Feeds

British lags less chatty on mobiles

Or getting niftier at hiding them

Choosing a cloud hosting partner with confidence

British prisoners aren't as connected as they were last year - or prison wardens are losing the ability to find contraband mobiles.

The figures come in a written answer to John McDonnell MP, who asked the question of the Secretary of State for Justice. The prison service has only been collecting national figures for the last eight months but the trend is downwards; so either fewer handsets are being smuggled into jail, or the guards are getting worse at finding them.

The only figures we have for last year cover the number of handsets, and SIM cards, analysed by the prison service; but it was assumed that represented a subset of the total number of handsets that were just found, the majority not being worth expensive analysis. Therefore, in April this year the government started counting all the handsets, regardless of whether they warranted further investigation, and it's these figures that we now have.

The numbers themselves are remarkably stable: 675 in December 2009 compared to 633 in November this year. It's tempting to conclude that the assumptions about what proportion of handsets were analysed were wrong, despite the anecdotal evidence to support it.

However, there is a considerable quantity of such evidence, and comparing other months shows the numbers have certainly dropped (in February 2010, for example, 938 phones were analysed, but by April less than 500 were seized). So we think prisoners have fewer mobile phones but don't know for certain, and if they're just getting better at hiding them then we'll probably never find out. ®

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.