SlideShare uma empresa Scribd logo
1 de 3
If you needed any more proof of how mobile the world has become, consider 
what happened to my lost iPhone. 
After I left my device in a New York City taxi this summer, I went through the 
usual steps to try to get it back. I turned on Apple’s Find My iPhone tool to locate 
it, but the phone had already been turned off and rendered untrackable. I called 
the cab company that was listed on my credit card statement, but they said the 
driver hadn’t found anything. So I changed all my passwords, bought a new 
phone and gave up on ever hearing about it again. 
But a week ago, someone turned it back on. I got a notification from Find My 
iPhone that it had been located -- in Dhaka, Bangladesh. 
Apple prompted me to remotely wipe the contents of the old phone and display a 
message that said, “This iPhone has been lost. Please call me.” In Apple’s 
perfect world, everyone who ends up with a stolen phone would return it to its
rightful owner. But that's wishful thinking when you consider how pervasive the 
problem is. A report by Lookout, a security firm based in San Francisco, found 
that one in 10 U.S. smartphone owners have been victims of phone theft. Almost 
70 percent of them weren't able to recover their device. 
"Naturally, criminals resell phones wherever they can get the highest value on 
the black market," said Samir Gupte, senior product manager at Lookout. "Often 
times, this ends up being overseas in dodgy marketplaces in regions like Asia, 
Eastern Europe and Latin America where the resale value is much higher and 
there's likely limited scrutiny on the illegal transaction." 
A stolen iPhone is "as good as cash’’ because of the booming secondary market 
for the devices, according to Kyle Wiens, chief executive officer of iFixit, which 
repairs old phones. But for the new owner, "It’s worthless if you can’t unlock it." 
While my phone can still connect to WiFi, it no longer works on AT&T's network 
after I told the carrier it was lost, and that's probably another reason it ended up 
overseas, Wiens said. 
A used iPhone 5S in Bangladesh sells for about 35,000 taka, or $450, according 
to ads posted on resale sites. Last month, Bloomberg News found resellers in 
Hong Kong hawking the gold iPhone 6 for $3,600 before they were available in 
the area. Some obtained their stock from those who stood in line at U.S. stores, 
solely for the purpose of reselling them in another part of the world where it 
would be worth more. 
For those peddling stolen phones, new kill switch technologies that can render 
the devices useless will make this business more difficult. That's a big deal given 
that phone theft accounts for 40 percent of larcenies in major cities, according to 
Lookout. 
But Gupte said "we won't see a drastic decrease in phone theft overnight. You 
have to factor in the time it takes for these new phones to hit the market and 
consumers to upgrade to these newer handset models." 
Until then, beware of your phone getting stolen and ending up across the globe. 
After I shared my experience on Twitter, others told me their stories. One 
person’s phone ended up in Ho Chi Minh City in Vietnam in two weeks and one 
found its way from Israel to Ukraine in 24 hours.
As for my phone, the new owner never called me. The device went back offline. 
Maybe it's back on the market. Wherever it ends up, I just hope it's back online 
long enough for me to wipe the data.

Mais conteúdo relacionado

Destaque (13)

Panfletos
PanfletosPanfletos
Panfletos
 
Golf
GolfGolf
Golf
 
B01110814
B01110814B01110814
B01110814
 
5つの情報発信方法
5つの情報発信方法5つの情報発信方法
5つの情報発信方法
 
Reality or Virtual Reality
Reality or Virtual RealityReality or Virtual Reality
Reality or Virtual Reality
 
TripScope
TripScopeTripScope
TripScope
 
4 arthur meetme
4 arthur meetme4 arthur meetme
4 arthur meetme
 
SharePoint Ribbon Deep Dive
SharePoint Ribbon Deep DiveSharePoint Ribbon Deep Dive
SharePoint Ribbon Deep Dive
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Healthcare seed fund strategy
Healthcare seed fund strategy Healthcare seed fund strategy
Healthcare seed fund strategy
 
Analyzing Genomic Data with PyEnsembl and Varcode
Analyzing Genomic Data with PyEnsembl and VarcodeAnalyzing Genomic Data with PyEnsembl and Varcode
Analyzing Genomic Data with PyEnsembl and Varcode
 
Globaled2010
Globaled2010Globaled2010
Globaled2010
 
Vlasov Vitaly - Barcamps And New Economics (BarCamp Krasnodar)
Vlasov Vitaly - Barcamps And New Economics (BarCamp Krasnodar)Vlasov Vitaly - Barcamps And New Economics (BarCamp Krasnodar)
Vlasov Vitaly - Barcamps And New Economics (BarCamp Krasnodar)
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

I Left My iPhone in a Cab. Guess Where It Ended Up? Hint: AsiaIphone

  • 1. If you needed any more proof of how mobile the world has become, consider what happened to my lost iPhone. After I left my device in a New York City taxi this summer, I went through the usual steps to try to get it back. I turned on Apple’s Find My iPhone tool to locate it, but the phone had already been turned off and rendered untrackable. I called the cab company that was listed on my credit card statement, but they said the driver hadn’t found anything. So I changed all my passwords, bought a new phone and gave up on ever hearing about it again. But a week ago, someone turned it back on. I got a notification from Find My iPhone that it had been located -- in Dhaka, Bangladesh. Apple prompted me to remotely wipe the contents of the old phone and display a message that said, “This iPhone has been lost. Please call me.” In Apple’s perfect world, everyone who ends up with a stolen phone would return it to its
  • 2. rightful owner. But that's wishful thinking when you consider how pervasive the problem is. A report by Lookout, a security firm based in San Francisco, found that one in 10 U.S. smartphone owners have been victims of phone theft. Almost 70 percent of them weren't able to recover their device. "Naturally, criminals resell phones wherever they can get the highest value on the black market," said Samir Gupte, senior product manager at Lookout. "Often times, this ends up being overseas in dodgy marketplaces in regions like Asia, Eastern Europe and Latin America where the resale value is much higher and there's likely limited scrutiny on the illegal transaction." A stolen iPhone is "as good as cash’’ because of the booming secondary market for the devices, according to Kyle Wiens, chief executive officer of iFixit, which repairs old phones. But for the new owner, "It’s worthless if you can’t unlock it." While my phone can still connect to WiFi, it no longer works on AT&T's network after I told the carrier it was lost, and that's probably another reason it ended up overseas, Wiens said. A used iPhone 5S in Bangladesh sells for about 35,000 taka, or $450, according to ads posted on resale sites. Last month, Bloomberg News found resellers in Hong Kong hawking the gold iPhone 6 for $3,600 before they were available in the area. Some obtained their stock from those who stood in line at U.S. stores, solely for the purpose of reselling them in another part of the world where it would be worth more. For those peddling stolen phones, new kill switch technologies that can render the devices useless will make this business more difficult. That's a big deal given that phone theft accounts for 40 percent of larcenies in major cities, according to Lookout. But Gupte said "we won't see a drastic decrease in phone theft overnight. You have to factor in the time it takes for these new phones to hit the market and consumers to upgrade to these newer handset models." Until then, beware of your phone getting stolen and ending up across the globe. After I shared my experience on Twitter, others told me their stories. One person’s phone ended up in Ho Chi Minh City in Vietnam in two weeks and one found its way from Israel to Ukraine in 24 hours.
  • 3. As for my phone, the new owner never called me. The device went back offline. Maybe it's back on the market. Wherever it ends up, I just hope it's back online long enough for me to wipe the data.