Categories
charitable Coast to Coast End User travel Weekend

Wainwright 190 mile Coast to Coast sponsored walk in aid of Cancer Research UK

Coast to coast sponsored walk

On May 1st 2016 my son Tom and I will be setting off from St Bees in Cumbria on the West Coast of England to walk to Robin Hood’s Bay on the East Coast. This is a 190 mile coast to coast sponsored walk.

coast to coast sponsored walk cancer research logoWe are doing it to raise funds for Cancer Research UK. There are two main reasons why this is important to us.

  1. May 1st is the first anniversary of the death of my mother, Eileen. Mam did not die of cancer but she had been Chairman of the Marown and District branch of the Isle of Man Anti-Cancer Association (where I grew up). Raising funds to help beat cancer was important to Mam. She was a nurse and had spent years helping and comforting patients at the end of their lives.
  2. My wife Anne’s father Keith died of Cancer two years ago.

 

So this walk is in memory of these two important people. I am expecting some side benefits. Walking for 190 miles across the lake district, Yorkshire Dales and the North Yorks Moors is going to be somewhat of a challenge for someone who has spent the last thirty years with his feet propped up on a desk. I have had to get into training just to be able to even get to the start. I’m hoping there will be less of me at the end than there was at the beginning of the odyssey.

The other benefit will be spending two weeks in the company of my first born effectively away from electronic screens. At this point I hear some of you fall off your chairs in disbelief. How can this be so? 🙂

Well the trip is not going to be entirely offline, other than the fact that there will be little or no mobile reception along much of the route. I am expecting to post updates from our B&B(/pub) every night and will be publishing a live tracker of our progress en route. Expect vids and pics.

Tom and I would also like to think that the walk will raise some serious cash for the cause. Most people have been touched by cancer in one way or another. In 2016 we are seeing signs that there is light at the end of the tunnel but we aren’t there yet.

If you would like to help please consider making a donation, no matter how small, to our JustGiving Page. Our chosen charity is Cancer Research UK.

Also if you want to come along on all or part of this walk then you are very welcome to do so and should get in touch.  Our friend Mark Agius and his son Luke are coming the whole way. We set off at 9am on Sunday 1st May and arrive at our destination at tea time on Thursday 12th.

Stay tuned to this blog for more info as it happens and in particular the coast to coast sponsored walk event page.

Featured image courtesy of Contours Walking Holidays.

Categories
4g broadband Business

Virgin Media Broadband Problem

Virgin Media Broadband Problem s R Us

I’m having a Virgin Media broadband problem. Took a skeet on my router and no WAN IP address was present. I haven’t bothered logging a fault as their website tells me there know about it – see featured image above. It’s been down since I got back from the dentist at around 10am.

In the meantime I’ve been using my phone as a portable hotspot connected to the EE 4G network. Since I got a 20GB data bundle for £20 a month (see here for story) I am totally comfortable with hammering the 4G connection. In fact you will see below that at 40Mbps down and almost 20Mbps up  I am getting a reasonable speed out of it – faster indeed than my old 80/20 FTTC line that only ever gave me 30/7.

eespeedtest

The only problem I have is that my SIP deskphone doesn’t work and similarly neither do our SIP DECT phones that are the “landlines”.

This is a little bit of a nuisance as I use the SIP line to make free conference calls and to call my dear old dad in the Isle of Man. Mobile operators rip you off on calls to the IoM by not only treating them as international roaming calls but also outside the EU. Landline calls are treated as UK geo.

The only easy way to find out if the problem has been fixed is by occasionally trying my landline. Otherwise it’s a nuisance switching hotspots. The connection did come back momentarily but has now disappeared again.

I can get by using the 4G line and mobile calls but you can see why it is important for larger businesses to that they have robust connectivity. If I had an office full of people it would be worth paying for a second totally separate line for resilience/redundancy.

The Virgin service status page says estimated fix time is 14.20. Who wants a bet on whether it will be fixed by then?

Categories
4g End User

20GB Mobile Bundle Saga

to PAC or not to PAC – the 20GB Mobile Bundle

I found a new 20GB mobile bundle. My mobile deal with EE is out of contract. I took a look expecting to be able to get a much better deal than one year ago. Pricing didn’t seem radically different to a year ago. I was paying £18.50 for unlimited calls and texts and 2GB of data. Any offers seemed to only last for the first three months. So I looked around.

Vodafone had a deal for 20GB at £20 in the first year, reverting to £40 thereafter. With Voday you could also use your bundle in Europe for £3 a day. It’s the data I’m after. EE offer £2.50 for calls and texts in Europe but they make their money on the roaming data, assuming you use it. I don’t.

I trooped downtown into the Vodafone shop and signed up. The deal also gave me Sky Sports Mobile. Sorted.

Last night, from the comfort of the settee I called EE to ask for a PAC code. The EE guy matched Vodafone’s pricing and threw in free calls and texts within the EU. I said I needed some time to think about it and when I finished the call revisited the Vodafone package.

The deal breaker was the Sky Sports. I downloaded the app and set the account up. Blow me down it didn’t work. I tried it  number of times and eventually called Voda to sort it out. To cut a long story short the Sky Sports app doesn’t appear to be supported on my Oneplus 2. How does that work?

The upshot is that I called EE back, accepted their offer and today will be cancelling the new Vodafone contract. Hey…

I’ll have to make sure I look at my contract options in 11 months time but that is a mere calendar entry.

Now the advent of a 20GB mobile bundle does change things. I didn’t often get anywhere near my old 2GB limit but there again my mobile usage habits were tailored to the package. Photo and video uploads in particular were restricted to when I was in WiFi coverage. I have removed this restriction and it will be interesting to see how this affects cellular data usage.

I also used to switch Sat Nav on just for the moments that I needed it as this was also a heavy consumer of data. At least Google Maps was. I’d started using Waze instead which seems to be much lighter on data.

The other consideration of course is battery usage. Hitting 4G hard will inevitably use up the battery before I want it using up. I’ll report back.

As a footnote to this post, I was discussing the Oneplus 2 with the very pleasant and efficient Sophie in the Vodafone shop and remarked that the major downside was the fact that the screen seemed to scratch easily. Glancing at the phone I then realised that the original plastic screen protector was still on. Doh!

For the derogatory comments on their screen in a previous post I offer Oneplus my unreserved apologies. Sorry.

ttfn

Categories
Business Legal

Brexit – in or out? Get your vote in now!

Have your say over Brexit

With the media frenzy now in full flow over Brexit I thought it would be a good idea to have our own opinion poll regarding whether the UK should be in or out of the EU.

This won’t be representative of the population as a whole but it may be somewhat representative of the tech community.

It’s a simple question. In or out and all you have to do is vote in the poll in the sidebar. Only one vote per person. Let’s see how we get on.

Anyone can vote and voting is anonymous. There is obviously quite a whole before the 23rd June polling day. I’m likely to be in Dublin on that day so will have to make sure I get a postal vote.

Feel free to leave a comment if you want. I think the most important thing over the next few months is to try and see  through all the hype. It’s very difficult to actually quantify the effect of leaving – what we really want to see are details. Costs. Jobs created or lost.

I doubt anyone really knows so we are being asked to vote on the basis of gut feel. Maybe you can chip in with some numbers that will stand scrutiny?

My own view is that we should probably stay in the EU. In an ideal world we would have the common market but without all the single superstate nonsense. I can see why mainland European countries might see the latter to be attractive. No more intra European wars for example.

My gut feel is that getting out of Europe would be a backward step and that we should stay and make the best of it from within the system. There you go. Have your say and vote in Brexit the poll in the sidebar on the right of this site.

Categories
Business Mobile

MWC trip prep

MWC trip prep

Getting my MWC trip prep in today before I set off tomorrow. I’ll probably do some reports from the show floor, fwiw, although the bars and restaurants may be more interesting.

A few other mobile posts here.

Categories
broadband Business

CLA calls for legal right to broadband

Broadband for all?

You need a bit of stamina in this broadband punditry game. It’s such a complex situation that it is difficult to follow everything that goes on. Yesterday the CLA (Countryside Landowners Association) called “on MPs today to press Government for a clear and unequivocal ‘Universal Service Obligation’ that means every home and business in rural England and Wales will get broadband coverage of at least 10 megabits per second by 2020.” Broadband for all!

It was only in November last year that Dave Cameron said:

“Access to the Internet shouldn’t be a luxury; it should be a right – absolutely fundamental to life in 21st century Britain. That is why I’m announcing a giant leap in my digital mission for Britain. Just as our forebears effectively brought gas, electricity and water to all, we’re going to bring fast broadband to every home and business that wants it. That’s right: we’re getting Britain – all of Britain – online, and on the way to becoming the most prosperous economy in the whole of Europe.”

Dave was talking 10Mbps USO by 2020. I think you have to accept the politicospeak that comes with the announcement as par for the course.

What does need drilling down into though is the detail which politicians rarely cover and is what gets these idealist statements bogged down in the mire of reality.

  1. First of all who pays for this? Why should BT (other broadband providers may be available) be legally obliged to shoulder the cost of running connectivity to a farmer 5 miles from the nearest green cabinet.
  2. Offering alternatives such as satellite based broadband doesn’t cut the mustard.
  3. By 2020 10Mbps will not cut the mustard either – it should be 1Gbps.

In relation to point 1 we also have to consider the competitive landscape for broadband in the UK. We claim to have the most competitive market going. This is fair enough (probably – I’ve not really looked elsewhere but I think broadband prices in the UK are very low) but this is only in the provision of services largely running over BT infrastructure. There is Virgin of course but Virgin don’t have a wholesale play and certainly (and understandably) ain’t interested in running DOCSIS to farmhouses five miles out of town. Competition isn’t providing services to Farmer Giles.

It seems to me that the only way to do this is for UK PLC to have a state owned infrastructure company that just runs fibre to rural areas places that need it. This entity doesn’t sell services to end users. It just supplies connectivity to service providers.

It may be that this connectivity is just backhaul in many areas which is often the seed required for communities to look after themselves. We need lots of B4RNs. Maybe we need B4RN to spread to every bit of the country. There is nothing to stop the BTs, Skys and Virgins of this world from selling Over The Top services that use someone else’s underlying connectivity.

Having a state owned infrastructure provider won’t sit very well with this government. In fact it doesn’t sit very well with me either really – I don’t trust governments to do things efficiently and well if only because they get themselves entangled in their own red tape. Could Openreach be that state owned infrastructure supplier?

I think the penny is very slowly starting to drop in the minds of the powers that be but it has a long way to go before the light comes on.

There you go. Rant over for now. Check out yesterday’s post on the lack of UK national broadband vision.

PS note new image of cow. I’ve been using one from @Cyberdoyle’s farm for ages. Thought I’d have a change:)

Categories
broadband Business

UK national lack of broadband vision

B4RL turns out to be a good source and the lack of UK broadband vision

Last year I created the B4RL Facebook page. B4RL stands for Broadband 4 Rural Lincolnshire. Seemed to me we needed one aka B4RN (Broadband for the Rural North) and B4RDS (Broadband for Rural Devon and Somerset). B4RN is by now world famous and B4RDS is becoming a place for heated discussion with people who have very clear views on the availability (or lack of) of connectivity.

I occasionally get contacted by people local to me looking for help getting connectivity to their communities. Usually the brick wall is backhaul cost. Lincolnshire folk don’t generally seem to be particularly demonstrative when it comes to broadband. It’s usually constrained to social media outcries when their broadband stops working, as the technology periodically tends to do.

B4RL however has turned out to be a good place to follow relevant news in the broadband space because a number of stalwarts post to the timeline on a regular basis.

This morning it’s all about The Culture, Media and Sport Committee visit to Russell’s Water Village, as part of its inquiry on “Establishing world-class connectivity throughout the UK”. The visit has already met with a hiccup as you can see from the tweet:


This week has also seen a link to an article in the Telegraph on the best and worst places to get broadband in the UK. Amazingly my home town Lincoln comes near the top. That’ll be my 200Mbps Virgin connection driving up the average.

best and worst broadbandThe difference between the best and the worst is really marked though. What’s more  we have to consider that to get an average a lot of people must be seeing far worse speeds. Also this probably doesn’t recognise that many households won’t be getting broadband of any sort.

There are lots more good articles on B4RL. What I really wanted to get to was the issue of what is to be done about broadband access and speeds and why we need to do anything..

There is a valid argument that nobody yet needs a 1Gbps connection aka the services of B4RN, Gigaclear et al. I doubt that I ever use my 200Mbps to the full. It may be argued that over and above a certain speed (say 10Mbps per person) what is more important is the contention/congestion on the service provider’s network. That’s as may be but the real point is that as a nation that needs to compete and be innovative in the big bad technology ruled world we need to have that cutting edge.

Commercial websites have evidence that shows how revenues increase with faster page load times. Amazon claim a 1% increase in revenue for every 100 milliseconds improvement in page loading time. Yahoo increased traffic by 9% for every 400 milliseconds improvement. Google say that “Slowing down the search results page by 100 to 400 milliseconds has a measurable impact on the number of searches per user of -0.2% to -0.6%”.

This is one of the reasons why large content providers are members of Internet Exchange Points like LONAP where their traffic gets the benefit of faster connectivity.

It may be about speed in the headlines but behind all the hype it’s about money.

The same logic can be applied to broadband connectivity. I found this Forbes article from 2012 that claimed that GDP increases by 0.3% with a doubling of broadband growth. Now I’m sure that there will be lots of caveats and conditions associated with this but the general message seems to be clear.

The problem is that this isn’t a BT or a Virgin issue. Apart from the fact that B4RN and Gigaclear have shown that it is very much doable to provide 1Gbps to the home economically (£30 a month for a 1Gig connection – I’d say that’s hugely competitive).

BT’s job is to generate value for its shareholders and not to underpin the economy. This is a we the people issue. Why should the UK wait for BT to decide that there is indeed a business case in providing FTTH, which is what we are talking about. Fibre all the way to your house.

UK GDP at the end of 2015 was around £1,787 Billion. Last year Ofcom told us that the average UK broadband speed had grown to 22.8Mbps by the end of November 2014. If everyone was getting 1Gbps that would be over x 25 growth or, if for the sake of a number we use the Forbes 0.3% figure, a 1.5% growth in GDP.That would take GDP to £1,814bn or a growth of £27Bn which is funnily enough roughly what the Caio Report in 2008 said that rolling out nationally FTTH would cost. Bear in mind this figure would be based on BT type overheads and costs.

Compare this to the £15.5 to £19.5Bn annual increase in GDP by 2040 quoted for the H2S train project for an investment of around £50Bn.

I don’t have a problem with investing for the future. The government’s problem is that it can’t see how an investment in digital infrastructure would generate growth. It can’t work out the numbers. A capital project such as HS2 has an established business model that bean counters can bet their brains around. The brave new digital world is a mystery to most of them. They aren’t necessarily to blame as it’s new for everyone. What is lacking however is vision.

There is something else lacking. If you talk to the folk at B4RN they won’t touch government money with a barge pole. This is partly out of bitter experience.  When they were starting they were ignored by the establishment in favour of BT when it came to the distribution of funds. BT being seen to be a “safer” pair of hands. It is also because government money comes so wrapped in red tape that accessing it is seen as too much effort to get to.

So somehow the MPS on the Culture, Media and Sport Committee visiting Russell’s Water today need to be provided with a message they can take back to Westminster. A message that says “raise your game UK”. Let’s be seen by the world as being visionaries and not just by a few people in government trying to spin a story.

The CartoDB  website is useful if you are looking for data on your local broadband speeds.

Categories
Business datacentre hosting

Jolt web hosting established at Timico Newark datacentre

Jolt web hosting launched in the UK

My pal Matt Russell is, at the tender age of 30, a veteran of the web hosting industry. He is a successful self starter and has owned a number of businesses in the space. I got to know him when he set up some services at our Newark Datacentre when I was CTO there. In those days Matt was joint owner of WebHostingBuzz which as well as the UK and Europe (Amsterdam) had resources across the USA. Matt is now rebranding WebHostingBuzz.co.uk to Jolt web hosting.

He is doing this to help focus the business on UK and European markets. Most of the support resources of WHB are on this side of the pond so it made sense for him to put his efforts into his home market. Matt has been remarkably successful in building a fully automated and integrated hosting system that can easily be applied to different brands. He keeps the same back end infrastructure and support teams and just replaces the front end.

The fact that he makes use of a seriously high quality date centre resource as is the TImico facility just underlines the quality of his approach to service provision. Timico massively over provision their connectivity to the datacentre to ensure the best experience for their customers.

If you are looking for some cost effective and quality web hosting take a look at Jolt. Try them out for responsiveness.

I asked Matt for an elevator pitch for Jolt and he gave me this:

“Jolt web hosting provides 24×7 support via helpdesk and also real time live chat. best blend of latest hardware, timico’s network, low prices”

There you go. It’s nice to be able to help and support a business in your home town. Matt lives half a mile from me and the Morning Star pub is approximately half way between our two houses:)

Happy Chinese New Year

shey shey

Tref

Categories
ecommerce Engineer internet ipv6

NANOG 66 is in San Diego by the sea @LONAP

NANOG 66 – bring your shorts

One of the downsides perhaps of being in the internet plumbing industry is that your Facebook timeline constantly fills up with people  off to conferences in exotic places. Even when they aren’t off to a meeting people are still off to exotic places as they spend their air miles. This week it’s NANOG 66  in San Diego.

San Diego is one of the nicest places you can choose to go to a conference. The other popular destination is Hawaii. I’ve done San Diego but not Hawaii. In fact I tend to avoid conferences that involve long haul travel these days because it’s hard enough submitting your body to a week of conference talks, corridor meetings and the follow on eating and drinking without throwing jet lag into the mix.

Out of curiosity I took a look at the NANOG Facebook group and the NANOG website. The first thing that hit me on Facebook was a comment that told me there were 1002 people signed up for the conference. That’s a lot of people. So many people that you have to figure out how to make the most of the fact that they are all there. The value in these meetings tends not to be in the actual conference material but in the people that attend.

This brings me to my second observation. The list of Platinum Sponsors, organisations that have paid $100,000 to sponsor the three events in the year, includes a business called Addrex. Addrex are an IP address broker. That’s a serious chunk of change they have invested in marketing by becoming a NANOG sponsor. It just goes to show how much money there must be in the IPv4 address game.

internet traffic growthI am more familiar with Sandra Brown and the IPv4 Market Group who very generously sponsored the LONAP dinner last month. LONAP usually sends a couple of people to the NANOG meetings because they are very good recruiting grounds for new members. Most of our big members have come on board as a result of relationships developed at such meetings.

If you are in NANOG this week do take the opportunity to look up Will Hargrave and Richard Irving who will be there representing us.

Categories
Business engineering internet

Cisco v Arista

Cisco Arista court case gets judgement

Cisco Arista court case gets judgement in favour of Cisco.  Quite an interesting spat going on in the big wide world of internet plumbing and routing at the moment. Cisco are suing Arista for patent infringement and have been given a judgement in their favour.

Now it seems to be the norm for big companies to go about suing each other these days: witness the long running Apple v Samsung saga, or Samsung v Apple – take your pick. This is no change to the status quo really. Many years ago when I was in the semiconductor business I once got a letter (yes letter) from AT&T or some similar long established telecoms giant saying that we were infringing a patent of theirs. We were using a CMOS process and they assumed that because of this we were using technology that they had patented.

They probably sent them out to every semiconductor manufacturer fishing for a response that they could grab hold of and drill deeper. I threw the letter in the bin and heard no more of it.

AT&T had a revenue generating department that specialised in doing this sort of thing – their patent portfolio was huge.

Nowadays the stakes are very high. Cisco are still market leaders (ref Gartner Magic Quadrant – Who’s Leading The Data Center Networking Market) but Arista are the fastest growing and together with Cisco hailed as leaders.

There are three reference points in respect of this court case:

  1. Cisco’s Mark Chandler (SVP, General Counsel and Secretary General Counsel) in a blog post on protecting innovation naturally takes the line that “copying and misappropriation are not a legitimate strategy”.
  2. Arista founder and CTO Kenneth Duda obviously has his own views here.His blog post entitled Protecting IP or Market Share?  is well worth a read.
  3. The third reference point, apart from the judgement itself is the online outcry from the internet engineering community. The feeling is that there is prior art that covers the meat of what Cisco are claiming as their own patented technology. There is also a sense that the patent authorities do not have sufficient expertise to vet a patent application and that we have to wait for expensive law suits to prove prior art.

