuesday.

New Opportunities and Challenges

The CTIA said Tuesday that the major U.S. wireless networks using GSM mobile technology have agreed to initiate, implement and deploy database solutions using unique identifying numbers. "U.S. GSM providers will implement this database [by the end of October] so that stolen GSM smartphones will not work on any U.S. GSM network," the CTIA said in a statement.

The CTIA's wireless provider members have also agreed to educate consumers about smartphone security features as well as third-party apps for remotely locking or wiping data from a lost or stolen device. Additionally, the trade association's device manufacturer members have agreed to have a software mechanism in place by April, 2013 that will prompt new smartphone purchasers to establish a device password.

Meanwhile, all handsets and media tablets are currently equipped with a set of codes that tell the wireless network which tasks each mobile device is capable of performing. This unique set of codes is known as a mobile equipment identifier (MEID) or international mobile equipment identifier (IMEI).

The FCC is urging U.S. consumers to write down the make, model number and unique device identification number of the mobile products they purchase. This is the information they will need to report to the police in the event their device is ever lost or stolen.

International Cooperation Required

In the last couple of years, the U.S. has regained global leadership in mobile innovation, Genachowski observed. "With the steps we're announcing," he added, "the U.S. will also become a world leader in addressing the growing problem of mobile device theft."

However, the ultimate success of the Protects Initiative will depend in major part on international cooperation. Otherwise, vendors of smartphones and media tablets lost or stolen in the United States will be able to ship their black market goods to partners overseas.

Genachowski said he has already met with the international executives responsible for the GSM database system currently operating in the United Kingdom and other nations abroad.

"I am making it a priority of the FCC's International Bureau to work with other countries to advance this initiative," he said.

Still, Genachowski admitted that the technology will continue to change, creating new opportunities as well as new challenges.

"The FCC will establish regular, quarterly meeting with the police chiefs on this initiative and on any new issues that might arise," he said.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Digital Life
1.   Apple Stock Soars Ahead of iPhone 6
2.   Twitter May Remove Pics of Deceased
3.   HTC One M8 Windows Phone Unveiled
4.   Supervalu Suffers a Data Breach
5.   Online Sites vs. Retailing in India


advertisement
HTC One M8 Windows Phone Unveiled
Can be POS device for small business.
Average Rating:
Sprint Dumps T-Mobile Merger
Looks to the future with new chief exec.
Average Rating:
New App To Manage Time Better
Helping to organize your busy life.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 

Enterprise Hardware Spotlight
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 

Mobile Technology Spotlight
Apple Stock Soars Ahead of iPhone 6 Launch
The imminent release of the iPhone 6 -- and maybe even an iWatch -- has sent Apple's stock soaring to new heights. Considering what else the firm could have up its sleeve -- the stratosphere may be the limit.
 
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
Verizon Earns Top Rating in Mobile Network Comparison
A new report says Verizon Wireless was the top-performing U.S. cellphone service provider in the first half of 2014, on a nationwide and state-by-state basis, as well as in metro areas.
 

Navigation
Sci-Tech Today
Home/Top News | Computing | Digital Life | Discovery | Space | Innovation | Health | Science News
Environment
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.