COUNTERFEIT/SUBSTANDARD MOBILE PHONES

Similar documents
RF safety at base station sites

GETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G

USER MANUAL V5.0 ST100

GSM HOME SECURITY SYSTEM

GSM Interfacing Board

FWT-8848 GSM (GATEWAY) USER S MANUAL

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview

Domonial, le Sucre. Easy to Use Intruder Detection Systems

Dolphin 9900 Mobile Computers

Broadband Video over Twisted Pair Cabling. By Paul Kish Director, IBDN Systems & Standards NORDX/CDT

Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by

Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Report on Government Information Requests

GPS / GPRS Vehicle Tracking for use with Online Mapping Services

Report on Government Information Requests

telstra.com/ppmbb visit a telstra store or partner GETTING TO KNOW YOUR

The GSM and GPRS network T /301

Global System for Mobile Communication Technology

Users Manual of GSM Home Alarm System with Photo-taken

Otium Gear S Smart Watch User Guide Please read the manual before use. * For further information, please visit

Methodologies for Reducing Mobile Phone Test Time

WIRELESS ALARM MONITORING. User Manual V1.2

GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G USB + WI-FI

Mobile Broadband in the 1800MHz Band

BlackBerry External Infrastructure Penetration Testing Service

Table of Contents. I. Working Directions...2. II. System Introduction...3. III. Wiring Installation Product Parts List...

MOBILE MALWARE REPORT

Tele Eye DT Series. Installation Guide. Dialup CCTV Transmitter DT-103G DT-103P DT-103D

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies

Quick Start Guide RRL Radio Telemetry

PCS300 Universal IP Reporting Module V1.0

Global System for Mobile Communication (GSM)

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone!

SPYTEC 3000 The system for GSM communication monitoring

ILLICIT TRADE IN TOBACCO

CellAdvisor. JD725A Dual-Port Cable and Antenna Analyzer

Vehicle Tracking System using GPRS

X-SOS 3000 Outdoor GPS tracking system with emergency button.

e s p i o n s.com. V680 GPS Watch User s Manual

How To Protect Your Credit Card Information From Being Stolen

An Example of Mobile Forensics

Prisma II Software Upgrade Program (SOUP) Installation Guide

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

Operating Manual Version: 1.0. U.S. Patent Pending

Anti illicit trade : scale and opportunities. Neil Withington

SOCIAL MEDIA ADVERTISING STRATEGIES THAT WORK

GPS Vehicle and personal location tracker. User manual

M2M and the PICtail Plus Daughter Board

GPS Vehicle Tracker User Manual VT810

Product Information S N O. Portable VIP protection CCTV & Alarm System 2

CCTR-800 Portable Real Time GPS Tracker

STEVAL-IEG001V2. Smart real-time vehicle tracking system. Features

GSM Voice Auto Dialer & SMS Sender JC-999

Continuous, remote monitoring and logging of electromagnetic fields

GETTING TO KNOW YOUR 4G USB

Introduction. 1

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

USER MANUAL V5.0 VT300

Technical Note. Radiating Cable (RCL/RCH) Performance Test & Design Guidlines. Document Code: TN02-RadiatingCable-14 Date: March 6, 2014

Vehicle GPS/GSM/GPRS Tracking System

MicroNet dual band IMSI and IMEI catcher

GPS+GSM+GPRS. AVL Automatic Vehicle Tracker PST-AVL01

USB DRIVER INSTALLATION GUIDE

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

The GSMA strongly support Denmark licensing the / MHz band 2 in a manner that will accommodate future use of

Addressing the Sale of Counterfeits on the Internet

NOT ALL CODES ARE CREATED EQUAL

WHITE PAPER. Let s do BI (Biometric Identification)

Near Field Communication in the real world part III

IP TELEPHONY A REVOLUTION FOR STRUCTURED CABLING SYSTEMS

The Need for Speed WHY YOUR LEADS DESERVE PROMPT FOLLOW-UP. White paper Quick and successful lead conversion 2Lead. generating success

