& cplSiteName &
Comments
You must login to participate in this chat. Please login.

Patrick is going to be joined by service provider and vendor specialists December 5 at the MOBILE NETWORK SECURITY STRATEGIES one-day conference in New York City

http://events.lightreading.com/mnss/

Blogger

Thanks, Patrick! And thanks everyone for joining. Hope to see some of you in NYC for our Mobile Security conference. Going to be a good one!

Blogger

And thanks everyone for joining in and asking some great questions and making excellent points -- this is a MASSIVE topic with a great many strands.

Blogger

I think we all know there are several layers in the network and I would expcet carriers to encrypt each layer to take the liability off of them.  Then, as someone pointed out, an app on the device and then additional encryption in the handset.  Security on LTE has been questioned for years and probably one of the reasons for the hesitacny in delivering services like VoLTE.

Light Sabre

Thanks Patrick! Great insights.

Blogger

ALL; Thanks all, have a good day.

Light Sabre

Taraseals: Carrier responsibility. Starting point here is that the carrier has responsbility to its employees and shareholders. Consistent with that, carriers allow competitors to lead on security at their peril. It follows from that they need to take a role, although fast moving technology (and regulation) make that a permanently moving set of goal posts.

Light Sabre

all too often, rather-- sorry for typos...

Light Sabre

Hello all.  I am wondering if some of the video optimization solutions carriers are placing into their networks have a filter to weed out spam.

Light Sabre

Ray: I think we've been hearing "Google will solvee the problem" all to aften actually....mostly from Google itself!! ;-)

Light Sabre

Great question, Sarah, about personal information protection, privacy and so on. Thorny, difficult waters there but it seems that should be a big issue in 4G as more people do full computing and move around all kinds of information via mobile broadband. What responsibility does the carrier have in all of that? If any? 

Light Sabre

I know.  Scary right?

Light Sabre
pzernick - not often you hear anyone saying that Google will solve the problem...
 

 

Blogger

People will need to run an app on their phone to block this kind of spam as they do email spam.  Google will solve the problem, not operators

Light Sabre

Ray:Hysteria. Not all and not all.

Light Sabre

RAY, VOLTE. Sure like I said Video messaging. The price of messgaing in going through the floor. Capacity and speed of LTE. You could use the equivlanet of Next Gen SIM boxes to generate hundreds/thousands of video spam messages.

Light Sabre

And certainly before we get to the end of the chat today I want to get to Patrick's opening remark - "Too much box-mongering hysteria on the part of some vendors on the one hand. Too much complacency on the part of some operators on the other."

Are the operators still too complacent and are all the vendors engaging in 'box-mongering hysteria'?

Blogger

Ray: VOLTE. Tendency sometime to think of that as "voice" whereas attacks tend to be associated with "data". Except VoLTE is data....

Light Sabre

Ray: yes! I'm coughing right now. Patrick: That sounds awful. I've heard about SPIT or voice spam...are the possibilities there even greater in VoLTE?

Light Sabre

I thought we would have more questions around VoLTE -- will the introduction of VoLTE services on multiple networks, expected in 2014-15, be the opening of the security threat floodgates?

Blogger

I think people chose that too because of the heightened awareness around the NSA and snooping...

Blogger

On our LR poll, we asked what people are most concerned with and the most votes went to criminals stealing sensitive information. That's often a handset-level issue, but is it a real network threat too? 

Blogger

Taraseals: Robocalls. Not just hijacking for own use but using robocalls as another typoe of DDoS attack. U.S govt issued notice to public govt agencioes recently of this attack. Bombard the Dept of Whatevcer with thousands of calls. Phone them up and demand $5000 for them to stop the attack or else it continues. In RCS land (when we get there...) think of video messaging.  Think of SMS spamming - what about video messaging spamming? Impact on congestion way, way greater.

Light Sabre

Tara - a threat to everyone's health, the Robocalls.... that's an interesting point on service hijacking - I have heard of that being an issue for fixed line ISPs.

Blogger

Robocalls! The bane of the political season! Are there other threats though besides "nuisance" type issues? You're talking about hackers essentially hijacking a VoIP service for their own uses?

