How to find a stolen android phone if it is off

  1. Search for a stolen off phone
  2. Search for a disabled smartphone by the police by IMEI code
  3. Search for a device by the SIM card number
  4. Determining the location of the smartphone through the application
  5. Harsh reality
  6. Software to prevent theft and search devices
  7. Protection of personal information

Theft of a smartphone delivers a lot of problems. Basically, it is not only the loss of the gadget, but also personal information, which, in particular, is valued much higher than the smartphone itself. For some, this information is invaluable. In this article, I will prompt:

  • how to find a stolen android phone if it is turned off;
  • what software to install to find the lost device;
  • how to secure personal data on a stolen gadget.

Content:

  1. Search for a stolen off phone
    1. Search for a disabled smartphone by the police by IMEI code
    2. Search for a device by the SIM card number
    3. Determining the location of the smartphone through the application
    4. Harsh reality
  2. Software to prevent theft and search devices
  3. Protection of personal information

Search for a stolen off phone

If your device is turned off, which is logical for theft, standard actions, such as a phone call, will not work. It is necessary to act immediately to catch the thief in hot pursuit.

There are three ways to find your stolen device:

  1. Turn to law enforcement.
  2. Contact the network operator to determine the location of the gadget.
  3. Use software.

We specify each of the methods.

Search for a disabled smartphone by the police by IMEI code

Each phone is assigned an identifier - IMEI code . It can be found under the battery of the device itself, find out by engineering menu android , using the service code (* # 06 #), in the settings "about the phone", look in the packing box of the smartphone.

When contacting the police, it is advisable to know this code. Also, take a passport, a SIM card contract and preferably visit the police station of the area in which the theft was committed. Write a statement with the details of the theft and provide the above data.

Tip! Finding a phone by IMEI yourself is quite a difficult task. This will require access to equipment and databases of cellular operators. And the data of free databases on the Internet in one case out of a thousand can give a real clue.

Search for a device by the SIM card number

Mobile network operators can track all actions on a SIM-card, up to its approximate location within a specific tower. Even if the smartphone is turned off, the SIM card will respond if it is within the range of access for telecommunication systems.

Try to contact the operator directly, tell the situation and provide:

  • IMEI device and phone number;
  • SIM contract number.

According to the specified data, the operator will be able to find out information from the memory of the billing server.

Determining the location of the smartphone through the application

Determining the location of the smartphone through the application

Almost every smartphone manufacturer offers solutions for finding a lost device in the security and privacy settings. For example: Huawei - Find a device, Samsung - Remote control. A popular and effective solution is software from Google:

  • Find My Device - an application for a smartphone (on the page following the link there is a detailed instruction for working with the program);
  • android.com/find - page on the Internet, login with your account.

But the problem with using programs is that you need to pre-tune when the gadget is in your hands. Otherwise, there will be no sense in finding a smartphone. In addition, no application can remotely turn on the smartphone, especially if the battery has sat down. But, programs can fix and inform the owner when the gadget becomes active.

Harsh reality

Harsh reality

The search for a stolen smartphone will directly depend on you and on your device pre-settings. In million cities every day hundreds of mobile devices are lost. Such statements may not be a priority for the police, especially when there is little information about the loss:

  • IMEI is not specified;
  • there is no identikit of the robber;
  • not installed customized applications to search for a missing smartphone, etc.

If there is not enough data, police officers can discourage you from writing a statement, because they obviously understand that there is almost no chance of finding a device.

The network operator may refuse to provide you with the billing data, stating that he has no right to do so without a court order, referring to the legislative framework, which does not regulate the work process in such cases.

The network operator may refuse to provide you with the billing data, stating that he has no right to do so without a court order, referring to the legislative framework, which does not regulate the work process in such cases

If the application is dragged out, the thief can throw away the SIM card, reset the smartphone to factory settings and change the IMEI code (rather complicated implementation on new devices implying the replacement of microchips in the smartphone. This can only be performed by a technically trained specialist), which makes it extremely difficult to further monitor the smartphone in the operator’s database.

Software to prevent theft and search devices

To protect yourself from possible theft will not work, but you can reduce the risks of parting with the device. Even if the device is irretrievably lost, your personal data will not fall into the hands of an attacker and can be restored. To do this, you can use the following tips and applications:

  1. Learn and keep IMEI of your smartphone in a safe place;
  2. Use a pin code and a fingerprint scanner (or Face ID).

    Important! If you have lost the smartphone on which the pin code is installed or is entered through a fingerprint, the attacker will not be able to access your data. To unlock the device, he will have to erase all data.

  3. To install Find My Device or equivalent. Allows you to determine the location (if geolocation is enabled), call, lock the screen and delete all data. The application works through your Google profile.
  4. Install antivirus Lookout or equivalent. It is interesting because there is a function of automatically saving information about the location of the smartphone while reducing the battery charge. Data is sent to the specified mail.
  5. Use paid antivirus on an ongoing basis. Good decision - Kaspersky Internet Security . The Anti-theft feature allows you to remotely turn on the siren, take a photo from the front camera, block access to the device, or delete all personal data.
  6. SIM Change Alarm . When you change the SIM card and turn on the device, the application will send two SMS to the specified number with the information: IMEI of your smartphone and the number of the new SIM card, GPS coordinates of the device.
  7. Synchronize important data for you or make backups .

Again, manufacturers are also offering smartphone search services. Take for example Samsung. Service findmymobile.samsung.com can monitor the included smartphone, determine geolocation when it is turned off, indicate the number of the new SIM card, lock the device and much more.

Protection of personal information

The task is as follows:

  • save your data in order to access them in the future;
  • restrict access to personal information to the attacker.

save your data in order to access them in the future;   restrict access to personal information to the attacker

To execute the first rule, you need to make backup copies (synchronize) the data important for you. For example:

  1. Phonebook contacts can be saved to your Google profile. .
  2. Photos can be synchronized with Google Photos.
  3. Notes or important data can be stored in Evernote .
  4. Books, videos, music, duplicate to cloud storage (Google Drive, Yandex.Disk, Mega, etc.).
  5. Passwords can be stored in "passwords and forms" of browsers or use analogs (for example True key ).

Restrict access to your data is simple. Use a password (pin code) on an ongoing basis, and when stealing your device, use one of the services to delete all personal data remotely.