Committed to connecting the world

Girls in ICT

Question 15

​​Combating counterfeit and stolen telecommunication/ICT devices

(Continuation of Q15/11)

Motivation
The work of this Question was mainly focused on the development of Recommendations and Technical Reports on combating counterfeit telecommunication/ICT device. The growing usage of telecommunication/ICT device in people’s daily lives in recent years resulted in increased problems related to the sale, circulation and use of counterfeit device in most markets as well as their adverse consequences for manufacturers, users and governments.

A considerable number of telecommunication/ICT device have been found to be counterfeit and have created concerns about national security, performance, quality of service delivery and revenue losses for all stakeholders. This has led to calls by ITU Member States, particularly those in developing countries to address the issue, especially the negative effects and to study any positive impact of measures taken.

In addition, the demand for services, resulting in the increased production and availability of telecommunication/ICT device has also seen the rise of stolen device. Some of these devices are returned to the market after they have been tampered with and their identity modified, hence bypassing identity blacklisting solutions implemented by Governments and mobile network operators. Consequently, most countries around the world are not only engaged in combating counterfeit telecommunication/ICT device, but also have put in place measures against theft of telecommunication/ICT device and some of them to tackle stolen device with modified identities from reactivating on networks and to effectively manage the situation.

SG11 approved Recommendation ITU-T Q.5050 “Framework for solutions to combat counterfeit ICT devices”, Recommendation ITU-T Q.5051 “Framework for combating the use of stolen mobile devices” and started a number of new work items.

Within ITU and around the world, there have been debates as to whether or not conformance and interoperability testing could be one of the solutions to combat counterfeit ICT devices. ITU Resolution 188 (Rev. Dubai, 2018) of the Plenipotentiary Conference, aware that tampering with telecommunication/ICT devices may diminish the effectiveness of solutions adopted by the countries to address counterfeiting, invites Member States to take all necessary measures to combat counterfeit telecommunication/ICT devices. Any unique and persistent identifiers could allow the recognition of genuine products. Additionally, special attention should be given to consider the potential growth of counterfeit IoT devices and the concern this may pose.

Moreover, ITU Resolution 189 (Rev. Dubai, 2018) of the Plenipotentiary Conference, on the combat of mobile devices theft, resolves to explore and encourage the development of ways and means to continue to combat and deter mobile device theft, and invites Member States to adopt the necessary actions to prevent, discover and control tampering and replication of mobile ICT device identifiers, and prevent devices with tampered/replicated identifiers from accessing mobile networks.

This Question intends to explore relevant possibilities to combat stolen and counterfeit telecommunication/ICT devices and, in particular, its relations to products supply chain identity management, traceability, security, privacy and trust of people and networks. Cooperation among ITU-​T study groups, between ITU-T and ITU-D as well as with external bodies outside the ITU (in particular with SDOs), will be required to gather a complete information and understanding on the subject including the organization of seminar/workshops in collaboration with stakeholders. Coordination among relevant organizations is also necessary to fulfil these tasks.

This Question will maintain the ITU-T Q.5050-Q.5069 and ITU-T TR-CF.

Question
Study items to be considered include, but are not limited to: Tasks
Tasks include, but are not limited to: An up-to-date status of work under this Question is contained in the SG 11 work programme ​(https://itu.int/ITU-T/workprog/wp_search.aspx?Q=15/11)

Relationships


Recommendations Recommendations Questions Study groups Other bodies
WSIS action lines
Sustainable Development Goals