Light Sabre

mark12 - welcome! good question, Patrick just completed a report on that called 

Mobile Network Outages & Service Degradations: A Heavy Reading Survey Analysis
Blogger

Mark12. NO doubt there are "vulnerabilities" in Diameter. Issue pertaining to early LTE networks was that it wasn't designed to deal and respond in a telco-like way to flooding incidents. That's being addressed now. Diameter Routing Agents (DRAs) helping too. Wouldn't call that a secuirty vulnerability per se. Sure there are some though. And more in future no doubt.

Light Sabre

Ah yes, security is one reason operators site on why it takes soooo long to work with them on APIs. Exposing network access is a non-trivial issue though. Makes sense, but still. :)

Blogger

pzernick - Yeah, I think that might be a request too far for this medium.... big BIG question! But a good one all the same

 

Blogger

These are potential risk areas but I am intersted in any reported exploits against real vulnerabilties in say Diameter as you mentioned...

Light Beer

Send a link to a good white paper Patrick!

Light Sabre

pzernick: List of threats and costs - not post, resrach and present over 4-6 pages maybe !

Light Sabre

SarahReedy: small cells. Yes a gratuitous snipe on my part.

Light Sabre

TaraSeals Web-facing APIs. The operators are used to exposing their APIs to their subscriebr sim cards, which are highlky, highly secure. Internet's a different animal. SIP very open, very vulnerable. Multiple risk vectors including Robocalls

Light Sabre

Patrick, why aren't public access small cells not an issue? Because they don't have scale yet?

Blogger

Can you talk a little about the possible exploits stemming from those vulnerabilities that you mentioned, like oWeb-facing VoLTE APIs and unencrypted backhaul? What are the looming potential threats involved for carriers and their customers?

Light Sabre

Sarah,

Mpayments has more than just a security issue. Other issue is that other forms of payment in this country are very efficient (believe it or not) compared to the rest of the world. That's why paper checks have stubbornly hung on, even when their end was forecast decades ago.

Light Sabre

TaraSeals. Femtocell issues are known. VZW had an isue on their CDMA femto line earlier this year so goal posts are always moving. public access small cells aren't an issue. In theory they are, in practice there aren't gonna be any for a while anyway....

Light Sabre

Can you post a list of threats (i,e, DOS) by prioritized by most likely and prioritzed the same list again by most costly to operators?

Light Sabre
Identify and block malicious traffic. Big market opportunity for vendors. Operators dont have very granular insight at all into their traffic. Lots of malcious traffic going under the radar. solutions out there to identify and block.
Light Sabre

Mark12; Real 4G threats? All the 3G threats plus some new ones: unencrypted backhaul; volumes of diameter signalling, opening APIs the Internet for VOLTE and RCS. You name it

Light Sabre

That's one big reason mHealth has had a hard time taking off...same with mobile payments.

Blogger

Are $G security threats that different from 3G sewcurity threats?

 

Blogger

TaraSeals: a malware-initiated data breach at a healthcare facility. It all depends. If the malware breach occured on a piece of equipment provide as part of an mHealth service by a care provider to a patient then the care provider would almost certainly be liable for resulting damages, not the service provider.

Light Sabre

Good point re: Femto security. That seems a different ball of wax from 4G networks themselves though...

Light Sabre

And to follow on from the DPI question, what can carriers do to identify and block malicious traffic traversing their networks? Typically terrestrial ISPs don't bother and leave that job up to browser seecurity and the like from what I understand.

Light Sabre

So what are the real 4G/LTE threats and not just speculation (e.g., there were real exploits reported with 3G femto cells)... 

Light Beer

What are the uniquely 4G security measures operators are or should be taking?

Blogger

Hi everyone-- I'm excited about this topic! I have a question: most of the reports focus on Android security and the growth in mobile malware on that platform. It seems that the onus is on end users to adopt better mobile security practices, especially when it comes to BYOD. And, corporate IT departments have the other part of the responsibility to protect their organizations with good policies, defenses and enforcement. What role, if any, do carriers play in taking responsibility for, say, a malware-initiated data breach at a healthcare facility? Or do carriers mainly have an opportunity to offer help to IT folks in the way of offering managed security services?

 

Light Sabre

What do you see as the biggest threat facing operators today?

 

Light Sabre

@pdonegan67 do you know of any reputable vendors who are in business with any Tier 1 carrier?

Light Sabre

pzernik: Not necessarily all that deep so sort of.

