ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices
|
|
- Roy Mosley
- 5 years ago
- Views:
Transcription
1 ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices ITU-T SG 11 Meeting, July rd July, 2018
2 CONTROL SYSTEM IN COLOMBIA FOR STOLEN MOBILE DEVICES OR WITH ALTERED/DUPLICATE IMEI Communications Regulation Commission Hugo Romero Adviser
3 AGENDA COMPREHENSIVE SET OF MEASURES IMEI BASED CONTROL SYSTEM DUPLICATED IMEI DETECTION AND CONTROL REGIONAL BLOCKING OF STOLEN IMEI RESULTS MAIN CHALLENGES
4 COMPREHENSIVE SET OF MEASURES ICT SECTOR Legal Framework use through Databases Regional Black Listing Not Reg IMEI Malformed IMEI Duplicated IMEI Control of sales Invalid IMEI Not Approved ME
5 COMPREHENSIVE SET OF MEASURES ICT SECTOR JUSTICE & DEFENSE Penalization of the IMEI tampering Domain extintion of ilegal POS Legal Framework use through Databases Regional Black Listing Not Reg IMEI Malformed IMEI Duplicated IMEI Law Enforcement Special Task Force Control of sales International operations & Border Controls Invalid IMEI New Police Code Not Approved ME
6 COMPREHENSIVE SET OF MEASURES ICT SECTOR JUSTICE & DEFENSE COMMERCE & CUSTOMS Penalization of the IMEI tampering Importations Domain extintion of ilegal POS Legal Framework use through Databases Regional Black Listing Not Reg IMEI Malformed IMEI Duplicated IMEI Law Enforcement Special Task Force Control of sales Exportations International operations & Border Controls Invalid IMEI New Police Code Not Approved ME
7 IMEI BASED CONTROL SYSTEM - LAW ENFORCEMENT TAC TYPE APPROVED POS User MOBILE OPERATORS + - IMEI (+) IMEI (-) NATIONAL DB + - IMEI (+/-) CUSTOMS Importer CDRs DETECTION INVALID NON- TYPE APPROVED NOT-REGISTERED CLONED (DUPLICATED) (+) Positive List + - (-) Negative List TAC TYPE APPROVED
8 ICT MEASURES FOCUS Each user is responsable of his device procedence Legal Device Registry POSITIVE DATA BASE Make lost/stolen device useless Blocking in mobile networks NEGATIVE DATA BASE Detect and control Altered/duplicated devices DAILY CONTROL OF IMEIS WITH ACTIVITY IN MOBILE NETWORKS
9 IMEI ACTIVITY CONTROL: DEPLOYMENT PROCESS oct 2015 mar 2016 jul 2016 sep 2016 oct 2016 mar 2017 may 2017 sep 2017 mar 2018 Invalids Not Type Approved Duplicated Transition periods (amnesties for existing devices)
10 PURPOSE OF MEASURES & IMEI CONTROL PROCESS Type Approval Importation of Approved and not reported devices Detect&Control Altered stolen devices Register of legally imported in DB + Make Stolen Device useless
11 INITIAL DIAGNOSTIC 47 M OF POPULATION WITH 57 M OF ACTIVE LINES 42 M OF IMEI WITH ACTIVITY IN MOBILE NETWORKS 7,1 M : Non Type Approved 1,8 M : Invalids 9,5 M : Not Registered 6,8 M Potential duplicated (Same IMEI seen with 3+ SIMs) March % of Irregular IMEIs
12 DAILY DETECTION&CONTROL PROCESS MOBILE NETWORK 24 H IMEI TAC DBs CROSS CHECKS
13 CONTROLS AND USER s OPTIONS IMEI TYPE DEFINITION CONTROL USER s OPTION Malformed (with no standard format) Invalid Non-type approved Not Registered Duplicated Less than 14 dígit or With alphabetic characters Not in GSMA TAC DB Not in CRC TAC DB Not in CRC TAC DB (Not homologated) Not in Positive DB (Unknown user/origin) Same IMEI in different devices No network access Blocked in 48 hr Blocked in 45 Days Blocked in 20 Days Blocked in 30 Days Control IMSI-IMEI Claim to vendor Definitive blocking Claim to vendor Claim to vendor Or proceed to homologate in CRC Proceed to register & Unblock Restricted use with one or more lines
14 CONTROLS AND USER s OPTIONS IMEI TYPE DEFINITION CONTROL USER s OPTION Malformed (with no standard format) Invalid Non-type approved Not Registered Duplicated Less than 14 dígit or With alphabetic characters Not in GSMA TAC DB Not in CRC TAC DB Not in CRC TAC DB (Not homologated) Not in Positive DB (Unknown user/origin) Same IMEI in different devices SOURCES OF ALTERED DEVICES No network access Blocked in 48 hr Blocked in 45 Days Blocked in 20 Days Blocked in 30 Days Control IMSI-IMEI Claim to vendor Definitive blocking Claim to vendor Claim to vendor Or proceed to homologate in CRC Proceed to register & Unblock Restricted use with one or more lines
