Network World - The Federal Communications Commission and the CTIA Wireless Association are joining hands in an attempt to take a bite out of smartphone crime.
The FCC and CTIA today announced a three-part plan to help prevent smartphone theft and protect consumers' personal data from falling into the hands of criminals.
IN OTHER NEWS: AT&T executive blames FCC for T-Mobile layoffsA
First, wireless carriers will create a nationwide database of smartphones that catalogs every single International Mobile Equipment Identity (IMEI) number currently in use and then uses the number to remotely deactivate smartphones when they are reported stolen. The database, which is expected to be online by November, will prevent any stolen GSM phone from being used on any GSM network in the United States. CTIA also said that carriers are working on a similar database for LTE devices that is scheduled to come online by the end of 2013.
The second part of the plan involves sending users direct notifications via SMS containing information on how to create secure passwords for their devices that can be used to lock down the phone and prevent thieves from accessing it. Finally, the carriers are also planning to educate consumers about mobile applications they can download onto their devices that give them the ability to remotely lock, locate or wipe data from their smartphone if it gets stolen. The carriers plan to fully enact both of these initiatives by spring 2013.
FCC Chairman Julius Genachowski said during a news conference announcing the initiative today that he wanted consumers to know that both the FCC and the wireless industry have "got your back." He said the major goal of the initiative was to make sure that stealing smartphones is no longer profitable, since thieves will quickly find that stolen smartphones are bricked within hours of taking them. Sen. Chuck Schumer (D-N.Y.) said during the news conference that the initiative was particularly important since smartphones are increasingly storing users' personal data and are being used for sensitive applications such as mobile payments.
"iPhones and smartphones are catnip for criminals," he said. "They're valuable, they're exposed and they're easy to steal. ... They're not only stealing the device they're stealing personal information."
Schumer also said that he was introducing legislation today that would make it a crime to alter a smartphone's IMEI number to prevent it from being locked down by the national intra-carrier database. Under the proposed bill, altering the IMEI number could result in a maximum five-year prison sentence.
"We're going to send a loud and clear message that the market for stolen cell phones is now closed," said Schumer.
Read more about anti-malware in Network World's Anti-malware section.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!