Definition

screaming cell phone

A screaming cell phone is a cellular telephone that is programmed to emit a noise like human screaming in the event that the phone is lost or stolen. If a device goes missing, an administrator can activate a kill switch that will render the device inoperable and wipe all stored data. Simultaneously, the scream alarm will sound.

"Scream technology" is provided as a service that can be used with any portable device equipped with wireless communication features such as a cell phone set, personal digital assistant (PDA), Blackberry, pager or notebook computer.

Although a screaming cell phone doesn't prevent theft of the device or ensure its return, it can protect any stored data and make the thief extremely conspicuous. Carsten Brinkschulte, CEO of Synchronica (a company that provides the service) explains the benefits of screaming cell phones: "According to industry sources, it takes on average only 30 seconds for someone to notice that their phone is missing, compared to an hour for a wallet or purse. Using our service, crime victims can be reassured that their information is immediately removed from the stolen phone, along with the satisfaction of annoying the thief with a screaming handset."

This was last updated in November 2006
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • On-device defenses for mobile malware

    As workforces grow increasingly dependent on smartphones, mobile threats warrant serious consideration. As discussed last month, mobile malware barriers are falling fast, at precisely the time when mobile users are becoming a bigger, juicier target. When the mobile malware "tipping point" is reached, will your organization be ready? Conventional Win32 malware defenses are commonly deployed on the assets they protect: PCs. Antivirus scanners, host intrusion detection programs, personal firewalls, and email spam filters are all designed to stop viruses, worms, trojans and spyware that prey upon desktops and laptops. These "on device" defenses are generally accepted security best practices, widely used by both businesses and individuals.

  • Symbian: Protect your data, not just your device

    As handheld devices become more common, protecting the data stored on them becomes a primary concern. Fortunately, mobile operating systems now include security features that enterprises can use to enforce corporate policies. In this series, we explore data protection on today's most popular handheld devices, starting with Symbian.<

  • TrueCrypt reviewed: Free utility for mobile encryption

    In the mobile world the only sure way to secure sensitive data is with encryption. But any such encryption utility has to be easy to use on Windows machines. Contributor Serdar Yegulalp takes an extensive look at a free partition- and disk-level encryption utility called TrueCrypt that is both effective and easy to use.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: