Author: Max Posthuma de Boer

News

Group 2000 achieves ISO 27001:2013 and re-certified ISO 9001:2015

 

Group 2000 achieves ISO 27001:2013 and re-certified ISO 9001:2015

As of October 16th 2018, Group 2000 officially achieved ISO 27001:2013 certification, the international standard outlining best practices for information security management systems. Compliance with these standards demonstrates Group 2000’s ability and commitment to a repeatable, continuously improving, risk-based security program.

Established by the International Organization for Standardization (ISO), the standard requires the certification of an organization’s information security management controls for areas such as data security and business continuity. The certification extends to every level of an organization’s IT infrastructure stack, including asset management, access control, human resource security, and application security.

On October 16th 2018, Group 2000 also achieved the renewal of their ISO 9001:2015 certificate.

About Group 2000

Group 2000 is a private and innovative partner for a wide range of IT security solutions. Our approach and solutions support Governments, Agencies, Telecommunication- and Internet Service Providers to solve (nationwide) communications, compliance and security matters.
From our headquarters in Almelo, The Netherlands, and our offices in Norway, Switzerland and the USA, we organize our operations all over the world. From our regional offices, we are flexible and we respond quickly to the requirements of our customers. It is our objective to solve your concerns whilst creating unparalleled value for you, our partners, our employees, and all other stakeholders. Corporate and social responsibility is embedded in our culture. We support various initiatives at home and abroad, we are consciously concentrating our efforts wherever possible to execute our business in a sustainable way and (re)use natural resources with the intention to reduce energy for our customers and ourselves. Our ethics are incorporated in a code of business conduct.

As Group 2000 we realize that a direct answer on complex issues is no longer sufficient, a direct, innovative, sustainable and transparent solution is however important and in conjunction we co create and work side a side with your teams. All disciplines, skilss, and professional approach that you expect from an IT security integrator are available. The core of our company, therefore, consists of architecture, software development, testing, project management, and service management. Besides our own skills, solutions, and products, we have a global network of trusted selected partners. Using our knowledge and expertise we are able to offer you an end to end solution.

Group 2000 delivers and creates mission essential and reliable Interception, network protocol and network measurement and provisioning knowledge and has a vast global experience in the public and telecommunication domain. We minimize your complexity and taking care of your concern from the start to the final acceptance and afterward in to manage your platform and maintain your platforms. Group 2000 is ISO 9001:2015 and ISO 27001 certified and as an active member of ETSI institute, we work on the standards and services of tomorrow.

 

News

Java Developer

 

Java Developer

As a Java developer, do you want to work in a demanding and dynamic environment, with the latest technologies and exciting projects?

 

Check our latest vacancy for a Java Developer.

Events

Interpol World Singapore

 

INTERPOL World – Singapore (5-7 July 2017)

INTERPOL World is a trade event which promotes public private partnerships and serve as a business platform for security manufacturers and service providers to offer innovative security solutions to law enforcement agencies, government officials and security professionals from the commercial sectors. INTERPOL World creates an environment for public and private sectors to come together to identify, develop and drive security initiatives for real world security situations across four key domains: Cybersecurity, Safe Cities, Border Management and Supply Chain Security.

July 5, 2017 to July 7, 2017 – Suntec Singapore Convention& Exhibition Centre, 1 Raffles Boulevard, Suntec City, Singapore 039593, Singapore
Booth: #
4F23

Events

ISS World Europe – Prague

 

ISS World Europe – Prague (13-15 June 2017)

ISS World Europe is the world’s largest gathering of European Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Innvestigations and Network Intelligence Gathering. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today’s Telecommunications network, the Internet and Social Networks.

June 13, 2017 to June 15, 2017 – Clarion Congress Hotel Freyova 33, Metro B Vysocanska, Prague 9 Prague, CZ, 19000, Czech Republic

 

News

New website for Group 2000’s solution LIMA Network Protect

New website for Group 2000’s solution LIMA Network Protect
We have launched a new microwebsite for our LIMA Network Protect solution.

