This document provides information about a 2-day workshop on security threats to mobile services and electronic crimes in IP and IP-TV platforms. The workshop will cover topics such as cyber terrorism, fraud in mobile TV and IP-TV, hacking mobile nodes, and industrial espionage. Attendees will learn how to protect mobile infrastructures from attacks, identify fraud in mobile networks and services, and locate fraudsters using advanced techniques. The workshop is aimed at staff from telecom operators, banking security departments, telecom fraud departments, and law enforcement electronic crime units.
This is my final report that i made in my course information communication technology about cell phone system technology
it include all generation of 1g-5g help students to take idea from it thank you happy learning
Leveraging digital insights via mobile channels
Joanna Jen - Director, Kantar Digital - Kantar
Rolfe Swinton - Co-Founder & Director - Lumi Mobile
Covering the evolution of market research – why mobile now? Consumer and digital insights.
Describing the paradigm shift of Information security at Mass Internet age.
Bot Net Order look like Order 66.
What are "New Hopes " of cyber warfare ?
This is my final report that i made in my course information communication technology about cell phone system technology
it include all generation of 1g-5g help students to take idea from it thank you happy learning
Leveraging digital insights via mobile channels
Joanna Jen - Director, Kantar Digital - Kantar
Rolfe Swinton - Co-Founder & Director - Lumi Mobile
Covering the evolution of market research – why mobile now? Consumer and digital insights.
Describing the paradigm shift of Information security at Mass Internet age.
Bot Net Order look like Order 66.
What are "New Hopes " of cyber warfare ?
Nowadays mobile phones have become a must for almost all people from all over the world. An opportunity to stay in touch with friends and family members, access to email and business associates are just a few of reasons for the boosting importance of cell phones. Mobile telephony is the provision of telephone services to phones which may move around freely rather than stay fixed in one location. Today mobile phones are the best way to stay connected with others as well as provide the user with a sense of security. A conceptual study have been made to briefly discus what mobile telephony is, how it emerges and what technologies it use.
Cell Phone Evolution: The Mobile Phone Technologycellphonerumble
These wireless devices known as #CellPhones that seem to have it all are now an important part of every one’s life all around the globe. From a mere tool that make and receive calls, it has now transcended into a multifaceted device.
This presentation showcases the transformation of this gadget from the first official mobile phone used in Sweden to the smartphone that it has become today.
USIP Presentation of ISR Mobile Land Dispute Resolutioninternetbar
This presentation was giving be the Internet Bar Organization on our Internet Silk Road Initiative at the USIP's panel, "Can You Help Me Now? Mobile Phones and Peacebuilding in Afghanistan."
Videos from the event and downloadable report are available at http://www.usip.org/events/can-you-help-me-now-mobile-phones-and-peacebuilding-in-afghanistan
Presentation by Danish Arshad, Business Development Manager CAST and CSCU sales & Country manager South East Asia, EC-COUNCIL Malaysia, on "Information Security" at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
The Telecom, Media & Internet (TMI) group is responsible for the development and management of Rabobank International\'s wholesale banking activities in the TMI sector. The team aims at being recognised as a provider of innovative solutions to the financial needs of prime Telecom, Media and Internet companies in sophisticated markets.
An Overview of 5G Wireless Cellular TechnologiesEditor IJCATR
5G technology stands for fifth Generation Mobile technology. From generation 1G to 2G and from 3G to 5G this
world has revolutionized by improvements of wireless network. This revolution brought up some drastic changes in our social
life .This paper also focuses on all preceding generations of mobile communication along with fifth generation technology. Fifth
generation network provide cost-effective broadband wireless connectivity (very high speed), which will be probably 1gigbit per
second Speed. The paper throws light on network architecture of fifth generation technology. Currently 5G term is not
officially used. Fifth generation negotiate on (Voice over IP) VOIP-enabled devices that user will get a high level of call volume
and data transmission. Fifth generation technology will be done all the requirements of customers who always want advanced
features in cellular phones. The main features in 5G mobile network is that user connect to the multiple wireless technologies at
the same time and can switch between them. This forthcoming mobile technology will support IPv6 and flat IP. Fifth generation
technology will offer the services like Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. Index
Terms— 5G, 5G Architecture, Evolution from 1G to 5G, Comparison of all Generations.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
Nowadays mobile phones have become a must for almost all people from all over the world. An opportunity to stay in touch with friends and family members, access to email and business associates are just a few of reasons for the boosting importance of cell phones. Mobile telephony is the provision of telephone services to phones which may move around freely rather than stay fixed in one location. Today mobile phones are the best way to stay connected with others as well as provide the user with a sense of security. A conceptual study have been made to briefly discus what mobile telephony is, how it emerges and what technologies it use.
