Fraud & Security
IMEI Database
Centrally located database of valid and stolen handset IMEIs to which operators may connect to upload and download data to control mobile device access on their networks.
Security Algorithms
Provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks.
Security Accreditation Scheme
Voluntary scheme where smart card suppliers subject their production sites and processes to a comprehensive security audit providing confidence to network operators that adequate security is in place.
Security Advice for Mobile Phone Users
These pages aim to provide mobile phone users with simple, easy to follow advice to help mobile users minimise the risk of experiencing potential problems firsthand.