Now there’s no way I’m going to get involved in this discussion (apart from the fact that I sort of already have here) other than to say that the only people who will do well out of this will be the lawyers – how much did that blog post cost Cisco? I doubt that it will make any difference to anything in the great scheme of things.

Note when we talk about data center market share we are talking about the core of the internet.

Categories
Engineer peering

LONAP networking dinner is great success @JoeBaguley @LONAP

Industry peers get together for LONAP networking dinner

The LONAP networking dinner held in a private dining room  at Kettner’s last Thursday night was as usual a huge success with guest speaker VMWare CTO Joe Baguley providing some stimulating thoughts for debate. Joe was speaking about Network Function Virtualisation.

LONAP as you may know is an Internet Exchange Point (IXP) of which I have the honour of being Chairman. Now the whole point of an IXP is to provide eyeball networks and content providers a meeting place for them to share their network traffic (peer) cost effectively and get the best performance out of their networks. The typically lower latencies obtained by peering at an IXP result in the best experience for their end user customers.

Joe Baguley in his talk highlighted an interesting use for NFV that was highly analogous to the way an IXP works. He discussed the scenario where a betting firm could set up a virtual network at the datacentre closest to a specific sporting event. This would in theory give the betting firm’s customers the fastest response time and best experience. ie help them to lose their money more quickly.

Once the event is over they just tear down the virtual network. A click of a virtual switch. Highly cost effective.

Virtual network functions we are told are just as good as hardware implementations these days. When you think about it unless your need requires high end state of the art ASIC silicon everything is realisable in software these days.

These LONAP networking dinners are always successful, helped on this occasion by the very generous support of the IPv4 Market Group (IPv4 address proker) and Xantaro (network integrator). I think both sponsors will have had great value from the exposure into a fast growing and high spending community of network operators. Take a look at their sites.

The attendees were a great mix of LONAP members and non-members/prospects ranging from small but agile communications providers to some of the biggest eyeball networks and content providers in the country.

These are top class networking events. If you are in this business, a LONAP member or otherwise, look out for the next dinner which will be sometime in the spring. If you want to sponsor a LONAP networking dinner by all means drop me a line. Vendors get really good exposure into a wide network engineering community.

Last week’s dinner did have a hint of that end of an era feeling. It was the last  week  of trading for Kettner’s, a legendary Soho bar that has been around for 149 years. Kettner’s has been sold to the SoHo House Group who are turning the whole block into a hotel. This is a shame because I’ve been holding private dinners for a few years now and only discovered Kettners in the last year. I’ll have to find another venue.

The sadness at the closure of Kettners was tempered by the fact that because they had been running down stocks of wine we got the most expensive plonk on the wine list for the lower price of the wine we had ordered but which had run out:)

Ciao amigos. Keep peering! A few pics of the evening below including some colourful ones taken en route. Oh and a big thank you for Joe Baguley for coming along and speaking:) Loads of peering content on this blog if you want to read it.

LONAP networking dinner

LONAP networking dinner
LONAP networking dinner guest Joe Baguley gets animated

LONAP networking dinner

LONAP networking dinner

LONAP networking dinner

Categories
Engineer engineering internet

UKNOF33 – live action from the conference room floor

UKNOF33 is happening today at Bishopsgate deep in the heart of the City of London

UKNOF33 returns once more to Bishopsgate. It feels a bit odd for what are obviously great bunch of guys and gals, famed for their altruism and generous heartedness to be holding a conference deep in the heart of the financial centre of London – a place known for its single minded pursuit of the filthy lucre purely for the sake of it and (allegedly) at the expense of all moral consciousness. That isn’t to say your average network engineer isn’t interested in the green stuff but we do like to think that we perform a good public service as part of the deal.

Nothwithstanding the location, which due to the growth of the conference is one of the few places able to hold all the people wanting to come, UKNOF continues to be one ofthe most worthwhile meetings in the networking calendar.

These UKNOF posts, in line with other conference posts, aren’t necessarily going to cover the presentations verbatim. You can download the slides if that’s what interests you. No, in these posts you get whatever catches my eye. This might be corridor gossip, interesting (editor’s judgement is final as to what constitute interesting) snippets from the talks, or just photos of things that catch my eye.

Feel free to share, comment and generally participate, if you want to. Otherwise it’s good to be back 🙂

If yer interested check out our other UKNOF posts.

Categories
Business ecommerce google

The local wide web and the Rangemaster cooker service

Rangemaster cooker service – does your cooker need one?

trefor.net is back in action for 2016 after a very refreshing Christmas and New Year break. Most of you who are friends on Facebook will have seen what I’ve been up to and you can follow my daily non-work-ish diary over on philosopherontap.com. In the meantime I offer you a short not too onerous post on web presence and Rangemaster cooker service.

We have a Rangemaster cooker. For the uninitiated the Rangemaster has two ovens, a grill, five gas jets and a hot plate. It is extremely useful kit for a family with four kids. This is especially the case at Christmas but before the festive season kicked in we had a problem with one of the ovens not working properly. How on earth does one manage with only one oven at Christmas? I’m not sure it is doable.

So one day I got to “get cooker fixed” on my jobslist and did a search for “Rangemaster cooker service Lincoln”. Google came up with a very comprehensive looking site that said it had engineers in our area. It looked a bit too comprehensive for sleepy ole Lincoln and my suspicions were aroused.

I then did the same search replacing “Lincoln” with “Brighton” and came up with the exact same site but this time portraying itself as a local to Brighton. Now there’s nothing wrong with a business being able to do this. It’s making great use of tinterweb to generate business opportunities. However when I’m looking for a cooker repair man I want a competent local guy who can do me a good job at a fair price without involving layers of middlemen and commissions.

The website was ignored and I popped into the local Aga gaff thinking they were the same company. There didn’t do Rangemaster but the guy gave me the name of a man who can. I rang the man and he came around the next day to advise me that I needed a new regulator (sucks in teeth).

Now whilst there is a place for location independent services on the www we have to remember that there are some times when all we want is to be able to pick up a good old fashioned (VoIP) phone and call the bloke down the road for help. The local wide web.

Happy New Year y’all…

Oh btw apparetly cookers don’t get serviced. They get repaired – there’s nothing to service. Also here’s a tip for you. Don’t put cast iron bits off the gas rings in the dishwasher. They get corroded and hinder the spark lighting function.

Also the real point to this post is that local firms need to start thinking about how they market themselves online. Innit.

rangemaster cooker repair brighton

Categories
food and drink Weekend

Tref is on holiday

Back roughly the third week in Jan. Hope your Christmas is a goodun and that Santa brings you everything on the list, always assuming you’ve been good during the year.

In the Davies household we will have a full deck of kids back for the holidays so we are all looking forward to that.

Also I will be working on AnnesVans.com so keep your mince pies peeled for that early in the new year.

If I can offer any advice on how to survive the holidays it is be sure to drink to excess, eat too much and lie in excessively late every day, small children permitting.

If you are anywhere near Lincoln on Wednesday 23rd December you are very cordially invited to my annual carol singing session in the Morning Star – details on the Facebook events page here. It’s a great evening, assuming you like beer and singing Christmas Carols.

If we are lucky the evening may also evolve into a jazz session once the carol singers have exhausted their repertoire.

See ya in 2016 🙂

Categories
fun stuff Weekend

trefbash 2015 is today – SOLD OUT

trefbash 2015 est arrivee

trefbash 2015 is a sellout, as usual and I’m looking forward to meeting y’all. Hopefully the theme of Bond meets Rocky Horror will have given people food for thought. Early indications are positive.

Don’t expect much feedback tomorrow as trefbash has traditionally grown into a two day event. Doors open tonight at 6pm and revelry continues until the official 2pm ish closing time.

Tomorrow morning (9 – 9.30 ish) we will be at Silvas on Shaftesbury avenue for one of the best greasy spoon breakfasts in London. In fact it’s almost a travesty to call Silvas a greasy spoon but hey…

Past performance suggests we will then find a pub and carry on the party. I’m on the 15.08 home from town on Friday.

trefbash marks the end of activities for the year for the blog. There will be a video released at some point hopefully next week once the dust has settled. trefbash 2015 also has a Facebook photo Album. You have to be a friend to post pics there but I guess if you are coming tonight that qualifies you for friendship. Just invite me and I’ll accept.

If you are coming tonight see you there. If not too bad – sgonna be a goodun. If you’ve never been to a trefbash you can see what you’re missing in these previous years’ trefbash posts.

Categories
Business scams

Telecoms Fraud, Liability and Responsibility: A Contractual Approach from a Telecoms Specialist Lawyer

Telecoms Fraud Liability and Responsibility

Danny Preiskel of Preiskel & Co is one of the world’s leading telecoms lawyers. In this final post of Manuel Basilavecchia curated posts on telecom fraud Danny looks at the subject of telecoms fraud liability from a legal perspective.

Considering the devastating effects telecoms fraud can have on a wholesale or retail telecoms business this post looks at some of the legal aspects and provides some guidance to minimise the impact from a contractual perspective.

Civil Litigation for Civil Fraud

Successfully suing in civil litigation for fraud and recovering damages is only possible in certain circumstances, and with fraud being notoriously difficult to prove, the risk of losing in court and being liable for the defendant’s costs often outweighs the potential award of damages.  This is exacerbated by the fact that even if the telco victim is successful, the defendant company may not have the funds to actually satisfy any judgment awarded.

As with other jurisdictions, English law also allows shareholders and directors to hide behind the veil of incorporation.  Only in limited circumstances will the English courts pierce the veil of incorporation to convict or fine the individual shareholders behind a company, though directors can incur liability in addition to the company.   Typically in the UK we have seen that fraudsters can simply re-appear and commit more fraud by hiding behind another company name.

Another legal principle which may accidentally protect fraudsters is the privity of contract doctrine, whereby contractual obligations are only due to the contracting party and not its sub-contractors. For example BT fraud department will usually not deal with carriers with whom it is not directly contracted with. This can be problematic as often BT’s call records as well as the knowledge and actions of its fraud department can be hugely useful.

And finally, there are the UK insolvency laws which make it hard and expensive to recover monies from a company in liquidation or administration.

