Feeds

Gov claims mobile phone theft waning as penalty rises

But is there still a market?

The Essential Guide to IT Transformation

Mobile phone theft has almost been eliminated, according to the Home Office.

It announced last week that 80 per cent of handsets are now blocked within 48 hours of the theft being notified, and new jail terms have been introduced for those found attempting to reprogramme stolen handsets.

The use of SIM chips allowed stolen phones to be easily used and has contributed to the huge number of phones nicked each year.

However, every phone has a unique identifier, the IMEI, which is sent to the network during registration - so it's just a matter of getting all the networks to use a central blacklist of stolen kit which can then be blocked.

The Central Equipment Identification Register (CEIR) keeps a list of all stolen handsets, as reported by the public to the network operators, and each day the operators download a copy of that list. This should mean that any handset stolen can be blocked within 48 hours of being reported, and it seems this is happening in a large majority of cases.

Blocking the IMEI doesn't make the phone useless, it just prevents it being used on a network connected to the CEIR. However, many networks around the world aren't connected to the CEIR.

It takes national legislation to force network operators to use the CEIR, but even then a stolen handset might have some value if it can be re-programmed with a different IMEI.

Changing the IMEI on a phone is difficult and has been illegal in the UK since 2002. As of Friday, even offering to reprogramme it could land you five years in chokey.

So stolen phones can be shipped abroad or illegally re-programmed, but there are other reasons a phone might disappear:

Insurance fraud on mobile phones is endemic, with everyone wanting a free upgrade, while muggers will generally take a phone to prevent a quick call to the police.

So what we have is an announcement that a policy brought in five years ago is finally working, in the UK at least, and a new law making it an offence to offer to break the previous law.

Hardly enough to "drive down street crime and make people safer in their communities" as promised by the Home Office. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.