Feeds

Bangladesh cuts off anonymous handsets

Every SIM to have registered owner

High performance access to file storage

Mobile operators in Bangladesh this week cut off more than a million connections to customers who bought their SIMs anonymously, despite the fact that doing so was completely legal at the time.

Operators have already got the deadline extended twice, giving users more time to let the operators know their identity, but the Bangladesh Telecommunications Regulatory Commission stood firm and the process of disconnecting the anonymous users was started last night.

The Swiss were the first to sell blister-packed mobiles, complete with a couple of AA batteries, off the shelf without filling in paper work or proving one's identity. The creation of pre-pay systems, removing the need for credit checks, allowed anyone to buy a mobile phone anonymously and use it with impunity, much to the annoyance of law-enforcement agencies around the world.

Most countries have tried to impose some sort of control on the anonymous mobile phone. In countries where national ID cards are used production of such a card is de rigueur, elsewhere some proof of identity is often asked for, though in the UK the motivation is generally commercial.

Pre-paid connections are still rewarded by the operator: the shop will get fifty quid or so for every pre-paid connection they sell. The exact amount varies, and will be less if they can't pass your identity on to the operator.

The operator desperately wants to know who you are, so they can sell you more stuff, and work out the kind of stuff you might buy. They also have more legitimate worries about content filtering for kids and so forth.

So operators want anonymous phones to rapidly develop a market, get lots of handsets out and in use, but then they'd like everyone to register their phones with the operators so they can sell them stuff more effectively.

In Bangladesh it was all going swimmingly, with anonymous phones pushing penetration up (currently just over 40 million - around 25 per cent of the population), and the regulator kindly insisting punters register, for security reasons of course. Unfortunately more than a million customers didn't bother, and now the operators have been forced to cut them off – not really part of the plan. ®

SANS - Survey on application security programs

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.