LOGO

Lost Smartphone? What to Do - Quick Guide

September 28, 2016
Lost Smartphone? What to Do - Quick Guide

Protecting Yourself After Phone Loss or Theft

Mobile phones are frequently misplaced or stolen. Given the substantial amount of personal data stored on these devices, the loss of a phone can be a deeply concerning experience.

Recently, I personally experienced this situation with my iPhone 4. Despite consistently keeping it within my view for a year, a brief lapse in attention allowed a thief to take it. Fortunately, I had taken preventative measures to safeguard my private information.

Immediate Steps to Take

Whether you’ve lost your phone or had it stolen, proactive steps can significantly mitigate potential damage. Even if you haven't fully prepared beforehand, options may still be available to you.

Taking precautionary measures beforehand will provide a great deal of peace of mind. Let's examine the necessary actions in a sequential manner.

What to Do Immediately

  • Report the Loss or Theft: Contact your mobile carrier immediately to report the incident.
  • Remote Wipe: If possible, remotely wipe the device to erase all personal data.
  • Change Passwords: Update passwords for important accounts, including email, social media, and banking.

Protecting your personal information is paramount. A swift response can minimize the risk of identity theft.

Being prepared and acting quickly are key to minimizing the negative consequences of losing your phone.

Step 1: Protective Measures & Initial Responses

Safeguarding Your Personal Information

Many individuals experience the loss of their mobile phones. A proactive step involves setting your lock-screen wallpaper to display your contact details – including your name, work information, an alternative phone number, and email address. This facilitates recovery should the device be found by an honest person.

The effectiveness of this approach varies depending on your location, but it presents a low-risk benefit, provided you avoid including highly sensitive information like your home address.

htg-explains-so-you-lost-your-smartphone-now-what-1.jpg

(Image by courtneyBolton)

Taking preventative actions can significantly enhance your security. Both Android and iOS platforms offer passcode-locking features, and you can enable automatic data wiping after a specified number of unsuccessful login attempts. Even without automatic wiping, most unauthorized individuals lack the expertise to bypass security measures.

They will likely attempt a factory reset, which is a reasonable precaution to prevent data theft, but it may reduce the chances of recovering your device.

Finding Your Android or iOS Device

Apple device owners running iOS 4.2.1 or later can utilize the "Find My iPhone" feature at no cost. After installation, you can access its location through GPS coordinates via an online interface.

GadgetTrak, a $3.99 application, extends these capabilities by capturing photos of the person in possession of your phone and emailing them to you.

htg-explains-so-you-lost-your-smartphone-now-what-2.jpg

(Image by bizmac)

Jailbroken iOS devices can employ Cylay, which provides similar functionality to "Find My iPhone" and GadgetTrak, but can be controlled via text message commands. iGotYa gained prominence within the jailbreak community due to its unique features.

These included the ability to capture and transmit images of the person handling the device, and a "fake-out" mode that granted access to the thief, potentially discouraging immediate wiping or resetting, thus providing more time for tracking and recovery. This approach carries a risk of exposing personal information, but can be combined with other recovery methods.

htg-explains-so-you-lost-your-smartphone-now-what-3.jpg

Android users have numerous options available as well. Wheres My Droid is a useful application that allows you to send a pre-defined code-word via text message, triggering the GPS to activate and transmit its coordinates, or initiating the ringtone at maximum volume, regardless of the device’s current settings.

Lookout, an antivirus and security application, offers comparable functionality to Wheres My Droid, with the premium version enabling remote data wiping. Alternatively, some users have replicated these features using Tasker. Notably, many Motorola devices, such as the Atrix, incorporate MotoBlur with a built-in remote wipe command, potentially eliminating the need for additional applications.

htg-explains-so-you-lost-your-smartphone-now-what-4.jpg

The developers of Lookout also offer Plan B. This application can be installed even after the phone is lost, providing tracking updates and GPS coordinates via email. It is available at no cost.

Furthermore, various services are available. StuffBak (now ReturnMe) facilitates the safe return of your lost device by a finder, potentially including a reward. Prey is an open-source project compatible with Android phones, computers, and even Linux systems.

It tracks your devices, captures images of the person in possession, and allows for remote data deletion. A free version is available, with premium plans starting at $5 per month for up to three devices, offering features like SSL encryption and enhanced reporting.

htg-explains-so-you-lost-your-smartphone-now-what-5.jpg

These solutions provide a comprehensive range of options for locating and securing your lost or stolen phone. However, if recovering your device is paramount, delaying data wiping is advisable, as further actions may be possible.