Insolvency Proceedings

Insolvency proceedings in the UK involve an application to court for the winding up of the company, usually after service of a Statutory Demand; and the appointment of an insolvency practitioner (to collect and distribute amounts for all the creditors).  

If the insolvency practitioner is not convinced there are sufficient funds in the insolvent company then it will ask the company appointing it to guarantee its costs. Whilst this is understandable it can be a huge disincentive bearing in mind that any amounts recovered by the insolvency practitioner will be for the benefit of all the creditors. It is not just in the telecoms sector that it is rare for creditors who are unsecured to get any meaningful percentage recovery.

If an insolvency practitioner is funded then it could potentially sue the fraudulent director and attempt to get a recovery as well as make a report recommending the person be disqualified as a director for several years. However the harsh reality regarding insolvency related proceedings in the UK, means that the failure to properly fund an insolvency practitioner often results in a director getting away with the telecoms fraud.

The Telecoms LCR Chain – Profiting From Fraud

When it comes to the wholesale industry we find ourselves in the curious position that, often it is not just the perpetrator of the fraud who seeks to profit. Understandably carriers in the chain want to be paid in full (including their profit margin), meaning that they profit from fraud, albeit not a fraud they have committed themselves. In essence it can be quite galling for a carrier that has been left with a gaping revenue hole, to have its supplier insist on recovering not only its cost of transiting the traffic but also its profit margin.

Contractual Protection

Please consider the important recent case Frontier Systems Ltd (t/a Voiceflex) v Frip Finishing Ltd [2014] EWHC 1907 (TCC), where the Court required the telecoms carrier to be liable for the calling costs, even if the traffic was fraudulently generated.  We advise that in light of this judgment in particular that carrier review carefully and make amendments to their end user and wholesale agreements.

Carrier contracts should not only exclude, to the fullest extent permitted by applicable law, all express and implied warranties but should require the other party to be responsible, even if traffic was fraudulently generated by a third party.  Looking up the supply chain, we advise our client carriers to require that the supplier’s systems should be set to block fraudulent traffic and accordingly be liable in the event that they fail to block such fraud, even if it has passed through our client’s system undetected.

There is a lot to be said for such provisions to avoid uncertainty at the outset, minimising our clients’ exposure in terms of liability whilst importantly drawing the carriers’ minds to implementing appropriate anti-fraud measures before exchanging traffic.

What the Industry Can Do

Beyond the various technical measures (not mentioned in this blog note), the blocking of certain destinations by the way of default and some anti-fraud security provisions in the contract protecting the single carrier, the telecoms industry should consider an industry code of practice:

agreeing to help other carriers in the chain in identifying the fraud, even though there is no contractual relationship;

agreeing not to profit from fraud, i.e. take out profit element of charges;

appointing industry representatives to have a better working relationship with the fraud sections of the police and the regulator;

allowing companies to refuse to pay up the supply chain where there has been fraud suspected, albeit subject to certain provisos to ensure that nobody unduly benefits in such case;

providing a reseller kitemark approach to help combat dial-through fraud (e.g. the FCS’ fraud group that Preiskel & Co helped set up; or the International Interconnection Forum For Services Over IP (I3 Forum))

considering an industry fund to make a contribution towards costs of bringing enforcement action against fraudsters

identifying a cost effective insolvency practitioner who understands the industry

This concludes telecom fraud week on trefor.net, edited by Manuel Basilavecchia of Netaxis. Read our other fraud posts from the week:

Colin Duffy on “is encryption the answer to data loss
Manuel Basilaveccia on Missing Trader VAT Fraud
Dave Dadds – “telecom fraud is industry’s problem not the customer’s
Manuel Basilavecchia on “A mobile operator fraud case study
Jonathan Rodwell on “Telecoms and IT Security” and with part 2 here

Categories
Business scams

Jonathan Rodwell on Telecoms and IT Security part two

SIP Trunk Plus CEO Jonathan Rodwell in Part two of his posts on Telecoms and IT Security

Fraud week sponsored by Netaxis continues with part two of Jonathan Rodwell’s post on Telecoms and IT Security. In part one Jonathan discussed “Telecoms and IT security in the UK” together with “Technical best practice”.

The second post  concludes with  “the human wild card” and says “we need a new way of thinking”

The weak link?

The elephant in the room is the weak link in all telecoms/network scenarios. Us human beings. The bigger question being that if the ‘human’ wildcard element cannot be controlled, can any network (Telecoms or otherwise) ever be truly secure?

I suspect that even some of the most technically astute individuals cut corners.  We just can’t help ourselves sometimes. Using similar passwords on email accounts perhaps?  Not bothering with voicemail passwords?  User log on credentials that are not sufficiently robust?  No matter how robust a technical architecture is when people cut corners they expose their business to another’s malicious intent.

Larger organisations certainly have more tools at their disposal to exercise greater control over protecting their services, or offering training and technical solutions to manage passwords and so forth. But even they face challenges, particularly when staff bring their own devices onto the network.  Larger organisations often present a more attractive target to groups of individuals intent on hacking. It is generally accepted that if a group of skilled individuals with sufficient resources wants to penetrate your security, they will undoubtedly find a way. TalkTalk can tell you all about it.

As Telecoms providers, we know that as our service is predominantly IP Based, our clients and our businesses are exposed to potentially massive costs.

Both The Federation of Communication Services (FCS) and the Internet Telephony Service Providers Association (ITSPA) understands these challenges and is working with industry experts, the police and stakeholders across the board to try and help mitigate the potential risks. The FCS have a Fraud panel dedicated to working with industry professionals to help deliver best practice. ITSPA work closely with the likes of Action Fraud and the Metropolitan Police. 

FCS’s experience is instructive:  less than two years ago, fraud was a taboo subject at FCS meetings.  No business CP liked to talk about it, for fear of admitting weakness to their competitors.  Today it’s the industry’s number one pain-point.  

These trade associations provide a single voice for their members to Ofcom and to policy-makers. This protects members from the risk of individual damage to their brands. 

What can we do?

This all seems somewhat daunting, particularly for the small business owner – remember, the challenges for a multi-national are immense, too. So where do we start? A good place is the set of recommendations from GCHQ: The Cyber Essentials Scheme. Essentially, this focuses on protecting against Internet-Originated attacks against IT/IP Comms services. Cyber Essentials focuses on five key controls:

  1. Boundary Firewalls and Internet Gateways – devices designed to prevent unauthorised access, and setting them up effectively.
  2. Secure Configuration – of systems relative to the needs of the organisation.
  3. Access Control – Ensuring appropriate permissions within systems, with sensible passwords.
  4. Malware Protection – Ensuring it is installed and correctly maintained.
  5. Patch Management – Ensuring they are applied and utilised this is particularly pertinent for users of all PBXs. They need to be patched as much as any other network device.

 

This is all perfectly sensible and a good starting point, especially if your staff are office-based, but many businesses in 2014 support flexible working environments, such as staff who work from home and so forth. Indeed, some businesses do not have offices at all; so consider item 3: how do you control access when a home internet service is provided by BT or Sky and they have direct access to the router? If your IT support is provided by a third party, what happens if their own security is penetrated; are you vulnerable too?

BYOD (Bring Your Own Device) adds a further layer of complexity when employee or visitor devices are allowed access to the network. Companies must balance the benefits versus the risks and what mitigation can be implemented (realistically) on a technical basis.

Suppliers must emphasise and help implement best practice when it comes to the protection of PBX and handset architecture. Granted, some end clients are more willing than others to be proactive on this front, but suppliers have an obligation to emphasise the security protocols that can best protect the PBX and handsets (essentially network devices). Suppliers should also take some expert advice when it comes to their client contracts, with terms and conditions requiring specific attention paid to liabilities in case clients simply do not implement best practice.

Carriers and Telecommunications providers are in an interesting and powerful position in the equation. The carrier position is interesting because they can in theory, actually benefit from Telecoms Security breaches – a £20,000 phone bill still has to be paid after all, be it by the resale partner or by the client. Moral issues aside, the dilemma arise when fraudulent activity places the client’s business in jeopardy: if a business folds, then recovering the money becomes a much harder proposition. This is not to suggest that carriers encourage fraud, rather that history has shown that the responsibility of managing security and cost has always been pushed down the supply chain. Most carriers, at best, offer simple credit limiting or algorithmic analysis of traffic patterns.

The industry has a responsibility to do more, not just from an ethical point of view, but by offering enhanced protection at the Carrier level.  Doing so means changing the whole dynamic between resellers and end clients. If we can empower both the end client, and the reseller to control in real time the volume of minutes to every possible global destination (or group of destination), we can ensure end clients will always know what their maximum liability would be. This is minute limiting for the global business environment that is both dynamic and at the control of both key stakeholders – the business and supplier chain.

Consider now the dynamic of the supplier / client relationship if ‘cost of fraud’ wasn’t an issue. How would your approach to IT and Telecoms security change if a business-crippling financial penalty wasn’t threatening to be the end result of a security breach?

If the acceptance of ‘risk’ becomes easier to tolerate because there is a layer of protection and mitigation delivered through the telecoms supply chain by partners who are proactive, rather than reactive, then choices made by end clients become simpler, and could actually be different.

This can be taken a step further, so much so that if we accept that there is no perfect system and there is always a risk, then we can decide which method of working, or what telephony connectivity represents an acceptable level of ‘risk’. Clients can then assess the practicality of a heavily locked down infrastructure versus the ability to be dynamic and innovative in working practice.

We are not advocating businesses becomes an open door to hacks, rather that the whole supply chain can be chosen to facilitate a sensible approach to IT and Telecoms security that is simple to manage and doesn’t become a rod to the back of a business.

Thought leaders for the future

So what do we do about it? Well first of all, there is no perfect solution. If you admit to yourself and accept that people by nature will always be the weak link when it comes to telecoms security, then how you deal with peoples’ nature will be the defining aspect of IT and Telecoms security for your business, either globally or domestically.

Accept the view that once a file is emailed, voicemail sent out, or words have left your mouth, you have ultimately lost control over them. From that point on they can be copied, re-purposed and distributed without your permission on an exponential scale. Within Telecoms security however, you can at least limit the financial damage to an almost negligible level.

