© 2018, IJSRCSE All Rights Reserved 44 International Journal of Scientific Research in _______________________________ Research Paper . Computer Science and Engineering Vol.6, Issue.1, pp.44-49, Feb (2018) E-ISSN: 2320-7639 GSM devices Property proof and Tracking Hussam Elbehiery Department of Computer Networks, Ahram Canadian University (ACU), Giza, Egypt * Corresponding Author: hussam.elbehiery@gmail.com, Tel.: +201027199717 Available online at: www.isroset.org Received 29/Jan/2018, Revised 05/Feb/2018, Accepted 18/Feb/2018, Online 28/Feb/2018 AbstractAll GSM network devices such as smart phones become a target of choice for thieves because they are small, valuable, and there is a market for them. A thief can sell a stolen electronic device to an unsuspecting used computer store or pawnshop, and easily receive up to half its value in cash. The penalties for a property crime are less severe than those of a crime against a person is another reason of wide spreading of this crimes. Cost of this crimes is not just its replacement cost, but also the cost of configuring and loading replacement software, and the cost of lost time for the owner while the device is being replaced. An even greater cost is the potential exposure and liability that results from lost confidential corporate and client information. Designed web page will be used to access these devices to take always a copy of the important data and will be saved on the cloud area related to the web site which make it easier to retrieve the stored information in theft or lost case. The introduced research explains how you can keep strangers from accessing your personal information, safely back up and retrieve the stored data in the device. The introduced design will help in trying of minimization of the theft cases also minimizing extortion by thieves or some of exploiters depending on that all GSM device especially cellular phones could be tracked using IMEI (International Mobile Station Equipment Identity) or MEID (Mobile Equipment Identifier). KeywordsCellphone tracking, Property Proof, and Data Retrieval I. INTRODUCTION Unsurprisingly, the thefts grew most rapidly in urban areas where cell phone density is highest. So they think firstly in stored data on these devices as the world become live in the digital life. However, because of their portability, mobile devices are more susceptible than desktop systems to loss and theft. Safeguards you can use to reduce the risk of someone accessing personal and institutional data when your mobile device is lost or stolen [1]. First of all some security features on smartphones which are using the GSM services should be enabled which is also vary between devices and operating systems (iOS, BlackBerry, Android, Windows Phone, and Windows Mobile) to configure security and encryption settings. [2] Use whichever features your device offers that provide the best security for your needs such as: Password, passcode, or PIN, Unlock pattern, Device lockout, Auto-wipe, and Encryption. The following common features are frequently useful, but can also create security risks [3]. You may want to consider disabling them: Bluetooth, and GPS. The suggested system depend on developing a web application system to verify an ownership for the customer's cellular phones and the GSM devices. There will be an employees who are responsible for client registration on the tracking and protection site in addition to the possibility of changing the ownership from the original client to any another customer (who the original client could choose) and the normal inheritance operations (son, daughter, brother, sister, relatives, etc.). In case of theft, the customer can contact the responsible employee in the suggested system or go to nearest branch to complete or finalize any operation related to this issue. Customer can see all the purchases of cell phones or GSM devices directly through the system website and all of the auxiliaries‟ customers [5,11]. There are specific websites are available for both iOS and Android devices and combines security, tracking, and anti-virus/malware protection. There are several interesting features, such as the system recording a cell phone‟s last location right before the battery dies, a chance to backup contact data before a remote erase, and it‟ll even snap a photo of any would-be thief and email it along with location data to you. There‟s a free two-week trial, after which it‟ll cost $5 per month approximately [6,9,10]. The rest of the paper is organized as follows: Section 2 highlights the system analysis and design for the proposed work whereas the web application output framework is