Alternative Recovery Approaches

Should proactive security measures not have been implemented, alternative methods for locating or regaining access to your smartphone may still be available. The Latitude service, present on both Android and iOS platforms, can be configured to continuously update your device’s location in the background, a feature accessible through online searches.

Furthermore, accessing your mobile carrier’s website allows you to review call and text message logs, potentially identifying suspicious activity. Documenting any unusual numbers contacted can serve as valuable evidence for law enforcement should the device be recovered and a dispute arises.

Essential Device Identifiers

Having your device’s IMEI/ESN/Serial number readily available is crucial. This information, typically found on the original packaging, can be invaluable when reporting the loss or theft to authorities.

Online services like Gmail often maintain a record of IP addresses used to access your account. This data can potentially be leveraged to remotely access your phone, enabling data retrieval or a complete device wipe.

In one instance, remote access was successfully achieved through SSH, facilitated by a DDNS client previously installed on the iPhone for a separate project.

Leveraging Existing Services

Consider the various online services you utilize and explore their web-based tracking capabilities. You might discover surprisingly straightforward methods for locating your smartphone.

Thinking critically about the applications and services running on your device, and how they can be monitored remotely, could reveal unexpected avenues for recovery.

Mitigating the Aftermath: Damage Control

From a legal standpoint, possessing only an IP address offers limited recourse for recovering a lost phone. Obtaining a subpoena for the IP address from the Internet Service Provider typically requires considerable time and further evidence. Even with a subpoena, successful identification of the perpetrator isn't assured.

Unfortunately, the thief likely will have already resold the device by the time sufficient proof is gathered. While receiving a remotely taken photograph and accessing records from your mobile carrier’s online portal can expedite the process, these measures may prove insufficient.

Typically, individuals who steal phones are proactive in powering them off and replacing the SIM card. This action circumvents many of the preventative strategies previously discussed. If remote data wiping is an option and recovery seems improbable, initiating this process is advisable.

Immediate Security Measures

Should any uncertainty exist regarding the security of your personal information, immediate password changes are crucial. This precaution is wise regardless, as compromising your accounts is always a possibility. Update passwords for all services automatically linked to your phone, including Gmail, PayPal, and your online banking platforms.

Revoke device access for social media platforms like Facebook and Twitter. Once the phone’s loss is confirmed, report it as lost or stolen to your carrier to prevent unauthorized charges.

htg-explains-so-you-lost-your-smartphone-now-what-8.jpg

(Image by WIlliam Hook)

Verizon identifies lost or stolen phones using “bad” ESNs, preventing reactivation on their network. However, other carriers may not employ this practice – AT&T, for example, does not. Filing a police report, including your device’s serial number, is recommended, particularly if you have insurance. Even without insurance, a police report can be beneficial should further issues arise.

Replacing Your Lost or Stolen Device

The final step involves obtaining a replacement phone. Many mobile carriers provide insurance coverage for devices, allowing for a replacement upon submission of a police report and payment of a deductible. While unconfirmed, there are reports of individuals receiving discounts at Apple stores by explaining their situation.

Upon reporting your phone as lost or stolen, your mobile number will be deactivated to prevent unauthorized use. However, you will continue to be billed according to the terms of your service agreement.

Exploring Upgrade Options

Visiting your carrier’s retail location may reveal an unexpected upgrade eligibility. Some providers offer partial discounts on upgrades as a reward for customer loyalty or through annual promotions, even if you are still under contract.

If you are on a family plan, consider discussing the possibility of utilizing a family member’s upgrade option with a sales representative.

Off-Contract Phones and Potential Risks

Purchasing a phone without a contract can be expensive. Exercise caution when buying used phones online, as many lost or stolen devices are sold through these channels. There is often no assurance that the purchased phone will function correctly.

Previously, some carriers flagged Electronic Serial Numbers (ESNs) of reported stolen phones, rendering them unusable.

A simple solution might be found within your personal network. Announcing your need for a temporary phone may result in a friend or family member offering an older device they no longer use. While it may not match your previous phone’s capabilities, it can serve as a functional interim solution.

Experiencing phone loss is undoubtedly stressful, but taking the appropriate measures to protect your data and potentially recover your device is crucial. Knowing your available options and the necessary steps to secure your personal accounts can provide peace of mind.

Do you have a preferred application or service that wasn't included in this discussion? Perhaps you have a compelling story about losing your phone or successfully recovering it? Feel free to share your experiences in the comments below!

#lost smartphone#lost phone#phone theft#smartphone security#remote lock#data protection