# The Path of Stolen iPhones: From Theft to the “Stolen iPhone Building” in China
In recent times, the concerning phenomenon of iPhone theft has risen to global prominence, with stolen units frequently landing in a specific site in China. This article investigates the trajectory of stolen iPhones, centering on a well-known building in Shenzhen referred to as the “stolen iPhone building,” where these gadgets are either resold or dismantled for parts.
## The International Theft Network
Reports suggest that iPhones pilfered from cities as varied as London and Los Angeles commonly make their way to the Feiyang Times building in Shenzhen, China. This structure has become infamous not just for its mobile repair services but also as a marketplace for stolen electronics. The Financial Times has pointed out this site as a center for pre-owned iPhones, especially those coming from Europe and the United States.
### A Case Study: Monitoring a Stolen iPhone
One individual, Sam Amrani, witnessed the theft of his iPhone 15 Pro firsthand when it was snatched from his grasp by thieves on electric bicycles. By using Apple’s Find My feature, he managed to track the journey of his phone across countless miles:
1. **Theft in London**: Amrani was momentarily distracted while responding to a WhatsApp message when the thieves acted.
2. **Local Repair Shop**: Soon after the theft, the phone was taken to a nearby mobile phone repair establishment.
3. **Transport through London**: The device was shuttled through various locations in London.
4. **Kowloon, Hong Kong**: A week later, it surfaced in Kowloon.
5. **Final Destination**: The phone finally reached the Feiyang Times building in Shenzhen.
While unlocked iPhones command higher prices, locked devices still have a market, as their parts can be sold off individually. Vendors at the Feiyang Times building often profess ignorance regarding the provenance of the phones they offer.
## The Dark Aspects of Phone Theft: Blackmail Attempts
In certain situations, individuals who have their iPhones stolen receive iMessages from the thieves, trying to extort them into unlocking their devices. When an iPhone is tagged as lost or stolen, it can show a contact number or email for the owner to facilitate its return. Thieves take advantage of this feature to send threatening messages warning the victim of data breaches if they fail to comply.
For example, one message stated:
> “Your old iPhone is recycled by us; we are just recycling merchants. If you don’t remove it, your old phone motherboard will be sold to other customers, maybe they will hack your phone or steal your credit card…”
This strategy is a bluff, as locked phones cannot be accessed for personal information, but it can be frightening enough to confuse vulnerable victims.
## The Effect of Apple’s Security Measures
Apple has established strong security measures, such as the Find My app and Activation Lock, which have substantially curtailed the market for stolen iPhones. However, as the situation demonstrates, the demand for stolen devices remains. The best way for users to protect their personal data is to use strong passcodes and activate features like Stolen Device Protection.
## Conclusion
The journey of stolen iPhones from theft to resale in the Feiyang Times building highlights the global dimension of phone theft and the obstacles in combating it. While Apple’s security measures have made progress in safeguarding users, the presence of a flourishing market for stolen devices emphasizes the need for ongoing vigilance. Users should make security a priority by using strong passwords and leveraging available protective features to protect their personal data from thieves.