Smartphone kill switch

Last updated

A smartphone kill switch is a software-based [1] security feature that allows a smartphone's owner to remotely render it inoperable if it is lost or stolen, thereby deterring theft. There have been a number of initiatives to legally require kill switches on smartphones.

Contents

Background and implementation

Smartphones have high resale value, and are therefore often the target of theft, with thieves selling them to cartels for resale. [2] A kill switch can deter theft by making devices worthless.

In the United States, Minnesota was the first state to pass a bill requiring smartphones to have such a feature, and California was the first to require that the feature be turned on by default. [2] The California law requires the kill switch to be resistant to reinstallation of the phone's operating system. [1] The CTIA initially resisted the legislation, fearing that it would make phones easier to hack, but later supported kill switches. [3] There is evidence that this legislation has been effective, with smartphone theft declining by 50% between 2013 and 2017 in San Francisco. [4]

Secure Our Smartphones (S.O.S.), a New York State and San Francisco initiative started by New York State Attorney General Eric Schneiderman and San Francisco District Attorney George Gascón. [5] [6] The initiative is co-chaired by Schneiderman, Gascón and Boris Johnson, and has 105 members. [7] [8]

Examples

See also

Related Research Articles

<span class="mw-page-title-main">Smartphone</span> Handheld mobile device

A smartphone is a mobile device that combines the functionality of a traditional mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multimedia playback and streaming. Smartphones have built-in cameras, GPS navigation, and support for various communication methods, including voice calls, text messaging, and internet-based messaging apps.

<span class="mw-page-title-main">SD card</span> Type of memory storage for portable devices

Secure Digital, officially abbreviated as SD, is a proprietary, non-volatile, flash memory card format the SD Association (SDA) developed for use in portable devices.

An over-the-air update, also known as over-the-air programming, is an update to an embedded system that is delivered through a wireless network, such as Wi-Fi or a cellular network. These embedded systems include mobile phones, tablets, set-top boxes, cars and telecommunications equipment. OTA updates for cars and internet of things devices can also be called firmware over-the-air (FOTA). Various components may be updated OTA, including the device's operating system, applications, configuration settings, or parameters like encryption keys.

<span class="mw-page-title-main">Kill switch</span> Safety mechanism to quickly shut down a system

A kill switch, also known more formally as an emergency brake, emergency stop (E-stop), emergency off (EMO), or emergency power off (EPO), is a safety mechanism used to shut off machinery in an emergency, when it cannot be shut down in the usual manner. Unlike a normal shut-down switch or shut-down procedure, which shuts down all systems in order and turns off the machine without damage, a kill switch is designed and configured to abort the operation as quickly as possible and to be operated simply and quickly. Kill switches are usually designed to be noticeable, even to an untrained operator or a bystander.

<span class="mw-page-title-main">Mobile phone</span> Portable device to make telephone calls using a radio link

A mobile phone is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area, as opposed to a fixed-location phone. The radio frequency link establishes a connection to the switching systems of a mobile phone operator, which provides access to the public switched telephone network (PSTN). Modern mobile telephone services use a cellular network architecture and therefore mobile telephones are called cellphones in North America. In addition to telephony, digital mobile phones support a variety of other services, such as text messaging, multimedia messaging, email, Internet access, short-range wireless communications, satellite access, business applications, payments, multimedia playback and streaming, digital photography, and video games. Mobile phones offering only basic capabilities are known as feature phones ; mobile phones which offer greatly advanced computing capabilities are referred to as smartphones.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

<span class="mw-page-title-main">George Gascón</span> American lawyer and police officer (born 1954)

George Gascón is an American attorney and former police officer who is the district attorney of Los Angeles County. A member of the Democratic Party and a former Republican, Gascón served as the district attorney of San Francisco from 2011 to 2019. Prior to his work as a prosecutor, he was an assistant chief of police for the LAPD, and Chief of Police in Mesa, Arizona and San Francisco.

The smartphone wars or smartphone patents licensing and litigation refers to commercial struggles among smartphone manufacturers including Sony Mobile, Google, Apple Inc., Samsung, Microsoft, Nokia, Motorola, Huawei, LG Electronics, ZTE and HTC, by patent litigation and other means. The conflict is part of the wider "patent wars" between technology and software corporations.

