Home » Technology » Apple & Google Profiting From Phone Thefts: MPs Accuse

Apple & Google Profiting From Phone Thefts: MPs Accuse


Met Police Urges Tech giants to Tackle London’s Stolen Phones Crisis as Thefts Rise

London’s Metropolitan Police (The Met) has issued a strong appeal to Apple and Google, urging them to address the escalating crisis of stolen phones in the capital.Accusations are mounting that these tech giants may inadvertently be profiting from a multimillion-pound phone-snatching industry, allegedly orchestrated by organized crime gangs with international links to Britain, Algeria, and china.

The Soaring Scale of Phone Theft in London

The statistics paint a grim picture. In 2024,London witnessed a staggering 80,000 phone thefts,marking a 25% surge from the 64,000 incidents recorded in 2023. These stolen devices, predominantly iPhones, hold an estimated street value of £20 million.

Darren Scates, The Met’s Chief Digital Data and Technology Officer, revealed to the House Of Commons science and technology commitee that the police have been requesting since 2023 that smartphone companies prevent stolen devices from accessing cloud services. This would effectively render the phones “un-smart” and drastically reduce their resale value. However, these requests have so far been unmet.

Legislators Demand Immediate Action on Stolen Phones

Martin Wrigley, A Liberal Democrat Member of the committee, voiced strong criticism: “Apple and Google continue to make profit and continue to sell more phones because these phones are not removed from the system. You [the companies] owe it to the customers around the world to implement this promptly.No ifs, no buts, just do it.”

Representatives from Apple and Google have defended their positions, citing existing security features designed to protect customer data as their primary focus.

Apple & Google Profiting From Phone Thefts: MPs Accuse
The Rise in Phone Thefts in London Causes Concern.

Tech Giants Respond to Phone Theft Accusations

Simon Wingrove, A Software Engineering Manager at Google, asserted that their system is “robust and works very well.” Gary Davis, Senior Director in Regulatory and Legal at Apple, expressed concerns that disconnecting stolen devices could be exploited for fraudulent activities, potentially enabling malicious actors to access data and blackmail users.

Former Policing Minister Kit Malthouse accused Apple of “dragging your feet,” suggesting a strong commercial incentive behind their reluctance to act. He highlighted the important £50 million annual loss from phone thefts in London, implying that preventing these thefts could negatively impact phone sales.

In response, davis refuted the claim that apple profits from phone thefts, stating, “I don’t believe we are profiting. It is necessary to refute the suggestion that we benefit from our users somehow suffering the traumatic event of having their phone stolen and being disconnected from their lives. We have invested many hundreds of millions in designing in these protections.”

Pro Tip: Always enable ‘Find My Phone’ features on your devices and keep your operating system updated for the latest security patches.

Police Efforts and Shifting Tactics

The Met reported a 15% decrease in overall theft during April and May, with approximately two-thirds of these thefts involving mobile phones.commander James Conway attributed this “tentative reduction” to increased police prioritization and heightened caution among phone users. The force has also invested in high-speed e-bikes to pursue thieves.

Conway described theft and robbery as “easy crimes to commit” in London, detailing how criminals use e-bikes and Faraday bags to evade detection before passing stolen phones to handlers for export out of the UK. The most expensive Apple phones are particularly targeted, selling for £300 to £400 due to the high cost of phones in lower-income countries. Over 90% of stolen phones are reused, while the rest are dismantled for valuable parts like screens.

Adding to the sense of urgency, Malthouse recounted witnessing an attempted phone theft firsthand while en route to parliament, underscoring the brazen nature of these crimes.Where do you see the line between personal privacy and big tech taking appropriate action?

Phone Theft: Apple Vs Google Security Measures

Feature Apple Google
Remote Lock Yes yes
Remote Wipe Yes Yes
Activation Lock Yes Yes
Cloud Service Disable on Theft Under consideration Under Consideration
Did You No? Faraday bags are frequently enough used by thieves to block mobile phone signals, preventing tracking by law enforcement. They work by creating a cage that shields electronic devices from radio frequencies.

The debate continues as The Met seeks stronger cooperation from tech giants to curb the escalating stolen phones crisis. What more can tech companies and law enforcement do to tackle phone theft? Share your thoughts in the comments below.