Light Sabre

To Ray: IPsec from the base station to the backhaul is uniquely relevant to 4G. A lot of techn ologies are common to 3G and 4G.

 

Light Sabre

Good point, pzernik. I wonder how much of the malware affecting phones happens to rooted phones.

Blogger

By filtering do you mean "deep packet inspection?"

 

Light Sabre

Are there any particular network security technologies that are more suitable for 4G service providers to deploy? And where in the network should they put up their defenses?

Blogger

To Phil Britt: There's a limit to how much an operator can do. But by investing in network-side security filtering you can at least prevent most incoming email or sms borne malware from getting to the user's device.

Light Sabre

Carriers should be able to identify users who ROOT their phones as they can then install applications that are not from an "app store" and also can remove security software that the service provider had pre-loaded on the devices.

Light Sabre

To Ray:

To your question Ray, yes on the whole we do see integrated incumbents generally being stronger in security than pure-play mobile operators but there are still quite a few exceptions to that. More often than not, the reason the integrated incumbents are stronger in security is that because of the association with the fixed line parent, their mobile arms have done disproportionately well in the corporate and government subscriber market. That's been the main driver of their leadership rather than because of graceful interchange of security smarts from the fixed to the mobile side of the house which does sometimes happen but more typically doesn't.

Light Sabre

Hi, all. Looking forward to the chat.

Blogger

Another early question: How does a provider protect against users not practicing "safe mobile security?"

Light Sabre

Nicely set up Patrick! Looking forward to it. I mean, where else can you find an appraisal of "box-mongering hysteria"?

Blogger

Looking forward to today's chat with the Light Reading crew. Good idea to do this - sort out the wheat from the chaffe of this subject matter. Too much box-mongering hysteria on the part of some vendors on the one hand. Too much complacency on the part of some operators on the other. Bring the conversation on.

Light Sabre

This is a test message

Light Sabre

I'm thrpowing out an early question for Patrick -- do  carriers with both fixed and mobile operations teams have an advantage in tackling the network security challenges that come with a 4G rollout because they already have experience of dealing with some of the issues in their fixed networks?

Blogger

Hi everyone! We will be holding our next live chat on Thursday, November 14, at 11 a.m. EST/8 a.m. PST with Heavy Reading senior analyst Patrick Donegan. We'll be discussing the many mobile network security challenges that face wireless operators as they roll out 4G. And there are plenty. Join in right here on Thursday, November 14, at 11 a.m. EST/8 a.m. PST.

Blogger


From The Founder
The independent evaluation of Nokia's key virtual network functions (VNFs) was a defining moment for the Finnish giant.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
Energy 2020: Growing Services, Not Consumption

6|24|16   |   07:18   |   (0) comments


Management of power requirements needs to be a key consideration as cable operators deploy new services, says Dan Cooper, vice president of critical infrastructure for Charter Communications and chair of the SCTE/ISBE Standards Program's Energy Management Subcommittee. In this video, Cooper discusses the importance of cable operators and technology partners ...
LRTV Huawei Video Resource Center
Huawei & TDC First to Launch DOCSIS 3.1 Trial in Europe

6|24|16   |     |   (0) comments


To meet the rising demands for high-speed broadband and to tackle fierce competition for 1.5 million household, TDC wanted to upgrade its network to use the latest technology. Using Huawei's DOCSIS 3.1 solution, TDC is now able to offer gigabit speeds to its customers.
LRTV Documentaries
OPNFV Summit: Key Takeaways

6|22|16   |   03:28   |   (0) comments


MANO shortfalls, an increasingly bloated open source ecosystem and the cultural challenges for network operators were among the key takeaways from the OPNFV Summit in Berlin.
LRTV Huawei Video Resource Center
Bringing Ultra Broadband to the South Pacific

6|22|16   |   7:55   |   (0) comments


At Singapore's UBBS 2016 summit, Light Reading speaks to Lim Chee Siong, Huawei's CMO in the South Pacific Region.
LRTV Custom TV
Juniper's NFV Platform

6|22|16   |     |   (0) comments


A telco cloud is a key enabler for service providers to deliver virtualized services to their customers. Juniper has a differentiated approach with an open and comprehensive NFV platform to build the cloud of the future for multiple use cases.
Women in Comms Introduction Videos
Infinera: The Glass Ceiling's Been Broken

