ITU SG11/Q15 Rapporteur Meeting December 2020

ITU meeting highlights image by DeviceAssure

 

Following on from our previous ITU meeting highlights, we recently participated in the December 2020 Rapporteur Group Meeting of Study Group 11, Question 15. As a reminder, SG11/Q15 is tasked with activities to combat counterfeit and stolen ICT equipment.

 

The aim of this particular meeting was to make progress on two document drafts in advance of a Working Party meeting on December 4th 2020.

 

The two documents for revisions were:

  • Q.BL-Audit. This is a draft recommendation for “Mobile device access list audit interface”, a definition of the interfaces between mobile operator Equipment Identity Registers and a Mobile Device Access List Audit System (MDALAS).
  • Q.Sup.BLvsWL. This is a set of guidelines around permissive versus restrictive system implementations for addressing counterfeit, stolen and illegal mobile devices. Broadly speaking, countries can choose to allow access only to approved handsets, or allow all handsets not explicitly on a blacklist.

Q.BL-Audit will, with approval, ultimately become an ITU Recommendation titled “Mobile device access list audit interface”. Over the course of the two day meeting there were minor updates made to both documents.

 

One particular aspect of interest was the tricky problem of handling the duplicate IMEIs that will inevitably arise on cellular networks, even when a Centralized Equipment Identity Register is in use, since IMEIs are readily modifiable and borders are porous. If mobile operator or regulators seek to reduce or eliminate IMEI duplication they will be forced to confront the problem of identifying which of the handsets in use are legitimate and which are not. This is an inherently large problem and imposing this burden on mobile subscribers is both unreasonable and unscalable. Thus a remote means of identifying handset authenticity is an essential component in managing IMEI duplication, not to mention counterfeits.

 

Contact us now to start remotely identifying non-authentic devices.

Share on: