Carriers Commit to Stolen Cell Phone Database

by Jonathan N
This Article talked about the top carriers teaming up with the Federal communication commission to bring an end to phone theft. The article states that they have support from AT&T, Verizon, T-Mobile, and Sprint to help created the PROTECTS initiative. The article first talks about what the new secured initiative will be able to do. They are stating that the cell phone owner will be able to call their provider if their device is stolen and the carrier will lock it down and prevent it from being used. Those gadgets will then be listed in a common database. The Federal Communications Commission are going to be regularly checking up on the database and making sure there are no problems. The carriers are required to submit quarterly updates on to the commission on their progress. The reason they feel they should be trying new techniques to stop crime against cell phone theft, is because in DC cell phone related crime is up 54% since 2007 as along everywhere else in the country. The Us was found using this strategy after they have learned that the database options were working in the U.K. and cut down their cell phone related crimes. Congress is told they are prepping legislation and are trying to make it a federal crime to tamper hardware on wireless devices in the database.

This article was very interesting to read because i didn’t know that databases can be used in so many efficient ways such as cell phone theft. The database use in this article dealt with Federal laws that require the main cell phone companies to use the database and not be able to tamper with it. This article was relevant to what we have discussed in class, due to the fact that we just completed a database project.

 

Chloe Albanesius (April 10, 2012) Carriers Commit to Stolen Cell Phone Database

Retrieved From: http://www.pcmag.com/article2/0,2817,2402830,00.asp

3 thoughts on “Carriers Commit to Stolen Cell Phone Database

  • April 22, 2012 at 11:19 pm
    Permalink

    This is very interesting and I like how you explained the article. Last week I read a summary of an article that was on the same topic and I left the summary without fully understanding what the article was saying. Now I know how exactly the data is being recorded and used for the database.

  • April 22, 2012 at 11:38 pm
    Permalink

    Really cool stuff. I think it’s about time we started worrying about stolen phones. Seeing how you can do so much nowadays with your cellphone and store so much personal information and professional work onto your device. I think the next step would be to do the same thing with tablets.

  • April 22, 2012 at 11:54 pm
    Permalink

    Nice, I’ll be keeping a close eye on the development of this service, there is just too much at risk in a compromised phone, a lot of embarrassing stories as well with execs and people with high company positions getting fire for compromised information. A way to erase personal information remotely would be nice, though pretty risky too for ill-minded individuals.

Comments are closed.