A mobile device is considered ineligible for use on a mobile network when it has been reported lost, stolen, or associated with fraudulent activity. This status effectively renders the device unusable for making calls, sending messages, or accessing cellular data on most networks. For example, if a subscriber reports their handset as stolen to their service provider, the provider will add the device’s unique identifier to a shared database preventing its activation on other networks.
The establishment of these lists is crucial for mitigating mobile device theft and preventing associated illegal activities. It provides a deterrent against theft by rendering the device functionally worthless to potential thieves. Historically, the lack of such systems allowed stolen devices to be easily resold and reactivated, fueling a market for stolen goods. The implementation of shared databases represents a significant advancement in mobile security and consumer protection.