We are therefore in a more fortunate position than our friends in the IT and Data security industry where personal information, intellectual property and company data stores are also at risk.

It is time for the telecommunications industry to regain the initiative, the ‘old way’ of doing things, and the old business paradigms the industry that apply brakes to progress. Instead of playing catch-up and adopting a siege mentality, we have to change the way with think about security. Acceptance of risk, balanced with technical mitigation solutions should be weighed against the potential cost of a security penetration.

Suppliers and clients must be both pragmatic in the implementation of security protocols, and both parties must understand their responsibilities and the corresponding risks of waiving them. This is certainly an matter of education, and business owners have a responsibility to take the time to understand what those risks are, as there are currently no formal benchmarks in the industry currently that relate to telecoms security to guide selection.

A crucial step to understanding your risks and developing a strategy that suits your business is obviously working with the right supply chain: Partners can be trusted advisors to business owners and IT specialists, that offer the right solutions, even if those solutions don’t necessarily come from an established brand that has been around for decades. Telecommunications has become a managed service.

We are now, more than ever, part of a corporate ecosystem of applications. The more you lock it down, the more you dampen the dynamism and creativity within a business. So think carefully about how you deliver services to your clients.  Deliver value and don’t be afraid of breaking from tradition.  Learn from the past, but don’t be shackled by it.

This is telecom fraud week on trefor.net, edited by Manuel Basilavecchia of Netaxis. Read our other fraud posts this week:

Colin Duffy on “is encryption the answer to data loss
Manuel Basilaveccia on Missing Trader VAT Fraud
Dave Dadds – “telecom fraud is industry’s problem not the customer’s
Manuel Basilavecchia on “A mobile operator fraud case study
Jonathan Rodwell on “Telecoms and IT Security

This second post is an adaptation of an article first published by Jonathan Rodwell last year in the Journal of the Institute of Telecoms Professionals but is only available to members behind a firewall.

Categories
Business scams

Jonathan Rodwell on Telecoms and IT Security

Telecoms and IT security in the UK and Technical best practice

In an excellent and wide ranging two part series, SIP Trunk Plus CEO Jonathan Rodwell dives into the world of telecom fraud. In this first post he looks at Telecoms and IT security in the UK and Technical best practice.

Executive Summary

Telecoms and IT security is a massive industry in 2015, but the lack of security and the results thereof are talked about much more quietly. Instead service providers and technology delivery partners prefer to speak of uptime, and resilience. It is hardly surprising that what we don’t hear mentioned is who suffers from fraud. Big consumer data breaches hit the headlines frequently though only vast corporations like Target, TalkTalk and Sony really hit the headlines of the business community. Target was the result of a third party supplier breach but the snowball effect affects the entire business community.

Fraud is perpetrated every day. We fear being the victim but the reality is that often we are the problem as much as we are the solution. The IT and Telecommunications industry’s challenge is to effectively address the “elephant in the room”.  Talking about fraud with clients is interesting because service providers don’t want to sell on ‘fear’. Yet, at the same time, when they provide only one aspect of client infrastructure (e.g. telecoms), they may have no direct control over the infrastructure or the end user’s business or employees. When ‘fraud’ is perpetrated the initial and historical reaction is ‘fire fighting’ by identifying the cause and implementing a solution. Finally, they determine who gets the blame. One thing is certain, regardless of ‘fault’, the provider’s brand is damaged simply by association.

This first post is an examination of:

  1. The Telecoms and IT security in the UK
  2. Technical best practice

 

The second post  addresses:

  1. The human wild card
  2. We need a new way of thinking

 

Perfect solutions may not be available, but by removing the most painful and immediate result of a telecoms security breach – the financial cost – companies can change the way they approach security. Removing the risk of an expensive pay-out – which a service provider does not want to request, nor a client receive – massively changes the dynamic of the whole security equation.

By removing the risk, core stakeholders can then (in theory at least) work together in a cooperative, and constructive ways to firstly, ensure that a process of best practice is implemented, but also ensure that the cause of most hacks – human error – means that scapegoating and blame can be turned into a justification and positive reinforcement exercise that strengthens the client’s focus on increasing their information and network security across the board. Happy clients mean happy service providers and protection for the industry’s reputation.

Telecoms and IT security in the UK – where are we today?

In 2015, Telecoms and IT security are one and the same. A Legacy or IP PBX, or IP handsets are simply network devices that can provide huge business benefit and are crucial to most business operations. They are, however, devices that must be managed carefully along with every other network device so that they are not open to misuse. Similarly to the Local Network, infrastructure services like ISDN and SIP Trunks must also be managed, and some legacy services such as ISDN have more inherent risks associated. PBX security does not happen ‘out of the box’, it requires careful planning and control of both the network and connectivity.

Worldwide spending on Information Security showed an increase of 7.9 percent on 2013 and is predicted reach $71.1 billion in 2014 and to grow a further 8.2 percent in 2015, with roughly 10% of security capabilities delivered through cloud services1. Malware and processing power are available on an industrial scale at relatively low cost and businesses must prepare themselves to prevent becoming targets.

An enormous telephony bill at the end of the month, for some, could be the only indication that they are the victim of Telecommunications fraud. A frightening situation for anyone – be it the business owner or the IT Manager responsible for making sure that such a situation doesn’t happen. What is the initial reaction? Apportion blame? Deny liability for the costs? Fire a supplier or an employee? Contact the police or seek remedy in court? Two things are certain, a business will not be happy to pay such costs; and the resulting fallout can destroy even the longest standing business relationships.

The first question is what we can define fraud as? Is it simply exploitation of third party resources for financial gain? Or does it also extend to company employees costing their employer more, by extending their use of services provided by the company for personal benefit? We work on the basis of the full definition and focus on any expenditure that would not have been authorised by a company (in relation to their Telecommunication systems) is fraud.

Experience to date shows that the costs of fraud often never see the light of day. The reporting rate to the police the Action Fraud Bureau is just the tip of the iceberg. The Telecoms industry has been forced into a position where liability is the responsibility of the end clients simply to protect their own businesses, which in turn stimulated the development of the entire Info Security industry.

European Commissioner Neelie Kroes, Vice President for the Digital Agenda, was typically direct in her views of the Telecommunications industry: ‘Sometimes I think the telecoms sector is its own worst enemy.’ She went on to ask whether we will be leading the industry or whether we will be dragged ‘kicking and screaming’2. This may seem negative, but the Telecommunications industry has been around for over a hundred years, and like many mature industries, change can come very slowly.  While consumer telecoms, driven by the likes of Apple and Samsung, has commoditised the industry and radically adjusted consumer perception, the more traditional business to business market moves much more slowly.

The business and technical challenges

The fact is that we, as providers of telecommunications services, are providers of business critical services; the security of which we don’t necessarily have control over. This seems counter intuitive, doesn’t it? However, the challenge does not end there; types of exposure to fraudulent activity can vary significantly depending on a number of factors, not the least of which is the actual size of organisations.

For example, a company with 5 employees may have no IT expertise in house; they could rely on outsourced network support (or no network support at all) and leave themselves exposed on a variety of levels. A FTSE100 company on the other hand, may have an IT department consisting of dozens (or even hundreds) of staff, with a multimillion pound budget, but the sheer volume of devices that access their network and potential complexity of the network alone doesn’t offer them certain protection. Consider the recent cases of Home Depot and Target in the US, for example, who were penetrated at the point of sale at a cost to their own brand and their bottom line.

So what are the key considerations when it comes to telecoms security?

An onsite PBX is inherently vulnerable.

Physicality – As we know, unless equipment is in a secure environment with biometric and prescribed access control procedures, the PBX can be accessed and call routing tables amended. Note that organisations such as the NICC refer to a plethora of documentation in respect to best practice for such installations; however, how many companies are in a position to adopt such best practice?

Unauthorised access can be gained by anyone, from a systems administrator to a cleaner.

Remotely – many PBX’s are connected to the internet to enable remote access from their providers and to interface with cloud servers such as Jabber for IM and contact centre technologies, for example.

The first challenge is securing the local network, such as blocking port 5060; however, who controls the network? Is it the IT support company (in-house or contracted) or the communications provider? More often than not it is both – two brains potentially acting separately. This creates grey areas of responsibility as demonstrated by a recent High Court case where £35K of fraud was held against the communications provider.

There are two principal methods by which fraud is perpetrated:

  1. Hacks over the internet
  2. Dial-through fraud – Hacks via voicemail pin

 

Both of these methods aim to divert traffic to premium rate numbers (usually international) whereby the fraudsters are rewarded with the profit generated from such numbers.

What about at a national and global level?

Typical Methods of Prevention

The Telecoms supply chain can be very complex.  A carrier provides minutes to a sub-carrier and in turn to a reseller and in turn to, say, a SIP trunk provider and then again to the end client, or indeed another reseller. There are many combinations and permutations in the supply network.

What about at a Carrier Level?

Responsible carriers will offer protection using two principal methods:

  1. Referring to a fraudulent number repository – and blocking calls to such destinations
  2. Algorithmic – detecting unusual traffic patterns and blocking calls accordingly.

 

At Sub-Carrier Level

  1. Credit Limits – Imposing credit limits on resellers globally

 

The only real way to protect against fraud is the intelligent and real time monitoring of call traffic via Call Detail Records, or the logging of minutes. The challenge the reseller community has is that they are reliant on carrier provided monthly CRDs which only deliver the information after an incident has taken place, over a period of time. A very large cost can be accumulated in the space of an hour, let alone a month.

There is a major consideration too for the reseller community: They will have a company credit / supply limit with their SIP Trunk carrier globally. If that reseller hits their credit limit an automatic block on their services is implemented (automatically); that could potentially mean a block on all of their clients trunk services – a total service outage in effect. It is absolutely crucial the telecoms channel be able to manage their client base at a granular level and in real time.

This is telecom fraud week on trefor.net, edited by Manuel Basilavecchia of Netaxis. Read our other fraud posts this week:

Colin Duffy on “is encryption the answer to data loss
Manuel Basilaveccia on Missing Trader VAT Fraud
Dave Dadds – “telecom fraud is industry’s problem not the customer’s
Manuel Basilavecchia on “A mobile operator fraud case study

This post is an adaptation of an article first published by Jonathan Rodwell last year in the Journal of the Institute of Telecoms Professionals but is only available to members behind a firewall.

