We are Telecom Forensics, an OEM of LI solutions based on the Kapiti Coast.
Being an OEM, there are no 'middle men' to inflate the price. We can provide a drop-in LI system that is fully supported, local and affordable.
We are proven LI Systems experts operating since 2005. We have deployed with national providers and on many complex projects both cellular and fixed. ASN.1 and ETSI Standards is what we do all day, everyday. Our projects and experience are detailed on out website:
Our Costs and Deliverables:
We supply the complete turnkey solution for your TICSA regulatory compliance.
No minimum contract term, full 24/7 support is provided.
One off: Upfront $5K Signup Fee - covers design, integration, pre-production testing and systems training,
Monthly: Starting at fixed $5K lease cost per month. For industry fairness the monthly charge is scaled to the number of subscribers.
*** SPECIAL OFFER ***: 10% discount on the monthly lease if you sign-up within the next four weeks!� Contact us via our website forms, https://www.telecomforensics.com/. �� Annual contracts are also available. Contact us to discuss your requirements.
A working pre-production environment; Provisioning, (HI 2/3) ASN.1 correct, complete & ready to cut-over to LEA Test then eventually LIVE.
Training on the LI system in parallel with LEA validation/testing HI 'usable format' pre-production delivery.
Training (provisioning and alarms) to meet the 'always ready' requirement of the TICSA Act.
Support: The monthly fee includes Layer 3 support.� TFE Solution License and Support Contract to meet Service Level Agreements of the TICSA solution
Once you have Agency sign-off to switch to their LIVE environment, you can get back to your core business activity.
Time Frame: Depending on the size of the network, this could take one to two weeks after sign-up. �
Custom interface work is available including any OEM TIER 4 Code level support. POA. �
TFE offers affordability for a trusted and reliable LI solution.
We welcome your enquiry through our web forms, https://www.telecomforensics.com/,
Brian Parsons BE(E&EE) MIEE | CEO TFE | +64272987097
Some technical detail:
Our systems operate an exokernel with optimised LI ASN.1 and protocol firmware on the Network (NWO) traffic inputs.
The NWO interface work independent of main OS for speed and security and line rate processing (at any packet size).
We support the following line interfaces: GE, 10G, 40G scaled to 100G, and typically can receive from any newtork tap/mirror port, splitter.
The probe throughput (XI fwd rate) after processing is wire speed with capacity per interface of 1.1 million
sessions per gig of installed Mem. Typical System interfaces: GE NWO, GE XI/OAM, GE HI.
Who's going? I'd be keep to catch-up for a drink or two while over in Sydney. (Feel free to ping me off the DL)
Fixed & Transmission Operations Manager
021 999 010
03 345 7875
Two Degrees New Zealand Limited | 2degrees House 351 Lincoln Road, Addington, Christchurch 8024 PO Box 8540, Riccarton, Christchurch 8440 | New Zealand
From: nznog-bounces(a)list.waikato.ac.nz [mailto:firstname.lastname@example.org] On Behalf Of Mark Prior
Sent: Monday, June 11, 2018 10:44 PM
To: nznog <NZNOG(a)list.waikato.ac.nz>
Subject: [nznog] Registration for AusNOG 2018 is now open
Get in early for the early bird rate!
We're also still looking for interesting talks so why not submit a proposal and lock in that early bird rate (or get free rego if accepted :-)
NZNOG mailing list
This transmission may contain information that is confidential and legally privileged. If you are not the intended recipient, please do not read, copy, or re-transmit this communication. If you have received this communication in error, please notify me and delete this message (and your reply) and any attachments.
Citylink's official Debian mirror (ftp.nz.debian.org) is apparently
again broken (not even listening on port 80 from where I'm sitting).
Would anyone be seriously interested in donating rack space, national
transit, or hardware to the cause of another official Debian mirror for
Having reliable and cheap access to free software projects like Debian
is critically important, and having a second official mirror seems like
a no-brainer to me.
I am very happy to donate my time to admin and monitor any equipment
provided for this, and to liase with the Debian project as required.
Perhaps Citylink could give us some insight in to the traffic levels
their existing mirrors see?
The 29th DNS-OARC Workshop will be a joint workshop combined with
CENTR-Tech and will take place at the Hotel Okura, Amsterdam,
Netherlands, on October 13th and 14th 2018.