Group 2000 LIMA Network Protect is a modular solution that can protect the mobile network against overload caused by disasters and other planned or unplanned events. Barring at cell level, LIMA Network Protect can for example ensure network availability for critical emergency services. Besides cell level barring, group level subscriber barring and control is supported for regulatory purposes.

To find out more about this solution, please visit: https://limanetworkprotect.com.

Blogs

Spies in the boardroom

 

Spies in the boardroom

Cell phone, mobile device, smartphone… whatever you call the device, it’s one of the most prevalent tools for both personal and professional success, helping people stay connected, attend meetings, work on the go.

While many mobile device users may not think too long or hard about how the device makes the call unless it can’t find a signal you should be aware while using your phone in the next boardroom meeting.

In an article published a while ago by Popular Science, secure mobile phone vendor and manufacturer ESD America announced that its engineers and customers had detected 17 phony cell phone towers, also known as inceptors or IMSI catchers across the country using its CryptoPhone 500, an Android-based mobile phone that includes native voice and message encryption. While the inceptors may look legit, they are anything but: Cell towers could allow attackers to eavesdrop on calls and text messages or even possibly infect the devices connecting to it with malware.

According to Popular Science, though standard mobile devices may not detect a threat. Another sign is that standard carrier towers will be named whereas inceptors will not be. An interceptor or fake tower can force the decryption of devices connecting to it, allowing the tower to spy on and even hijack phone calls, text messages and other means of communications.

Imagine this happening while you are in your boardroom having the most important conference call with your entities around the globe to discuss your strategy.

I can almost read the headline in the news “Multi billion corporation CEO resigns after espionage”.

Mobile phones seek out radio signals and connect to the nearest cell tower, and each phone has to prove its authenticity to the tower it is connecting to. That’s where IMSI catchers, collect the IMSI identification numbers of the SIM cards used in cell phones. Cell phone towers nearby, regardless of whether the towers are fake or real, log the device’s IMSI.

This is where the tapping starts and you won’t even know about it.

Now, what to do to counter this irritating threat that you can’t even in the most secure room in your company make a phone call or send a message!

LIMA Intrusion Detector is Group 2000’s solution for detecting anomalies in the mobile network.

The LIMA Intrusion Detector solution consists of the Command & Control Center and one or more sensor devices. These sensor devices are setup in a geostationary setup; e.g. attached to buildings or structures and they are able to provide a (static) overview of all mobile cells in range. Using this static overview, the sensor devices in combination with the Command& Control Center application will be able to detect ‘anomalies’ within the area covered. In most cases these anomalies will be a kind of devices like IMSI Catchers. But also jammers and the use of so called (legal) femto cells for corporate use will be detected.

The LIMA Intrusion Detector will be delivered with a GUI that will easily be able to depict the cells in range and pinpoint / highlight the anomalies clearly.

Particularly for knowledge-intensive organizations like yours it is key to protect your company assets in order to prevent industrial espionage by other companies operating in the same domain or governmental bodies of foreign countries. The leakage of confidential information might e.g. result in the loss of your competitive advantage. As mentioned mobile communications by your employees can easily be eavesdropped without their knowledge through the use of IMSI catcher devices. LIMA Intrusion detector helps protecting your company assets by alerting your organization immediately when an IMSI catcher has been detected.

Want to know more, send me a message and let’s get in touch!

 

Blogs

Resilient communications

 

Resilient communications

We don’t notice how dependent we have become on our mobile networks, until they fail. Only then, we notice that it’s not obvious being able to communicate anywhere, anytime. Those moments make us realize just how vulnerable we are. That is still to overlook when the signal reception drastically deteriorates on New Year’s Eve, when everybody wants to convey their best wishes at the same time. A power failure that causes a mast to breakdown, which in turn overloads another nearby mast, is generally resolved quickly as well.

