Committed to connecting the world

Question 17

​Combating counterfeit or tampered telecommunication/ICT software

(New Question)

Motivation
ITU Resolution 188 (Rev. Dubai, 2018) of the Plenipotentiary Conference, recognizing the adverse impact of counterfeit telecommunication/ICT devices on governments, manufacturers, vendors and consumers and aware that tampering with telecommunication/ICT devices may diminish the effectiveness of solutions adopted by the countries to address counterfeiting, invites Member States to take all necessary measures to combat counterfeit telecommunication/ICT devices.

At the same time, Resolution 96 (Hammamet, 2016) of World Telecommunication Standardization Assembly, recognizes that counterfeit and tampered telecommunication/ICT devices negatively impact on security and privacy for users and impose adverse impact on governments, manufacturers, vendors, operators and consumers such as the loss of revenues, erosion of brand value/intellectual property rights and reputation and network disruptions.

Moreover, ITU Resolution 189 (Rev. Dubai, 2018) of the Plenipotentiary Conference, on the combat of mobile devices theft, recognizing that device theft can have a negative impact on users' data and on their sense of security and confidence in the use of information and communication technologies (ICTs), resolves to explore and encourage the development of ways and means to continue to combat and deter mobile device theft, and invites Member States to adopt the necessary actions to prevent, discover and control tampering and replication of mobile ICT device identifiers.

Resolution 97 (Hammamet, 2016) of World Telecommunication Standardization Assembly, recognizes that the theft of user-owned mobile devices may lead to the criminal use of telecommunication/ICT services and applications, resulting in economic losses for the lawful owner and user; indicates the necessity to identify existing and future technological measures, both software and hardware, to mitigate the consequences of the use of stolen mobile devices.

ITU-T SG11 received contributions from ITU Member State and from Sector members that led to the approval of Recommendation ITU-T Q.5050 “Framework for solutions to combat counterfeit ICT devices” and Recommendation ITU-T Q.5051 “Framework for Combating the use of Stolen Mobile Devices”. In addition, a number of new work items were agreed.

At the same time, some contributions suggested the need to address some new scenarios, such as:
(i) The tampering with stolen mobile device software in order to achieve unauthorized access to the user data with consequent impacts.
(ii) Counterfeit/tampered network devices (such as routers or switches) that has backdoors access to the user network, allowing data theft and consequent revenue loss.
(iii) Counterfeit/tampered Paid TV receivers with tampered software that allow unauthorized access to the content provider data by non-subscribers.

There is no simple solution for this topic, since in general the telecommunication/ICT user is unaware of the vulnerabilities that are included on counterfeit devices or can be present with the counterfeit or tampered ICT software. Therefore, is critical to raise the awareness of all stakeholders regarding this topic.

Therefore, this Question intends to explore appropriate possibilities to combat counterfeit or tampered ICT software. Cooperation among ITU-T study groups, between ITU-T and ITU-D as well as with external bodies outside the ITU (in particular with SDOs), will be required to gather a complete information and understanding on the subject including the organization of seminar/workshops in collaboration with stakeholders. Coordination among relevant organizations is also necessary to fulfil these tasks.​

Question
Study items to be considered include, but are not limited to: Tasks
Tasks include, but are not limited to: An up-to-date status of work under this Question is contained in the SG11 work programme (https://itu.int/ITU-T/workprog/wp_search.aspx?Q=17/11​).

Relationships

ResolutionsRecommendations Questions Study groups Other bodies WSIS action lines ​Sustainable Development Goals