Home Blog Page 186

Consumers need network-native cybersecurity – but which kind?

Sponsored: It’s hard to chose from so many options to give customers the protection and features they need

Cybercrime is part of our lives and will apparently continue to be so for the foreseeable future. In Europe, according to Eurostat, 32% of individuals in the 27 states of the European Union claim to have experienced security-related issues, and 16% of individuals curtailed internet activities because of security concerns. In the United States, 2021 saw 496,501 internet crime victims totaling $6.1 billion in losses according to the FBI Internet Crime Report.

According to an Allot-sponsored 2022 survey by Coleman Parkes Research, 56% of global communications service providers’ (CSPs) consumer customers want security as part of their existing package. In other words, we expect our mobile and fixed broadband providers to protect us from cyber criminals as a part of the service they offer.

Now that CSPs know this, the question is how to provide that protection? With different options on the table, including some that have been around for decades, which cybersecurity solutions offer consumer customers the protection they want with the features they need?

What do consumers want and need?

The most obvious choice for CSPs has been the endpoint application. With familiar names, the endpoint solutions have been the go-to security solution for CSPs for decades. The problem with endpoint applications, however, is that they need to be installed and configured and maintained by the customer. While there are a handful of consumers who are comfortable with this scenario, they are just that – a handful. Perhaps 5-7% of customers take advantage of endpoint solutions. For the rest, they argue that they need a simple, easy-to-use solution that doesn’t take up their time or effort. So, what else is out there?

CSPs can implement inline network-native cybersecurity solutions for their consumer and small business customers. These are solutions that sit in the core of the CSP network and provide protection as a part of the CSP’s service offering. One of the most significant features of network-native solutions is that they offer zero-touch onboarding and operation.

As opposed to endpoint solutions, Network Native solutions provide protection from cyber threats without the need for the customer to install, configure or operate them. The protection simply happens. However, there are two types of very different network-native solutions, DNS-based and premium network-based.

DNS-based protection

DNS-based protection is the more traditional way of filtering network traffic. It looks at DNS queries to make filtering decisions, making it very lightweight from a deployment perspective. When the DNS-based solution sees a malicious site that resolves from a known DNS entry, instead of serving the page with the IP address of the malicious site, it will reply with the IP address of a blocking page, causing a redirection on the browser and preventing access to the malicious content.

Sounds great but there are some drawbacks. Threats that use an IP address, instead of a DNS entry, are not addressed by DNS-based solutions. For example, classified as the world’s most dangerous malware by Europol, EMOTET, a banking trojan, has operated using direct IP based communication.

DNS-based solutions also cannot identify a compromised page within a legitimate HTTP website since they only operate at the domain level. In addition, DNS settings can be changed by malware or by curious kids, enabling content to bypass the DNS-based solution. Finally, anti-virus protection requires a proxy with DNS-based solutions, adding latency to the network.

DNS settings can be easily accessed and changed.

Operating from within the CSP’s network

Like DNS-based cyber protection solutions, premium network-native security solutions operate from within the CSP network, offering zero-touch activation and operation. However, a premium solution blocks more malicious sites by making filtering decisions based on IP addresses. In this way, it can catch malicious pages in legitimate sites so that those sites can be accessed, with only the bad pages being blocked and it can block direct communication to IP addresses (that don’t use DNS queries).

Premium solutions can also block malware that was downloaded from a legitimate site or from a new site that has not yet been indexed. Importantly, this type of solution cannot be bypassed by changing DNS settings since it is fully operated from the core network and does not rely on DNS filtering.

A traditional DNS-based filtering and cyber threat protection solution can be exactly what a CSP needs if the goal is to provide a response to regulatory demand, or if the customer base is prepared to only pay a limited fee for cyber threat protection. For a more comprehensive approach, and one that cannot be bypassed by changing device settings, a premium solution could be what is called for.

Both offer zero-touch, clientless activation. Both protect subscribers from dangerous and inappropriate content. However, a premium Network Native security solution for consumers and small businesses continues to filter malicious content even if DNS settings are changed. A premium solution can also block domains, URLs and IP addresses. Importantly, a premium solution can also block individual pages that are compromised with malware or phishing bait within a legitimate HTTP site.