Cell Phone Evolution: The Mobile Phone Technologycellphonerumble
These wireless devices known as #CellPhones that seem to have it all are now an important part of every one’s life all around the globe. From a mere tool that make and receive calls, it has now transcended into a multifaceted device.
This presentation showcases the transformation of this gadget from the first official mobile phone used in Sweden to the smartphone that it has become today.
USIP Presentation of ISR Mobile Land Dispute Resolutioninternetbar
This presentation was giving be the Internet Bar Organization on our Internet Silk Road Initiative at the USIP's panel, "Can You Help Me Now? Mobile Phones and Peacebuilding in Afghanistan."
Videos from the event and downloadable report are available at http://www.usip.org/events/can-you-help-me-now-mobile-phones-and-peacebuilding-in-afghanistan
Presentation by Danish Arshad, Business Development Manager CAST and CSCU sales & Country manager South East Asia, EC-COUNCIL Malaysia, on "Information Security" at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
The Telecom, Media & Internet (TMI) group is responsible for the development and management of Rabobank International\'s wholesale banking activities in the TMI sector. The team aims at being recognised as a provider of innovative solutions to the financial needs of prime Telecom, Media and Internet companies in sophisticated markets.
An Overview of 5G Wireless Cellular TechnologiesEditor IJCATR
5G technology stands for fifth Generation Mobile technology. From generation 1G to 2G and from 3G to 5G this
world has revolutionized by improvements of wireless network. This revolution brought up some drastic changes in our social
life .This paper also focuses on all preceding generations of mobile communication along with fifth generation technology. Fifth
generation network provide cost-effective broadband wireless connectivity (very high speed), which will be probably 1gigbit per
second Speed. The paper throws light on network architecture of fifth generation technology. Currently 5G term is not
officially used. Fifth generation negotiate on (Voice over IP) VOIP-enabled devices that user will get a high level of call volume
and data transmission. Fifth generation technology will be done all the requirements of customers who always want advanced
features in cellular phones. The main features in 5G mobile network is that user connect to the multiple wireless technologies at
the same time and can switch between them. This forthcoming mobile technology will support IPv6 and flat IP. Fifth generation
technology will offer the services like Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. Index
Terms— 5G, 5G Architecture, Evolution from 1G to 5G, Comparison of all Generations.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
Intense and wide workshop on major voice encryption technologies for private, business, military, public safety and internet.
Strong review of wiretapping technical and political context.
This is a PPT of Mobile phone crimes in cyber crimes under Information Technology Act, 2000. This will help students to understand the cyber crimes or mobile phone crimes.
1. This Wo
rkshop
requires a
laptop
Security Threats to Mobile
Services and Electronic Crimes
in IP and IP-TV Platforms
23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek
Dear Delegates, By attending this 2 days
Security has been a crucial issue for telecom operators and service providers. workshop you will be able to:
With the emerging of new mobile technologies and services (e.g. mobile TV)
and equipment such as cellular Smartphones, PDAs, Blackbarries, telecom
operators and service providers are forced to offer higher data rates for the • Learn how to protect your mobile telecom
provision of mobile services (e.g. transmission of multimedia, MMS etc.) on infrastructures against attacks coming from
mobile phones. fraudsters, criminals or other nation
intelligence.
Mobile internet market reached over USD71 billion but on the same time
there is a growing concern of new security threats. Penetration and use of • Familiarize with the risks in M-Commerce and
mobile internet, is expected to grow from 46% to 135% in the next few years micro payments in systems that are using RFID
in the Middle East. It is typical for attackers and cyber criminals to capitalize technology.
on this dramatic growth. Therefore, it is important for telecom operators and
service providers to prepare themselves for the growing security threats and • Learn how to protect your mobile
take countermeasures to secure their infrastructures, their subscribers - communications against eavesdroppers and
customers and business, since the mobile use growth will increase the the methods used by international spying
potential number of victims. networks and industrial espionage.
On the other hand criminals are using high technology sophisticated
methods to hide their traces and communications in order to perform their • Get advice on how to better protect your
illegal actions. Next Generation Networks, infrastructures and services mobile communications against various types
including mobile TV, IP-TV, M-Commerce, micro-payments and use of new of fraud in pre or post paid services.
technologies eg. RFID (RadioFrequency Identification) are improving the way
we are doing business but on the same time they are opening a lot of • See how to identify and control telecom fraud
opportunities to fraudsters and various criminal groups to perform their in mobile networks and IP services (VoIP,
illegal actions. Companies need to get knowledge how to protect from mobile TV, IPTV), including interconnection
industrial espionage and countermeasures against white collar crime and fraud between Telecom Operators.
loss of sensitive information. Join us in the most exciting workshop that will
provide a deep knowledge of the various security threats to mobile services • Get experience on how to locate fraudsters -
and IP platforms and will describe in detail various ways electronic crimes criminals when they disappear, by using
are performed in present and future (NGN) networks and infrastructures. advanced techniques (artificial intelligence –
neural network techniques, link analysis,
Mr. Michalis Mavis telecom signatures, etc.).
