Intentions to build the database were announced in April by the FCC. Now that the program is operational, an owner whose mobile phone goes missing can contact his or her carrier, who will add the device to the database and prevent it from being re-appropriated by illicit parties. In the past, taking control of a stolen phone could be as simple as inserting a new SIM card. The carriers' program, however, identifies handsets via International Mobile Equipment Identity (IMEI) numbers, which are device-specific.
Many experts agree that the program is well-intentioned but that its potential impacts should not be overstated.
In an email, IDC analyst Stacy Crook wrote, "[I]t's great that the carriers came together to work on this for the good of the consumer." She countered, however, that though the effort could be helpful to IT, she doubts it "magically solves all of their problems." She pointed out that enterprises still face data loss concerns related to sensitive content being stored in public cloud services, suggesting that even if the IMEI database is successful in deterring thieves, IT security initiatives are unlikely to change. As for the database's potential effectiveness, she said, "Criminals are nothing if not creative."
451 Research analyst Chris Morales expressed similar views in an email, writing that IMEI-based blocking probably won't have any relevance to the enterprise. He pointed out that even if a phone's cellular service is turned off, a thief could always hook a device over the Wi-Fi anyway.
In an interview, Tim Williams, director of product management for Absolute Software, said the database probably won't impede smash-and-grab thefts or other crimes of opportunity; rather, it might simply decrease the resale value of stolen devices. He said that smarter thieves who are interested in data, rather than the hardware itself, might realize that they have a limited window before a given device will be wiped or deactivated. Existing security tools, though, have already established this constraint. The database, he remarked, has nothing to do with protecting data.
Speaking of those data-focused bandits, it might seem plausible that the database could increase their numbers; that is, thieves who profit from illicit phone sales could shift to data theft if they perceive their revenue stream is drying up. Williams said this is doubtful, remarking, "It would require more industry and victim-specific knowledge than you'd expect [most criminals] to have." He said it's possible stolen data might be ransomed rather than sold but added that thieves would be exposing themselves to pretty clear risks.
Williams speculated that the database could actually be detrimental if it lulls consumers into a false sense of security. "It's obviously still a high priority for enterprises to manage encryption and passwords," he asserted.
The carriers' approach is new to the U.S. but not particularly novel on the international scene. A similar program has been active in the UK since 2007, for example, and its effects have been mixed.
Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.