15 DUPLICATED IMEI DETECTION 1. Same IMEI with different SIM making calls at the same time 2. Or within not posible time and distance frames
16 GENUINE VS ALTERED MEs VALUE CHAIN OF GENUINE DEVICES OEM TAC MANUFACT IMPORTER VENDOR OPERATOR USER GENUINE ME VALUE CHAIN OF ALTERED DEVICES GENUINE ME STOLE RECEIVING IMEI ALTERATION ILLEGAL RE SALE USER OPERATOR ALTERED ME
17 GENUINE VS ALTERED MEs VALUE CHAIN OF GENUINE DEVICES OEM TAC MANUFACT IMPORTER VENDOR OPERATOR USER GENUINE ME IMPACT VALUE CHAIN OF ALTERED DEVICES GENUINE ME STOLE RECEIVING IMEI ALTERATION ILLEGAL RE SALE USER OPERATOR ALTERED ME
18 GENUINE VS ALTERED MEs Match of TAC, Brand and Model Internal IMEI = external IMEI Original Label Importation papers Authorized vendors (Big surfaces/operator) Invoice consistency (value, IMEI, etc) IMEI history associated with a subscription data TAC, Brand, Model don t Match Internal IMEI different from external IMEI Fake label Case Brand and Model are different from the TAC No importation papers Invoice inconsistencys (value, IMEI, etc.) No IMEI history associated to a subscription IMEI technical diagnostic required (Case manufacturer) STAKEHOLDERS DON T HAVE CHANCE TO PREVENT DUPLICATION IN OTHER ME ME ALLOWS IMEI TAMPERING TO USE OTHER s GENUINE ME IMEI
19 Duplicated IMEI Control
20 REGIONAL BLOCKING OF STOLEN IMEI SOURCE: GSMA LATIN AMERICA OTHER REGIONS CONNECTIONS TO GSMA IMEI DB (# of Countries) EUROPE: 39% ASIA: 5% AFRICA: 4% OCEANIA: 7%
21 RESULTS Controlled Irregular IMEIs Invalid Not registered Duplicated Not-Type approved Unformatted 5,28 M 3,16 M 6,44 M 2,67M 1,15 M 2,65 M No network access 2,6 M 11,15 M 17,55 M Registered in Positive Database 85,6 M 31,1 M 13,8 M 8,0 M 142,8 M
22 THOUSANDS THOUSANDS THOUSANDS THOUSANDS RESULTS Trends of Irregular IMEI presence INVALID NOT HOMOLOGATED NOT REGISTERED DUPLICATED
23 MILLION RESULTS Year Lost + Stolen.vs. Users ,7% 44,48 3,4% 46,20 3,7% 3,9% 55,33 49,07 50,30 3,1% 62,22 58,68 57,33 3,2% 3,0% 2,9% 4,5% 4,0% 3,5% 3,0% 2,5% 30 2,0% ,67 1,57 1,83 1,95 1,70 1,70 1,89 1, ,5% 1,0% 0,5% 0,0% Lost+Stolen Active Users
24 MAIN CHALLENGES - GOVERNMENT Challenge Active role by different goverment entities Attack criminal economy Follow up of the problem trends Impacts on stakeholders How to built the positive and negative data bases Enforcement of ICT measures Device repair technicians Black market of device parts Treatment Leadership from the top of the government Legal framework & revisions All law enforcement involvement International scope Police findings & statistics Multisector f.u. Meetings Dialog focused on solving public safety issue By law, is a financial/operational responsabiltiy of operators Per law is ict ministry function Educate them in ethics in front of alteration Police controls on points of sale
25 MAIN CHALLENGES -REGULATOR Challenge Empowerment to regulate Know how of the problem Dynamics of the problem Volume and types of IMEI to control Not registered devices Blocking of not homologated devices duplicated IMEIs Law issued by congress Decree issued by ict ministry Treatment Experienced team profile Exchange of experiences with other countries Technical follow up commitees Continuos regulation adjustments pashed deployment priorization per imei type transition periods for each type of existing imeis gov&operators public campaigns start blocking of not registered imeis Re engineering of homologation process (on-line, for any person) Search of technology to control duplicates Adoption of 2 criteria to define genuine devices: 1. The ones owned by registered user in db+ 2. The one who proves having genuine device
