Smartphone Anti-Theft Database: What's Enterprise Impact?
By Michael Endler
InformationWeek
The proactive step will likely benefit consumers, many of whom neglect security precautions. It's unlikely the new initiative will decrease the need for data-protection tools within the enterprise, however.
Intentions to build the database were announced in April by the FCC. Now that the program is operational, an owner whose mobile phone goes missing can contact his or her carrier, who will add the device to the database and prevent it from being re-appropriated by illicit parties. In the past, taking control of a stolen phone could be as simple as inserting a new SIM card. The carriers' program, however, identifies handsets via International Mobile Equipment Identity (IMEI) numbers, which are device-specific.
[ How does mobile biometrics play into the future of identity and access management? Read more at Mobile Biometrics: Your Device Defines You. ]
Many experts agree that the program is well-intentioned but that its potential impacts should not be overstated.
In an email, IDC analyst Stacy Crook wrote, "[I]t's great that the carriers came together to work on this for the good of the consumer." She countered, however, that though the effort could be helpful to IT, she doubts it "magically solves all of their problems." She pointed out that enterprises still face data loss concerns related to sensitive content being stored in public cloud services, suggesting that even if the IMEI database is successful in deterring thieves, IT security initiatives are unlikely to change. As for the database's potential effectiveness, she said, "Criminals are nothing if not creative."
451 Research analyst Chris Morales expressed similar views in an email, writing that IMEI-based blocking probably won't have any relevance to the enterprise. He pointed out that even if a phone's cellular service is turned off, a thief could always hook a device over the Wi-Fi anyway.
In an interview, Tim Williams, director of product management for Absolute Software, said the database probably won't impede smash-and-grab thefts or other crimes of opportunity; rather, it might simply decrease the resale value of stolen devices. He said that smarter thieves who are interested in data, rather than the hardware itself, might realize that they have a limited window before a given device will be wiped or deactivated. Existing security tools, though, have already established this constraint. The database, he remarked, has nothing to do with protecting data.
Speaking of those data-focused bandits, it might seem plausible that the database could increase their numbers; that is, thieves who profit from illicit phone sales could shift to data theft if they perceive their revenue stream is drying up. Williams said this is doubtful, remarking, "It would require more industry and victim-specific knowledge than you'd expect [most criminals] to have." He said it's possible stolen data might be ransomed rather than sold but added that thieves would be exposing themselves to pretty clear risks.
Williams speculated that the database could actually be detrimental if it lulls consumers into a false sense of security. "It's obviously still a high priority for enterprises to manage encryption and passwords," he asserted.
The carriers' approach is new to the U.S. but not particularly novel on the international scene. A similar program has been active in the UK since 2007, for example, and its effects have been mixed.
Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.



Subscribe to RSS