Cellular Telecommunications and Internet Association (CTIA) has confirmed that the stolen smartphone database system in the U.S. for AT&T, T-Mobile, Sprint and Verizon Wireless, along with some specific international carriers is now complete.
The smartphone space has been growing at a rapid pace and more companies have started manufacturing and selling smartphones in the global arena. With latest technology inbuilt, smartphones can be very expensive and can attract many thieves. With the growth in the smartphone market, the number of smartphones stolen every year has also increased.
In an attempt to deter smartphone theft, the top wireless operators in the U.S. have created a central database system with the help of CTIA.
The stolen smartphone database will enable carriers to block activation of LTE smartphones as well as 3G devices, which are reported to be stolen. The database is said to be integrated with some international databases so that foreign carriers can also assist in finding and deactivating stolen smartphones. CTIA hopes that more countries and carriers participate in the database to curb smartphone theft to a certain extent.
"We continue to believe that combating stolen cellphones will require a comprehensive effort. We encourage consumers to use currently available apps and features that would remotely wipe, track and lock their devices in case they are lost or stolen, and our members are continuing to explore and offer new technologies. We also strongly support and need Senator Schumer's legislation to pass that would impose tough penalties on those who steal devices or modify them illegally since it would help dry up the market for those who traffic in stolen devices. We also need more foreign countries and carriers to participate in the global stolen phone database to prevent criminals from selling stolen devices internationally," said Steve Largent, president and CEO of CTIA.
CTIA also pointed out that another important element to stopping stolen phones is to assist users with a list of apps with which owners can remotely erase, track and lock the stolen devices.