However, what if there is a huge calamity, like an earthquake or a flood? The network traffic during the tsunami in Japan was fifty to sixty times larger than usual. Even if the infrastructure itself hasn’t been damaged, the increased demand on the mobile communication system causes the network to fail. In a situation where the emergency services should also be reachable, this is an absolute disaster.

How do we make the network accessible again? By excluding a part of the calls in the area surrounding the calamity: ‘cell barring’. First-aid workers and others, who need the mobile network the most, are prioritized by immediate and accurate network interventions. During the recent terrorist attacks on Brussels, users, including emergency services, received the request not to call, but to use WhatsApp: under the given circumstances this was definitely not the most useful means of communication.

Using LIMA Network Protect would have prevented this: a powerful tool from Group 2000, for managing critical networks and cell barring. By deploying this tool, we get future-proof ‘smart cities’ that communicate resilient.

 

Blogs

Why your phone doesn’t work during terrorists attacks

 

Why your phone doesn’t work during terrorists attacks

When terrorists attack, cell phone networks fail. They go down during disasters, attacks and even at big events. What causes the network overload?

In the fog of disaster, hundreds of thousands of people trying to call their loved ones, police forces, fire departments, first aid support, everybody has a reason to communicate with the first thing they have in their hand, their cell phone…

Mobile networks simply clogged up as telecom providers coped with a massive and unexpected surge. In the aftermath of natural disasters, terrorist attacks, and anomalous incidents worldwide, telecommunications networks simply can’t cope with the sharp increase in call volume. Mobile networks have bandwidth that is more than sufficient 99% of the time. However, when disaster strikes, the decentralized nature of the network means that whole geographic regions can be knocked out by increased call volume.

Group 2000 has developed a solution where Mobile Network Operators control their networks with a simple push of a button to keep communication lines open at all times where it is most needed.

LIMA Network Protect is a modular solution that can protect the mobile network against overload situations caused by disasters and other planned or unplanned events. It does this by barring at cell level. LIMA Network Protect is a complete solution for Network and Subscriber Barring Control that is built around a central management system. It integrates all necessary network equipment, databases and includes a Graphical User Interface to visualize the network and affected areas. Cells can be bared at access class level enabling the operator to differentiate between the barring of private subscribers and emergency services.

 

Blogs

Making Europe’s external frontiers and stadiums more secure

 

Making Europe’s external frontiers and stadiums more secure

Group 2000 is launching an effective tool for further securing Europe’s external frontiers with the introduction of LIMA Biometric Identity Surveillance.

This new generation of 3D facial recognition represents the next step forward. The system not only looks at the characteristics ‘on the surface’, but also at bone structures in the skull which are unique to every individual. There is simply any point in acquiring a new identity through plastic surgery any more. A facial scan can be carried out on everyone crossing the border and a check conducted against existing photo databases of people who have previously been detained for terrorism or human trafficking or are otherwise undesirable.

With the current refugee problem the system can also be crucial in establishing the identity of people who arrive at Europe’s external frontiers. A facial scan which cannot be falisified can be readily linked to existing databases and blacklists. People with malevolent intentions can therefore be identified more quickly than with the current labour-intensive registration system, which is not completely reliable.

For example, if evidence is lacking because the identity papers have been ‘lost’ between arrival at the airport and the asylum application, the LIMA facial scan carried out on all passengers at the gate can be decisive in determining what steps are taken, since the scan shows which faces arrived on which flights. In the case of a positive match the original airline can return the person concerned back to where they came from.

The system can also help with the ongoing problem of football hooligans who are subject to stadium bans. It has repeatedly shown that there are serious flaws in enforcing these stadium bans.
By installing the 3D camera system at the entrance gates, it is possible to check entirely automatically, quickly and accurately for every visitor whether that person is on the blacklist.

We are constantly working on new high-tech solutions to make society as safe as possible.