Author: Anouck van der Ham

Events

Security & Policing Home Office Event – Farnborough (6-8…

 

Security & Policing Home Office Event – Farnborough (6-8 March 2018)

This UK Government event is the largest police, security and National Resilience event in the UK and provides a platform for showcasing world leading technologies, products and solutions to more than 570 police services, Government departments, organisations and agencies from the UK and overseas Security & Policing 2017 will bring together international professionals and experts from Government, law enforcement, police service, CNI and industry to share knowledge and experience.

March 6, 2018 to March 8, 2018 – FIVE (Farnborough International Venue & Events) Show Centre, ETPS Rd, Farnborough GU14 6AZ
Booth: # 19A

 

Events

Bedrijvendagen Twente – The Netherlands

 

Bedrijvendagen Twente – The Netherlands (15 February 2018)

Bedrijvendagen Connects! This annual event, hosted by the University of Twente, consists of a series of events aimed at creating and improving contacts between students, post-graduates and alumni on one side, and potential employers on the other. Every year, more than 2,500 students and recent graduates meet over 150 companies through a great variety of activities, which take place on or around the University of Twente’s own campus. www.bedrijvendagentwente.nl

February 15, 2018 – Universiteit Twente, Drienerlolaan 5, 7522 NB Enschede, The Netherlands
Booth: # 1

Blogs

ETSI – the importance of effective standardization

 

ETSI – the importance of effective standardization

Group 2000 has been an active member of the European Telecommunications Standards Institute (ETSI) for over ten years.

As a technology supplier, we strongly believe that standardization is crucial for creating intelligent security solutions for law enforcement, intelligence agencies, telecom providers and internet service providers. Standardization and active collaboration across the industry makes it possible to combine platforms and solutions from multiple technology vendors, enabling better end-to-end security solutions.

In the field of Lawful Interception, the work of ETSI’s Technical Committee Lawful Interception (TC-LI) has proven to be very effective. The participants are government organizations, telecommunication providers, and technology vendors. Group 2000 actively participates in this committee, covering all aspects of interception and working closely together with other ETSI committees and with the 3rd Generation Partnership Project (3GPP).

The interoperability that is a core element of Group 2000’s strategy and our LIMA product portfolio is based on the adoption of these ETSI and 3GPP standards. The successful implementation of these standards enables lower integration costs and a faster time-to-market for our customers.

Group 2000 will continue to actively participate in and contribute to the ETSI TC-LI standardization efforts and promote the standardization efforts in the years to come!

Willem Carel Van Setten van der Meer
Solution Architect Group 2000

 

Blogs

From idea to product – CRMP

 

From idea to product – CRMP

Group 2000 is a company with years of experience in Network Management Solutions. Group 2000 needs to update and maintain their Network Management product suite constantly in order to keep up with the technology innovations and the security related items. Next to the impact on our existing products, these market movements also hold the possibility for new products. In this article Group 2000 will show how an idea is formed into a product. This blog is intended for more technical inclined readers and will not contain commercial information.

The product mentioned in this article is called “Cell Recovery Management Platform” (in short CRMP) and might soon enrich our network management suite portfolio. Network Management within Group 2000 means integration with various vendors (for example Nokia or Huawei) in a customer network. The vendors follow ETSI specifications so therefore Group 2000 needs to have in-depth knowledge (of ETSI specifications) in order to translate the individual use cases to vendor specific commands that need to be send into the customers network.

The initial idea for a new product came from a disaster that occurred a few years back when the mobile networks from multiple operators were disturbed for a long period of time. One of the striking things was that the impacted network area was far greater than the disaster area. This was caused by the handover behavior of cell phones when they lost the connection to the network.

Some time ago Group 2000 was in the phase of creating a product called LIMA Network Protect that required in depth knowledge concerning the process of cell phones setting up (and terminating) a connection to an operator network. This knowledge was gathered by investigating numerous (versions of) ETSI specifications. It was during that investigation that we found a way to potentially solve the problem that was mentioned earlier.

