Smartphone Theft: What Is Best Defense?
Oldest First  |  Newest First  |  Threaded View
D. Henschen
D. Henschen,
User Rank: Author
5/17/2013 | 6:55:18 PM
re: Smartphone Theft: What Is Best Defense?
Best defense is to own a cheap or older model that nobody would want to steal. I'm stunned by how much money people spend on phones and data plans. My wife uses a 5-year old phone that was $9.95 and spends $7 per month on service with VirginMobileUSA. No, she can't surf the Web or check e-mail, but all she wants is a phone. I do want a smart phone, but I'll be damned if I'm going to spend $200 and then add $50 or more in monthly service fees.
User Rank: Apprentice
5/17/2013 | 7:08:45 PM
re: Smartphone Theft: What Is Best Defense?
It is my understanding that if you report your stolen mobile phone's IMEI number to your phone service provider, then they could disable your phone, regardless of what SIM is inserted for use by any potential thief or subsequent buyer. You can get the IMEI number by dialing *#06# (asterisk-pound sign-zero-six-pound sign) BEFORE your phone is stolen, then store the IMEI number in a safe place, just like your credit card numbers.
Anyone care to comment on this so called solution?
Andrew Hornback
Andrew Hornback,
User Rank: Apprentice
5/20/2013 | 12:30:36 AM
re: Smartphone Theft: What Is Best Defense?
I think the solution here, with the ubiquity of cloud computing (storage, in this instance) and higher bandwidth capable networks and handhelds, would be to put all of the user's data in the cloud - preferably at the service provider. In that instance, if you have a device stolen, your personal information isn't on it - kind of going back to the terminal/mainframe paradigm. The loss of personal information and the threat of identity theft can seriously outweigh the cost of replacing the device.

Additionally, just how much does it cost to produce these devices? Maybe someone should look at it from that perspective - do I honestly think it costs Google, Apple or anyone else $650 (or more) to produce a handheld? Let's take a look at incidences instead of overall replacement costs.

And finally, if you want to stop these sorts of things, let's take a look at where someone would sell a stolen phone. There's a major on-line auction site out there (you're probably familiar) that has a bunch of interesting results if you search for "bad ESN". Now, I'm no expert in how carriers operate, but I believe the chief way of turning a good ESN into a bad ESN would be to report it stolen or lost. Now, granted, there are occasions where someone could have a phone with a bad ESN - lose your new device in the couch with the battery near dead and not be able to find it then report it as lost, but how many of those devices are stolen?

@Certifiable - the service provider has the IMEI number already, I believe it's used in the provisioning process in order to make sure that your device is allowed to access the service. All you'd need to do is call to report it lost/stolen and they have that information already.

@Doug - Not sure if this is really an option in your case, but you could get a used Android device that's WiFi enabled and with the right combination of applications, use it to make/receive phone calls when it's on the WiFi. You'd need to carry a hotspot of some sort, but there are deals out there where they're free and then $50/month plus you'd have the capability of hanging other devices (like a laptop or a tablet) off of the same hotspot. I currently have an older Droid that I use as a remote control for our TV service (Verizon FiOS) and can use it as a handset for my Google Voice number as well.

Andrew Hornback
InformationWeek Contributor
User Rank: Apprentice
5/30/2013 | 2:26:18 AM
re: Smartphone Theft: What Is Best Defense?
I really hope that this investigation leads to the major smartphone and tablet companies to invent greater theft defenses on their devices. The amount of phone and tablet theft is alarming and until now there has not been any way to stop them. When a thief takes your phone or tablet it is easy for them to just shut it off so you cant track it and then wipe the memory clean. I know there will always be some hacker out there that will figure out a way to crack a code, but that is why these companies should be constantly updating their security protocols.

Jay Simmons
Information Week Contributor

Register for InformationWeek Newsletters
White Papers
Current Issue
2016 InformationWeek Elite 100
Our 28th annual ranking of the leading US users of business technology.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of June 19, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.