econintersect.com
  • 토토사이트
    • 카지노사이트
    • 도박사이트
    • 룰렛 사이트
    • 라이브카지노
    • 바카라사이트
    • 안전카지노
  • 경제
  • 파이낸스
  • 정치
  • 투자
No Result
View All Result
  • 토토사이트
    • 카지노사이트
    • 도박사이트
    • 룰렛 사이트
    • 라이브카지노
    • 바카라사이트
    • 안전카지노
  • 경제
  • 파이낸스
  • 정치
  • 투자
No Result
View All Result
econintersect.com
No Result
View All Result
Home Uncategorized

Huawei’s Ability To Eavesdrop On Dutch Mobile Users Is A Wake-Up Call For The Telecoms Industry

admin by admin
9월 6, 2021
in Uncategorized
0
0
SHARES
0
VIEWS

from The Conversation

— this post authored by Greig Paul, University of Strathclyde

Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN. The revelations are from a secret 2010 report made by consultancy firm Capgemini, which KPN commissioned to evaluate the risks of working with Huawei infrastructure.


Please share this article – Go to very top of page, right hand side, for social media buttons.


While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN’s network – including the call data of millions of Dutch citizens – and that a lack of records meant KPN couldn’t establish how often this happened.

Both KPN and Huawei have denied any impropriety, though in the years since the 2010 report, Huawei has increasingly found itself labelled a high-risk vendor for telecoms companies to work with, including by the UK’s National Cyber Security Centre.

viewimage/Shutterstock

To better understand this story, and to consider whether other telecoms networks may have had similar security vulnerabilities to KPN’s, we need to look at how complex mobile networks are run. KPN essentially granted Huawei “administrator rights” to its mobile network by outsourcing work to the Chinese firm. Legislation is only now catching up to prevent similar vulnerabilities in telecoms security.

Commercial pressures

Huawei is one of the three dominant radio equipment providers in the world, alongside Ericsson and Nokia. These giant technology companies provide the base stations and equipment that deliver mobile phone signals. Operators like KPN increasingly pay these companies not only to buy the equipment, but also for them to support and maintain it.

The telecoms market in which KPN operates is one of the most price-competitive in the world. European mobile operators saw average revenues per user in 2019 of euro 14.90 (Pound Sterling12.85) a month, compared with euro 36.90 a month in the USA. European spend on telecoms services are also reducing year-on-year as operators compete to offer the best deals to consumers.

Lower revenues force operators to carefully manage costs. This means that operators have been keen to outsource parts of their businesses to third parties, especially since the late 2000s.

Large numbers of highly skilled engineers are an expensive liability to have on the balance sheet, and can often appear underused when things are running smoothly. Such jobs are often outsourced, with personnel transferring to the outsourced provider, to help operators to cut their payroll costs.

Outsourcing gone too far

When everything is working, very few people notice outsourcing. But when things go wrong, outsourcing can often significantly complicate recovery, or create a large “single point of failure” or security issue.

In the UK, for instance, mobile operator O2 has seen at least one outage which has been linked to the use of outsourced functions. Where large numbers of operators rely on the same outsourcing partner, any issue or security breach affecting the outsourced provider can have a widespread impact.

Still, outsourcing by mobile operators is widespread. And firms in the UK and across Europe have often turned to Huawei to provide IT services and to help build core networks. In 2010, Huawei was managing security-critical functions of KPN’s core network.

Administrator access

At the same time, equipment suppliers like Huawei are trying to move away from merely selling equipment and towards providing a managed service, including installation, maintenance and support. This helps them create recurring revenue in an industry that has generally been dominated by large five-year or ten-year purchasing cycles.

But as these vendors add services to their repertoire, they gain wider access to the mobile networks they work with. This could include certain security-critical parts of telecoms networks, which are often designed to work in trusted, secure environments.

In the scenario where a vendor like Huawei also provides a managed service, they find themselves sitting in a uniquely privileged position, with inside knowledge of their own equipment, and with direct access to trusted management interfaces.