(MSc) – f. Chairman of the Hellenic Fraud Forum.
Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: telecom.training@invension-i.com www. invension-i .com 1
2. Security Threats to Mobile
Services and Electronic Crimes in IP and IP-TV Platforms
(Workshop Outline)
Presented by Mr. Michalis Mavis (MSc) – f. Chairman of the Hellenic Fraud Forum.
Day 1 Day 2
• 09:00am – 11:00am: • 09:00am – 11:00am:
Cyber terrorism and countermeasures in mobile and IP Id-theft and countermeasures. Methods used by fraudsters
platforms. How to locate criminals that are using anonymous and criminals to disappear and how to locate persons that
services. Methods used by fraudsters and criminal groups to have disappeared. P2P communications interception and
hide their identity and location when communicating (P2P steganography.
communications, spoofing techniques, VoIP encryption).
Manipulation of CLI (Calling Line Identification) to avoid • 11:00am – 11:30am: Coffee Break
detection. Fraud in mobile TV and IP-TV platforms and Next
Generation Networks. How PBX fraud is used by criminals to • 11:30am – 13:00pm:
hide their identity and communicate without traces. RFID (Radio Frequency Identification) attacks, when used
for micropayments and biometric passports. Skimming,
• 11:00am – 11:30am: Coffee Break cloning and eavesdropping attacks.
• 11:30am – 13:00pm: • 13:00pm – 14:30pm: Lunch Break and Social
Telecom Fraud and Electronic Crimes in Mobile Services (e.g. Networking
SIM cloning, SIM Boxing, PRS - Roaming Fraud, prepaid •
services Fraud, bypass fraud, attacks to mobile infrastructures, 14:30pm – 15:30pm:
GPRS fraud, Internal fraud and Dealer’s fraud). Fraudsters Industrial espionage and intelligence. Methods to collect
against Mobile Operators, telecom fraud from one Mobile information by using legal and illegal techniques.
Operator to other Mobile Operator, Content Provider fraud. International Spying networks, how efficient they are,
Ways to manipulate-delete CDRs, attacks against the prepaid limitations and success stories.
services. Mobile-Commerce Fraud.
• 13:00pm – 14:30pm: Lunch Break and Social Networking
• 14:30pm – 15:30pm:
Hacking a mobile node/switch. Monitoring mobile phones
(conversations – SMS) and countermeasures, Mobile phone
used as a bug and how to protect yourself (eg. By using
cryptography). Attacking WiFi networks and
countermeasures.
WHO SHOULD ATTEND ?
• Staff and managers of Telecom Operators • Top management of telecom company
• Banking sector Security dpt. • Police officers and electronic crime units of law
• Telecom Fraud dpt. enforcement.
• Internal Auditor dpt.
Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: telecom.training@invension-i.com www. invension-i .com 2
3. Trainer’s Profile
Mr. Mavis was the founder and first Chairman of EFTA (Hellenic Fraud Forum), that
was established in the year 2000, by the major Telecom Operators in Greece
(COSMOTE, OTE, Vodafone and TIM) with the aim to fight telecommunications
fraud and electronic crime amongst its members. he studied Physics and got two
Master’s degrees in Telecommunications and Computers & Automation from the
University of Athens. He worked for OTE (the Hellenic Telecom Organization) since
1977 from where he voluntarily retired in 2006, to work as telecom and IT security
consultant. Mr. Mavis worked :
- as crypto engineer at NATO in Brussels Belgium (between 1989-1993) and
- as Project Supervisor at EURESCOM (European Institute for Research
and Strategic Studies in Telecommunications) in Heidelberg – Germany
(between 1995-1999).
Before his retirement from OTE he was the Director of the Security Audit and
M r. M i cha li s M avis Telecom Fraud Control Division of OTE.
He became chairman of the ETNO (European Telecom Network Operators
Association) WG on Information Security (1994-1995) and was the Greek rep in the
SOGIS (Senior Officials Group on Information Security) of the European
Commission (1994-1995). He was also rep of OTE and Greece in the ETSI (European
Technical Standards Institute) Technical and General Assembly (France).
He is the author of more than 15 papers presented during International
Conferences in Australia, USA, and Europe in the areas of Telecommunications,
Security and Electronic Crime. He is a permanent expert to the Head District
Attorney of Athens, on electronic crime issues.
