Location-Based Services Market by Type and Geography - Forecast and Analysis 2022-2026
NEW YORK, July 15, 2022 /PRNewswire/ -- The latest market analysis report titled Location-Based Services Market by Type and Geography - Forecast and Analysis 2022-2026 has been added to Technavio's catalog. Location-based services (LBS) are part of a software application that uses location data for IP-capable mobile devices to trace where the mobile device is located. The analysts at Technavio have categorized the global location-based services (LBS) market as a part of the global communications equipment market. 49% of the market's growth will originate from North America with the US emerging as the is the key revenue-generating economy. The increasing use of indoor LBS solutions in the retail sector will fuel the LBS market growth in the forthcoming years. In terms of the highest revenue-contributing segment, the outdoor type segment held the largest LBS market share. The segment will continue to account for the highest growth throughout the forecast period. The increasing applications of outdoor LBS in industries such as manufacturing, oil and gas, defense, and insurance will drive the segment growth in the coming years.
Is Your Printer Spying On You?
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it. Sounds like something from an episode of "Alias " right?
Unfortunately the scenario isn't fictional. In a purported effort to identify counterfeiters the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information. That means that without your knowledge or consent an act you assume is private could become public. A communication tool you're using in everyday life could become a tool for US government surveillance. And what's worse there are no laws to prevent abuse.
'Five Eyes' Countries Will Seek to Scan Messages
The Five Eyes—an alliance of the intelligence services of Canada, New Zealand, Australia, the United Kingdom, and the United States—warned in 2018 that they will “pursue technological, enforcement, legislative or other measures to achieve lawful access solutions” if the companies didn’t voluntarily provide access to encrypted messages. More recently, the Five Eyes have pivoted from terrorism to the prevention of CSAM as the justification, but the demand for unencrypted access remains the same, and the Five Eyes are unlikely to be satisfied without changes to assist terrorism and criminal investigations too.
The United Kingdom’s Investigatory Powers Act, following through on the Five Eyes’ threat, allows their Secretary of State to issue “technical capacity notices,” which oblige telecommunications operators to make the technical ability of “providing assistance in giving effect to an interception warrant, equipment interference warrant, or a warrant or authorisation for obtaining communications data.” As the UK Parliament considered the IPA, we warned that a “company could be compelled to distribute an update in order to facilitate the execution of an equipment interference warrant, and ordered to refrain from notifying their customers.”
SS7： it needs to be replaced rather than patched up
SS7 tells the telephone network what number a user is calling or texting from, known as the "presentation number". This is crucial so that calls can be connected from one to another. The problem is that fraudsters can steal a presentation number, and then link it to their own number.
The issue affects both landlines and mobile phones, with SS7 still central to the 2G and 3G parts of mobile phone networks that continue to carry our voice calls and text messages - even if you have a 5G-enabled handset.
One theory is that the vulnerabilities of SS7 cannot be fixed because the telecoms firms need to give national security agencies access to their networks, but Mr Gribben says GCHQ (Britain's intelligence agency) can monitor communications without using SS7 loopholes.
The problem, he says, is that SS7 is still used in telecoms networks globally. And it needs to be replaced rather than patched up.