Given the allegations of Apple and Google possibly profiting from the phone theft black market,what are the most impactful and feasible regulatory actions governments could take to ensure the security of stolen phones and prevent future profit from theft?

Apple & Google Phone Theft Allegations: MPs Accuse Tech Giants of Profiting

Recent accusations from members of Parliament (MPs) have put The MPs’ Accusations: A Deep Dive

The central argument revolves around several key points. Primarily, MPs are concerned about the insufficient security measures in place to render stolen phones unusable. While features like Find My iPhone (Apple) and Find My Device (Google) exist, they are frequently enough circumvented by skilled thieves. Lawmakers are also pointing to the lack of global standardization for device locks and data wiping, making it easier for stolen phones to be sold and reused in different markets.The concern is that the existing platforms incentivise theft.

profit Motives & the Black Market

The enormous black market for stolen phones drives the accusations. When a phone is stolen, it often ends up in the hands of a reseller who than sells it for parts. This is another possible avenue of profit. The MPs beleive Apple and Google have a duty to implement more robust security features that woudl make stolen phones worthless, thus disincentivizing theft. Related search terms include phone IMEI blocking, and unlocking stolen phones – reflecting user concerns with illicit phone activity.

Security Vulnerabilities Exploited by Thieves

several vulnerabilities allow thieves to bypass security features. Understanding these vulnerabilities is crucial for users seeking to protect their devices. Here some prevalent issues:

  • SIM Swapping: Criminals can exploit SIM swapping to gain access to the victim’s accounts.
  • Screen Lock Workarounds: Some methods can bypass the screen lock. These methods sometimes involve software exploits.
  • Software Flaws: Regular software updates are essential for patching these to security holes.

Financial Implications & the Need for Stronger Security

The security vulnerabilities translate into financial losses for individuals and profits for criminals. The average cost of a lost or stolen phone ranges from hundreds to thousands of dollars,considering the device and possible fraudulent activity. The MPs highlight the importance of stringent security measures that make stolen phones promptly unusable.

To put this in perspective, consider a hypothetical example: A phone is stolen, the thief quickly wipes the device. The victim finds that disabling the phone is next to impossible and it has been sold to a shady reseller, who profits. This scenario underscores the complex interplay of loss, profit and market dynamics impacting tech giants.

User Actions & Protecting Your Device: Prevent Phone Theft

While the focus is on actions that apple and Google should take, users can implement several measures to protect their devices, aligning with the search term “phone theft prevention.”

  • Enable Device Tracking: activate “Find My iPhone” (Apple) or “Find My Device” (Google) immediately after purchasing the device.
  • Set a Strong Passcode or Biometric Authentication: Go beyond easy-to-guess passcodes and secure the device with biometric recognition software.
  • Regular Software Updates: Promptly install system updates to patch any security vulnerabilities.
  • Back Up Data Regularly: If a device becomes lost, you will still have access to your files.
  • Report the Theft Immediately: Report the phone stolen with law enforcement immediately; provide the IMEI number.

Practical Tips for Enhanced Security

Here are some additional best practices:

  • Beware of Public Wi-Fi: Avoid using sensitive facts on public wi-Fi networks.
  • Secure your Accounts: Use two-factor authentication on all of your online accounts.
  • Don’t Flash Risky Firmware: Don’t use risky system tweaks on devices when you are not fully aware of the outcomes.

The Future: Legal & Ethical Considerations

The accusations from the MPs will likely trigger legal and ethical reviews for both Apple and Google. The long term impact could include changes to privacy policies, more stringent data protection laws, and updates around data security. There will likely be new standards regarding how mobile devices are manufactured and how the data on these devices is protected. The core focus will be on user data; this includes protecting personal data.

The Legal Landscape: Exploring Regulatory Impact

Governmental and regulatory bodies around the world will be paying close attention to how effectively both companies comply with the changing standards of data security. Regulatory bodies in countries like the United states and Europe have a great deal of power in terms of setting and enforcing new guidelines. The ongoing investigations will almost certainly have implications for the legal and ethical landscape.

Area of Concern for MPs Potential Solutions
Ineffective device locking Develop a kill switch functionality that permanently disable the device.
Lack of IMEI blacklisting, or sharing Create a global database for blacklisted/ stolen devices.
Circumvention of Security Protocols Improve security to make it more arduous to reset or bypass security precautions.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.