Feeds

Home Office discusses thief-proof phones

Solution for problem that doesn't exist

Website security in corporate America

The UK Home Office yesterday met with handset manufacturers and mobile networks to identify ways in which mobile phones could be "secured by design".

This follows John Reid's comments last month.

Despite virtually eliminating mobile phone crime as recently as six weeks ago, the Home Office has been in discussions with the industry about how mobile phone crime can further be reduced, and has come up with some ideas for discussion.

Most of the ideas revolve around some mechanism for automatically shutting down a handset when it's been reported stolen - sending a coded SMS or similar - but that opens up wonderful hacking possibilities when the secret code is broken, and given the blacklisting of phone identifiers (IMEIs) it's not clear how often stolen phones are ever used.

The government's favourite topic, biometrics, is also suggested, but anyone who's tried to use a fingerprint system after sanding wood, welding, or even painting, will know just how quickly one can become persona non grata to such systems.

More esoteric biometrics will no-doubt be suggested, and rejected on the grounds of cost.

The idea of a mobile phone reporting its location back to the police is attractive, and under discussion. This is possible though network operators now, at least roughly, though you can see why the Home Office likes the idea of being able to accurately track a mobile phone on demand.

Far more interesting are discussions about how the police might be able to make more use of mobile phones recovered from suspects - how to maximise the value of all those call records and stored texts, and perhaps make use of that tracking system mentioned, in advance of a phone being stolen.

All this is driven by the apparent epidemic in mobile phone crime. Apparently, two per cent of the UK population has had a mobile phone nicked: though how many lied to get a free upgrade we don't know. We do know that 52 per cent of robberies included a mobile phone, though it seems likely a lot of those are just taken to prevent a swift call to the police. Where a mobile is the only thing stolen it's almost always (69 per cent) because it was left unattended and some opportunist grabbed it.

So the network operators and manufacturers have each sent someone along to appease the Home Office and discuss impossible technologies for solving a problem which the Home Office has told us no longer exists - makes you glad it's a Friday. ®

Internet Security Threat Report 2014

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
Vodafone to buy 140 Phones 4u stores from stricken retailer
887 jobs 'preserved' in the process, says administrator PwC
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.