Pros and cons

The bottom line is that endpoint security solutions have traditionally seen slow uptake and are rarely deployed properly, leaving customers with exposed assets and not much revenue for the CSP. DNS-based solutions offer a good first layer of defense, but call for additional solutions to fill the gaps. ​

To protect customers fully from botnets, phishing, malware and dangerous and inappropriate content, while taking advantage of the high adoption rates that zero-touch activation offers, the way to go is a premium Network Native security solution.

These types of solutions, for mobile, fixed and converged networks, are being deployed by large and small CSPs around the globe who are benefiting from supplemental monthly revenue and improved customer loyalty. Premium Network Native security solutions for consumers and small businesses are becoming more prevalent as CSPs discover the benefits for themselves and their customers.

To learn more about the research cited in this article, please visit the Telco Security Trends H1 2022 report on allot.com.

David Elmaleh Bio

David Elmaleh is the VP of Product Management for Cybersecurity at Allot. With over 18 years of experience in enterprise technologies, David has a strong track record in product management and cross-functional leadership at companies such as Cisco, Imperva, and Alvarion. In these roles, he has focused on developing innovative solutions for service providers and enterprise markets, with expertise in 4G and 5G networks, AI, application security, and network security. David holds a M.Sc. in Electronics Engineering from Paris XII University, France.

How are operators faring on their automation journeys?

Mobile operators know the move to automation is essential, but progress is slow, and perhaps slower than they think

Mobile operators know the move to automation is essential. Around a third claim to be in some state of commercial deployment with automation technologies, yet progress is slow. Less than half them have automated more than 40% of their processes, according to GSMA Intelligence, which recently surveyed 100 decision-makers.

Challenges span the technical and cultural, with mobile operators under increasing pressure to ensure the autonomous networks required for 5G alongside the digital transformation of their entire business.

Operators say they are making progress in the move to automation of their networks and wider operations. In March, Orange CTO Laurent Leboucher talked to Mobile Europe about automation’s role in network evolution and service innovation.

Meanwhile, Vodafone is using automation to transform its network and operations, including for customer services with its TOBi chatbot, and AT&T has introduced of AI applications to speed up customer service procedures and responses. Telefonica is also making progress in automating its network and using data to its advantage.

But operators “may be over-estimating” the progress they have made on automation and under-estimating the work still to be done, says Susan White, Head of Strategy and Portfolio Marketing at Netcracker. One of the major issues is the short-term return on investment, she says. “Automation is not likely to give immediate pay back until it’s up and running and as autonomous as possible.”

Driving automation

Operators are driving automation initiatives over three main domains, says Azfar Aslam, Nokia’s CTO in Europe. The first is cost avoidance, through capabilities such as smart capex planning. They are also driving operational efficiencies improvements and opex reduction through capabilities such as AI-based predictive maintenance and robotics process automation (RPA). Meanwhile, mobile operators are boosting customer experience for “stickiness and NPS gains”, says Aslam, citing the example of Elisa in Finland – one of the few operators in Europe to have increased ARPU.

According to Analysys Mason, 46% of firms have automated 25% of their assurance and orchestration functions, but almost all plan to increase their level of automation during this decade. The pace of automation has been slow, says Aslam. “It will require a significant acceleration during this decade in order to deal with expanding networks and an increase in complexity in operations.”

In the meantime, everything is still manual – especially from a development and delivery perspective, says Kelvin Chaffer, CEO of Lifecycle Software. “Before it can be said that mobile operators have successfully delivered on their visions of digital transformation, there needs to be a serious overhaul of previously entrenched business models and a genuine willingness to adapt to meet their customers’ needs.”

Meeting timescales for automation is proving challenging for many operators. Part of the issue is often the lack of an internal consensus: “Aggressive and sometimes unrealistic deadlines are imposed, forcing hybrid solutions to be implemented as an intermediate step,” says Vladimir Mitrasinovic, Regional Vice President (EMEA) at Amdocs.

There needs to be an acknowledgement across the organisation that digital transformation “rarely involves a direct step from zero to one”, he says. “It’s much more complicated than that and will require a coherent approach to interaction and integration with legacy systems.”

