Feeds

How to get back your nicked mobile

The Met starts new ad campaign

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

The Metropolitan Police has launched a new radio campaign aimed at tackling the huge increase in mobile theft in London. Last year, 10,000 mobiles were stolen and two-thirds of those were nicked or robbed from kids.

The Met has clearly decided its advice to avoid using the mobile in public is unlikely to find many converts so has gone for a more practical approach.*

This consists of writing down your phone's unique IMEI number (International Mobile Equipment Identity) and giving it to police if it's nicked. Then, if they pick it up, they'll know where to send it.

You get your IMEI by tapping "*,#,0,6,#" into your mobile. This will give you a 15-digit number. The first two refer to your country, the first six are known as the Type Approval Code. Then the seventh and eighth digits give who manufactured the phone (for example, 10 and 20 are Nokia). The next six are your phone's serial number and the last digit is just an "additional number".

It is debatable whether this is likely to affect the level of mobile crime. And we would ask who would want back their mobile six months later it was stolen, but just one look about these days shows people getting strangely attached to their phones.

It's not just downloaded ring tones but also hundreds of ridiculous features (remind yourself of something in two hours' time!). Mobile bores are a new aspect of modern life, see them in a pub close to you now. ®

* This gem of common-sense comes from the Met's own guidelines. To protect your phone:

  1. Do not carry them openly (keep it in your pocket or handbag).
  2. Avoid using your phone in crowded spaces.
  3. Do not leave your phone unattended, keep it with you.
  4. Be aware of the area you are in and the people around you.
  5. Use your phone security lock code or pin number.
  6. Property mark your phone with your post code and door number.
  7. Record your phone's IMEI number
  8. If your phone is stolen or lost report it to police immediately.
  9. Inform your service provider. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.