CC5500 Interceptor HSS DEVELOPMENT INC. HSS Development Inc. 75S Broadway White Plains, NY Tel: Fax:

User Manual (UDTTV01 V 1.6

Review of Cell Phone Technology

STATUS POWER MONITOR ALARM SOS DISARM

OWNER S GUIDE OWNER S GUIDE

Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace

2015 Visa Payment Security Symposium Webinar

Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试 Dec. Celebrating Technology Innovation

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

Design Considerations for DVT and Manufacturing Test of Wireless Devices

GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI

Report on Government Information Requests

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

Security & Chip Card ICs SLE 44R35S / Mifare

OpenBTS Development Kit

INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, Academic Research Journals.

A better way to secure your business. Vodafone Power to you. White paper: M2M for business security. m2m.vodafone.com

- 1 -Page 1 of 37 GPS VT-300. Automatic Vehicle Locator User Manual. Version 1.3

WIRELESS /// INTERREACH FUSION FOR BUSINESS INTERREACH FUSION FOR BUSINESS (F4B) WIRELESS SERVICE SIMPLIFIED

GPS WATCH Q50 MANUAL

1. Introduction: The Evolution of Mobile Telephone Systems

Transcription:

COUNTERFEIT/SUBSTANDARD MOBILE PHONES A RESOURCE GUIDE FOR GOVERNMENTS 1 INTRODUCTION There has been a proliferation in recent years in the manufacture, distribution, and sale of black market mobile phones (commonly referred to as counterfeit and substandard phones). While this problem has measures. on in order to understand the problem and to assist information educating consumers about the risks of purchasing black market cell phones. The goal of this topic. The Mobile Manufacturers Forum (MMF) has collected guide and as such this guide subjects such as information on the scope of the risks to society, and benchmarking information on technical solutions. 2 WHAT IS THE DIFFERENCE BETWEEN COUNTERFEIT AND SUBSTANDARD MOBILE PHONES? 1 ) are the same in the 2 ; both counterfeit and substandard mobile phones intellectual right holders; both use inferior or used chipsets and other components; and, both fail to that are designed to control the distribution of both categories of handsets. counterfeit mobile phone explicitly infringes the trademark or design of an phone copies the trademark (brand) of an original phone is an identical copy of the original brand or similar to the original brand (in terms of copying the trademark or the design) for all practical purposes 1 2 1

substandard mobile phone, on the other hand, similar in form factor to the authentic brand, but carry no explicit branding (i.e. do not explicitly other brands or form factors from original products. mobile phone is essentially the same as a counterfeit mobile phone in all other respects. There is mobile phones present the same societal challenges. 3 QUANTIFYING BLACK MARKET COUNTERFEIT/SUBSTANDARD DEVICE PROBLEM: THE TIP OF THE ICEBERG market in the mobile phone sector. This is because many black market mobile phones are physically amount is expected to be 148 million units in 213. only represent those products sold in traditional 21% 6% 1% 11% 1% 5% retail channels and do not capture those sold in the it is reasonable and logical to assume that the data trademark infringements. smuggled in 3 4 Force, and that does not include the thousands problem that exceeds 6 billion dollars USD. Asia Pacific Eastern Europe Latin & Central America Middle East & Africa North America Western Europe 3 html 4 2

furthermore estimates counterfeiting and piracy costs 4 WHAT IS THE NEGATIVE IMPACT OF COUNTERFEIT AND SUBSTANDARD MOBILE PHONES ON SOCIETY? substandard mobile phone problem manifests itself A : WHAT IS THE IMPACT ON CONSUMERS? 1 : HAZARDOUS SUBSTANCES IN COUNTERFEIT/ SUBSTANDARD MOBILE PHONES cadmium) in both internal and external components at concentrations much higher than the maximum Figure A internal and external components of the tested mobile phones. models (3 nos. for each model) from the stores and components) comprising all handsets. FIGURE A: Test: Hazardous substances Chemical analysis Lead (Pb) Chemical analysis Cadmium (Cd) Chemical analysis 3.1 2.7,2,2 Lead (Pb) % 2.1 1.1 1.9 1.8 2.1.6 1.2 Cadmium (Cd) %,1.1 Antenna PCI-SD card Material IC 1 PCI base Panel Black PCI connector Gold PCI connector Antenna mobile phones. 3