In his second post, to be published tomorrow at 1pm Jonathan conclude by looking at

  1. The human wild card and
  2. We need a new way of thinking

 

1 Gartner Press Release, Sydney, Australia, August 22nd 2014
2 Adapt or die: What I would do if I ran a telecom company, FT ETNO Summit 2014, Brussels, October 1st 2014

Categories
Business Mobile scams

Mobile operator fraud case study

A Mobile Operator Fraud case study but it could apply to any type of network

In this article this week’s guest editor Manuel  Basilavecchia of Netaxis describes a mobile operator fraud – in other words a telecom fraud that impacted a mobile operator. He describes the type of traffic pattern (destinations) and fraudster behaviour. For obvious reasons we are keeping the name of the operator out of it. It could happen to anyone dropping their guard.

The mobile operator in question underwent some planned maintenance work on its network.  Few details are available on the nature of the planned work but from a security point of view the activity was a total failure as the following day their switch was accessed from outside their network. We may assume that the planned work cleared the access list on the SBC/firewall.

Once the fraudster had access to the switch, he initiated some test calls. The goal was to check if it was possible to terminate traffic to specific destinations. To avoid detection the tests calls were kept to a low volume.

It is important to note that the hijack and the test phase took place on weekdays. On the Friday evening, fraudster rolled up his sleeves and got on with the real work of sending volume traffic to several destinations.  

The traffic pattern was as follows:

  • Fake CLI’s used like 1001111,1000001,123456; etc
  • Massive calls to Latvia, Lithuania, Moldova, Gambia etc….
  • Big volumes generated per CLI

The fraud was detected the next day in the morning by a service provider of the mobile operator. The time elapsed between the beginning of the fraud and the detection allowed the fraudster to generate quite high volumes.

As it was a week-end it was difficult for the SP to get in touch with the mobile operator to inform him about the ongoing fraud and to align on measure that needs to be taken. Again here, few hours lost which benefits the fraudster……

Once the decision to block fraudulent traffic has been taken a game of cat and mouse started. Indeed,  when the fraudster identified that a destination was not generating revenues due to barring implemented, he immediately and simply switched to targeting another country. The same principle applied for CLI’s. Any time he noticed that a CLI was blocked he just moved on to another. This game lasted the entire day.

On day two, a major change in the destinations targeted was seen: Nauru, Senegal, Maldives Zimbabwe was now part of the fraud scheme.

Again, barring had to be implemented on the targeted destinations. It is important to note that the barring had to be implemented so as to stop fraudulent traffic but without impacting the legitimate traffic

In parallel, the mobile operator attempted to solve the security breach which took some time.  Once the issue solved on the SBC, fraudulent traffic finally stopped.

Lessons learnt:

Security is key to protect  a network and in the case where a modification is made to a SBC, a cross check needs to take place after the intervention

Based on the short time between the planned work and the hacking it is clear that networks are scanned by fraudster to find an open door.

Fraud monitoring needs to be made live or near real time to minimize the impact and this 24 x 7

Barring solution must be available to stop fraud. This barring solution needs to be flexible (A number, B number, range, destination).

This is telecom fraud week on trefor.net, edited by Manuel Basilavecchia of Netaxis. Read our other fraud posts this week:

Colin Duffy on “is encryption the answer to data loss
Manuel Basilaveccia on Missing Trader VAT Fraud
Dave Dadds – “telecom fraud is industry’s problem not the customer’s

Categories
End User scams

Telecom Fraud – industry’s problem not the customer’s

Industry needs to take ownership of telecom fraud says VanillaIP CEO Dave Dadds

The ongoing “quiet” debate about telecom fraud which for the Voice Carriers and Resellers in the UK typically shows itself in the form of “dial through fraud” is a continued ongoing discussion, but the truth is that it is everyone’s dirty secret.

We all know the ways dial through fraud typically happen by either the PBX being hijacking or impersonating the SIP credentials, then big bills being sent all the way down the chain typically ending up on the customer doorstep.  

The first thing I would say is this is not an end user problem, why should the customer be expected to know the inside out of the black magic art of telecoms to somehow work out how to stop it? If the banks turned around to us and told us all that our next credit card fraud is our problem to sort we would rightly tell them where to go.  No, this problem is for the industry to sort out and get its house in order and start spending the money to resolve the problem. It would also help if our regulator Ofcom took more interest in this issue rather than just passing the buck.

Why this is everyone’s “dirty secret” is because no vendor is keen to talk about how much they have been hacked for as they see it as a loss of face and a reflection of weakness in there system. This in itself means that the problem is being tackled with one hand behind everyone’s back.  The other major issue which does not always get asked is where exactly this money is being sent?  

Various stats are given as to how much this fraud is worth worldwide, millions, billions, trillions who knows but the key question is are we all funding ISIS?.  When this possibility is put in the ring this becomes not just a commercial concern for all of us but just as importantly a moral concern with the recent tragic incidents around the world including Paris.

The industry needs to get its act together and tackle the problem head on. Anyone that is running a SIP based network service these days will no doubt be putting their own preventative measures in place but the biggest leak in all of our cumulative “Buckets” is the fact that the large carriers continue to be happy to pay the out payments with NO questions asked.  If UK based carriers refused to pay their international partners this fraud would soon start to be stopped, we saw the change in the UK fraud market once out payments could be withheld for UK routed 09x, 08x and 070x numbers.  We ourselves today at VanillaIP see very little attempted fraud to UK numbers as there is no financial incentive, what a surprise!

As an industry we need to be putting a much brighter spotlight on the subject, we must all be prepared to talk openly about this problem and share best practice.  Both FCS and ITSPA have been working on strategies to help resolve this problem and we could all start by reporting all frauds through https://app03.actionfraud.police.uk/report/Account which is a website run by the City Of London Police and the National Fraud Intelligence Bureau.   We should push for greater engagement with the large carriers and the regulator as this is everyone’s problem. In reality there is absolutely no reason why we can’t resolve this to the benefit of everyone apart from the criminals and terrorists out there.

Dave Dadds ([email protected]) – is CEO of VanillaIP.com and Deputy Chairman at FCS

This is telecom fraud week on trefor.net, edited by Manuel Basilavecchia of Netaxis. Read our other fraud posts this week:

Colin Duffy on “is encryption the answer to data loss
Manuel Basilaveccia on “Missing Trader VAT Fraud

Categories
Business scams

Missing Trader VAT Fraud

Missing Trader VAT Fraud

Fraud is for telecommunication companies a wide problem. Several fraud scenarios are well know like IRSF, PBX hacking, Bypass, and could be managed using a Fraud Management System (FMS).

Nevertheless, there is a fraud mechanism that could severely affect the business of a company even if this company is using an FMS. This fraud mechanism is called Missing Trader VAT fraud and is a significant problem for both business and tax authorities.

This type of fraud becomes possible because of the way the VAT system works within the European Union. This article aims to describe the Missing Trader VAT fraud mechanism at least at the top level.

How it works?

As a first step, fraudsters create a company (telecom reseller in this case). As a second step, traffic is purchased and resold.  Following the normal VAT mechanism, VAT is charged to and recovered from the end customer by the fraudster.

Up to this point, everything is ok. However the fraudster then disappears before having handed over the cash to the VAT authorities.

This in turn can cause a problem for the innocent party who has handed over the VAT to the crooks because the taxmen believe that they can recover it from said innocent party. This is a major risk for the business, especially as tax authorities can apply penalties. 

They get you with the “should have known” clause. They repeated say that you must know your customer and your suppliers and you have to prove to them that you’re innocent – a reversal of natural justice.

It is important that you read the leaflet linked to below. If you do not take due care and HMRC can demonstrate that you knew or should have known that your trading was linked to fraudulent tax losses then you will lose your entitlement to claim the input tax linked to those transactions.

https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/366907/How-to-spot-missing-trader-fraud.pdf

missing trader vat fraud

In reality of course, when a MTIC is established, it is made is a more complex way than the basic principle described above.

Indeed, the fraud can be perpetrated on genuine traffic, meaning that no alarm will be triggered by the FMS. Also, a “clean” supplier with which a customer has business relations since years can suddenly enter in this bad game

Last but not least, in many cases several companies involved in the supply chain are complicit (buffers). This help to hide the full picture if the fraud and enable carousel mechanism.

How to detect Missing Trader VAT Fraud?

We have seen that this fraud can occur on legitimate traffic which makes detection more complicated. For that reason, a number of different checks must be made on various aspects of the workings of a business: legal, financial, and traffic analysis.

This is especially although not uniquely for new interconnections. Existing interconnections also should also be regularly checked.

Market intelligence is also a great added-value in order to avoid to connecting with suspect companies or companies managed by people who have had issues with tax authorities in the past

Considering the nature of this fraud it is important to set up alert processes across your finance, legal and fraud management departments.

Sources:

MTIC (VAT fraud) in VoIP- B.U school of law/Boston University, School of law Working Paper No10_03. Richard T.Ainsworth

ETNO/ Missing Trader Fraud. Telecommunications Industry Standard Risk Management Process

HM Revenue & customs/ Missing Trader Intra Community (MTIC). VAT Fraud presentation. Joanne Cheetam MTIC National Co-Ordination Unit . 2012

Categories
Bad Stuff Business security

Is encryption the answer to data loss?

Is encryption the answer to data loss?  Voipfone CEO Colin Duffy thinks not

The TalkTalk hack and subsequent data loss – and to a lesser extent the Vodafone hack only a few days later – bring the issue of data security and telecommunications into the news. In the media, much emphasis has been placed on the use of encryption as a line of defence against data loss. This is only very partially true – encryption is not a panacea.

When it is useful, the system has already been compromised, the data is already lost and can be worked on at the criminal’s leisure or sold on to more sophisticated criminals with the tools to decrypt it. Encryption is not perfect and through cryptanalysis it can be broken. For example, knowing that you are looking at a list of tens of thousands of postcodes that are encrypted with the same key can provide sufficient information to decrypt the entire list. Moreover, the encryption key itself then becomes a prime target for hackers.

Encryption is most useful when it is used to protect data transport over a hostile medium e.g. when data is exchanged between two parties over the Internet or a laptop being taken out of the office or situations where physical hardware can be stolen.