This creates the high-tech equivalent of putting all your eggs in one basket. It’s akin to giving the combinations of the bank vault to the same security guard in charge of the CCTV camera footage. It’s difficult to reliably monitor operations carried out by the vendor without relying on that vendor’s own software.

In cases where a vendor has been designated as high-risk as a result of their own product security practices, it’s very difficult to know whether that vendor didn’t do anything untoward. This is the situation KPN apparently found themselves in with Huawei back in 2010.

A man on the phone walking in front of a Huawei store

Huawei’s privileged access to KPN’s network could have allowed the Chinese firm to listen to calls made by Dutch citizens. viewimage/Shutterstock

Are changes needed?

With at least one operator aiming to reduce European operating expenditure by euro 1.2 billion, and 5G deployments bringing new opportunities for managed services and software-based solutions to be used in networks, decisions around outsourcing will continue to play an important role for mobile operators going forwards.

But legislation is rapidly catching up. The UK has proposed a telecoms security bill, and associated draft secondary legislation includes requirements for network operators to monitor all activity carried out by third party providers, to identify and manage the risks of using them, and to have a plan in place to maintain normal network operations if their supplier’s service is disrupted.

For some operators, it’s conceivable this might mean bringing key skills back in-house to ensure there’s someone watching the (outsourced) watchmen. In the case of KPN, these measures would likely have prevented Huawei from having seemingly unchecked and privileged access to its customers’ mobile data.The Conversation

Greig Paul, Lead Mobile Networks and Security Engineer, University of Strathclyde

This article is republished from The Conversation under a Creative Commons license. Read the original article.

.

include(“/home/aleta/public_html/files/ad_openx.htm”); ?>

Previous Post

Environmental News For The Week Ending 09 May 2019

Next Post

Bitcoin Devours More Electricity Than Many Countries

Related Posts

Scammers Steal $300K Using Fake Blur Airdrop Websites
Uncategorized

FBI Warns Investors Of Crypto-Stealing Play-to-Earn Games

by admin
Maersk Almost Completing Russia Exit After The Sale Of Logistics Sites
Uncategorized

Maersk Almost Completing Russia Exit After The Sale Of Logistics Sites

by admin
Why Is ‘Staking’ At The Center Of Crypto’s Latest Regulation Scuffle
Uncategorized

Why Is ‘Staking’ At The Center Of Crypto’s Latest Regulation Scuffle

by admin
Mexico's Pemex Dismantled Resources Worth $342M From Two Top Fields
Uncategorized

Mexico’s Pemex Dismantled Resources Worth $342M From Two Top Fields

by admin
Oil Giant Schlumberger Rebrands Itself As SLB For Low-Carbon Future
Uncategorized

Oil Giant Schlumberger Rebrands Itself As SLB For Low-Carbon Future

by admin
Next Post
Final August 2021 Michigan Consumer Sentiment Shows A Stunning Loss Of Confidence

Final August 2021 Michigan Consumer Sentiment Shows A Stunning Loss Of Confidence

답글 남기기 응답 취소

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다

Browse by Category

  • Business
  • Econ Intersect News
  • Economics
  • Finance
  • Politics
  • Uncategorized

Browse by Tags

adoption altcoins bank banking banks Binance Bitcoin Bitcoin market blockchain BTC BTC price business China crypto crypto adoption cryptocurrency crypto exchange crypto market crypto regulation decentralized finance DeFi Elon Musk ETH Ethereum Europe Federal Reserve finance FTX inflation investment market analysis Metaverse NFT nonfungible tokens oil market price analysis recession regulation Russia stock market technology Tesla the UK the US Twitter

Categories

  • Business
  • Econ Intersect News
  • Economics
  • Finance
  • Politics
  • Uncategorized

© Copyright 2024 EconIntersect

No Result
View All Result
  • 토토사이트
    • 카지노사이트
    • 도박사이트
    • 룰렛 사이트
    • 라이브카지노
    • 바카라사이트
    • 안전카지노
  • 경제
  • 파이낸스
  • 정치
  • 투자

© Copyright 2024 EconIntersect