Group 2000 encourages employees to develop their own ideas. The process for these new ideas is that they are logged and pitched (internally) to see if the idea has any potential. The initial steps for our new product CRMP were taken. Next will be the creation of some high level documentation that can be used to determine the market potential for such a product. After these phases it is time to work out the requirements of the product so that each of the relevant use cases is supported and the product is compliant to the Group 2000 standards. During this requirements phase we identified a series of challenges that needed to be addressed.

As earlier mentioned, one of the features for a Network management product is the need to support various vendors. Due to the relatively long lifetime of a network element our product will encounter a broad range of different software versions in customer networks. In order to limit the impact and still be flexible enough to support the different setup between operators, group 2000 has chosen for the separation of concerns (SoC) principle. By implement according to the SoC principle, the Group 2000 software has a base that supports the use case and standard features and some small sections/modules (called provisioning modules) that encapsulate the vendor specific code. The result is a stable base product that has separate small provisioning modules which are impacted when the product encounters a different software version or even a new vendor.

The provisioning modules are also the entry points into the customer’s network and that means high security requirements and support for multiple connection methods like SSL, SFTP, SSH etc. Next to the method that is used to setup a connection, the product also needs to support parallelism in order to speed up a use case by opening multiple connections to the same network element.

Although Group 2000 software is highly configurable this particular product requires another level of configuration. Group 2000 wants this product to constantly fine-tune the settings on the customer’s network. One of the challenges is the varying performance of the network elements. The fastest network element responds in a matter of seconds while the slowest takes about 6 minutes to respond to a command. Normally there is no need to perform a second use case while the first use case isn’t finished but that would mean that the product is ‘inoperable’ for at least 6 minutes. That is not acceptable and to overcome this problem the product is going to use an “event driven process chain” (EPC) that is capable of maintaining events over different use cases. Also the EPC should be capable to react in a preconfigured manner to events that are sent from the network to the product. This feature enables the product to adjust the setup behavior of cell phones in the same area.

These are just a few technical items that need to be addressed in the requirements and of course in the product. Besides technical items there were also a series of commercial challenges, some of those could be addressed in the prototyping phase, others through desk research and interviews with potential customers. One particular challenge which significantly could impact the commercial success of the product was the Net Neutrality legislation as it was implemented in various countries. With the recent harmonization of the net neutrality regulation in Europe, introduction of CRMP now actually facilitates the new net neutrality regulation.

The next phase is the prototyping phase in which a subset of the requirements are build. The subset of the requirements is determined by some standard criteria’s like time and costs but, more importantly, features that are either technically challenging or identified as interesting for the market.

After the prototype and the market exploring, Group 2000 has a solid understanding concerning the costs, risks, effort and market potential of creating such a product. If the product still has enough potential then a new product is born and is added to Group 2000’s product portfolio.

René Lüers
Solution Architect Group 2000

News

Growth in Jobs and Revenue in Dutch Security Cluster

 

Growth in Jobs and Revenue in Dutch Security Cluster

20 April 2017 – Last year, 1,000 new jobs were created in the security sector and the revenue increased with 4.8% up to a total sum of 7.2 billion euro. The added value of this sector to the national economy grew 6.2% up to a total sum of 3.8 billion euro. This was published in the Policy Research Corporation report on economic potential of the national security cluster HSD. This is a growth which is higher than the national average of 2.1%. In order to maintain this growth it is vital to continue investing in this cluster. On 20 April, HSD executive director Richard Franken handed over the report to HSD chairman Wim Kuijken and Saskia Bruines, deputy mayor of the city of The Hague.

The Dutch security cluster has important regional cores in Twente, Brabant and The Hague where the HSD Campus is located. The biggest growth will be realised within these cores. Richard Franken, executive director HSD Board: “This concerns both the growth of the existing businesses, which could expand through collaboration and innovation, and foreign security organisations which opened a branch in The Netherlands. It shows the attractive power of the presence of the cluster and the Campus. There is an ongoing trend in The Netherlands whereby more international security congresses are organised and foreign security organisations open an office in or near the Campus. This leads directly to an increase of jobs and revenue for The Netherlands. Not only in terms of security but also in service sectors, such as consultancies, taxis and hotels.”

The region of The Hague

Figures show that the region of The Hague welcomed 31 new security organisations and 400 new jobs last year. The total of 406 organisations which are good for 15,200 jobs generate a revenue of 2.27 billion euro, including an added value of 1.23 billion euro to the Dutch economy. Saskia Bruines, Alderman Knowledge Economy, International, Youth and Education of the city of The Hague: “It is great to see that the HSD Campus gives this spin-off. The security domain creates many job opportunities for our region, in particular when all jobs at security services, such as the National Police and Fire Department, are included as well (13.200). This demonstrates why we are the international city of Peace, Justice and Security.”

Tangible results

In 2016, 12 international organisations set up an office in The Netherlands/the province of South Holland, including Red Tullip Systems (USA/Denmark), Andrupos (Germany) and Payatu and E2labs (both from India). Good results were also booked with regards to attracting international congresses with a total of 11. Examples are a congress about Smart Secure Cities, Critical Infrastructure Protection & Resilience Europe, hardware i.o. and European Conference on Blockchain. HSD work closely together with NFIA, InnovationQuarter and the Municipality of The Hague. Besides that, soft landing programmes with Canada and the USA were set up.

Joris den Bruinen, deputy director HSD: “In order to maintain this growth and efficiency, it is necessary to continue investing in this security cluster and to do so we will, for example, organise the second Cyber Security Week in The Hague at the end of September 2017. The Cyber Security Week will attract many international visitors, incoming trade missions and media to the city. It is a great example to see how such investments directly lead to economic return and gives The Netherlands the opportunity to demonstrate itself as the ‘secure digital gateway to Europe.”

(Author: https//www.thehaguesecuritydelta.com/news/newsitem/858-growth-in-jobs-and-revenue-in-dutch-security-cluster)

News

INTERPOL and TNO Partnership to Combat Cybercrime

 

INTERPOL and TNO Partnership to Combat Cybercrime

19 April 2017 – On 19 April, INTERPOL and the Netherlands Organisation for Applied Scientific Research (TNO) have signed an agreement to further enhance and extend their collaboration in combating cybercrime. Combining INTERPOL’s reach throughout the global law enforcement community with TNO’s research and technology provides opportunities to identify practical solutions to increase cyber security.

Tackling cybercrime cannot be resolved unilaterally. As cybercriminals innovate, they do so with speed and by communicating and sharing information with each other. Public and private sectors also need to be innovative in building trusted relationships to identify ways to become more effective in combating the global threat posed by cybercrime.

Staying ahead in the fight against cybercrime
In 2015 INTERPOL’s Cyber Research Lab and TNO created a private darknet network, private cryptocurrency and simulated marketplace to recreate the virtual underground environment used by criminals. This training environment on darknet and cryptocurrencies will now be delivered globally, providing law enforcement worldwide with a deeper understanding of the evolving criminal activities on the darknet. The partnership between INTERPOL and TNO will also be extended to include additional research and innovation to move ahead in the fight against cybercrime, in addition to the secondment of a TNO expert to the IGCI.

Innovation in policing
“Innovation in policing is key and the INTERPOL Global Complex for Innovation provides a platform for achieving this with our member countries and partners. This new agreement with TNO is important in our continued work to ensure law enforcement have the training and resources they need to take effective action in combating cybercrime,” said Noboru Nakatani, Executive Director of the IGCI.

First scientific research institute
Mr Wim Nagtegaal, vice-admiral (ret), member of the TNO Executive Board, Chief Operating Officer: “With TNO’s approach to concept development and experimentation we contribute to the fight against cybercrime and cyberterrorism with training and tools. TNO is honored to be the first research institute to partner with INTERPOL. We are proud to see how the research contributions of Prof Pieter Hartel are currently translated to worldwide delivery. This is important from both a security perspective and also emphasizes the Netherlands’ innovation potential.”