CLIENT LIST
ARMENTEL ARMENIA MAKNAN COMMUNICATIONS GREECE
BRONET GREECE MARFIN BANK GREECE
BT UK MATAV - HUNGARIAN TELECOM CO. LTD HUNGARY
BTC BULGARIA MD5 GREECE
BUSINESS INFORMATION SUPPORT GREECE NATO CIS AGENCY BELGIUM
CENSUS GREECE PORTUGAL TELECOM PORTUGAL
CNET - FRANCE TELECOM FRANCE PRESIDIUM SERVICES LTD UK
COSMOTE GREECE RIGHTTRACK LTD CYPRO US
CSELT, TELECOM ITALIA GROUP ITALY ROMTELECOM ROMANIA
CYTA CYPROUS SLOVAK TELECOM SLOVAKIA
DEUTSCHE TELECOM AG GERMANY SWISSCOM SWITCHERLAND
DISTRICT ATTORNEY ATHENS GREECE TELCORDIA US
ELECTRONIC CRIME UNIT GREECE TELECOM FINLAND - FINNET GROUP FINLAND
EURESCOM GERMANY TELEFO'NICA I+D SPAIN
EUROJUST NETHERLANDS TELENOR NORWAY
FORTH / ENISA CRETA GR TELIA SWEDEN
GREEK MINISTRY OF DEVELOPMENT GREECE TRUST-IT GREECE
HELLENIC FINANCIAL POLICE GREECE UNIVERSITY OF LUND SWEDEN
HELLENIC MINISTRY OF PUBLIC ORDER, KEMEA GREECE VODAPHONE HELLAS GREECE
HEWLETT PACKARD ITALIANA SRL ITALY VTRIP GREECE
IIR TELECOMS & TECHNOLOGY UK WIND (TIM-HELLAS) GREECE
LITHUANIAN POLICE LITHUANIA
Tel: 603 2162 5485 | Fax: 603 2162 7485 | Email: register@invension-i.com www. invension-i .com 3
4. Security Threats to Mobile 3 EASY WAYS TO REGISTER
Services and Electronic Crimes Call: +603 2162 5485
Fax the registration form to: +603 2162 7485
in IP and IP-TV Platforms Email this form to: telecom.training@invension-i.com
23 - 24 February 2010, Radisson Blu Hotel, Dubai, Deira Creek
PRICES AND OFFERS
REGISTRATION FORM
(Use copies of this form for additional participants) Security Threats to Mobile
Services and Electronic Crimes In IP and IP-TV Platforms
Per Delegate
1st Delegate
Name Mr/Mrs/Ms Regular Price USD 2,300
Position Group Fee of 2 Delegates & Above USD 1,900
Telephone Mobile
METHOD OF PAYMENT
Email
Cheque/Draft Payable to
2nd Delegate INVENSION INTERNATIONAL SDN BHD
Name Mr/Mrs/Ms
Bank Transfer A/C No. 205-418510-725
Position HSBC Bank, Main Branch,
Kuala Lumpur, Malaysia
Telephone Mobile SWIFT: HBMBMYKL
Email
For Invoice Purpose
Contact Person Name:
3rd Delegate
Name Mr/Mrs/Ms Position:
Position Tel: Fax:
Telephone Mobile
Email:
Email
Terms and Conditions
1. Professional Training Fee
AUTHORIZATION Registration Fee is inclusive of course materials and refreshments, and does not
include accommodation or transportation.
(This form is invalid without a signature or company stamp)
2. Payment Terms
Once a completed registration form is received , full payment is expected within 5
Organization business days from receipt of invoice. PLEASE NOTE: payment must be received prior
to the event date. A receipt will be issued once payment is received.
Address
3. Confirmation Details
Joining instructions such as Confirmation Letter, Location Map, etc will be sent to the
Country concerned delegate (s) or contact person once a completed registration form is
received.
Telephone Fax 3. Cancellation/Substitution/Addition of Delegate (s)
Substitutes for registered delegates is welcome at any time, provided the organizer is
Authorising Manager notified either by official fax or email.
Additional delegates are welcome too subject to seat availability.
All cancellations after a registration is communicated to the organizer either by fax or
Position email will be subjected to a 10% penalty of the regular fee. Cancellation must be
received in writing by mail or fax. Non-payments and non-attendance does not
Signature constitute cancellation.
4. Late Registration
Date The organizer reserves the right to reject any registration that is received after the last
day of registration that is advertised in our brochure and promotional materials.
5. Certificate
All participants who complete the course will receive a Certificate of Attendance,
signed by the trainer. Please ensure when registering that your name is written the
way you want it to appear on your Certificate.
6. Copyright
All intellectual property rights in all materials produced or distributed in relation with
this event is expressly reserved with INVENSION International and any unauthorized
duplication, publication and distribution is prohibited.
www. invension-i .com Important Note: While every reasonable effort will be made to adhere to the
Tel: 603 2162 5485 Fax: 603 2162 7485 advertised package, INVENSION reserves the right to change event dates, sites, location
General Enquiries: info@invension-i.com or omit event features or alternate offers shall be made.
4