Committed to connecting the world

  •  
wtisd

ITU-T work programme

[2017-2020] : [SG11] : [Q15/11]

[Declared patent(s)]  - [Publication]

Work item: Q.5051 (ex Q.FW_CSM)
Subject/title: Framework for combating the use of stolen mobile devices
Status: Approved on 2020-03-13 
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: -
Liaison: SG2, SG17, SG20, CITEL, RCC, ATU, 3GPP.
Supporting members: Brazil, Uganda, Colombia
Summary: With the increased functions and capabilities available on Mobile Devices, the importance and usage of these devices in people's daily lives have been growing in recent years. As a side effect, we also observe the rise, in some countries, of actions aimed to steal these devices and generate profit, not only by selling the equipment itself but also by illegally using the information contained on it. As a response, initiatives are needed to deter the theft and reuse of stolen Mobile Devices and to protect the consumer data stored on these devices against illegal use. Since it is common to have devices stolen in one country, that may have deployed solutions to mitigate the use of stolen devices, sold into other countries or even regions where similar mitigation measures may not have been taken, it is critical to the success of such initiatives to have coordination and information sharing between the governments and operators from different countries that aims to combat the theft and reuse of stolen Mobile Devices in a global environment. Otherwise, there is a risk that the illegal trade of stolen devices could occur across international borders. It is important to note that, since most solutions deployed today to deter the device theft and reuse problem rely on unique identifier lists, a common action taken by the traffickers to bypass these actions is to tamper with the device to alter its unique identifier, sometimes choosing an identifier already in use by a legitimate device, to allow the equipment to return to the market and to connect to mobile networks. In response to this scenario, many countries around the world are engaged not only in combating the use of stolen Mobile Devices, but also in preventing the devices with unauthorized reprogrammed unique identifiers, commonly described as tampered identifiers, from returning to the network. Meanwhile governments in other countries are challenged and unclear on the best strategies to adopt, mainly due to a lack of knowledge or expertise to understand the issue and the possible solutions, and to make informed choices to deploy solutions, tailored for their individual countries, that could be effective. In this sense, guidelines are necessary to address this challenge, as indicated on the WTSA Resolution 97 (Hammamet, 2016). Therefore, this Recommendation proposes a framework composed of requirements and a broad range of comprehensive and recommended measures that can be taken and applied to combat the theft and reuse of stolen Mobile Devices.
Comment: -
Reference(s):
  Historic references:
Contact(s):
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2017-02-17 10:28:03
Last update: 2020-03-25 11:30:04