Carriers and Smartphone Makers Commit to Anti-Theft Tech

Last week, the five largest U.S. cellular carriers and leading smartphone makers announced a voluntary commitment to add new anti-theft tech to devices being released next year. Supporting companies include Apple, Google, HTC, Huawei, Microsoft, Motorola, Nokia and Samsung. The commitment means that devices sold after July 2015 will have the ability to allow users to wipe data remotely, and prevent the device from being reactivated without permission from the owner.

The measures will also allow for lost or stolen devices to be restored later if recovered by the original owner. Carriers promised to help facilitate these measures.

Some device makers have already incorporated these features into their products. For example, Apple’s iOS 7 has a feature called Activation Lock that prevents a stolen or lost device from being reactivated, even if it is reset.

“A number of state and local lawmakers praised the agreement, though it was panned as inadequate by California state Sen. Mark Leno, who has proposed a mandatory kill-switch law,” reports Re/code.

“The wireless industry today has taken an incremental yet inadequate step to address the epidemic of smartphone theft,” said Leno. “Only weeks ago, they claimed that the approach they are taking today was infeasible and counterproductive. While I am encouraged they are moving off of that position so quickly, today’s ‘opt-in’ proposal misses the mark if the ultimate goal is to combat street crime and violent thefts involving smartphones and tablets.”

In contrast, CTIA President Steve Largent praised the agreement, and said that it is a positive example of the smartphone industry working with consumer groups and regulators.

“This flexibility provides consumers with access to the best features and apps that fit their unique needs while protecting their smartphones and the valuable information they contain,” Largent said. “At the same time, it’s important different technologies are available so that a ‘trap door’ isn’t created that could be exploited by hackers and criminals.”

No Comments Yet

You can be the first to comment!

Leave a comment

You must be logged in to post a comment.