His Excellency Jacques Werner, ambassador of the Kingdom of the Netherlands in Singapore who witnessed the agreement signing ceremony said: “In our hyper-connected world, cyber security is a joint responsibility that cannot be solved by any organisation in isolation. The partnership between INTERPOL and TNO is one of the many key ingredients towards cyber security.”

Picture: Mr. Noboru Nakatani and Mr Wim Nagtegaal shaking hands, accompanied by the Dutch Ambasador H.E. Jacques Werner and TNO and INTERPOL officials

(Author: https://www.thehaguesecuritydelta.com/news/newsitem/871-interpol-and-tno-partnership-to-combat-cybercrime)

News

Grondwet bij de tijd: e-mail ook onder briefgeheim

Grondwet bij de tijd: e-mail ook onder briefgeheim

18 April 2017 – E-mail, sms en andere vormen van telecommunicatie krijgen voortaan ook de grondwettelijke bescherming van vertrouwelijkheid. Vandaag heeft de Tweede Kamer unaniem ingestemd met het voorstel van minister Plasterk (Binnenlandse Zaken en Koninkrijksrelaties) artikel 13 van de Grondwet zo aan te passen dat ook voor deze vormen van communicatie het briefgeheim geldt.

In het huidige artikel 13 van de Grondwet wordt nog gesproken van telefoon- en telegraafgeheim. Dat is niet meer van deze tijd. In het voorstel dat vandaag is aangenomen door de Tweede Kamer staat nu: ‘Ieder heeft recht op eerbiediging van zijn brief- en telecommunicatiegeheim.’

Alleen na tussenkomst van een rechter of in het belang van de nationale veiligheid met toestemming van in de wet aangewezen personen, kan inbreuk op dit recht worden gemaakt.

Het voorstel tot wijziging van de Grondwet gaat nu voor behandeling naar de Eerste Kamer.

(Author: https://www.rijksoverheid.nl/actueel/nieuws/2017/04/18/grondwet-bij-de-tijd-e-mail-ook-onder-briefgeheim)

News

IT Security Company G2K Labs opens new office in…

IT Security Company Group 2000 B.V. opens new office in the United States of America: G2K Labs Inc.

Washington, April 10 2017 – The fact that society today is exposed to serious threats is a serious topic  that we see and read about in the news every day. Organized crime and terrorism seem to have reached a level that can scarcely be controlled  while at the same time our society is increasingly ‘connected’, via mobile devices and the Internet of Things. These developments demand the solid protection of the individual user, who is often only partially aware of the risks of being on-line 24/7. The telecommunication network’s data flows, the information concerning the location of the users and the use of social media yield a wealth of ‘Big Data’ to the authorities charged with enforcement. G2K Labs provides a clear and sustainable answer for today’s challenges.

To actively participate in the provision of security for the people, telecommunication networks nationwide, G2K Labs announces its formal presence in the United States. G2K Labs opens its business on April 17th with Mr. Matthew Smith as CEO and Mr. John Sheridan as COO.  Both Mr. Matthew Smith as Mr. John Sheridan are well known in this arena and have extensive experience in this field. G2K Labs will focus on serving the government authorities and telecom providers with a wide range of security solutions.

G2K Labs arose from an initiative by Group 2000 B.V. Group 2000 is a Dutch company founded over 38 years ago with extensive experience in a wide range of security solutions like lawful interception (CALEA), (mass) surveillance, location based services, big data and data disclosure solutions, network management solutions, along with her partner’s analysis solutions. Group 2000’s approach and solutions help governments, intelligence agencies, telecom and Internet service providers to solve security matters and create sustainable critical nationwide intelligence infrastructures. The robust and high performance solutions from their own LIMA portfolio are used globally.

G2K Labs provides solutions that actively contribute to tracing threats, people, and groups on a strategic and tactical level. We supply national critical security infrastructures that are primarily implemented in telecommunications networks, but also on the cyber-security level. Security departments and telecom providers across the globe put our solutions to use.