FIGURE B: High Lead (Pb) content found in all handsets tested - clearly amplifying their substandard character 4, More than 39 times than the acceptable Pb limit 39,236 38,737 Figures in PPM 3, 2, 1, 922 19,617 483 SIM slot 19,56 37 Memory card slot 5672 Charging connector 3,154 1217 14,39 31,466 8575 Camera 1395 Back cover 16,14 13,22 23,76 176 PCB 14,55 8573 9248 Battery connector 11,879 9846 5764 Chip component 22,75 4866 31,613 Microphone Speaker 19,617 25,132 LED light G5-C2-21212 (G-Five) F-N71-51212 (Forme) W-M25-91212 (Wing) SE-X5-111212 (Suny Ericson) YX-88-111212 (YX Tel) found to contain alarmingly high proportions of therefore safe for consumer use. Figure B Figure C 2 : OTHER SAFETY ASPECTS substandard mobile phones is not the only safety compliance assessments before they can be sold. in most countries, mobile phones must be type things, ensures that the mobile phone performs the functions it purports to be able to perform, tests for accessories such as battery chargers and batteries FIGURE C: Parts of the cell phone where hazardous substances are found Chip component LED manual soldering point Memory card slot Mic soldering point Battery Connector SIM Connector 1 SIM Connector 2 SPK manual soldering point 4

3 : QUALITY OF SERVICE A : GSMA of 18 counterfeit smartphones alongside 3 genuine sector labs for compliance to any legal or industry standards. and data capacity loss, data transmit speeds and stations to rectify the problems. These results highlight the considerable impact for B: INdT STUDY 8 existence of counterfeit and substandard phones in testing protocols in order to compare the measures that are needed in order to make up for the (i.e., more antenna installations, base stations and the need for more spectrum). 4 : COUNTERFEIT/SUBSTANDARD PHONES ARE SOLD WITHOUT WARRANTY function. 8 5

5 : SECURITY ISSUES (CYBER SECURITY, THEFT OF STOLEN PHONES, DATA-PROTECTION, ETC.) They use them to shoot, store, and share photos and the security related risks that arise from mobile phones need to be taken seriously. numbers, social security numbers, bank account information, and other types of information. There is these mobile phones are not continuously scanning the information the consumer inputs on the phone money or their identity. capacity to act as a logger of information including remote phone monitoring, logging of incoming and address books, and other data. phones cannot be underestimated. This is a huge through the creation of blacklists and other similar measures. interests, and crime control are a cornerstone of the most important public policy debates societal problems is not in the crosshairs of most much more important threat than other counterfeit products because it is perhaps the most important mobile phones present. This is a threat that must be taken seriously. B : WHAT IS THE IMPACT OF COUNTERFEIT/SUBSTANDARD DEVICES ON GOVERNMENTS? any country is the existence of a legal protection of rights of legitimate business and the promotion in the loss of potentially billions in direct and indirect 6

C : IMPACT ON PRIVATE INDUSTRY: COUNTERFEIT/SUBSTANDARD PROBLEM RESULTS IN LOSSES FOR RIGHTS HOLDERS Most major manufacturers employ tens of thousands of sales as result of these black market products produced rather easily and cheaply. enables black market manufacturers to create and distribute counterfeit and substandard phones much easier than in the past. of mobile phones and black market manufacturers them. To compound this problem, these black market manufacturers pay no intellectual property royalties. of turnkey solutions, counterfeit and substandard mobile phones can be produced incredibly cheap 5 WHAT CAN GOVERNMENTS DO TO CONTROL THIS PROBLEM? the MMF discusses potential solutions to the problem A : NETWORK BLOCKING SOLUTIONS right one for a certain country. 1 : COUNTERFEIT/SUBSTANDARD FINGERPRINTING BLOCKING SOLUTIONS number because the technology may not be able does not guarantee that the model is not counterfeit or substandard. The GSMA for example, does not check the legitimacy of the device before issuing an IMEI number. One technological solution (referred to as 7