But inside private networks it is far less useful. This is because customer data is in constant use by multiple users – for billing, reporting, and customer support and by customers for updates and information. Customer databases need multiple entry points and authorisations for both human and machine access. Encrypted information is unencrypted on the fly by the computer which processes it. If the hacker gains access to that computer as a user the data is automatically unencrypted and visible.

Any breach that allows an attacker access to a component such as remote code execution and login access would also give them access to the encrypted data and the encryption key. There are very few remote attack forms where encryption would prevent data loss once the hacker has penetrated the system.

In these circumstances, encrypting data adds extra load on processors and systems, adds system and managerial complexity and cost and mostly does little more than provide a false sense of security. In reality, encryption of data inside networks is of most use not for the protection of the data, but from subsequent media accusations of security laxness.

Finally, encryption does not protect against the database deletion or interference.

For a limited number of risks, data encryption can bring some security value to a system, but for most it has no benefit whatsoever. Therefore it certainly isn’t a replacement for the other security measures – protecting access to systems, minimising SQL injection or code execution vulnerabilities. It has to be considered a last line of defence, added on top of all other reasonable measures.

Colin Duffy www.voipfone.co.uk

This week of telecoms fraud posts is edited by Manuel Basilavecchia of Netaxis.

Categories
Bad Stuff Business scams

It’s telecoms fraud week on trefor.net

Telecoms fraud – a massive cost to the industry

I periodically run themed weeks on this blog. This week it’s going to be a few posts on telecoms fraud, edited by Manuel Basilavecchia of Belgian anti fraud specialists Netaxis. Manuel has already contributed a post on PABX fraud during a previous fraud week.

The telecoms industry loses a huge amount of money to fraud. The total amount has been estimated to be in the tens of billions of dollars (see global fraud loss survey by cvidya). It is a problem that affects most businesses of any size. The worst aspect of the problem is that it often alienates service providers with their customers. The fault is often down to inadequate network security practices amongst end user companies who in turn blame their communications provider.

It is in everyone’s interest to do something about telecoms fraud but because these scams are usually perpetrated across national boundaries with multiple networks involved in the loop making any progress is a difficult thing to do. It is only the local communications provider who has the problem – of recovering the cash from their customer.

This week’s contributors include some heavy hitters in the industry including Colin Duffy of Voipfone and Dave Dadds of Vanilla IP. Keep your eye open for their posts.

First one goes live today at 1pm. Catch ya later…

Categories
fun stuff

RIPE71 Tuesday afternoon – international cyberwarfare – the internet as a field of war

cyberwarfare

This talk promises to be very interesting – is presented by  team from Leiden University

Categories
End User phones

In which I take a look at my new Oneplus 2 one week in

Oneplus 2 review – is the upgrade worth going for?

I took delivery of my new Oneplus 2 last Wednesday. Initial thoughts:

Screen already chipped – wtf??
I like the fingerprint recognition – works really well
Took a while to figure out how to close down the camera app
V cool button for selecting priority callers only
Much better phone directory lookup than Oneplus 1
I’ve kept the sms and hangouts functions in separate apps this time because merging the two in the Oneplus 1 didn’t work very well
the rough back on the phone is great

I didn’t need a new phone but the Oneplus 1 was starting to give me some grief in a few areas. It would quite often take minutes to look up people/phone numbers. The phone would sometimes not find a person I knew I had in my address book. It was hit and miss. Wasn’t like that when I first got it. I also made the mistake of merging the sms function with the hangouts app. This caused so much hassle in figuring which account to use when sending a text message. It may also have been the source of the problem of directory look up. I don’t know.

Because the Oneplus 2 didn’t break the bank at £270 or so I bit the bullet. First issue was it uses a nano sim which the Oneplus 1 doesn’t. I could have cut the sim down but figured it wasn’t worth the effort and went into the EE shop in Lincoln and got a new one. New sim worked straight away fair play. In the meantime I used the Oneplus 2 without a SIM.

Before originally deciding to sign up with EE I had considered running without a mobile number and getting a data only sim. Decided that this approach was a little too ahead of its time.

Screen defect on Oneplus 2

Now before diving into the improvements that the Oneplus 2 has brought it is worth saying that the screen has already got a defect in it. It’s very small and I can’t see if it is a chip but boy is it irritating. The problem is I suspect that the RMA procedure takes ages with Oneplus and I think I’m going to have to live with it. It doesn’t get in the way of the overall experience. I’m pretty sure it didn’t happen as a result of being dropped or bashed in any way. The Oneplus 1 went a year without mishap.

For an update on the screen issue please see this post.

Fingerprint recognition on Oneplus 2

The fingerprint mechanism on the Oneplus 2 is great. Works every time. I have both index fingers and my right thumb stored. It’s real progress. I still have the PIN number as a backup. It took me a while to realise that this function was worthwhile but now I use it every time and even find myself shutting down the screen just so that I can reactivate it with my thumbprint!

Oneplus 2 Camera

One of the most important features of a phone for me is the camera. I take a lot of pictures. Other reviews tell me the camera is an evolutionary improvement over the Oneplus 1. I guess it is though I can’t really tell the difference that much. One thing worth noting is that if you use the “photo” mode for hte camera it takes a while to take the picture. You have to hold the camera still whilst it take the photo. If you choose “Manual” more it still seems to do things automatically but doesn’t have the same problem.

A few observations. It took me a while (a few days) to figure out how to exit the camera app. There is no obvious x button and the android softkeys that allow you to go to the home page, go back or show open apps disappears from the screen when you are using the camera. Turns out you just swipe up from the bottom and these buttons reappear. This might be something adjustable in the settings but now I know what to do I can live with it.

I also discovered a “feature” whilst writing this post. If you have the phone locked in portrait mode and then take a landscape oriented video the video turns out at right angles to the way it should when viewed. I found this out after having posted four videos to Facebook. What’s more Facebook didn’t appear to have any mechanism for rotating the vids and none of the cloud based video editing services seemed to want to work. At least with the four videos of mine. Fortunately YouTube was reliable and I was able to rotate all four for inclusion on this blog. Check em out here.

Priority notification setting button

Dunno if that’s the right description for the button but on the left side of the phone is a small slider that has three settings. The first lets all calls and notifications through, the second just priority ones and the third none at all. In other words it blocks all communications. It’s a good way for quickly putting the phone in silent mode. Took me a while to get used to this but I then figured out that I could label specific people as priority callers by highlighting a star in their directory profile.

In principle this could be quite useful. I’ve set all the family as priority callers. This is a risk as my dear wife Anne has a track record of ringing during important meetings to discuss “tonights tea”. We shall see.

Much better phone directory lookup than Oneplus 1

You’ve already read my whinge about the directory lookup speeds in the Oneplus 1. Well this seems to be fixed in the Oneplus 2. It could just be that the firmware load is fresh and hasn’t had a chance to get bogged down yet but all I can say is that so far it’s a huge improvement.

I’ve also kept the sms and hangout apps separate in the two. Actually this has shown me that I don’t really use hangouts all that much and it was a mistake to have merged the two in the first place. I use Facebook messaging far more.

It remains to be seen which messenger app will win out considering that the UK government seems hell bent on making it difficult for such apps to be used in the UK. I think a general uprising would ensue if this happened or people would move to “illegal” platforms.

Rough back on phone

I’ve seen a Oneplus 2 review where the reviewer didn’t like the rough back to the phone. It took me a while to get used to it but in balance I think this is a winner. It stops the phone from sliding off surfaces. For example I can have it on my tummy whilst leaning back on the settee writing (as I am doing now) and the phone won’t slip off. I’m sure it’s going to save a few smashed screens.

Conclusions

So having looked at the Oneplus 2  review I can say it’s definitely better than its predecessor. I’m still a bit peeved about the screen defect and I may yet RMA it but we shall see.

Feature pic taken from Oneplus website – I can’t take pics of the phone with itself 🙂

Categories
Engineer internet

RIPE71 social scenes

It isn’t all work you know – videos from the first night RIPE71 social

The RIPE71 social was a goodun. It’s always a bit of a risk using video recorded at such events because you never know what clarity of diction is going to be achieve, if you get my drift. On this occasion we were all very sensible and I think hte vids are ok to go:)



Categories
Engineer internet travel

RIPE71 – end to end reportingish

A RIPE71 story begins. The live blogging feature doesn’t seem to want to show embedded videos so these are pasted into the body of the blog

Categories
End User travel

Hurricane Nora strikes

I mean storm Abigail

I should say mildly agitated bit of wind Abigail.  I wouldn’t promote her to storm, at least not in Lincoln. Course things may be different in other parts of the country. In the West. Where they get all the weather.

Here in Lincoln it has got colder and I’ve stuck the central heating on. Yesterday I noticed people (ok girls) walking around Lincoln in strapless tops! It was that warm. Not today. Today it’s warm vest and scarf weather.

This afternoon I’ve been packing to go off to RIPE 71 in Bucharest. One assumes that a vest is going to be necessary in Roumania. I have visions of the snow drifting up against the castle wall, burying the cottages of the villagers down in the valley. You can just about see the tops of the roofs and the chimneys are emanating woodsmoke. Hope they have enough supplies in. It’s going to be a hard winter ahead.

Not for those of us attending the RIPE conference. That’s in a warm and comfortable hotel with a pool – gotta keep fit and healthy innit. Offset the effects of “conference life”.

I’m back in town next Thursday for the trefor.net Exec Dinner with Danny Prieskel. We currently have 18 execs signed and room for just 2 more if you want to come, Tix here. Then it’s off to the Isle of Man to see me dear old Dad. Expect photos.

So you may hear from me over the next couple of weeks or you may not. In the meantime I am looking for some guest contributors interested in discussing telecom fraud issues. If you have something to say re fraud by all means drop me a line – or leave a comment here.

In the meantime have a great weekend. Catch you on Facebook sometime…

PS you may be wondering about the featured image in this post. It’s a bit of a tree blown down, presumably, by storm Abigail!

Categories
broadband Business

Long Line Issues – Living & Working with a 0.18Mbps Internet Connection

Long line issues – makes you appreciate good broadband when you have it

This is Lincolnshire broadband week on trefor.net. Most of the posts have been pretty upbeat. Feelgood stuff about how superfast broadband has changed life/work for the better. Well it ain’t all good I’m afraid. Businessman David MacGregor tells us about his long line issues – broadband so slow as to be almost unusable.

