Feeds

Big Four US carriers vow to switch off stolen smartphones

Operators team up with FCC to draw up stolen smartmobe blacklist

Providing a secure and efficient Helpdesk

In order to combat rising cases of phone theft, America's Federal Communications Commission (FCC) is planning to create a national database of stolen smartphones with the goal of ensuring that the mobes never work again.

FCC chairman Julius Genachowski is meeting police chiefs from New York, Pennsylvania and Maryland and a representative of international Telecomms group CTIA later today to announce the new plan which will be fully implemented in 18 months time.

One in three robberies in the US involves the theft of a smartphone, according to the New York Times. The FCC hope to reduce the incentive for phone theft by slamming the brakes on the resale market.

Over the next six months the four big operators – Verizon, AT&T, Sprint and T-Mobile – will start to compile databases of all phones on their networks that are reported as stolen. The carriers will then block these units from being registered again. After 18 months the FCC hopes to have merged the databases from the four companies and to introduce a cross-network block on the stolen handsets ever being re-registered, according to the NYT report.

The block would only apply to US phone registered with the Big Four companies.

To reduce phone theft leading to other types of crime such as financial or identity fraud, mobile operators will also commit to giving customers advice on simple security measures such as setting pass codes on their handsets. Networks are already experimenting with tech that would remotely brick stolen mobes.

For the database to work, it would also become a federal crime to tamper with the unique identifiers on a phone.

The full FCC announcement is expected shortly (at 10.00 EDT, 13.00 GMT today). ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.