a. to determine if the capabilities of the phone match the listed capabilities. The technology capabilities stored in the capability database (database creation is based on information The capability database can also, for example, use b. capability crosscheck failed. c. considering this approach. 2 : IMEI NETWORK BLOCKING SOLUTIONS employed by some countries is perhaps best The solutions used in both countries establish purposes. 1 The blacklist is focused on stolen and lost lists to determine if the mobile phone is blocked or not. This solution has the potential of screening out 3 : NETWORK BLOCKING BASED ON TYPE APPROVAL B : IMPORTATION BLOCKING SOLUTIONS not block those handsets that are imported as contraband (outside the customs process). 11 C : DEVELOPMENT OF A COMPREHENSIVE PLAN more traditional measures should also be a focus. should include, among other things, consumer 8

1 : INCREASED CONSUMER AWARENESS a critical component of any strategy. The demand problems posed by these products such as the safety and health threats, the poor performance of the important the security threats particularly in the 2 : INCREASED ENFORCEMENT must include increased resources in the form of focus on the huge black markets that exist in all problem impacts and cuts across a number of industry representation is necessary. The MMF action plans and the allocation of appropriate and sustainable funding mechanisms. 3 : LEGISLATIVE/REGULATORY REFORMS substandard mobile phones are out of the reach of products that are being shipped to a third country. CONCLUSION of the mobile phones and their importance in dollar industry for illegal manufacturers and it is must occur in order to adopt a solution that best suits other resources. For more information on this important issue, help consumers learn more about the dangers before they buy them. 9

ANNEX 1 TEST CATEGORY #1 AND #2: Access Failure and Dropped Calls Access Failure: This category measures call Dropped Calls: This category measures ongoing calls that are undesirably interrupted Results: Access Failure Rate (%) 3 2 1 Access Failure 26.% Substandard.% Original Drop Call Rate (%) 3 2 1 Dropped Calls 24.% Substandard 3.3% Original TEST CATEGORY #4: Transmission Power Capabilities: Minimum received power Maximum transmission power to be listened by antenna. Bit Error Rate (%) 4 3 2 1 Minimum Received Power 2 times (13dB) -6-62 -64-66 -68-7 -72-74 -76-78 -8-82 -84-86 -88-9 -92 Received Signal Level (dbm) Original Substandard TEST CATEGORY 3: Handover Performance to another. This mechanism is called handover and should (ie. dropped). Power (Watts) 2. 1.. Maximum Transmitted Power 1.81 1.35.96.72.51.37.13.9 GSM 85 EGSM (9) DCS (18) PCS (19) Original Substandard Handover Time (s) How mobility works TEST CATEGORY #5: Transmission Power Control: Should my phone transmit high or low?.4.3.2.1. Handover Time.53% +41% time delayed Substandard.37% Original Handover Failure Rate (%) 3 2 1 Handover Fail 34.2% Substandard 1.8% Original needs to be controlled. needs to be executed phones and if transmits Power Control Time (s).4.2 Transmission Power Control time.49 Substandard +55% more delay.31 Original High Power Low Power 1

TEST CATEGORY #6: How fast is my internet access? The speed of internet access is related to technology Most substandard phones tested do not support Speed Data Rates Data Speed (Kbps) 2 EDGE 1 GPRS -62-65 -68-71 -74-77 -8-83 -86-89 Received Signal Level (dbm) 125 3 Distance Estimated (meters) Original Substandard 7 Diamant Building Boulevard Auguste Reyers 8 13 Brussels Belgium Telephone + 32 2 76 8567 Facsimile + 32 2 76 8569 Av. Paulista, 23 Piso Pilotis CEP 131-3 São Paulo/SP Brazil Telephone +55 11 2847-461 Facsimile +55 11 6847-455 www.mmfai.org 15th Floor, 1 Queen s Road Central, Central, Hong Kong Telephone +852 318 9375 Facsimile +852 318 9399 11