Working and living with a 0.18Mbps connection (…on a good day) is beyond ridiculous. Trust me when I say Broadband rage is real thing. My other half Kirsty and I run a small business (Terranomade) making and designing vinyl graphics, signs, wall art, stickers etc. from our small-holding just outside Theddlethorpe. It never ceases to amaze me that we have managed to grow the business as much as we have, with such limited internet access. Previously we have had some reasonably high profile clients, and attempting to draft and discuss previews and mock-ups via email, whilst operating on such a painfully slow connection speed, has very nearly cost us contracts and further commissions. As you can maybe imagine, in a competitive market place, speed is quite often the key. We genuinely feel as though we are losing business as a direct result of our internet speed issue.

As previously mentioned, one of the main problems with a slow connection is obviously downloading and sending attachments. A considerable portion of our day is spent waiting on pictures uploading, which eats into the time that should be spent on other projects and before you know it you find yourself still working at 9pm at night and thinking I wish I had got more done today.

Quite often friends will ask if we’ve watched some series or another on Netflix or its ilk, and then the quietly embarrassing conversation of “No, we can’t get Netflix etc” ensues. No-one ever quite believes that a connection speed of 0.18mbps is even possible. So, we never get to use on-demand services that’s just a huge no no! Hell, even to watch a 2 minute video on YouTube it takes 10mins and three attempts to get it to play all the way through whilst “buffering”. We have a rule of only one person connected to the internet at a time, primarily because if we are both attempt to go on ebay or facebook we spend the night getting messages of “no internet”.

We are currently awaiting an investigation being completed by BT as to what can be done to improve not only our connection, but also that of the six other houses along our road that are in the same boat. According to Openreach we are some 9.5km down the line and our cabinet has been fibre enabled, which is all well and good, but due to the length of the copper line, it has meant no improvement whatsoever. In the three years of living here our line speed has in fact has become considerably worse. When we first moved in we were lucky enough to get almost 0.35Mbps at times, now, due to more houses or line degradation, we are subjected to a pitiful 0.18Mbps.

Tref writes:

Remember the days of the 56k modem. You’d set something going and walk off to make a cup of tea whilst it downloaded. Might even set it going overnight and hope that it didn’t crash in the wee small hours making you have to start again. Well for some people this is still a reality as David can testify.

Other posts in Lincolnshire broadband week:

Tim Mackintosh gets excited http://www.trefor.net/2015/11/13/ultra-high-speed-broadband-uses/

There’s tiles in them thar clouds http://www.trefor.net/2015/11/13/cloud-storage/

Superfast translation http://www.trefor.net/2015/11/12/superfast-speeds-superfast-translation/

No more commuting to Budapest by composer Ervin Nagy http://www.trefor.net/2015/11/12/broadband-replaces-commute/

Philip Little of Bluecube Move to the cloud accelerated by superfast broadband http://www.trefor.net/2015/11/12/cloud-services-in-lincolnshire/

Intro to day 4 by Tref http://www.trefor.net/2015/11/12/today-on-trefor-net-how-people-are-using-their-new-superfast-broadband-connection/

Broadband for all by Tref http://www.trefor.net/2015/11/11/broadband-for-all-our-rights-to-access-utilities/

Could we have a B4RN in Lincolnshire (B4RL) http://www.trefor.net/2015/11/11/broadband-for-all-our-rights-to-access-utilities/

Gigaclear Ultrafast broadband in Lincolnshire by CEO Matthew Hare http://www.trefor.net/2015/11/10/gigaclear-ultrafast-broadband-in-lincolnshire/

BT fibrebroadband Managing Director Bill Murphy discusses superfast broadband progress in Lincolnshire http://www.trefor.net/2015/11/09/bt-superfast-broadband-lincolnshire/

Lincolnshire broadband programme update by Steve Brookes http://www.trefor.net/2015/11/09/lincolnshire-broadband-programme-update/

Categories
broadband Business

Tim Mackintosh is getting excited at the prospect of high speed B4RN internet access and has some suggestions of how he might use its excess capacity

ultra high speed broadband uses – innovative ways of using your high capacity internet connection

Tim Mackintosh is about to dig himself onto the B4RN hyperfast hyperhighway. In this post he discusses innovative ways of using the capacity that will soon be made available to him and talks about TV White Space.

Well, it’s a bit too wet today to do anything to help push forward that twenty kilometre trench today … so, I thought I’d just ponder what it might mean to us all once the sods are replaced and Silverdale residents have gigagot their gigabits.

As Karen Adams posted on B4RL Facebook page recently, in an extract from a CNET article written five years ago, Verizon Communications Chief Information Officer Shaygan Kheradpir said:- “I remember when AOL first came out and people wondered why people would ever need faster than 56Kbps downloads,” he said. “Every time we have increased the speed of service, consumers and others have found a way to fill the pipe. I’m confident that someone will figure out what to do with all that capacity.” With our B4RN gigabit fibre broadband, we’ve got 18,724 times more capacity.  That’s a very big pipe to fill.

Of course, we don’t need to fill the pipe.  There’s no obligation upon us to do any more on line than we are doing now.  B4RN fibre is just going to let us do what we do much more reliably.  But what sort of things could we do, if we wanted to?

There’s a company in the Netherlands called Nerdalize.  For people in places like B4RNland with a gigabit at their disposal, they are offering the opportunity to use some of their unused bandwidth to heat their houses.  They will supply storage heater sized server units which will be processing information for universities, research centres and other industrial data managers whilst at the same time, heating the premises.  Nerdalize pay for all the electricity used by the servers and can still offer data processing at 30% – 55% cheaper prices than its competition.  https://vimeo.com/68294884 – Green, clean and environmentally friendly.

In the USA, there are a number of initiatives where communities can share their surplus bandwidth with less well connected neighbourhoods.  These initiatives are made possible by the use of TV white space and it doesn’t take a huge leap of the imagination to see how it would work in Lincolnshire.

What is TV White Space (TVWS)?

Between 2008 and 2012 the UK’s terrestrial television system switched from analogue to digital broadcasting. The TV transmission system is arranged regionally and so to avoid interference between neighbouring regional signals there needs to be space between the channels used in each region.

Devices used for program making and special events (known as PMSE), such as wireless microphones, occasionally use some of these spare channels, but the remaining channels can be shared for other uses. TV White Space technology makes use of these available channels using an online geo-location database that tells the wireless device which frequency it can use without causing interference to TV broadcasters and PMSE operators.  Depending on the availability of channels in an area, TVWS can offer tens of Mbps per channel over several kilometres.  One of these databases has  already expressed an interest in working with community projects for community benefit.

The Gigabit Libraries Project in the ‘States, has libraries with spare broadband bandwidth, sending some of this connectivity to more remote locations in their communities to provide a WIFI connection for special community events and activities.

https://www.youtube.com/watch?v=y-lmMXMzxow&feature=youtu.be  TV white space technology is being developed extensively in many parts of the world and the equipment required is becoming more affordable all the time.  Individuals in B4RNland, with connectivity to spare and an interest in community art, could decide to use TVWS to share some of it, as a WIFI hotspot, with a ‘Woodstock’ like music festival visiting the vicinity, or a ‘Hay on Wye’ type book fair a field or two away.

Another TVWS initiative being explored in UK would be particularly resonant in B4RNland with Areas of Outstanding Natural Beauty, National Parks and Sites of Special Scientific Interest as prolific as fleas on a dog’s back.  TVWS would easily allow any B4RN connected environmentalist to furnish a bit of bandwidth to a local university or conservation organisation that wanted eyes and ears on a remote location 24/7.  They could set up an HD video feed serviced by a TVWS link and put it immediately up on the web for the world to see and study.  https://www.youtube.com/watch?v=TDplAVHmGTc

Our community owned and managed gigabit connectivity is going to give us opportunities that not only don’t exist today but that will open doors to whole new worlds that we cannot even imagine from where we’re standing now.  

From the horse’s mouth, I have it on good authority that TVWS connectivity will soon be able to be mounted on a vehicle.  In the event of an emergency – road accident, rail crash, cockling disaster – anywhere in B4RNland, this TVWS mobile WIFI hub will facilitate immediate high bandwidth WIFI inter connectivity between all the emergency services, volunteers and local community resources to co-ordinate the best possible response in the quickest possible time.  All that’s tomorrow.  But we can start exploring its potential whenever we like.  

Once we’ve dug that twenty kilometre trench …

Tim Mackintosh found B4RN in 2011, attended their launch in Lancaster, bought some shares and started making a nuisance of himself locally. In 2013 he got together with a few like minded individuals and set up B4YS (B4RN broadband for Yealand, Silverdale and Storth) and obtained a grant from Arnside and Silverdale AONB to grease its wheels. So far, BAYS has connected most of one of the three parishes – Yealand. Tim has been interested in TVWS since before B4RN.

Other posts in Lincolnshire broadband week:

There’s tiles in them thar clouds http://www.trefor.net/2015/11/13/cloud-storage/

Superfast translation http://www.trefor.net/2015/11/12/superfast-speeds-superfast-translation/

No more commuting to Budapest by composer Ervin Nagy http://www.trefor.net/2015/11/12/broadband-replaces-commute/

Philip Little of Bluecube Move to the cloud accelerated by superfast broadband http://www.trefor.net/2015/11/12/cloud-services-in-lincolnshire/

Intro to day 4 by Tref http://www.trefor.net/2015/11/12/today-on-trefor-net-how-people-are-using-their-new-superfast-broadband-connection/

Broadband for all by Tref http://www.trefor.net/2015/11/11/broadband-for-all-our-rights-to-access-utilities/

Could we have a B4RN in Lincolnshire (B4RL) http://www.trefor.net/2015/11/11/broadband-for-all-our-rights-to-access-utilities/

Gigaclear Ultrafast broadband in Lincolnshire by CEO Matthew Hare http://www.trefor.net/2015/11/10/gigaclear-ultrafast-broadband-in-lincolnshire/

BT fibrebroadband Managing Director Bill Murphy discusses superfast broadband progress in Lincolnshire http://www.trefor.net/2015/11/09/bt-superfast-broadband-lincolnshire/

Lincolnshire broadband programme update by Steve Brookes http://www.trefor.net/2015/11/09/lincolnshire-broadband-programme-update/