Combating counterfeit and stolen ICT equipment
(Continuation of Q8/11)Motivation
The work of this Question during the last study period was mainly focused on the development of recommendations and technical reports on combating counterfeit ICT equipment. The growing usage of ICT Equipment in people’s daily lives in recent years resulted in increased problems related to the sale, circulation and use of counterfeit equipment in most markets as well as their adverse consequences for manufacturers, users and governments.
A considerable number of ICT equipment have been found to be counterfeit and have created concerns about national security, performance, quality of service delivery and revenue losses for all stakeholders. This has led to calls by ITU Member States, particularly those in developing countries to address the issue, especially the negative effects and to study any positive impact of measures taken.
In addition, the demand for services, resulting in the increased production and availability of ICT equipment has also seen the rise of stolen equipment. Some of these equipment are returned to the market after they have been tampered with and their identity modified, hence bypassing identity blacklisting solutions implemented by Governments and mobile network operators. Consequently, most countries around the world are not only engaged in combating counterfeit ICT equipment, but also have put in place measures against theft of ICT equipment and some of them to tackle stolen equipment with modified identities from reactivating on networks and to effectively manage the situation.
During the last study period, a technical report on “Counterfeit ICT Devices” was published by ITU-T and a number of new work items have been established.
Within the ITU and around the world, there have been debates as to whether or not conformance and interoperability testing could be one of the solutions to combat counterfeit ICT equipment. ITU Resolution 188 (Busan, 2014) of the Plenipotentiary Conference, invites Member States to take all necessary measures to combat counterfeit telecommunication/ICT devices. Any unique and persistent identifiers could allow the recognition of genuine products. This Question intends to explore all possibilities to address this problem and in particular its relations to products supply chain identity management, traceability, security, privacy and trust of people and networks.
Cooperation among ITU T study groups, between ITU T and ITU D as well as with external bodies outside the ITU (in particular with SDOs), will be required to gather a complete information and understanding on the subject including the organization of seminar/workshops in collaboration with stakeholders. Coordination among relevant organizations is also necessary to fulfil these tasks.
This Question will maintain the Technical Report on Counterfeit ICT equipment (December 2015).Question
Study items to be considered include, but are not limited to:
- What technical reports are needed to raise awareness of the problem of counterfeiting of ICT equipment and the dangers they pose?
- Can Conformity and interoperability testing and assessment schemes be used to combat counterfeit ICT equipment?
- What technologies may be used as a tool for combating counterfeit, tampered and stolen ICT equipment?
- What identity management frameworks are appropriate to combat counterfeit and stolen ICT equipment with their identity modified?
- What kind of Recommendations, technical reports and guidelines should be developed to combat ICT counterfeiting, tampering, modification and/or duplication of unique device identifiers?
- What kind of Recommendations, frameworks, technical reports and guidelines should be developed to assist ITU Members, in cooperation with ITU-D Sector, on combating counterfeit and mitigate the use of stolen ICT equipment?
- What ITU Recommendations are required to secure the supply chain management (from manufacturing, importation, distribution and marketing) to ensure traceability, security, privacy and trust of people, products and networks?
- In this field, what should be taken into account to provide energy savings, directly or indirectly, in ICTs or in other industries?
Tasks include, but are not limited to:
- develop Recommendations, technical reports and guidelines to assist ITU Members, in cooperation with ITU-D Sector, on combating counterfeit ICT equipment;
- develop Recommendations, technical reports and guidelines to address the problem of stolen ICT equipment and to assist the Member States, in cooperation with ITU-D Sector, in deploying solutions to and mitigate the use of stolen equipment;
- study any possible solutions, including identity management frameworks, to combat counterfeit and stolen ICT equipment with their identities modified;
- study any technologies that can be used as a tool for combating counterfeit and tampered ICT equipment;
- organize workshops and events across ITU regions in cooperation with the ITU-D Sector to promote the work of ITU-T in this field and involve stakeholders;
- study possible conformity and interoperability testing (C&I) solutions to combat counterfeiting of ICT equipment, taking into account the activities of the ITU-T CASC;
- study results achieved by various international standardization bodies and develop technical specifications to feed the standardization work of the Question.
An up-to-date status of work under this Question is contained in the SG 11 work programme
- Resolution 188 (Busan, 2014) of the Plenipotentiary Conference, on Combating counterfeit telecommunication/information and communication technology devices;
- Resolution 189 (Busan, 2014) of the Plenipotentiary Conference; on Assisting Member States to combat and deter mobile device theft;
- Resolution 79 (Dubai, 2014) of the WTDC, on the role of telecommunications/ICT in combating and dealing with counterfeit telecommunication/ICT;
- Resolution 76, WTSA, 2012 (Dubai) on Studies related to conformance and interoperability testing, assistance to developing countries, and a possible future ITU Mark programme.
- ITU-T X.1255, ITU-T X.660
- All Questions of SG11, especially Questions relating to control, signalling architectures, protocols, conformance and interoperability testing
- ITU‑T SG2
- ITU-T SG3
- ITU-T SG5
- ITU‑T SG12
- ITU-T SG13
- ITU‑T SG20
- ITU‑D SG1 and SG2
- ISO/IEC JTC 1