Most of us have experienced that sinking feeling when we can’t find our phone anywhere and realize we’ve lost it. Or worse still – that someone has stolen it.Given that these devices hold so much important personal information of real and sentimental value, their theft can be particularly traumatic. Unfortunately, this means little to the thieves, who are are typically only interested in the high-value hardware.
The moment we realize that a mobile device has been stolen, rather than lost, the internal monologue begins. Where is it? Will I ever get it back? Will a thief be able to access my photos? What about my videos, messages, and other personal information? Unfortunately, the chances of actually getting a stolen phone back are slim. However, if you take the right steps before and after your phone is stolen, you can increase the chance of recovery and limit the damage.
In this post, we explain what to do if your phone is stolen and provide best practices for securing a new or existing phone.
Steps to take when your phone is stolen
Here’s what to do when the unthinkable happens and you realize your phone is gone. Some of these steps will depend on how you’ve prepared for a stolen or lost device.
1. Check that it isn’t just lost
It’s easy to believe that you’ve been a victim of phone theft. But are you sure that’s the case? Although you might normally be careful about always keeping your mobile device in the same spot, there’s a chance you might have left it somewhere while in a rush.
Try calling it first and hopefully you’ll hear it ringing or vibrating. The next best-case scenario is that someone picks it up and engages in conversation. For example, if you left it at a café and a good Samaritan retrieved it, you can arrange to get it back from them.
No answer when you call? Try using a phone finder app such as Apple Find My iPhone, Google’s Find My Device, or Samsung Find My Mobile. T-Mobile’s finder app, Lookout Mobile, uses a device feature that sounds a loud alarm if your phone is nearby.
Using finder apps
All you have to do is go to the app’s website from any web browser, log in using your credentials, and follow the instructions to locate your mobile device on a map. Note that you will need to have these apps set up in advance or they won’t work.
If the app says your phone is close by, for example, in your house or in a restaurant you recently visited, then you know you just need to keep looking or go back to the venue and ask a staff member.
If it is somewhere you haven’t been or appears to be on the move, then clearly someone else has your phone. And if they didn’t answer when you called, there’s a big chance the phone was stolen. That being said, thieves will usually turn the phone off immediately after stealing it so it won’t show up on finder apps (or only show the most recent location).
If a thief has left the phone on and you can track where it is, it may be tempting to go and confront the supposed thief and retrieve the phone. Law enforcement agencies strongly advise against doing this as it could have dire consequences. Instead, you should contact police (more on that below).
2. File a police report
As mentioned, it’s important not to confront thieves. There have been cases where this has ended very badly, including one incident in Canada in which a teen was shot dead after tracking his phone and approaching the suspected thieves.
If you believe your phone has been stolen, file a police report. Although law enforcement agencies don’t have the resources to investigate every case of a stolen phone, if you’re able to tell them where your phone is (using a finder app), they will be more likely to be able to help you recover it. Bear in mind, it probably won’t be considered a high priority case, so could take some time.
Even if you don’t end up getting your phone back, filing a police report can help in other ways. For example, in some countries, devices that have been reported missing or stolen are added to a nationwide blacklist. This means they won’t work with any networks in the country.
If your credit card has been used as a result of your phone being stolen, your financial institution may need your police report number as proof your device was stolen before they will reimburse your losses. In the same vein, you’ll need to provide a police report number to make an insurance claim – assuming your phone is insured. If it isn’t, home contents insurance may cover devices stolen from inside your home.
It’s also worth noting here that some police divisions won’t file a report unless you are sure that you didn’t just lose your phone, so be sure you have your story straight before contacting them.
Here’s where to report your stolen phone in a few countries:
- US: Contact your local police via a non-emergency number or visit your local police station.
- UK: Call 101 to report crimes where an emergency response is not required. You can also report crimes online. If you’re in Scotland, you should contact your local police.
- Canada: Visit your local police website for instructions on how to report your device. Note that some enable you to report a stolen device via a web form.
- Australia: Visit a local police station or call 131 444 for non-urgent assistance.
Note that if the phone theft involved some type of more serious crime, such as burglary or assault, then you should call the emergency number for your jurisdiction.
When reporting your phone stolen, ideally, you should be able to provide police with the device’s IMEA number (more on that below). This way, if they do happen to recover your phone, they will be able to identify it as yours and reunite you with it.
3. Lock (and maybe erase) your phone remotely
As soon as you find out your phone is with someone else, the priority should be making sure that the person cannot access the contents of the phone. To do this, you can lock your phone remotely. The exact process will depend on your operating system:
For iOS devices, the Activation Lock is automatically enabled when you turn on Find My iPhone (which needs to have been enabled before the device was stolen). This locks the device so that no one can sign in without your Apple user ID and password.
The Find My iPhone app also includes a Lost Mode feature. This will display a custom message on the device which can include a phone number to reach you. To put the device in Lost Mode, go to icloud.com/find on a Mac or PC and sign in using your iCloud username and password.
If you’re absolutely certain you won’t be getting your phone back and you’re concerned about identity thieves, you can perform a remote erase on your phone within the Find My iPhone app. Ideally, you have your phone backed up, so performing an erase won’t result in you losing any information permanently.
You can remotely lock your Android device via the Find My Device app (which needs to have been turned on before the Android phone was stolen). Use Gmail credentials to sign in to google.com/android/find from a web browser and select SECURE DEVICE.
You’ll then be prompted to set a new lock screen password. In the same interface, you can perform a remote erase on your device if deemed necessary.
Windows has its own app called Find My Phone which you can use to lock your device. In any browser, sign in to windowsphone.com. Click Find My Phone and then select Lock. Follow the prompts for locking your phone which will be different depending on whether or not you’ve already set up a password for your phone. Within this application, you also have the option to remotely erase your device.
4. Call your cellular provider
If someone has stolen your phone and has been able to get in to the device, they could easily rack up some hefty call, text, and data charges. Call your service provider right away to suspend your service and prevent unauthorized charges.
If you’re unable to perform a remote lock or erase yourself, don’t lose hope. Your wireless provider might be able to deactivate the device and possibly wipe your personal information from it. Call them to find out what the options are.
5. Change your passwords
Even if there’s a chance you could get your phone back, you want to be sure that no one can use it for anything while it’s in their possession. Your phone should be protected with a PIN, password, or pattern. However, these are crackable with sophisticated software. Even if you’ve managed to remotely lock or erase your phone, there could have been a window of time where the thief had access.
As such, changing passwords for any accounts associated with your phone is a good idea, especially if you have any autosaved (although this isn’t a good practice in the first place). Perhaps most importantly, change your password for the app store so that no one can make app or in-app purchases. If you use a password manager, alter the password for that right away too. Email and social media app passwords should be changed as well. Email is particularly important if you use this to change your password or as a second step in two-factor authentication for other accounts.
Also change your password for your online banking account (if you use the corresponding app) and other financial accounts, for example investing apps. Use shopping apps? Change your passwords for those too. And what about streaming sites like Netflix and Hulu? If you log in to these sites automatically, there’s a chance someone could view your billing information, including credit card details, so you should change these passwords as well.
6. Call your bank
On the subject of credit cards, you should call to let your bank know that your phone has been stolen and ask if there has been any recent activity on your card (which may not show up on online banking apps immediately). They may even advise you that you should cancel your existing credit card and get a new one just to be on the safe side.
You should also monitor your statements in the days and weeks after your phone goes missing and watch out for any suspicious activity. Check for any unauthorized activity on your cards, social media accounts, and anything else that could be accessed from your phone.
7. Contact your insurance company
If you have insurance for your phone that protects against loss or theft, then your final step will be trying to retrieve the value of the device itself (although sentimental value can never be replaced). Can’t remember if you have insurance? You might have purchased it through your provider when you bought your phone. Or you may have it covered under your home insurance, so check with that provider too.
Have AppleCare+? You may be covered, but there is one majorstipulation to be eligible for compensation: the Find My iPhone app must be activated at the time of the loss or theft.
Steps to take when you get a new phone
As you can see from some of the steps above, the course of action you take after your phone has been stolen depends heavily on the precautionary measures you’ve taken beforehand. Unfortunately, you’re likely reading this post after your phone has been stolen. Nevertheless, you can apply this information to your next phone, or if you’re lucky enough to be reunited with your old one.
1. Note your device’s serial number
Keep a record of your International Mobile Equipment Identification (IMEI) number. This might be found in your phone settings or in your online account. It might also be physically printed on the phone (near the battery or SIM) or on the original packaging. You can quote this when you file a police report. It likely won’t persuade the police to actively investigate the case. However, if they do happen to uncover your phone, for example, if they arrest someone who has a number of devices in their possession, you have a better chance of getting it back.
2. Activate a phone finder app (and others)
We mentioned phone finder apps like Find My iPhone and Find My Device earlier. While these may come pre-installed on your device, it’s important that you enable them in order for them to work when you need them. They can help you in determining whether your device has been stolen or simply lost. They also give you a better chance of finding your device, and qualify you for certain types of insurance reimbursement.
You might also consider installing an app that takes photos after repeated login attempts. Apps like Lockwatch, Third Eye, and Intruder Selfie will automatically snap a selfie after a specified number of login attempts.
While these are generally more useful for discovering if anyone is snooping on your phone, they can still help deter a thief. Just the fact that the phone starts taking pictures while they try to log in could be enough to get them to discard the device. Plus, some of these apps tag images with a location, so you know roughly where your phone is at the time of a login attempt. This is handy if you’ve forgotten to enable a phone finder app.
3. Use strong passwords
If your phone is hard to get into, there’s more chance a thief will simply discard it. This introduces the possibility that it could be found and returned to you.
Use a strong password, PIN, or pattern for locking your phone. This may sound obvious but as recently as 2018, more that half of users don’t password-protect their device. Many phones now have biometric login options available. Although these can be frustrating when they don’t work, they can be difficult to crack. You may want to go for fingerprint instead of facial recognition though. In the latter case, a good photo of you may be all that’s needed to fool the software. Fingerprints can be recreated too but may be harder to get hold of than a photo.
Don’t rely on patterns
Patterns have been found to be fairly poor options for protecting your device. It’s not difficult to watch someone unlocking their phone and recreate the same pattern. One study found that a swipe could be recreated almost two-thirds of the time after just looking at it once. Patterns can also be guessed by looking at fingerprint smudges on the screen. That said, short passwords or PINs can be fairly simple to crack too. Use a password with at least eight digits if possible.
It’s a good idea to require passwords for any app store purchases and in-app purchases, such as for Amazon. You might consider two-factor authentication for some apps, particularly online banking platforms. With two-factor authentication, a second method of contact may be used to confirm your identity. This typically involves a code sent via email or text.
It’s important to use different passwords for every account and not to save passwords in apps or web browsers. If you have trouble remembering a lot of passwords, you can consider using a password manager. Sticky Password and Dashlane are some good options with apps available for iOS and Android. Just make sure you set the password manager app to lock automatically after a short period of time. Otherwise, you could be leaving all of your passwords (and an accompanying account list) exposed to a thief.
4. Set up automatic backups
If your phone is gone for good, the loss of the device itself might not be the worst part of the situation. Having to part with all of the information it holds, such as contacts, calendars, photos, and videos, can be heartbreaking.
Backed up your phone but having trouble accessing everything from your device? Data recovery tools such as iMyFone D-Back can help you recover everything from photos and videos to WhatsApp and WeChat messages.
If you use your phone for work, ask about additional security options that might be available.
5. Use best practices when using your phone
Some common sense can go a long way when it comes to keeping your information away from prying eyes. Delete apps that you don’t need anymore. Log out of apps after each session, especially for things like online banking. Don’t keep unnecessary information on your phone, and avoid keeping sensitive documents or intimate images on your device.
Where do stolen smartphones go?
Despite locks being placed on devices, and stolen phones blocked from using in-country cellular providers, the number of smartphone thefts continues to increase. In the UK, almost 250 phones a day were stolen in London during 2022. But what happens to these stolen smartphones?
First, it’s worth pointing out that thieves are rarely interested in personal data. What they want is the hardware. Stolen devices can be pawned or sold to no-questions-asked electronics stores. The devices are easy to sell on after inserting a new SIM card and reprogramming them. Those that are locked can be stripped for parts or hacked by those with the necessary expertise. Devices may also be shipped abroad, where their resale value can be greater than it is in the country from which they are stolen.