26 MAIN CHALLENGES - OPERATORS CHALLENGE Operate national DBs Consistency & Concilliation of DBs Block rigth IMEI of stolen devices Volumes of IMEI to block Centralized + Distributed DBs Protocols Automatization TREATMENT Daily treatment of error messaging Take IMEI from netowork activity Upgrade EIR Keep entries on EIR for a limit of time Add new IMEIs to blacklists deleting earliest entries malformed IMEIs not homologated devices Detection of duplicated IMEI Apply changes on Radio acces and core networks Daily CRC homologated TAC list Agree on duplicated IMEI definition Agree on criteria and algorithms to detect duplicates Given time to develop, test and opérate algotihms
27 MAIN CHALLENGES - OPERATORS CHALLENGE Detect both intra network and inter network duplicates (with activity in different mobile operators) Volume of data to analyze in the process of duplicates detection Protection of personal data contained in CDRs duplicated IMEIs Identify genuine devices from several with same IMEI Rotation of devices with irregular IMEIs TREATMENT Split processes, one for intranetwork detection and other for inter network detection by a third party thac collects information and apply defined criteria and algorithms Only Voice CDR is taken to analysis Use of minimun fields of CDRs to analyze in the detection For inter network detection, use only data related to those IMEI with activity in more than one network for a month period. Only using fields that are not personal data by itself (or alone) Sending only fields required for analysis to the third party in charge of inter network detection of duplicates. Upgrading EIR to IMSI-IMEI check functionality Updating of CRM to EIR provisioning process Establishing customer care processes Agree on criteria of genuine devices with the regulator. Using general criteria to let the operator take decision based in each case, proves and the devices involved. Reduction on bllocking times
28 MAIN CHALLENGES LAW ENFORCEMENT CHALLENGE Better and on line information of stolen devices Low technical know how on mobile theft Increase Street surveillance Control to Points of Sale of mobile devices Judicialization of people that alter IMEI Impact all links in to the criminal chain Very low denounce levels of stolen devices from users Access to centralized DB TREATMENT ICT Ministry and Regulator training Georeference of hot spots with centralized DB info Device Sale Authorization Regime by ICT Ministry On line information system of authorized POS Legal framework (closings + Domain extintion) Proposal for law revision to pass in the congress New Police Code (mobile device contraventions) Legal framework & revisions Create several interinstitutional groups (intelligence/operations) Actions with international scope Change presencial process to virtual denounces Public campaings
29 Findings and Recommendations Reach global exchange and blocking of IMEI reported as stolen/lost Complement black lists with national detection / control of altered devices Detect and control all IMEI types that identify posible altered devices: Malformed (Unformatted) Invalid Not homologated (Not-Type approved) No Registered in positive/white data bases Duplicated Thieves act and adapt rapidly. Continuos follow up of the application of measures. Key success factor: Reference Data Base with unique regular identifiers of legally imported and acquired devices Mid Term process (~3 year). Phased deployment recommended: Diagnostic Design Implementation Operation Transition (amnesty) periods to existing devices User processes
30 REFERENCES 1. GSMA and ETSI standards (ETSI 3GPP TS v ( ), 3GPP TS ) 2. GSMA TS.06 IMEI Allocation and Approval Process 3. GSMA Latin America quarterly reports of GSMA IMEI DB to CITEL Permanent Consultive Committee I 4. IDC Consulting Latin America: Using IMEI Control Systems to combat stolen, fraudulent and counterfeit mobile phones: A Colombia case study. March, English: Español:
31 ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices THANKS HUGO ROMERO ITU-T SG 11 Meeting, July rd July, 2018
Combat of Counterfeit and Stolen ICT Devices
SG 11 Regional Workshop for Africa on Counterfeit ICT Devices, Conformance and Interoperability Testing Challenges in Africa (Cairo, Egypt 5 April 2017) Combat of Counterfeit and Stolen ICT Devices João
More informationOutcomes of the ITU Workshop. Global approaches on combating counterfeiting and stolen ICT devices. (23 July 2018, Geneva)
Outcomes of the ITU Workshop Global approaches on combating counterfeiting and stolen ICT devices (23 July 2018, Geneva) Appreciation The workshop convener appreciated all speakers and moderators for their
More informationIMEI Counterfeit Update
IMEI Counterfeit Update Presented by Mohamed Abbes, MENA Public Policy Director, GSMA mabbes@gsma.com 23 April 2018, ITU Study Group 11 Regional Workshop for Africa 2 www.gsma.com/services /gsma-imei/
More informationITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016
ITU Workshop Combating grey devices Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 Security solutions Qualcomm s vision Theft Deterrence Enterprise
More informationIMEI Security Technical Design Principles
IMEI Security Technical Design Principles Enabling stolen mobile device blocking V4.0 August 2016 Table of Contents 1. Introduction... 1 2. Device Identity Security... 1 3. Design Principles... 2 4. IMEI
More informationGSME proposals regarding mobile theft and IMEI security
GSM Europe The European interest group of the GSM Association http://www.gsmeurope.org GSME proposals regarding mobile theft and IMEI security The question of mobile theft and ways of combating it has
More informationGSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers
GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers Training Guide February 2018 v1.0 Copyright 2018 GSMA Introduction About this document This is a practical training
More informationScope of the Member State mechanism
FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism
More informationCalidad Celular: Case for Colombia
CITEL (PCC.I)/ ITU Forum on Information and Communication Technology Service: Quality, Control and Surveillance (Cartagena de Indias, Colombia, 23-24 September 2013) Calidad Celular: Case for Colombia
More informationWorkshop on Addressing the Barriers to IPv6 Deployment Spanish use case
Workshop on Addressing the Barriers to IPv6 Deployment Spanish use case Cristina Ramos cristinapilar.ramos@correo.gob.es Agenda Agenda IPv6 addressing plan Barriers Conclusions 1 Background Digital Agenda
More informationWORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe
WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the
More informationLTE in Industry Verticals: Market Opportunities and Forecasts
LTE in Industry Verticals: Market Opportunities and Forecasts 2013 2018 January 2013 Overview: There is a rapidly growing demand for broadband-enabled data applications within certain vertical market segments
More informationBDT Activities on Spectrum Management István Bozsóki Head of Division BDT/IEE/SBD
BDT Activities on Spectrum Management István Bozsóki Head of Division BDT/IEE/SBD 07/05/2015 EUR RI 2015, Budapest 1 Recent Activities on Spectrum Management Spectrum Management Master Plan (SM MP) Spectrum
More informationOverview on the Project achievements
Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia
More informationMutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits
Conformity and Interoperability Training for SADC Region on Type Approval testing for Mobile Terminals, Homologation Procedures and Market Surveillance Mutual Recognition Agreement/Arrangement: General
More informationSustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America
Sustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America Content The Context The Report Country Assessment WEEE Management Challenges in Latin America Main Findings of
More informationIMEI Systems Under Convergence Conditions. Yurii Kargapolov Ukrainian Network Information Center
New prospective of DNStechnology: 3d Generation of MNP & IMEI Systems Under Convergence Conditions Yurii Kargapolov Ukrainian Network Information Center 3 Systems of the 3.0 Generation (3G Systems) 2 Mobile
More informationETSI TS V6.2.0 ( )
TS 100 508 V6.2.0 (2000-07) Technical Specification Digital cellular telecommunications system (Phase 2+); International Mobile station Equipment Identities (IMEI) (GSM 02.16 version 6.2.0 Release 1997)
More informationThe Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative
The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative United States Department of State International Security and Nonproliferation Bureau Office
More informationStatus of preparations for PP-18. Inter-American Telecommunication Commission (CITEL) Permanent Executive Committee (Com/CITEL)
Status of preparations for PP-18 Inter-American Telecommunication Commission (CITEL) Permanent Executive Committee (Com/CITEL) Working Group for PP-18 Established within COM/CITEL Chairperson: Santiago
More informationUtimaco OX Summit
Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany
More informationCOUNTERFEIT ICT DEVICES, CONFORMANCE AND INTEROPERABILITY TESTING CHALLENGES IN AFRICA COUNTERFEIT ICT DEVICES: THE NIGERIAN PERSEPCTIVE
1 COUNTERFEIT ICT DEVICES, CONFORMANCE AND INTEROPERABILITY TESTING CHALLENGES IN AFRICA COUNTERFEIT ICT DEVICES: THE NIGERIAN PERSEPCTIVE Engr. Ubale A. S. Maska, Executive Commissioner, Technical Services,
More informationMutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits
Workshop for Caribbean countries to promote the development and implementation of Conformity Assessment programmes St. Augustine (Trinidad and Tobago) 2-4 December 2014 Mutual Recognition Agreement/Arrangement:
More informationETSI TS V7.0.0 ( )
TS 100 508 V7.0.0 (1999-08) Technical Specification Digital cellular telecommunications system (Phase 2+); International Mobile station Equipment Identities (IMEI) (GSM 02.16 version 7.0.0 Release 1998)
More informationPROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM
PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;
More informationTelecom Sector Outlook and Spectrum Trading: the Case of Pakistan
Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan Shahbaz Nasir Pakistan Telecommunication Authority ITU Workshop on Economic Aspects of Spectrum Management 21 st 23 rd November 2016 Tehran
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More information3GPP TS V ( )
TS 22.016 V10.0.0 (2011-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; International Mobile station Equipment Identities (IMEI)
More informationA comprehensive approach on personal data protection in the European Union
A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications
More informationTHE IMPACT OF SPECTRUM MANAGEMENT ON MOBILE BROADBAND General framework and technological choices
THE IMPACT OF SPECTRUM MANAGEMENT ON MOBILE BROADBAND General framework and technological choices Wladimir Bocquet, Head of Policy Planning, GSMA 11 APRIL 2014 28 NOVEMBER 2014 AGENDA GSMA Overview Mobile
More informationBWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF
BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal Geneve Switzerland, August 26th 2010 1 NATION WIDE PUBLIC SAFETY NETWORK THE BACKBONE An advanced telecommunications and information
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More information10007/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationPilot Study on Big Data: Philippines. World Telecommunications/ICT Indicators Symposium (WTIS) November 2017 Hammamet, Tunisia
Pilot Study on Big Data: Philippines World Telecommunications/ICT Indicators Symposium (WTIS) 14-16 November 2017 Hammamet, Tunisia Background, Objective, Scope - In June 2016, ITU initiated a pilot project
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationmr. sci. Suada Hadžović, dipl.ing.el. Communications Regulatory Agency Bosnia and Herzegovina Ohrid, Republic of Macedonia, May 24 26, 2017.
International Regulatory Conference The trend and regulatory issues in OTT mr. sci. Suada Hadžović, dipl.ing.el. Bosnia and Herzegovina,. Agenda 1. OTT definition and taxonomy 2. OTT - small companies
More informationGLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius
GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya,
More informationVirtual Currencies and The Commonwealth. 1 June 2016
1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity
More informationGSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world
GSMA Embedded SIM 9 th December 2013 Purpose of this Reference Messaging Pack Appropriate slides may be selected to used for within different presentations for multiple audiences To provide consistent
More informationSAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS
SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS 1. THESE TERMS 1.1 What these terms cover. These are the terms and conditions on which you may take part in our Handset Trade In Programme ( Trade
More informationHomologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India
Conformity and Interoperability regimes of Telecommunication/ICT equipment in [India] Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India
More informationPort 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks
Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks Henrique Faulhaber, Board Member Brazilian Internet Steering Committee CGI.br Dr. Cristine Hoepers,
More informationSpectrum Audit - What does the mobile world look like today?
Spectrum Audit - What does the mobile world look like today? Herman Schepers, Head of Regional Strategy and Government Affairs, GSMA 11 APRIL 2013 OCTOBER 2013 GSMA BY THE NUMBERS ENABLING A MOBILE FUTURE
More informationConnecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1
Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What
More informationJoint ITU-UNIDO Forum on Sustainable Conformity Assessment for Asia-Pacific Region (Yangon City, Republic of Union of Myanmar November 2013)
Joint ITU-UNIDO Forum on Sustainable Conformity Assessment for Asia-Pacific Region (Yangon City, Republic of Union of Myanmar 25-27 November 2013) Mark Amos Business Manager, IECEx Secretariat, IEC mark.amos@iecex.com
More informationWorld Conference on International Telecommunications (WCIT-12) Revision of the International Telecommunication Regulations (ITR)
World Conference on International Telecommunications (WCIT-12) Revision of the International Telecommunication Regulations (ITR) Maria Häll, Deputy Director Division of IT Policy, Ministry of Enterprise,
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationZambia National Standardization Organization Audit
Sixth SG13 Regional Workshop for Africa on Standardization of future networks: What opportunities for Africa? (Abidjan, Côte d Ivoire, 26-27 March 2018) Zambia National Standardization Organization Audit
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.
ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY 2005. PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. BY : UGANDA COMMUNICATIONS COMMISSION 1.0: Background Uganda, like
More informationUNODC tackling cybercrime in support of a safe and secure AP-IS
UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway
More informationMarket Surveillance and enforcement
Conformity and Interoperability Training for AMS Region on Type Approval testing for Mobile Terminals, NGN testing, Homologation Procedures and Market Surveillance Campinas-Brazil, 8-12 June 2015 Market
More informationCYBERSECURITY LEGISLATION IT OUT!
