fbpx

PHONE THEFT IN NIGERIA: THE BEST OPTION FOR RECOVERY

Must Read

Destiny Young
Destiny Younghttp://linktr.ee/youngdestinya
Destiny Young is a highly credentialed information technology professional with over 14 years of industry experience. An HND/BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.

If you have enabled the #FindMyPhone feature on your mobile device, be it Android or iPhone, it is possible to track the phone location in cases where the phone is stolen, Provided the phone Operating System is not #ROOTED (programmatically altered).

The FindMyPhone feature uses GPS technology to plot the coordinates of the phone’s location. When a mobile device is powered on and connected to a network, its GPS is synchronized with the network Base Station for call routing. Each Telecom Base station has geo-location data for traceability.

It is therefore possible that, on your own, you can log into a computer, sign into your account, and use #FindMyPhone on the web to track the location of the phone if its OS has not been tampered with. The challenge here is that the GPS location of the stolen phone might change once the person moves to another location.

MY RECOMMENDATION:

Ensure you have recorded and kept in a safe place your phone IMEI number, which is usually written on the pack of the phone you purchase, or dial *#06# to see it.

If your phone is stolen, make an official report to the DSS office near you and submit the IMEI.

I am recommending DSS because of my personal experience with their services and approach.

Security agencies have the technology to not only track the device’s GPS location but also listen to conversations made through the phone, even if the phone SIM has changed (of course, the thief will change the SIM).

Because the security agencies can listen to conversations established using the phone, they are able to pick up the second or third party in the conversation chain, and from there, the first party (the person with the stolen phone) will be extracted.

Destiny Young, Cybersecurity Analyst

Destiny Young
Destiny Young is a highly credentialed information technology professional with over 14 years of industry experience. An HND/BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.
- Advertisement -spot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

National Digital Economy and E-Governance Act 2024: THE DIGITAL TRANSFORMATION ERA

For effective execution of the provisions under this Act, there shall be established in every public institution an ICT Unit with such number of staff as may be required for efficient performance, effective service delivery, and digital transformation of functions in the respective public institution.
- Advertisement -

More Articles Like This

- Advertisement -