IMEI Counterfeit Update

Similar documents
ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016

A1. Actions which have been undertaken by Governments

GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers

ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices

Outcomes of the ITU Workshop. Global approaches on combating counterfeiting and stolen ICT devices. (23 July 2018, Geneva)

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

Small Business FRAUD PREVENTION Manual

Detect Fraud & Financial Crime

Website Privacy Policy

Financial scams. What to look for and how to avoid them.

The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative

Dubai Customs WCO IT Conference Dubai, United Arab Emirates. Coordinated Border Management Road Map

Scope of the Member State mechanism

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

Issue I. Airport Communication Project

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

National Communications Authority

The EU cracks down on e-waste crime

UNODC. International Cooperation and Assistance in Cybercrime Matters

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Policy recommendations. Technology fraud and online exploitation

POMONA EUROPE ADVISORS LIMITED

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

CHAPTER 13 ELECTRONIC COMMERCE

EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE)

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

Sh. Alok Mittal, Commissioner of Police, Gurgaon addressed the delegates in the session on Finalization of Recommendations for Policy Initiatives

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007

Why does JB Hi-Fi collect, hold, use and disclose personal information?

Combat of Counterfeit and Stolen ICT Devices

Guiding principles on the Global Alliance against child sexual abuse online

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Legal Foundation and Enforcement: Promoting Cybersecurity

Standardization for DRR: Opportunities or barriers?

ACCEPTABLE USE POLICY

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Data Breach Preparation and Response. April 21, 2017

Identity Theft and Account Takeover Prevention

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

Breckenridge Financial Supplies Website Use Policy

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

AC PARTNERS LLP CHARTERED ACCOUNTANTS GDPR PRIVACY STATEMENT

Online Survey on Spamming Issues

How to Fight Back against Phishing A guide to mitigating and deterring attacks targeting your customers

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

INTERNATIONAL MOBILE ROAMING

What we really mean when we talk about verification

Inter-American Port Security Cooperation Plan

Motorola Mobility Binding Corporate Rules (BCRs)

Framework for Cybersecurity in Nigeria

PRIVACY. YOUR DATA. YOUR TRUST.

Xerox Channels Group Counterfeit Toner Cartridges Q&A April 12, 2004

COUNTERFEIT DEVICES: IMPACTS ON QUALITY OF SERVICE AND CONSUMER HEALTH

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

Massive M2M Communications: Challenges for NRAs

Accelerating growth and digital adoption with seamless identity trust

- OQSF - Occupational Qualifications Sub-framework

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Safety and Security. April 2015

Privacy Policy Statement Last update 25 th May 2018.

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA

Illicit Goods and Global Health Programme

Virtual Currencies and The Commonwealth. 1 June 2016

How we use your personal and business information

EXPERT GROUP MEETING ON CYBERCRIME

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Thailand Initiatives and Challenges in Cyber Terrorism

Maboe Maphaka Senior Manager: Energy Trading & Sales Forecasting Eskom South Africa

Your security on click Jobs

INTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

Perspectives on Threat

COUNTERFEIT ICT DEVICES, CONFORMANCE AND INTEROPERABILITY TESTING CHALLENGES IN AFRICA COUNTERFEIT ICT DEVICES: THE NIGERIAN PERSEPCTIVE

15412/16 RR/dk 1 DGD 1C

Registry Internet Safety Group (RISG)

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Care Recruitment Matters Limited Privacy Notice

Global Wildlife Cybercrime Action Plan1

Data protection policy

Organized Crime Agency of British Columbia

A Regulator s Perspective on Accountability and How to Incentivise It

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

2011 International Law Enforcement IP Crime Conference. Operational Round Table 1. Transforming Regional Success into Global Action

RCS Business Messaging: Recommended Good Practices

Who We Are! Natalie Timpone

June 2 nd, 2016 Security Awareness

Cyber Threat Landscape April 2013

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

Transcription:

IMEI Counterfeit Update Presented by Mohamed Abbes, MENA Public Policy Director, GSMA mabbes@gsma.com 23 April 2018, ITU Study Group 11 Regional Workshop for Africa

