FCC, CTIA push against stolen phones failed
Exclusive: Draft plan might have made it harder to resell stolen phones, if it had gone into place
IDG News Service - The U.S. Federal Communications Commission and the CTIA, a lobbying group for the wireless industry, discussed a major initiative last year that could have significantly cracked down on trading in stolen phones, but the plan appears to have gone nowhere.
A draft of the initiative, called STOPS, describes it as "a multi-stakeholder initiative" intended to "stamp out the illegal secondary market for smartphones and other mobile devices." The document, dated Aug. 15, 2013, was obtained by IDG News Service through a public records request.
STOPS was due to begin last September with a campaign to teach consumers how to avoid buying a stolen phone. That was to be followed in November with the promotion of software that could remotely wipe lost or stolen handsets and display a "stolen phone" message on the screen.
Perhaps the biggest step was to happen last month, when third parties and law enforcement would be able to run a phone's unique IMEI identification number against a database of phones operated by wireless carriers.
Another system would act as a kind of Carfax service for phones, allowing people to verify a used phone hadn't been flagged as stolen. The plan was to conclude later this year with a one-stop website where "all the necessary reports" could be filed when a phone is stolen.
Today, eight months after the document was drafted and seven months after the program was due to get underway, it appears to have gone nowhere.
A spokesman for the FCC wouldn't comment on the record about the STOPS document or answer specific questions on the status of the plan. "Commission staff is in regular contact with carriers and law enforcement about this important area of concern and STOPS is part of that process, which is ongoing," the spokesman said.
The CTIA didn't return a request for comment.
During the same period, pressure has been building on the industry to do something about the growing problem of violent smartphone theft.
Wireless carriers and phone makers have mostly dragged their feet, although the threat of legislation on the horizon appears to have them moving. For example, the CTIA long opposed the installation of "kill-switch" software on phones but changed its stance ahead of a recent California Senate vote on a mandated kill switch.
The California law, SB962, passed the state Senate last week and is now in the hands of the assembly. If it passes, it will require a software kill-switch on all phones sold and manufactured in California from July next year.
The bill has received backing from law enforcement officials across the state including San Francisco District Attorney George Gascon, who was asked for his reaction to the STOPS draft plan discussed by the FCC and CTIA.
"These are steps that can be taken right now to undermine the black market for stolen devices while more effective technological solutions make their way to market," he said.
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is email@example.com
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- The Shortfall of Network Load Balancing
- Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services
- F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- Five Key Issues for DNS - The Next Network Management Challenge
- Since every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS...
- Architecting the Network of the Future
- Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher... All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts