Feeds

Bloke blasts Sprint for fingering his home as phone thieves' den

Welcome to Wayne's world: Multiple missing mobes mistakenly tracked

Designing a Defense for Mobile Applications

Phones lost and stolen in Las Vegas are mistakenly telling their owners they're at the house of one Wayne Dobson, who's getting pretty angry at the late night demands and visits from the police.

We're indebted to the Las Vegas Review-Journal which tells us that Dobson's plight has been ongoing for two years. It follows what appears to be a flaw in Sprint's location database which points phones last seen nearby as being precisely in his house and prompted him to erect a sign outside his home.

NO LOST CELL PHONES!! This location gives a false "phone location" position due to a cell tower behind the house. Please contact the North Las Vegas police and file a report

In fact it's unlikely to be the tower causing the problem, which seems to be limited to phones on Sprint's network, so it's almost certainly down to an error in Sprint's database, but that's little consolation to Dobson who's had the desperate and the angry waking him up at all hours, begging, pleading and threatening in the hope of recovering their property.

But it's not just the public who come knocking. The police have been round four times; twice when victims refused to believe the technology could be faulty, and twice when responding to 911 (emergency) calls which came from a mobile reporting itself as being at the house.

Satellite location systems don't have problems like this, but sat-nav only tells the phone where it is, sharing that data requires an app to connected to some sort of reporting service. Without that the network operator can provide a rough location based on the cell tower and signal strength, and best guess is that all phones whose last connection was to the tower behind Wayne's house are claiming to still be on the premises.

Either that or there's a particularly cunning thief living in his loft.

Sprint is apparently looking into the problem, and a fix should be possible, but until then Dobson is sleeping by the door so callers don't get him too far out of bed, and offering what sympathy he can for their loss. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.