4. History of Anti-theft Policies
4.1 Mobile Device Theft Deterrence Act
Senator Charles Schumer (D-New York) first introduced the Mobile Device Theft Deterrence Act of 2012 (S. 3186). This was the first attempt to address phone crimes on a national scale. Due to the previous failure in 2012, the Mobile Device Theft Deterrence Act was re-introduced by Senator Schumer in 2013. It targeted to criminalize tampering with mobile device identification number as a means to halt the black market for stolen cell phones. There is a unique International Mobile Equipment Identity (IMEI) number in every smartphone. This number enables local carriers to block operating device’s network and puts it on blacklist. This bill also sought to impose a 5-year criminal penalty for the alternation of IMEI number. Other than these, there were joint efforts between cell carriers and FCC to create Stolen Cell Phone Registry by November 30, 2012 . This registry would store a list of stolen phones’ International Mobile Equipment Identity (IMEI) number. However, this database only worked if thieves didn’t tamper cell phone ID number. In fact, there are many loopholes for thieves to get around with such registry. When cellphones are reported stolen, most phone carriers in United States only deactivate the SIM card by prohibiting access to information stored in the SIM card. This blocks the device from using the existing data on the phone. Yet, SIM card can be easily removed and replaced. Stolen cell phones can be sold in black market even if it is blocked. Therefore, there are a lot more to be done to protect public safety and smartphone crimes.
4.2 Smartphone Theft Prevention Act
The Smartphone Theft Prevention Act (H.R. 4065) was introduced by the House ...
... middle of paper ...
...nt way of making profits. In fact, the Consumer Reports estimated about 1.6 million cellphones were stolen in United States in 2012 (Duckworth 2013). However, there is a lot of violence involved in phone robberies. Victims are often threatened of violence and some even lost their lives because of a smartphone holding in their hands. A technical kill switch preinstalled in smartphones has proven as an effective deterrent to de-incentivize phone robberies because phones are inoperable once kill switch is activated. 83% of smartphone owners also believe that a kill switch would reduce cell phone theft (Duckworth 2013). Furthermore, phone thefts may add over USD $10,000 to victim’s stolen cell phone bill from roaming (Cleave 2014) . Since many people are victimized in phone robberies, it is undoubtedly necessary to mandate kill switch preinstalled in all smartphones.
Although they can be easily tracked, people overlook the invasion of privacy possibility because of the convenience they bring to every day life. Systems like OnStar installed in cars have made the tracking of stolen cars practically effortless. Similar tools are being used by law enforcement, Penenberg stated “cell phones have become the digital equivalent of Hansel and Gretel’s bread crumbs” (472). He then goes on to discuss how in Britain in 1996, authorities installed 300 cameras in East London. Although this didn’t affect the terrorism, it did affect the crime rate which fell 30 percent after the cameras were put into place.
Gross stated she noticed at approximately 15:00 hours on 02/01/2016, her cell phone stopped operating. Gross was unable to use her cell phone. Since Gross’s cell phone stopped operating, she contacted her cell phone provider, Verizon. Gross contacted Verizon customer service at approximately 16:30 – 17:00 hours. Gross was informed by Verizon that her current iPhone 5c was disconnected. Gross’s account information was used to purchase three iPhone 6’s and a line was added to her account. Verizon removed the charges from her account and changed the current password to her account. Gross did not have any suspect information. She was not aware of how, who, or when the suspect(s) gained access to her account. Gross was informed by
These sort of programs have shown immense help in the number of fatalities on the road today. Along with these kinds of programs there have been several laws put in place that ban cell phone use while driving. In Syracuse, N.Y. there have been strict laws against handheld cellphone use and texting and driving, and they have been extremely effective (Copeland, 1). Law enforcement saw over 70% of texting driving put to a halt. Transportation secretary Ray LaHood said, “Over half a million people are said to be injured, and thousands more are killed in distracted driving accidents” (Copeland, 1).Another very effective campaign that will probably soon be known world-wide is “Phone in one hand, Ticket in the other”(Copeland, 1). Most people in todays world would be familiar with the “click it or ticket” phrase that has allowed people to be reminded to put on your seat belt. Just as this campaign reminds people to wear a seat belt the “Phone in one hand, Ticket in the other” is designed to remind drivers that it is far too dangerous to be interacting with your phone while driving (Copeland,
According to Rosen, the main reason why people acquire a cell phone is because of security. After the tragic event that occurred on September 11, 2001 in the United States cell phones started to play an important role in our lives. Rosen states that after this e...
When one looks around in public it is almost impossible not to see someone who is talking, texting, or playing a game on a cell phone. When someone sends a text, the phone company saves it in a data bank where it sits waiting to be u...
In today 's generation many adults and teenagers keep everything from contacts numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 code password and the government wants Apple to create a backdoor operating systems that allows them to computerize as many passcodes they can to unlocks the terrorists IPhone. Apple strongly believes that creating this necessary backdoor system will create a negative chain of effects that will affect everyone from smartphone users to social media companies and their privacy. The FBI recently has taken Apple to court to create the necessary backdoor operating systems to get around the security features created on the Apple IPhones. Apple has the legal right to refuse creating a “backdoor” software to get into suspected terrorists iphone because it invades the privacy of Apple 's customers, it will set a precedent for other companies, and the FBI will mislead Apple.