2 www.gsma.com/services /gsma-imei/

Device Crime and Fraud Counterfeit Phones Illegal Import Phone Theft Subscription Fraud Manufacturer loss $ Government Consumer loss $ Operator loss $ Poor performance taxation loss $ Personal injury Safety concerns No warrantee Un-level playing field for legitimate device providers Buying stolen goods Insurance claims Insurance fraud

Counterfeiting requires an international strategic response Prevention at Source Enforce bona-fide manufacturing practice Boarder Protection Enforce legal export and import Local protection Implement local counter measures High value effort Multiple efforts Multiple high cost efforts

Illegal Import and Counterfeit Ecosystem PROFIT FROM CRIME PROFIT FROM CRIME Export Illicit Production Illegal Importer Re-order $$$ $$$ Retail Consumer Access Profiteering from illicit production and illegal import takes place at an early stage in the supply chain Tax losses take place at point of import

Blocking does not deter profiteering from counterfeiting and fraud PROFIT FROM CRIME PROFIT FROM CRIME Export Illicit Production Illegal Importer Re-order $$$ $$$ Retail Consumer Access Consumers suffer loss when devices are switched off Criminals are not deterred. Free to operate globally Blocking allows profiteering to continue

Illegal Import and Counterfeit Ecosystem CUSTOMS AGENCIES SCREEN EXPORTS VS GSMA WHITELIST CUSTOMS AGENCIES SCREEN IMPORTS VS GSMA WHITELIST OUTLAW SALE OF NON-COMPLIANT GOODS Export Illicit Production PROSECUTE FAKE FACTORIES Illegal Importer Re-order PROSECUTE IMPORTERS Retail Consumer Access Supply stopped, distribution stopped, taxation restored, global operations restricted, consumers not victims

GSMA support of Export/Import Control GSMA provides the Global Whitelist Direct to any Customs Agency and World Customs Organisation (WCO) WCO provides Customs Checking tools including the Whitelist Solutions exist but usage is poor 8 WCO IPM App The GSMA request ITU and member state support of WCO tools 8

GSMA Whitelist Availability Just over 700 MNOs and 100 Govt / Reg / LEAs 9

IMEI Re-programing GSMA IMEI Security Testing GSMA is monitoring IMEI hacking tools GSMA test hacking tools on target devices Member states may report weakness to GSMA and we will seek remedy with manufacturers Weakness are reported to the manufacturer for remedy Test Lab Manufacturer Improved phones re-test to verify fix 10

Local blocking options Each operators runs pre-regulation amnesty whitelist Allow IMEIs on selected whitelists. Block all other devices Block stolen devices on/via the GSMA international blacklist exchange Operator amnesty whitelists Customs Screened Imports Duty Paid Nationally Certified Devices GSMA Whitelist Registered TAC/IMEI GSMA Blacklist Operator access screening

GSMA support Global tools and information Manages the GSMA White List Manages the GSMA Black List Provides GSMA White List to customs agencies Provides retail screening services Provides information to law enforcement Secures remedy over IMEI miss-use with manufacturers Country support Countries have powers of enforcement Custom Agencies Law enforcement agencies Intelligence concerning abuse Awareness and cooperation is building GSMA encourages adoption of its facilities Provides secure IMEI implementation design principles IMEI security weakness reporting facility IMEI security testing service 12

Existing global best practise tells us to successfully halt the growth of counterfeit devices Prosecution of sources and removal of profit eliminates the problem Blocking at consumer end allows fraudsters to operate freely in different territories Create appropriate law underpinning enforcement Conduct public information campaigns Share information internationally between enforcement agencies to eliminate sources and distribution Use existing global GSMA White List and Black List information tools Send detailed information of IMEI misuse and security issues to the GSMA Keep local measures simple, in-expensive, non-punitive to consumers; focus your efforts at the source, the early stage of the supply chain 13

Contact GSMA Advice Whitelist Blacklist imeihelpdesk@gsma.com