Multi-vendor integration

Multi-vendor integration is a big challenge. “Many vendors have not yet adopted open APIs and standard models, which increases the time and complexity to deploy disaggregated networks,” says White.

Another issue has been access to and usage of certain data, says Aslam. This is in addition to confidence levels in outcomes of AI and machine learning automation activities, and challenges around automating legacy products and solutions which may not be able to generate the needed data.

In addition, operators’ approach to automation has varied significantly in the absence of a common framework and best practices. Investment in automation needs to be a business-driven initiative with clear benefits and outcomes, says Aslam. “Cognitive automation in particular relies on data – so the industry needs to ensure the decision on what and when to automate is also data-driven and prioritised with a clear ranking order.”

This needs to be a high priority because, as Angus Ward, CEO at Beyond Now, notes, “Customers are finding multi-partner digital solutions too complex to manage, but utilising end-to-end automation to remove management headaches will help them achieve their digital transformation goals faster. And this is where CSPs can help to push this journey along faster..”

Change mindset

While change needs to happen across the board, employee mindsets must adjust to new ways of working, Aslam agrees. Incentives need to be aligned towards successful implementation and outcome of automation projects, he says. “The operators don’t need to develop everything inhouse. Instead, be ready to start creating the architectures and align this with the business rationale of automation uses cases.”

As operators continue their automation journeys, technological developments such as generative AI could also offer a boost, says Mark Jackson, telecoms industry expert at Pegasystems. “This isn’t about machines taking over, but more about how generative AI coupled with low code can stimulate the creative process and reduce the time to deploy ‘enterprise ready’ automation projects.”

He says a generative AI model could help to define a new app to improve complex ordering, for example. “It can instantly provide a best practice straw man option for the citizen developer team to work with and build out for the exact needs of the business. The fear of starting from a blank page on an automation or digitisation project goes away.”

As competition among all operators increases, the pace of progress now needs to ramp up. Speed is key, as well as a clear emphasis on customer-centricity, Chaffer says. “The whole process of integrating automated procedures is focused on providing customers with convenient and better experiences. If this is achieved, networks will almost certainly be able to foster better relationships with their customers, which in turn leads to greater retention rates and drives market share.”

Revealed: secrets of Telia-Ericsson’s Private 5G Network with smart factory

Location? That really would be Tallinn

A private 5G network is the perfect chrysalis for factories to undergo metamorphosis and there is a prime example in the Baltics right now, according to Swedish equipment maker Ericsson and mobile operator Telia, who have unveiled Ericsson Private 5G. The exclusive network went live on 2 May 2023 at Ericsson’s supply site in Tallinn in neighbouring Estonia, hopefully bringing in a new era of productivity, finesse and sustainability as the crucible for the ingenious factory. The new environment for manufacturing 4.0 is provided by the unique conditions of a 5G Private Network (5G PN).

Reliability, predictable latency, security and speed create the perfect conditions for productivity, while the 5G PN supports variety of use cases. Asset condition monitoring and management and computer vision all help the project manager. Meanwhile, the creatives who may be charged with modifying proceeds as production evolves will benefit from the extra options afforded them by digital twins, collaborative robotics and new features like 5G precise indoor positioning.

That last development in the Ericsson and Telia collaboration could have a significant impact, both locally and globally, on the Tallinn Supply Site and its contribution to Estonia’s export market. The supply site in Tallinn plays a central role in Ericsson’s global supply chain footprint, accounting for nearly half of the company’s New Product Introductions (NPIs). These NPIs involve extensive research and development to keep products relevant, compete and expand at will, all of which are essential to the successful ramp-up of new products. The use of Ericsson 5G PN cuts the dependency on wires dramatically, which in turn unleashed the layout and design artists, which mobilises the automated guided vehicles (AGVs).

The 5G PN is actually a hubris 4G and 5G hybrid whose connectivity is in the gift of its single server dual mode core. Built for business operations, the system is pre-integrated to jump to attention and instantly produce the latest intelligent operations in any environment.

Andre Visse, CTO of Telia Estonia, has been working with Ericsson for decades as each generation of mobile networks has emerged in Estonia, “from the very first 1G.” Contributing to the first 5G private networks gave him insight into what advantages and opportunities today’s technology can offer businesses and customers in order to digitise their processes even smarter, more efficiently and more securely. “They contain Industry 4.0 solutions and help us to create a sustainable future,” said Visse.