ATTEMPTS TO PASS US U.S. CYBERSECURITY LEGISLATION YOU NEED A SCORECARD TO FIGURE YOU NEED A SCORECARD TO FIGURE IT OUT! Professor Pauline C. Reich Waseda University School of Law cyberasia2@gmail.com
More informationThe Challenge of Spam An Internet Society Public Policy Briefing
The Challenge of Spam An Internet Society Public Policy Briefing 30 October 2015 Introduction Spam email, those unsolicited email messages we find cluttering our inboxes, are a challenge for Internet users,
More informationECC Recommendation (17)04. Numbering for ecall
ECC Recommendation (17)04 Numbering for ecall Approved 22 November 2017 ECC/REC/(17)04 Page 2 INTRODUCTION ecall is a service designed for automotive vehicles to provide quick emergency response in case
More informationNIST UPDATES TELECOM MRAS
NIST UPDATES TELECOM MRAS ACIL Mid-Winter Meeting March 28, 2012 Jogindar Dhillon 2 Topics G-to-G Telecom/EMC MRAs Current MRAs NIST Role Various MRA activities Other activities & meetings Other programs
More informationPacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific
PacNOG-21 Migrating to IPv6 : Experiences from Asia-Pacific Goals for a Sustainable Future : The SDGs 17 Sustainable Development Goals and 169 Targets Available for download at http://www.itu.int/en/itu-d/statistics/pages/publications/mis2017.aspx
More information5G roadmap: challenges and opportunities ahead
Information Session by ITU-R and ITU-T 5G roadmap: challenges and opportunities ahead July 217 ITU Overview Committed to connecting the world 193 Member States 874 Sector Members 171 Associates 127 Academia
More informationThe Regional Internet Registries
The Regional Internet Registries Managing Internet Number Resources www.afrinic.net www.apnic.net www.arin.net www.lacnic.net www.ripe.net www.nro.net Global Coordination A Fair and Stable Platform Whether
More informationCell and PDAs Policy
Cell and PDAs Policy CHAPTER: 13 Information Services Department SECTION: 13 SUBJECT: Cell Phones and PDAs POLICY #: 13.13.00 Revised OFFICE/DEPARTMENT: Information Services EFFECTIVE DATE: October 1,
More informationDIGITAL FINANCIAL INCLUSION FOR MONGOLIA
DIGITAL FINANCIAL INCLUSION FOR MONGOLIA ITU-TRAI Asia-Pacific Regulators Roundtable, 21-22 August 2017 D.SEREEDORJ Vice Chairman Communications Regulatory Commission of Mongolia 1. Country profile 2.
More informationMaintaining Trust: Visa Inc. Payment Security Strategy
Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationEUROPEAN ETS TELECOMMUNICATION April 1997 STANDARD
EUROPEAN ETS 300 921 TELECOMMUNICATION April 1997 STANDARD Source: ETSI TC-SMG Reference: DE/SMG-010211Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications
More informationDon t plug me in just yet.
Easy Transfer Cable for Windows 7 Don t plug me in just yet. We need to do a few things first to get your computers ready to transfer your files and user accounts. Quick Start Guide F5U279 i 1 Prepare
More informationStatus of activities Joint Working Group on standards for Smart Grids in Europe
Status of activities Joint Working Group on standards for Smart Grids in Europe Ralph Sporer Chairman JWG on standards for Smart Grids ETSI - Smart Grids Workshop 5-6 April 2011 Sophia-Antipolis Page 1
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationP.O BOX 7289 KIGALI, Tel: , Fax: Website:
P.O BOX 7289 KIGALI, Tel: +250 252584562, Fax: +250 252584563 Email: info@rura.rw Website: www.rura.rw GUIDELINES N.../GL/UAS-ICS/ RURA/017 OF.../.../2017 ON MINIMUM BANDWIDTH FOR BROADBAND INTERNET CONNECTIVITY
More informationITU Workshop on "Combating Counterfeit Using Conformance and Interoperability Solutions" Geneva, Switzerland 28 June 2016
ITU Workshop on "Combating Counterfeit Using Conformance and Interoperability Solutions" Geneva, Switzerland 28 June 2016 ITU SURVEY ON COUNTERFEIT ICT DEVICES IN AFRICA REGION: FINDINGS, CONCLUSIONS AND
More informationPRODUCT CERTIFICATION SCHEME FOR ENERGY DRINKS
Ref No: RACS/PCS/11 Page 1 of 6 1. Objective: This procedure describes the criteria implemented by RACS as Notified Body of Emirates Authority of Standardization and Metrology (ESMA) that Energy Drinks
More informationThe below represents a summary of Section 1 of Chapter 9 of the National Integrated ICT Policy White Paper.
