Intentions to build the database were announced in April by the FCC. Now that the program is operational, an owner whose mobile phone goes missing can contact his or her carrier, who will add the device to the database and prevent it from being re-appropriated by illicit parties. In the past, taking control of a stolen phone could be as simple as inserting a new SIM card. The carriers' program, however, identifies handsets via International Mobile Equipment Identity (IMEI) numbers, which are device-specific.
Many experts agree that the program is well-intentioned but that its potential impacts should not be overstated.
In an email, IDC analyst Stacy Crook wrote, "[I]t's great that the carriers came together to work on this for the good of the consumer." She countered, however, that though the effort could be helpful to IT, she doubts it "magically solves all of their problems." She pointed out that enterprises still face data loss concerns related to sensitive content being stored in public cloud services, suggesting that even if the IMEI database is successful in deterring thieves, IT security initiatives are unlikely to change. As for the database's potential effectiveness, she said, "Criminals are nothing if not creative."
451 Research analyst Chris Morales expressed similar views in an email, writing that IMEI-based blocking probably won't have any relevance to the enterprise. He pointed out that even if a phone's cellular service is turned off, a thief could always hook a device over the Wi-Fi anyway.
In an interview, Tim Williams, director of product management for Absolute Software, said the database probably won't impede smash-and-grab thefts or other crimes of opportunity; rather, it might simply decrease the resale value of stolen devices. He said that smarter thieves who are interested in data, rather than the hardware itself, might realize that they have a limited window before a given device will be wiped or deactivated. Existing security tools, though, have already established this constraint. The database, he remarked, has nothing to do with protecting data.
Speaking of those data-focused bandits, it might seem plausible that the database could increase their numbers; that is, thieves who profit from illicit phone sales could shift to data theft if they perceive their revenue stream is drying up. Williams said this is doubtful, remarking, "It would require more industry and victim-specific knowledge than you'd expect [most criminals] to have." He said it's possible stolen data might be ransomed rather than sold but added that thieves would be exposing themselves to pretty clear risks.
Williams speculated that the database could actually be detrimental if it lulls consumers into a false sense of security. "It's obviously still a high priority for enterprises to manage encryption and passwords," he asserted.
The carriers' approach is new to the U.S. but not particularly novel on the international scene. A similar program has been active in the UK since 2007, for example, and its effects have been mixed.
Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.