Building Private 5G at Ericsson’s supply site is testament to its commitment to connected manufacturing and emerging data-driven technologies, said Sirli Männiksaar, Country Manager of Ericsson Estonia.

The new network is already having an impact at the supply site by improving the monitoring and management of all devices in a defined area. This gives better coverage with less infrastructure and sets up seamless connectivity through wireless sensors on the shop floor.

Around €8.3 billion will have been spent by 2026 on Private LTE/5G says IDC Research, so the Ericsson-Telia partnership needs to be sharp. By showcasing their 5G private network technology, the duo are also creating ample opportunities to test new use cases and expedite industry-wide adoption. Implementing this technology in a real-world scenario provides valuable practical insights on how to best implement and use 5G private networks.

MTN Group asset sale could list Liberia, Guinea-Bissau, Guinea-Conakry

CEO Mupita may want to focus on Asante

MTN Group is in advanced talks with Axian Group to sell some of its West African markets, according to Bloomberg’s teams of insiders people familiar with the matter. The bigger question is: why is Africa’s largest mobile operator trims its portfolio. The companies are negotiating the prices for MTN’s assets in Liberia, Guinea-Bissau and Guinea-Conakry, said insiders who asked not to be named over the private leak. The deal has not been finalised, and there is no guarantee that a transaction will go ahead, they said.

The three countries accounted for 1.6% of MTN’s revenue in 2022, according to data compiled by Bloomberg. A representative for MTN declined to comment. A spokesperson for Mauritius-based Axian was unable to comment. It is known that MTN’s Chief Executive Officer Ralph Mupita (pictured) has been evaluating the company’s portfolio. The African mobile network operator has narrowed its horizons and may concentrate on core markets, with its biggest assets on the West African countries Nigeria and Ghana. MTN operates in 19 countries in the region. Mupita has made a conscious decision to leave territories with which he has no connection, such as certain Middle Eastern businesses in Afghanistan, Yemen and Syria.

Africa’s young population has created a lively and exciting market for smartphones, West Afrca has proved to be an attractive place for companies targeting telecom deals. In 2022, Axian bought Millicom International Cellular’s Tanzanian operations. The firm’s telco unit has invested in towers, undersea cables, data centres and financial technology as well as a number of phone operators in countries such as Madagascar and Senegal. 

South Africa’s Vodacom Group attracted interest from Emirates Telecommunications Group as its parent company, Vodafone Group weighs options for the business, people familiar with the matter said in December. Telecel Group, headed by French tycoon Hugues Mulliez, bought Vodafone’s operations in Ghana earlier this year.

Telco cloud forecast is patchy with $8bn demand for security – ABI Research

Clouds and 5G creating big security problems

As 5G is rolled out, the network builders and their clients are unwittingly creating a security problem that will cost $8 billion to fix, according to global technology intelligence firm ABI Research. It seems rather a harsh cause and effect accusation, which could possibly be averted by a number of means, such as creating a security infrastructure as you go, a built-in security to support the building of the network. Perhaps these problems are resolved in the report, which is only available to subscribers.

The analyst predicts an opportunity will open up for software and service-based security as the need to secure virtualized and cloud-based assets becomes apparent, especially, it says, at the edge of the Radio Access Networks (RAN) and in the core. ABI expects a diverse multi-vendor cybersecurity market to use and adapt to the best digital security technologies to the 5G ecosystem.

Vendors are already putting together their security proposals, reported Michela Menting, Telco Cybersecurity Research Director at ABI Research. Their ‘commercial systems’ will authenticate the cloud and virtual network functions (VNF), protect subscription identifiers with traditional hardware security modules (HSMs) and secure container services in 5G core. Though that doesn’t very cloudy, perhaps it indicates the evolution of the telco cloud ‘environment’ in which ransomware operators are beginning to establish themselves.

“Numerous existing solutions in the traditional cybersecurity market can secure 5G networks, data and devices. The critical success factor is to ensure that these technologies are adapted to the new context and can work with the architectural requirements defined by 5G standards,” explained Michela Menting, Telco Cybersecurity Research Director at ABI Research.