Opening Access: Infrastructure and supply-side issues The below represents a summary of Section 1 of Chapter 9 of the National Integrated ICT Policy White Paper. Contents Introduction... 1 Goals... 1 What
More informationPay as you go Terms and Charges
Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk
More informationUTC - Global Advisory Council
UTC - Global Advisory Council JRC Autumn Seminar 13 th September 2017 Utilities Technology Council Global Focus on Utility Information and Communications Technology Mission UTC is the source and resource
More informationSILVER SPRINGS HOTEL, KAMPALA, UGANDA FROM 24TH 28TH JULY 2017 AGENDA ITEM AND AGREED
REF NO AGENDA ITEM AND AGREED RESPONSIBLE DEPARTMENT 8.0 CONSIDERATION OF THE REPORTS OF WGs AND COMMITTEES STATUS ON THE IMPLIMENTATION OF AGREEDS BY MEMBER COUNTRY (BURUNDI, KENYA, RWANDA, SOUTH SOUDAN,
More informationOverview of ITU capacity building activities
Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity
More informationESSA Q INTEGRITY REPORT
ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationLIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150
COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationThe Global Research Council
The Global Research Council Preamble The worldwide growth of support for research has presented an opportunity for countries large and small to work in concert across national borders. Cooperation and
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationAustralian Government Cyber-security Activities in the Pacific
Australian Government Cyber-security Activities in the Pacific Daniel Wells International Branch Department of Broadband, Communications and the Digital Economy Overview Australia s engagement with the
More informationTech Data s Acquisition of Avnet Technology Solutions
Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe
More informationCybersecurity Strategy of the Republic of Cyprus
Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of
More informationDigital government toolkit
Digital Government Strategies: Good Practices Colombia: Government Enterprise Architecture Framework The OECD Council adopted on 15 July 2014 the Recommendation on Digital Government Strategies. The Recommendation
More informationETSI TS V ( )
TS 122 016 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; International Mobile station Equipment
More informationIn the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the
The Organized and Serious Crime Programme (GPTOC) focuses on assisting states with the implementation of the core elements of the Organized Crime convention. This includes judicial and law enforcement
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationHow UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations
How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and
More informationCanada Anti-Spam Legislation: Review and Update
Canada Anti-Spam Legislation: Review and Update Agenda Introduction Overview Nuts and Bolts Compliance Strategies CRTC Administrative Penalties July 1, 2017 Changes July 1, 2017 What Does it Mean? Final
More informationNATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post
Introduction Telecommunication and Post The n legislation in the field of telecommunication and post is almost in full incompliance with that of the EU, except for certain legal rules on general legal
More informationAPCO Canada November 6, MHz Public Safety Broadband Network. From Vision to Action. Claudio Lucente, P.ENG, M.ENG. Senior technical advisor
APCO Canada November 6, 2013 700 MHz Public Safety Broadband Network From Vision to Action Claudio Lucente, P.ENG, M.ENG. Senior technical advisor Disclaimer The statements contained in this presentation
More informationSAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS
SAMSUNG HANDSET TRADE IN PROGRAMME TERMS AND CONDITIONS 1. THESE TERMS 1.1 What these terms cover. These are the terms and conditions on which you may take part in our Handset Trade In Programme ( Trade
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationLaunched at UNCTAD 14. Nairobi Azimio
Launched at UNCTAD 14 We welcome the formal unveiling of the etrade for All initiative at UNCTAD XIV. It provides a new approach to trade development through electronic exchanges by allowing developing
More informationKENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D
KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication
More informationIAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities
59 th General Conference Senior Regulators Meeting Security Session 16 September 2015 IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities Khammar Mrabit Director,
More informationAccountability Conceptual Framework
Accountability Conceptual Framework Massimo Felici, HP Trust in the Digital World and Cyber Security & Privacy EU Forum Brussels,18 th April 2013 Motivations for an accountability-based approach Drivers
More information