Feeds

UK government won't be keeping mobile database

Leave that to the network operators

Combat fraud and increase customer satisfaction

The Home Office has responded to a petition against plans for state registration of mobile phones, by pointing out that the state has no such plans.

The petition, on the Number 10 website, was set up by a chap from Privacy International and closed in October last year with 266 signatures. In November the Home Office published a consultation about how far a government should go in monitoring communications, and has now closed the petition by pointing out that mandatory registration of mobile phones was not part of that consultation.

But the response is a little too explicit for our liking - "The Government has no plans to require owners of mobile phones to be registered with statutory authorities", says the Home Office statement closing the petition, pointing out that the consultation "rejected an option for a single database holding all communications data".

So no "single database", or requirement to register with "statutory authorities", but that doesn't mean that those using pre-paid mobile phones will continue to be anonymous forever.

Most countries require anyone buying a pre-paid phone to present identification, but that information is held by the network operators (and made available to the police on request). In the UK one can still buy a SIM anonymously, but the network operators don't like it for purely commercial reasons: it's hard to up sell to someone you don't know, not to mention the issues around child protection (it's hard for an anonymous customer to prove their age, and thus network operators block anything remotely dodgy, such as Flickr, by default).

So operators would be unlikely to object to mandatory registration of pre-paid mobile accounts. In response to the petition the Home Office states it won't be running a database of mobile phone numbers, but why would it when the government can just ask the network operators to take on the role should it feel so inclined? ®

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.