The new ecosystem will consist of those coming from a telco background and are familiar with 5G networks, such as network equipment providers, like Ericsson and Nokia. Then there are the telco software and network security companies like BroadForward, Allot, and SecurityGen.  Finally, pure-play cybersecurity vendors like ThalesFortinet and Palo Alto Networks.

Cloud service providers and systems integrators, having built the networks, will re-enter the fray as managed security service providers. These findings are from ABI Research’s 5G Security: The Software & Service Opportunity  part of its Telco Cybersecurity research service,

Follow up Questions:

According to Michela Menting, Telco Cybersecurity Research Director at ABI Research, the customers, presumably mobile network operators and industrial scale customers will, in the face of threats, want to use diverse, multi-vendor cybersecurity with creative outlooks. However, there are some who might argue that security buyers are notoriously conservative and unlikely to explore their option. Wouldn’t their priority be to just get the network safe, a process which might be expedited if all the security came from one source?

Supernal and Inmarsat link as demand for pilot-free flights goes vertical

eVTOL links to Velaris

Satellite provider Inmarsat is to engage the unmanned aerial vehicles (UAV) of South Korean car maker Supernal as it develops electric vertical take-off and landing (eVTOL) aircraft. An eVTOL is like a helicopter designed make short-haul flights of 30 miles for a small number of passengers. While it has a pilot seat Supernal has included the design option for automated flight, because it wants to be on the launchpad when passengers feel brave enough for unmanned flights when the time comes. Supernal will connect its eVTOL to the Inmarsat’s Velaris comms service. It runs on Inmarsat’s Elera L-band satellite network and was designed for the UAV market, specifically the beyond visual line of sight (BVLOS) side of it.

According to flight expert Nick Wood at Telecoms, BVLOS has been a big sticking point for the commercial UAV market because aviation authorities do not allow it. When they do they only allow it in segregated airspace, or ‘drone highways’ or the ‘documentary aerial shot way’ whereby it’s obligatory for film and documentary makers take an aerial shot of a metropolis. “That restricts the reach of unmanned passenger flights and by extension the potential of the whole market,” said Wood.

Inmarsat’s Velaris system can move 320 Kbps of data, enough for High definition video and important command and control (C2) data from the producer. The terminal includes a 300 gram antenna which is a dealer breaker in the evolving eVTOL market. Velaris also offers full UAV tracking and identification. Together with Inmarsat, Supernal wants to put Velaris through its paces, conduct tests and share data in an effort to optimise hardware and network performance, paving the way for Verlaris’ integration with eVTOLs.

“Inmarsat working with Supernal leads the conversation around connectivity and comms for UAV, eVTOL and UAM vehicles,” said the official statement by Joel Klooster, SVP of aircraft operations and safety, Inmarsat Aviation, “We can deliver the safety services required to allow these vehicles to fly beyond visual line of sight operations and continually improve the customer experience.”

Meanwhile Nokia recently launched its drone-in-a-box service that promises automatic, BVLOS flights as two drones connect to public or private 5G or LTE networks. Drones have  similar flight altitude and distance to eVTL so the commercial UAV connectivity market could see them competing with each other or they could evolve distinctive niches. Meanwhile, the Supernal announcement was made the same day that Inmarsat’s proposed sale to rival Viasat cleared a crucial hurdle.

Vodafone hits record speeds in Open RAN towns – leaves a trail of distraction

Where’s the digital revolution?

Vodafone claims that customers of the first commercial urban deployment of Open RAN in Europe, like the UK seaside towns Torquay and Exmouth and docktown/military base Plymouth, are benefiting from improved services as a result of their technology leadership. There are no signs of any 5G-stimulated urban renewal or digitisation effects, however. “We’ve been keen to test the network’s improved internet speeds and access to 5G,” said Alberto Ripepi, Vodafone group chief network officer in his company blog, “we can already see the benefits for customers in these towns.”

The benefits are measured in network speeds. Vodafone is peaking at 700Mbps, double previous internet speeds, faster than 4G and better than the connectivity provided before. In the week of testing, Vodafone’s engineers observed that 5G Open RAN is available more than 99% of the time. This means customers can now make video calls, play online games and view content without any connection issues or delays, and with greater clarity and streaming quality. The network is there, but has business life improved?