The Workshop's Program Committee is now requesting proposals for
presentations. All DNS-related subjects are welcome.
A timeslot will also be available for lightning talks (5-10 minutes)
on day two of the workshop for which submissions will be accepted
on the first day of the workshop, until 4pm.
The second afternoon of the workshop will start with a Members-only
session which will include reports on DNS-OARC's activities. If you
are an OARC member and have a sensitive topic that you wish to present
during that session those can be accommodated. The Members-only session
will be followed by the AGM.
15 Jun 2018 - Submissions and Registrations open via Indico
13 Jul 2018 - Deadline for submission
17 Aug 2018 - Contribution list published
14 Sep 2018 - Full agenda published
06 Oct 2018 - Deadline for slideset submission
13 Oct 2018 - Workshop
Details for presentation submission are published here:
The workshop presentations will be organized by common themes, depending
on the topics and the timing of each presentation. There are 30-minute
and 15-minute slots, let us know your preference in your submission.
To allow the Programme Committee to make objective assessments of
submissions, so as to ensure the quality of the workshop, submissions
SHOULD include slides. Draft slides are acceptable on submission.
If you have questions or concerns you can contact the Programme Committee:
Sebastian Castro, on behalf of the Programme Committee
OARC depends on sponsorship to fund its workshops and associated social
events. Please contact <sponsor(a)dns-oarc.net> if your organization is
interested in becoming a sponsor.
(Please note that OARC is run on a non-profit basis, and is not in a
position to reimburse expenses or time for speakers at its meetings.)
Chief Scientist @ InternetNZ
desk: +64 4 495 2337
mobile: +64 21 400535
I'm happy to announce that we have locked in a venue for the NZNOG
conference in 2019.
Where : Napier Conference Centre, Napier
When (conference proper) : 31 January to 1 February, 2019
As normal, expect there will be various workshops and tutorials in the days
prior the conference proper.
Note, this is a change from our usual dates due to Linux Conference
Australia coming to Christchurch during NZNOG's 'normal' week.
We'll be putting together our sponsorship packages this month. In the
meantime, if anyone is interested in sponsoring the conference please make
contact with info(a)nznog.org .
(on behalf of the NZNOG Trust)
I am interested in looking at the progression of hacking strategies over
the last ten years or so. However hackers typically don't talk and sadly
my circle of friends do not extend to those leading the hacking trends,
that is, well resourced criminal groups and nation states.
Hackers do however read. I'm interested in what you have found that
already exists in the public domain. Stuff where you have gone "ohhh,
interesting..." or "that's novel" or "I can't talk about it, but I have
seen this...". I am anticipating links to publicly available news
articles, government reports, conference presentations, YouTube videos
The goal is an academic paper examining these trends that hopefully will
present interesting insights.
I am a researcher at Victoria in Wellington under Professor Ian Welch
whom runs our Cyber Security undergraduate degree and postgraduate
research. I have an ME in Software Engineering with a Network Security
slant and am currently working towards a PhD in the same field with an
applied science focus. I like to think I am making stuff that is
I am very happy to chat if you are interested and will respect the need
to discuss clients and employers in the abstract. Coffee is on me.
But, my main interest here is interesting links Please email me direct!
Engineering and Computer Science
Hi NZNOG Community,
As you may know, every two years APNIC conducts a large-scale survey to
help us understand the needs and wishes of its Members and those who use
The results of the survey provide guidance for the future direction of
As a valued member of the APNIC community, I’d like to personally invite
you to take the survey. Please also share the survey link with your
colleagues so they can complete the survey too.
The survey is anonymous and no identifying information will be made
available to APNIC.
The survey closes on 2 July 2018. There will be three prize draws during
the survey period.
Thank you for your continued support of APNIC.
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during May 2018:
ASN Name Fixed-By
55850 TRUSTPOWERLTD 2018-05-21
Further information for the inferred remediation is available at:
Source Address Validation issues inferred during May 2018:
ASN Name First-Spoofed Last-Spoofed
9876 NOWNEW 2016-09-26 2018-05-31
Further information for these tests where we received spoofed
packets is available at:
Please send any feedback or suggestions to spoofer-info(a)caida.org