Feeds

Mexican phone firms to fingerprint new customers

If they have any fingers left, that is

Internet Security Threat Report 2014

Buying a mobile phone in Mexico will soon be a biometric affair. The country’s set to introduce a law requiring all new phone buyers to be fingerprinted.

The law, according to a report by Reuters, comes into force this April and has been designed as a way of matching calls and text messages to the specific owner of a specific phone.

Why? Because Mexico’s kidnap rate is rising thanks, in part, to drug gangs seeking new ways to make money.

Some of these gangs work from prison cells, where they use mobiles to threatent extortion or kidnapping.

In addition to recording the fingerprints of anyone buying a new mobile phone or signing up to a new contract, network providers must also store details about an individual user’s call, text and voicemail history for 12 months.

Phone owners not thinking of rolling someone up in a carpet and throwing them off a bridge have been urged to report lost or stolen mobile phones immediately. And don't eBay your old phone when you upgrade, or pass it on to a pal.

After all, you don’t want to get stuck with an unpaid bill and a kidnapping charge... ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.