Absolute Home & Office is a proprietary laptop theft recovery software. The persistent security features are built into the firmware of devices. Absolute Home & Office has services of an investigations and recovery team who partners with law enforcement agencies to return laptops to their owners. Absolute Software licensed the name LoJack from the vehicle recovery service LoJack in 2005.

<span class="mw-page-title-main">Project Ara</span> Project for a modular smartphone by Google

Project Ara was a modular smartphone project under development by Google. The project was originally headed by the Advanced Technology and Projects team within Motorola Mobility while it was a Google subsidiary. Google retained the ATAP group when selling Motorola Mobility to Lenovo, and it was placed under the stewardship of the Android development staff; Ara was later split off as an independent operation. Google stated that Project Ara was being designed to be utilized by "6 billion people": 1 billion current smartphone users, and 5 billion feature phone users.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

eSIM Programmable SIM card embedded into a device

An eSIM (embedded-SIM) is a form of SIM card that is embedded directly into a device. Instead of an integrated circuit located on a removable SIM card, typically made of PVC, an eSIM consists of software installed onto an eUICC chip permanently attached to a device. If the eSIM is eUICC-compatible, it can be re-programmed with new SIM information. Otherwise, the eSIM is programmed with its ICCID/IMSI and other information at the time it is manufactured, and cannot be changed. Different mobile telephones may not support an eSIM, may have a permanently programmed, unchangeable one, or one that can be reprogrammed for any carrier that supports the technology. Phones may support physical SIMs only, eSIM only, or both.

<span class="mw-page-title-main">Librem</span> Computer line by Purism featuring free software

Librem is a line of computers manufactured by Purism, SPC featuring free (libre) software. The laptop line is designed to protect privacy and freedom by providing no non-free (proprietary) software in the operating system or kernel, avoiding the Intel Active Management Technology, and gradually freeing and securing firmware. Librem laptops feature hardware kill switches for the microphone, webcam, Bluetooth and Wi-Fi.

<span class="mw-page-title-main">Purism (company)</span> Computer manufacturer focusing on software freedom

Purism, SPC is an American computer technology corporation based in San Francisco, California and registered in the state of Washington.

A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection. Security switches should be operated by an authorized user only; for this reason, it should be isolated from other devices, in order to prevent unauthorized access, and it should not be possible to bypass it, in order to prevent malicious manipulation.

A microphone blocker is a phone microphone connector used to trick feature phones that have a physical microphone switch to disconnect the microphone. Microphone blockers won't operate on smartphones or laptops because the microphone is controlled with software rather than a physical switch.

<span class="mw-page-title-main">Find My Device</span> Asset tracking app and service

Find My Device is an asset tracking service provided by Google to remotely trace, locate and wipe devices that are compatible with the Find My Device network.

Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.

<span class="mw-page-title-main">Bootloader unlocking</span> Process of disabling secure device booting

Bootloader unlocking is the process of disabling the bootloader security that makes secure boot possible. It can make advanced customizations possible, such as installing a custom firmware. On smartphones this can be a custom Android distribution or another mobile operating system. Some bootloaders are not locked at all, others can be unlocked using a standard command, others need assistance from the manufacturer. Some do not include an unlocking method and can only be unlocked through a software exploit.

References

  1. 1 2 "10 things to know about the smartphone kill switch". PCWORLD. 24 June 2014. Retrieved 2019-01-15.
  2. 1 2 Nieva, Richard (1 July 2015). "Smartphone 'kill switch' law takes effect in California". CNET. Retrieved 2019-01-15.
  3. "Kill switch proposals finally force wireless industry's hand". PCWorld. 2014-04-17. Retrieved 2019-01-15.
  4. Claburn, Thomas (28 Jul 2017). "Cellphone kill switches kill cellphone snatchers". www.theregister.co.uk. Retrieved 2019-01-15.
  5. "Smartphone Kill Switch: What It Is, How It Might Work". Tom's Guide. 14 May 2014. Retrieved 2019-01-15.
  6. "SECURE OUR SMARTPHONES". San Francisco District attorney. Retrieved 2019-01-15.
  7. "Secure Our Smartphones Initiative Members | New York State Attorney General". ag.ny.gov. Retrieved 2019-01-15.
  8. "Citizens Crime Commission of New York City | Cybercrime". www.nycrimecommission.org. Retrieved 2019-01-15.