US four operators build database stolen mobile phones cannot be reactivated

Source: Internet
Author: User
Keywords Stolen the operator
Tags communication communications internet internet + internet association mobile mobile phone mobile phones
Absrtact: November 29 News, last year the four major U.S. operators ATT, T, Sprint and Verizon announced the establishment of a stolen mobile phone database, now the system has been built. The U.S. wireless Communications and Internet Association (CTIA) said the database could allow operators to be stolen

Last year, four U.S. operators At&t, T, Sprint and Verizon announced the establishment of a stolen mobile phone database, the system is now in place, the news said November 29.

The US wireless Communications and Internet Association (CTIA) said the database could allow operators to blacklist stolen LTE and 3G handsets so that they could not be reactivated to prevent cell phone thefts from happening. The association is now actively communicating with operators outside the United States and is expected to participate. "If more and more countries and operators join the system, it will curb the occurrence of crime." "Steve Largent, president of the Wireless Communications and Internet Association of the United States, said Steve Rajant.

It makes sense for foreign operators to join. Although the stolen cell phone database has been running before, New York officials say the effect is not good. The United States stolen mobile phone fence is an important way to transport abroad, blatantly sold. Perhaps only more country operators will be able to achieve better results.

The current mobile phone thefts in San Francisco and New York have become a serious social problem, and prosecutors want operators and handset makers to include a "self-destruct system" in their handsets so that they cannot be used after their phones are stolen.

But the idea has been hampered in reality, with four of the U.S. operators reluctant to add a third party "self-destruct" to their devices, even though Samsung, a tier of vendors, has made a statement. A US judge believes operators fear that once stolen handsets are "self-destruct" by third-party programs, they will affect the company's revenue. The American Association for Wireless Communications and Internet believes that "self-destruct programs" are dangerous and hackers can paralyze legitimate handsets.

Although the vast majority of mobile phones provide lost post positioning services, only Apple meets the U.S. prosecutors ' request: the IOS 7 added a stronger anti-theft function, if others want to close the "Find My iphone" or brush machine, need to enter the Apple ID and password, which greatly increased the difficulty of the fence.

Using this database, what does it matter? Will it reduce the crime rate? The U.S. judge said it was not optimistic: "The UK has done more strictly, but mobile phone thefts have not improved significantly."


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.