There is no evidence presented that the people of the south west coast know how lucky they are. The gentrified fishing villages that were Torquay and Exmouth have no been urbanised sufficiently to have a combined population of around 87,000 people. As the first recipients of the ‘revolutionary technology, surely these are precisely the types of towns where business could do with being transformed. Are any fishing boats and businesses involved in the supply chain associated with the fishing industry, such as distributors, benefitting from the new technology? How?

If 5G is to lead the digital transformation of industries in need of rejuvenation, then surely it would be good to illustrate how that is happening, with some examples.

Vodafone’s golden cluster currently extends beyond the these coastal towns and comprises 14 site. This is just the beginning of its Open RAN deployments in the UK with five cities – Exeter, Plymouth, Swansea, Telford and Birkenhead –its Open RAN roadmap. Each of those citires exceeds 100,000 citizens. It would be more impressive if Vodafone could show how it’s technology is catalysing change through the creation of new apps and new business processes that never existed before.

Telecoms Europe LIVE 2023 – Event Preview with Red Hat

Annie Turner, Editor, Mobile Europe and host of the upcoming Telecoms Europe LIVE 2023 event, speaks with Timo Jokiaho, Chief Technologist – Telco, Media & Entertainment (TME) / EMEA at Red Hat, the Platinum Sponsor of the event, about their involvement.

For more information about Red Hat – CLICK HERE

For more information about the event and to register – CLICK HERE

WG2 tells telcos buy your own place in the cloud and learn to speak like a native

Watch out for time-share hyper scallywags

A design of engineers left Telenor to build a sort of Android store for telco networks. Soon its ambitions extended to creating cloud native telco software from the core to the edge. Now their company WG2 has created an off-the-self mobile core that turns telco into cloud natives without getting fleeced by the hyper-scalpers, who help them migrate to the cloud and then hold their business to ransom.

The cloud world has rapidly moved on from when Erlend Prestgard was working at Telenor as part of a group asked to build a few small applications on top of the telco’s network core. Though the apps were simple, building them was nigh on impossible since the core network was proprietary and mega complex. Engineers needed permissions to work on the core software and had to use protocols from the 1980s. Having done all that work they couldn’t re-sell the end products to other telcos as the Norwegian telco’s systems used a proprietary mix of protocols that wouldn’t work anywhere else. The problem was that all the operators in the world had slightly different core networks, so the app wouldn’t work for them anyway.

The entire design, the collective terms for engineers, realised modern applications must be built from scratch with a cloud-native core. Prestgard and a four others broke away from Telenor, with its blessing, and formed WG2. Since 2017 the original five designers have created a ground breaking cloud-native mobile core and now WG2 has 85 people in countries. In one of those over-night sensations that ifs five years in the making, suddenly the C-level crowd are all crying out for cloud-native apps. In the cycle of procurement, the cry has moved on from Who’s WG2? through Get Me WG2 to Get Me a WG2 lookalike! But once again, branding is luring them away from his vision on an Android for Mobile Networks. The buyers at some operators have unfortunately heard their traditional suppliers talking about offering “cloud applications as a service.”

As a rule of thumb, you should never trust anyone who overcomplicates things. Nobody calls the police as a service, and the SAS is no less professional because it’s not referred to as The Special Air as a Service. However many telco buyers are mesmerised by this dogwhistle marketing phrase and are now buying cloud applications as a service from the same vendors who would have laughed at the idea two years earlier. Some mobile network operators continue going go to their normal vendors and asking for an ‘asser’, which is cloud native in name only. “They say [to the olde worlde software vendor] do what you do, but do it in the cloud. That’s actually the worst of both worlds,” Prestgaard told Linda Hardesty in Fierce Wireless magazine. The WG2 team decided it wouldn’t be sufficient to take a traditional core network and put it on a cloud like AWS. It needed to build a mobile core in the cloud, from the start.

