Feeds

Home Office to secure mobile phones

Despite eradicating phone theft in 2007

Security for virtualized datacentres

The UK's Design Council has been working with the Home Office to create technologies designed to prevent mobile phone theft - which is rampant, or not, depending on when you ask.

Development of the three technologies has been funded by the Technology Strategy Board, as part of the Mobile Phone Security Challenge, and will be demonstrated at the mobile industry shindig in Barcelona next week.

The breakthrough technologies that are going to leave thieves destitute are: a requirement for a PIN when the SIM is replaced; a tag which bleeps when the mobile phone is out of range; and (our favourite) an NFC card which is waved near the NFC-enabled phone in order to authorise an NFC transaction.

Requiring a PIN when replacing a SIM is already a feature of some handsets, though rarely enabled, and bracelets equipped with Bluetooth can already alert you if your phone gets too far away, as well as buzzing when a call comes in. The i-migo product named by the Home Office can't do that, but it will offer a backup capability instead.

Our favourite innovation, though, has to be the "Touch Safe" - a card (or tag) which is carried in addition to the phone. When you want to use Near Field Communications for a transaction you just take out your card and place it near your phone, then place the phone near the NFC reader and away you go.

It's fun to imagine those boarding the London Underground balancing this teetering combination of items on the reader as they stream through the NFC-based gates - quite why you couldn't do the entire transaction with the card (as already happens) isn't explained.

Phones are still stolen in the UK, despite an international database that prevents them being used once they've been reported stolen which was expected to make theft pointless. But in reality some phones never get reported, and some are taken during a mugging to prevent the rozzers being called too quickly, but most are nicked by opportunists when left lying around on tables and in bags.

The Home Office tells us that 228 phones are reported stolen every hour in the UK. That's doubly scary as the government's own figures put annual mobile theft at around 700,000, so we're forced to assume that over a million of those phones reported stolen are later recovered.

But it's not just theft which has got the Home Office all in a lather: apparently "Mobile phone identity fraud rose 74 per cent in the first half of 2009", which is obviously a concern to every one of us. We're not sure what exactly "mobile phone identity fraud" is; the Home Office rep we spoke to agreed that it was unlikely to be people pretending to be mobile phones and promised to get back to us when he found out.

Whatever it is we clearly need to come down on it hard, and only by carrying more NFC-enabled devices can we prevent the plague of mobile phone identities being used fraudulently. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Net neutrality protestors slam the brakes on their OWN websites
Sites link up to protest slow lanes by bogging down pages
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Who us, SHARE infrastructure? Networks reject gov proposal
Execs pour scorn on 'national roaming' outline – report
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.