Feeds

Home Office takes non-action against phone pinchers

Does nothing new to stop green thieves maybe making a mint

Build a business case: developing custom apps

The Home Office is demanding that mobile phone recyclers continue what they're already doing, in the name of cracking down on mobile phone theft.

The office is busy creating a new Code of Practice which will require the industry to check handsets sent for recycling against the register of stolen phones, preventing thieves cashing in on the £25 average value of a handset. Which would be most laudable, it if wasn't happening already.

The fact is that few handsets sent for recycling get broken up for parts - the majority are shipped to developing countries where last year's model can still be sold for a profit. But an increasing number of those countries are now signed up to the international database of stolen phones, so recyclers (or, more accurately, resellers) have to check against the database anyway.

The Home Office cites "due diligence specialists" Recipero saying that 100,000 stolen handsets turn up for recycling every year, and at an average price of £25, that adds up to a possible £2.5m in ill-gotten gains. Recipero runs the Immobilise database of stolen items on behalf of the UK police, and the company tells us that most recycling companies already check the database so they've got a good handle on the number of stolen handsets that turn up.

But that also means those stolen phones aren't being recycled resold, so no one is paying out the £2.5m - the criminals aren't getting away with it.

So the plan appears to be for some civil servants to sit round and write up guidelines over a few cups of coffee, whereupon the Home Office Minister gets to appear tough on the industry, which reluctantly accepts the demands to continue doing exactly what it was already doing - and everyone wins. As you were. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.