Prestgard and co-founder Werner Eriksen are still working on an Android for Networks where they would have clever hardware and install an operating system that’s common across all this hardware. Then they would create application programming interfaces (APIs) for developers, who could easily create products. However though operators desperately need their core strengthened before they can strengthen the rest of their infrastructure, WG2 has sold few core operators. Telenor uses it for its Vimla MVNO brand. The Hutchinson Group, which owns 11 MVNOs around the world, uses WG2’s technology. Earlier this year, the Hawaiian operator Mobi announced that it was using WG2 for its core network.

This is madness according to cloud native missionary Danielle Royston, who runs a number of cloud native companies, including app shop Totogi and consultancy TelcoDR. “It’s not enough to move legacy apps to the cloud. They have to be rewritten with the mindset the only place they will run is in the cloud. And by the cloud I only mean public cloud.” Telco executives think they have a lot more time than they do, said Royston, who seems to think it’s her way of the highway. WG2’s technology includes programming interfaces to connect to business support systems (BSS) specialists like Amdocs. Prestgard said it was frustrating to work at a telco that used proprietary equipment for its core network. “This is the fundamental reason operators are challenged; their ability to change is so slow,” he said. “Except for Jio and Rakuten, no operators are able to do anything because of proprietary equipment. They don’t have access to the source code.”

The big problem is the perception of public cloud and the IT industry in general has a terrible record of misleading and bamboozling people over subscriptions. According to Telecom TV, the dread of being locked into a contract as the prices ‘hyper scale up’, are the main barriers to successful partnerships between telcos and hyperscalers, it discovered in a poll conducted during a recent Telcos and Public Cloud Summit. Developers are starting to admit the shame of being bamboozled over ‘three cloud tricks’ when building apps for cloud-based mobile PBX switch-boards, professional voice assistance, network anti-spam products and SMS security products.

Most telcos now have some kind of relationship with at least one of the main public cloud players – Amazon Web Services (AWS), Microsoft Azure and Google Cloud. WG2 runs their programmable mobile core on infrastructure from AWS and makes it possible for any developer to build telco products.  Perhaps this is the way forward.

Big Charlie is watching you – coronation was surveillance nightmare

Gullible public accepted use of Hikvision

London Metropolitan’s police used a live facial recognition system on the public watching the coronation of the UK’s new king, minutes after telling the media that the use of oppressive Chinese-made labour-camp cameras from Hikvision, were being considered. If true, the Met Police’s systems integrators set multiple records for installation and integration and they could be in massive demand in future.

UK civil liberties group Big Brother Watch said on Twitter the police were testing public opinion by making the announcement about a possible installation of the surveillance technology. “The Government’s decision to install 38 Hikvision cameras along the Coronation route shows a staggering lack of judgment, especially given that Hikvision is already banned from many Government sites. It is grossly inappropriate, deeply insensitive, and a stain on our country’s record that Chinese state-owned companies closely linked to grave human rights abuses will have their surveillance tech at the heart of this historic event,” Big Brother Watch said in a statement.

If that was the case, the testing phase was over quickly, reported Didi Rankovic in ReclaimTheNet, since the London police website detailed all the actions they would be undertaking during the coronation, on Wednesday. Among those details was the admission that facial recognition would be used in central London. The plan to use the technology was explained using the watch list that will focus on persons whose presence would raise public protection concerns.

This class of citizen includes those with outstanding warrants against them, or those undergoing relevant offender management programmes. Before it became official that live facial recognition will indeed play a role during the event, Big Brother posted a response on its site to the Metropolitan police, which was at that point considering this.

The group’s Legal and Policy Officer Madeleine Stone said that this type of surveillance is an authoritarian and Orwellian tool, that would in the end treat everyone as suspects whose biometric data is checked by the police. Hundreds of thousands of people attending the coronation were likely to be considered as suspects.

The system is not actually useful in detecting threats, which is its main raison d’etre, according to ReclaimTheNet. Big Brother Watch claims that the London police themselves have put out numbers that show 86% percent of racial flags are not accurate.

“Live facial recognition is not referenced in a single UK law, has never been debated in parliament, and is one of the most privacy-intrusive technologies ever used in British policing,” said Stone.

Other measures that observers saw were GPS jammers that are already installed in Westminster, but are not currently active.

- Advertisement -
DOWNLOAD OUR NEW REPORT

5G Advanced

Will 5G’s second wave deliver value?