6|22|16   |   4:34   |   (0) comments


Shannon Williams, an engineer by trade and now the director of sales for Infinera's major accounts, draws confidence from being a female in a male-dominated industry and hopes other women will too as industry dynamics swing in our favor.
LRTV Custom TV
RAD Demonstrates SD-WAN Functionality at BCE 2016

6|22|16   |     |   (0) comments


In conjunction with Versa Networks, RAD demos a joint solution for SD-WAN implementation. The solution uses RAD's ETX-2i, a vCPE platform integrating a powerful IP and Carrier Ethernet NID/NTU with a field-pluggable x86 NFV module that runs Versa's FlexVNF for SD-WAN functionality. The demo implements SD-WAN over a simulated service provider footprint by deploying ...
LRTV Custom TV
Radware on Virtualizing Network Security

6|21|16   |     |   (0) comments


Radware's Michael O'Malley highlights the benefits for service providers of virtualizing network security.
LRTV Huawei Video Resource Center
Huawei 2016 UBBS World Tour: Singapore

6|21|16   |   02:39   |   (0) comments


Highlights from Huawei's UBBS World Tour event in Singapore.
LRTV Custom TV
The FlowBROKER Solution

6|21|16   |     |   (0) comments


During a demo at the Big Communications Event 2016, Accedian director of product line solutions Greg Spear demonstrates how the FlowBROKER distributed packet capture solution (part of Accedian's SkyLIGHT platform) can be used to troubleshoot and resolve QoE issues.

FlowBROKER is the industry's first lossless remote packet capture solution, which uses ...

LRTV Documentaries
BCE 2016: Dell & the New World Order

6|21|16   |   22:48   |   (0) comments


Dell's Jim Ganthier on how the very essence of enterprise is being affected by digital disruption – and how the cloud can help companies find a path forward.
LRTV Documentaries
BCE 2016: The CSP of the Future

6|20|16   |     |   (0) comments


Traditional telecom operators have been adopting new ways of doing business from the IT sector and emulating web-scale companies in their technology adoption. Are these strategies succeeding? A panel of experts at BCE considered the evidence...
Upcoming Live Events
September 13-14, 2016, The Curtis Hotel, Denver, CO
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 6-8, 2016,
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
A new survey conducted by Heavy Reading and TM Forum shows that CSPs around the world see the move to digital operations as a necessary part of their overall virtualization strategies.
Hot Topics
FCC to Vote on 5G Spectrum on July 14
Dan Jones, Mobile Editor, 6/20/2016
'Brexit' Vote Hits BT, Vodafone
Iain Morris, News Editor, 6/24/2016
Twitter Buys Magic Pony... Not That Kind
Mari Silbey, Senior Editor, Cable/Video, 6/20/2016
AT&T Settles on LTE for Cellular IoT
Dan Jones, Mobile Editor, 6/22/2016
Google Fiber Buys Webpass in Wireless Play
Iain Morris, News Editor, 6/23/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
At the BCE 2016 show in Austin, ECI Telecom CEO Darryl Edwards tells Light Reading founder and CEO about the Elastic Network concept and the company's NFV and cybersecurity developments.
Mark Dzuban, president and CEO of SCTE/ISBE, sits down with Steve Saunders in Light Reading's New York office to discuss the society's Energy 2020 campaign, including its mission to benefit the environment, enable economic benefits and the key challenges facing cable operators wanting to reduce energy consumption.
Animals with Phones
Live Digital Audio

Our world has evolved through innovation from the Industrial Revolution of the 1740s to the information age, and it is now entering the Fourth Industrial Revolution, driven by technology. Technology is driving a paradigm shift in the way digital solutions deliver a connected world, changing the way we live, communicate and provide solutions. It can have a powerful impact on how we tackle some of the world’s most pressing problems. In this radio show, Caroline Dowling, President of Communications Infrastructure & Enterprise Computing at Flex, will join Women in Comms Director Sarah Thomas to discuss the impact technology has on society and how it can be a game-changer across the globe; improving lives and creating a smarter world. Dowling, a Cork, Ireland, native and graduate of Harvard Business School's Advanced Management Program, will also discuss her experience managing an international team focused on innovation in an age of high-speed change.