Cybersecurity

CALEA Compliance: Do it yourself or Outsource?

Congress enacted the Communications Assistance for Law Enforcement Act (“CALEA”) in 1994, requiring telecommunications service providers to assist law enforcement agencies in executing electronic surveillance, according to a court order or other lawful authorization. Since 2006, the Federal Communications Commission (“FCC”) has extended the requirements of CALEA to service providers of two-way interconnected VoIP and […]

Addressing Mobile Operator VoLTE Roaming LI Challenges

This is a busy time for mobile operators, both large and small. The march toward 5G deployment is underway for most large mobile operators while small and mid-size operators are pushing toward the deployment of IP Multimedia Systems (IMS) for Voice over LTE (VoLTE) operation. VoLTE allows operators to phase out 3G voice service by […]

5G Security – Metrics of the Engaged

This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a “partnership” created among […]

WTSA-2020: Reflecting on a Contemporary ITU-T Role

Setting the stage Every four years — as it has done for nearly a hundred years — the ITU-T as the world’s only global intergovernmental standards body for all telecommunication, invites its 196 sovereign state members to a meeting where they examine their work and set the stage for the next four years. There is […]

Truth in Web Digital Identity?

Most of us, when we go to a website and see the little lock at the top of the browser, don’t think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or […]

Cybersecurity Standards Practices as Cyber Threats

One of the most embarrassing and pernicious realities in the world of cybersecurity is the stark reality that some industry cybersecurity standards practices are themselves cyber threats. How so? Most industry and intergovernmental standards bodies serve as means for assembling the constantly evolving collective knowledge of participant experts and package the resulting specifications and best […]

Yaana’s FCC Ray Baum’s Act Filing Explained

Today, Yaana Technologies, LLC filed ex partecomments in the FCC’s new Ray Baum’s Act Sec. 503 proceeding being instituted by Commission as part of its 14 February 2019 agenda. This note explains what the Ray Baum’s Act section and new proceeding are about, who Yaana is, what the company said to the FCC Commissioners, and the larger context of spoofing internationally.

5G Security Transparency

There is considerable rhetoric propagated today about 5G security. Some of the more blatant assertions border on xenophobia with vague assertions that the 5G vendors from some countries cannot be trusted and wholesale government banning is required. Existing treaty obligations are being summarily abrogated in favor of bilateral trade bullying. These are practices that the […]

Innovation Today is IN the Network

The level of 3GPP industry involvement and collaboration today probably exceeds all other telecoms, internet, and assorted other bodies put together… and then some. Nowhere was this better demonstrated than the stunning 3GPP standards mega-meeting this past week in Reno — and the message was clear: innovation today is *in* the network.