For more information: www.g2klabs.com

Blogs

How Cell Barring would help in preventing failing communications…

 

How Cell Barring would help in preventing failing communications at the moments that matter

We don’t notice how dependent we have become on our mobile networks, until they fail. Only then, we notice that it’s not for granted being able to communicate anywhere, anytime.  Such moments make us realize just how vulnerable we are. This is easy to overlook when the signal reception deteriorates on New Year’s Eve, when everybody wants to convey their best wishes at the same time. A power failure that causes a cell tower to breakdown, which in turn overloads another nearby mast, is generally resolved quickly as well.

However, what if there is a huge calamity, like an earthquake or a flood? The network traffic during the tsunami in Japan was fifty to sixty times larger than usual. Even if the infrastructure itself wouldn’t have been damaged, the increased demand on the mobile communication system would have caused the network to fail. In a situation where the emergency services need to be reachable, this is an absolute disaster.

How do we make the network accessible again? By excluding a part of the calls in the area surrounding the calamity: this is what we call a ‘cell barring’. First-aid workers and others, who need the mobile network the most, are prioritized by immediate and accurate network interventions. During the recent terrorist attacks in Brussels, users (including emergency services) were requested not to call, but rather to use WhatsApp instead: Under the given circumstances this was not the most useful means of communication, however it was the only way the network could cope.

The usage of LIMA Network Protect, a powerful tool from Group 2000, for managing critical networks and cell barring would have prevented this. By deploying this tool, we help mobile network operators in creating future-proof ‘smart cities’ that communicate resilient and prevent failing communications.

www.limanetworkprotect.com

Anouck van der Ham
Marketing and Communications

Uncategorized

King Willem-Alexander Visits The Hague Security Delta

 

King Willem-Alexander Visits The Hague Security Delta

23 March 2017 – On 23 March 2017, his Majesty King Willem-Alexander visited The Hague Security Delta: a network in which businesses, knowledge institutions and governments work together on knowledge development and innovation in the field of security. The core is the HSD Campus, the national innovation centre for security in The Hague. 50 of the 250 partners of HSD are located at the Campus. These parties vary from governments to knowledge institutions and from startups & SMEs to corporate organisations. All of these partners share a common goal: more business activity, more jobs and a secure world.

At the HSD Campus, the King of the Netherlands spoke with representatives of involved organisations and the HSD Board, followed by a guided tour. Richard Franken, executive director of HSD: “This visit offered us the opportunity to familiarise his Majesty with the diversity on initiatives within HSD. Besides that, we discussed some challenges in the security field, such as the lack of IT and cyber security talent, the tensions between privacy and security, and the cyber security threats with regards to the Internet of Things.”

HSD partners talked about four topics with King Willem Alexander:

  • The education of Cyber Security talent. The University of Leiden, TU Delft and The Hague University of Applied Sciences offer an executive master education in Cyber Security at the Cyber Security Academy. The King spoke with professors and professional students about challenges, such as guaranteeing the sufficient supply of professional teachers, anticipating on the quick developments within the cyber security domain and the protection of the balance between security and privacy.
  • SAM the security robot, which can patrol autonomously. The robot is designed by Robot Security Systems/Lobeco in collaboration with Trigion, TU Delft and end users. With the help of HSD investments and its partners, it is now successfully used at the Port of Rotterdam. In addition to the physical threats, the port of Rotterdam also needs to be resilient against digital threats.
  • The National Cyber Testbed, an investigation by TNO and HSD – in consultation with the Metropolitan region Rotterdam/The Hague – with a focus on how society can be more resilient against cyber attacks. As long as the possibilities of digitalising, ‘The internet of Things’ and ‘Smart Cities’ grow, vulnerabilities for ‘hacks’ will grow as well. The municipality of The Hague and KPN have been the first organisations to support the development of this Testbed.
  • Sweetie 2.0: preventing child abuse. Tracks Inspector, the University of Leiden and Tilburg University work for Terre des Hommes on the development of an advanced version of a ‘chat robot’. Using artificial intelligence it prevents the abuse of children through webcam sex.