Identity theft is the stealing and use of someone’s personal information and is one of the fastest growing crimes in the nation (Dole, 2005). According to Federal Trade Commission estimates, identity thieves victimize approximately 10 million Americans every year at a cost of an astonishing $50 billion (2005). Identity theft has been going on for years now and is easily done with the help of today’s technology. According to the Federal Trade Commission, there are six common ways that identity thieves get a hold of personal information. The varieties of methods that are used are dumpster diving, skimming, phishing, changing the victim’s address, stealing, and pretexting (Federal Trade Commission). Once someone’s identity is stolen, accounts can be opened in the victim’s name such as credit cards, loan, and utilities; money can be withdrawn from the victim’s bank accounts and cause financial difficulties or the victim’s personal information may be used for other reasons. While consumers blame credit card companies and credit bureaus for lack of security, credit card companies blame consumers for being too gullible and forthcoming with private information (Shelly, 2010). While the two disagree who is at fault, they both share a deep concern over identity theft. Credit card companies’ refusal to accept that technology is moving too fast for them to keep up and their lack of security with existing accounts provides evidence that it is not the consumer’s fault that identity theft is one of the fastest growing crimes in the nation (Dole, 2005).
“Mobile devices range from basic, inexpensive phones used primarily for phone calls to smart phones that integrate a phone, PDA, camera, music player, and more into one device.” (Guide To Computer Forensics and Investigations - Nelson 2013) The cellular telephone could be recognized a definitive disruptive innovation: indeed, for example telephony, radio, TV, the Internet, mobile telephones are radically changing about every part of day by day life, both inside organizations and in the everyday lives of people, furnishing more provisions and gathering more private information. Cutting edge smartphones give progressed characteristics like email, Internet and recorders. Such smartphone's characteristics, other than the side of the portable devices, give to user the opportunity to co...
Over the past few years, technology has grown to be the driving force in human productivity and efficiency. Technology has been incorporated into our everyday lives to help us perform daily activities and bridge long distance communication. Although technology has brought us many advantages, it has also created quite few ethical issues along the way. Some of the biggest ethical issues technology has created revolve around cell phones. These issues include cell phone tracking and using the cell phone to cheat. Cell phone privacy can be compromised in many situations regarding phone call tracking and messaging. Cell phone use is also starting to be abused by students and other test takers to cheat on tests. Even if the person has good moral standards, sometimes the right decision to make is not always clear.
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
Knowing the dangers and consequences of too much time spent on cell phones can protect lots of people and keep them healthy and happy along the way. Therefore, before picking up a cell phone at 2:00 a.m. on a Monday night to go on a social media website or to text a friend, people should think more about the important events that they have in the upcoming hours. Before they know it, it’s already 6:00 a.m. and time to wake up for school or
Have you ever heard of the gruesome Columbine High School massacre? This incident occurred on April 20th 1999 and involved two students embarking on a shooting rampage, killing twelve students, a teacher and wounding twenty three others. Unfortunately during this incident, the school's most easily accessible phone was on the other side of the school in the library. Perhaps some of these lives could have been saved if the students in this class had cell phones that they could've used to contact the authorities more quickly. The issue we are addressing today is the use of cellular devices in educational facilities. I believe that cell phone use is of extreme convenience, and has academically beneficial aspects, among it's so called "faults".
That’s My Tracker.”, written by Peter Maass and Megha Rajagopalan, indicates that the, “...tracking device that happens to make calls...” are exploiting our identities far more than we know (Maass and Rajagopalan,P.129). It was shared that cellphone carriers disclosed and “...responded 1.3 million times last year to law enforcement requests for call data...” without warrants (Maass and Rajagopalan,P.129). These reporters enlighten that all the “explosion of GPS technology and smartphone apps...” as well as “...frictionless sharing...”or “...surveillance has caught our attention so much so that it blinded us from the ugly truth (Maass and Rajagopalan,P.129). In actuality, modern technology such as cellphones and surveillance cameras allow the government to know of it 's citizens location, conversations, and actions—“...treasured by police departments and online advertisers...”(Maass and Rajagopalan,P.130). The mania of technology and “...these invasive services have proved irresistible to consumers…” writes Paul Ohm (Maass and Rajagopalan,P.129). He states that the overly advertised technology is like a magnet to consumers because it continues to be bought and sold regardless of the facts
Many of us see cell phones pessimistically, but really haven’t looked at them optimistically. We all know that "with every good, comes a bad, and with responsibility, comes consequences".
Cell phone use by motorist is dangerous and can cause accidents resulting in deaths and injuries. Furthermore, Nations and states should take the lead in outlawing this dangerous act. Prohibition of Cell phone use by motorists globally is the solution. Since a driver cannot concentrate fully on driving while making a phone call, he remains as impaired as someone who drives while intoxicated. In addition, imagine the risk one puts himself in when he is being driven by a drunk driver .This is the same risk that a motorist speaking on phone faces. If lawmakers are serious about addressing the increasing number of deaths related to motorists using cell phones. Hence, they should ban use of cell phone use by motorist.