Routing Security in Latin America and the Caribbean Table of Contents

Total Page:16

File Type:pdf, Size:1020Kb

Routing Security in Latin America and the Caribbean Table of Contents Routing Security in Latin America and the Caribbean Table of Contents Acknowledgments 3 Introduction 4 What is at Stake? 5 Types of incidents 8 Route Hijacking (BGP Hijacking) 9 Route Leaks (BGP Leaks) 10 Incidents Timeline 12 Event Analysis 15 Methodology 15 Numbers around the World 16 Numbers in the Region 27 Events by Country 28 Rankings in Latin America 35 Mitigation Strategies 36 Initiatives 38 FORT Project 39 Conclusion 40 Annexes 41 Number of Incidents by Month around the World 41 2017 Statistics 42 2018 Statistics 46 2 Acknowledgments Author: Augusto Luciano Mathurin Supervisors: Carolina Caeiro Guillermo Cicileo Reviewers: Carlos Martinez-Cagnazzo Raúl Ramirez Castañeda Style Editor: María Eugenia Martínez Graphic Designer: Martin Mañana English Translator: Justina Díaz Cornejo Collaborators: Andrei RoBachevsky Gerardo Pias Mariela Rocha 3 Introduction Routing is one of the few components of Internet infrastructure that is still insecure. Nowadays, it is easy to hijack routing systems to Block weBsites, spy on users and redirect traffic to false destinations. These vulneraBilities may affect the free flow of information around the world and pose a threat to the security and privacy of users. Internet standardization Bodies have Been struggling for a long time to identify strategies that make routing more secure. The purpose of this three-part report is to help us address and understand this issue both globally and in our region. ● Firstly, as an introduction, this report explains that the Internet can Be the target of various attacks of very diverse technical characteristics, and then moves on to routing infrastructure attacks that Become incidents: hijacks and leaks in the BGP protocol. ● It then provides an exhaustive analysis of incident data collected in 2017, 2018 and part of 2019. This is to understand —on the Basis of statistics that can Be studied By country— how routing security has evolved in the last few years. Statistics help us get a grasp of how our region compares to the rest of the world and actually show how these incidents may affect Internet freedom. ● Lastly, it outlines the various measures that network operators can adopt to enhance the Internet routing system. Mainly, the implementation of a puBlic key infrastructure for resource certification (RPKI), which has Been the most successful initiative in securing BGP routing. This report is part of a RPKI deployment campaign in Latin America and the CariBBean, promoted By the FORT project, a joint initiative of LACNIC and NIC.MX, which seeks to improve routing system security and resilience. 4 What is at Stake? Tip! This section aims at introducing technical concepts and topics that provide the report with context. If you are knowledgeable about network operation, you can skip this part and go straight to the “Incidents Timeline” section. Cyber-attacks are not new. They Began as a few incidents that made amazing news headlines, But they are now part of the daily news: the week's Blocking, data Breach, malware or attack. Some governments seek to prevent their citizens from communicating freely through the Internet,1 for cultural and historical reasons, to avoid organized demonstrations or incidents, to hide uncomfortaBle truths or simply to keep the upper hand on the population in the name of security and social wellBeing. Criminal associations engage in online massive scams and even some organizations try to saBotage their competition. But, how can there Be attacks on the Internet? To answer this question, we first need to think what the oBjective of the attacker is or, in other words, which quality of the information they want to affect. It is possible to attack the confidentiality (which translates into espionage attacks), the availaBility (which results in censorship) or the integrity (which devolves into fraud) of information. Once the objective has been set (what to attack), the strategy is planned (how to attack) and, as is often the case, it is possiBle to reach the same destination (to accomplish the oBjective) through different paths. Internet architecture is complex, and different attacks can Be carried out at several different levels or layers and they evolve with time. At the same time, the security measures to mitigate them are Being perfected. As regards censorship, which is the most common goals, there are different types of technical strategies to carry it out.2 The most famous are: ● Blocking the access to certain IP addresses. For instance, an ISP can prevent its clients from accessing a certain site, discarding all of the requests whose destination is the IP address that corresponds to the servers where the Blocked portal is hosted. This technique can also Be used from the other end; i.e., a server that rejects the requests coming from an IP set. For example, the ones that Belong to a certain country. ● DNS filtering. Generally, ISPs offer their own DNS resolver server; i.e., the service that translates URLs or domains (like www.lacninc.net) into an IP address (in this case, 200.3.14.184). It is possible to block domains that belong to the sites an attacker wants to censor. This way, clients 1<https://www.maketecheasier.com/internet-censorship-block-citizens-from-weBsites/> 2<http://www.unesco.org/new/en/communication-and-information/resources/puBlications-and-communication- materials/puBlications/full-list/freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the- internet/> 5 are not able to reach their intended destination. This technique can Be easily avoided By changing the device’s DNS resolver server, although nowadays most of DNS queries are not made using encryption. This means that providers can also set filters even when queries are not sent to their DNS servers. ● URL filtering. When clients connect to the Internet through a proxy server, it is possiBle to filter the addresses or URLs of weBsites that contain certain words. ● The “kill switch” solution is also possiBle. This means turning routers off using software (through malware) or physically unplugging them. This way, it is possiBle to deprive a population of Internet access or to take down a server. ● Content removal. Sometimes, it is not necessary to censor an entire web portal, but just to somehow force it to stop showing certain content. This technique is the most commonly used when resolving some legal disputes, such as copyright infringement. ● Denial-of-service attacks. Another way to shut down a server is to saturate it By redirecting an irrational amount of garBage traffic to it. This list is not exhaustive. It simply aims at providing a notion of the range of potential or existing attacks. This report focuses on the attacks that happen in another part of the Internet infrastructure: the routing layer. Akin to a road network, the Internet has its own highways and crossroads, which are caBles and routers. When driving, we use a GPS, a driver-assistance system to know how to get from point A to point B, driving on all the necessary routes and making the necessary stops. Similarly, the Internet uses its own navigation system, called BGP (Border Gateway Protocol), which makes it possiBle for data traffic in the network to reach its destination. Just like most of Internet protocols, the BGP was created toward the end of 1980s, in a scenario that was very different from the current one. At the time, only a small numBer of networks needed to Be connected. Back then, security was not a core principle to have in mind, so the protocol was strongly based on a trust game between the parties. Things are different today. With over 92,0003 registered autonomous systems that are part of this Internet navigation system, it can no longer Be assumed that all of its participants are trustworthy. Certain actors may even Be rivals, like two competing ISPs that offer their services to the same population. How is this scenario harmful to Internet users? Back to the road network analogy, if caBles are the roadways, then the BGP would Be the road sign system; i.e., all the signs that indicate which roads to take in order to get to the desired destination. The proBlem with —and, at the same time, the advantage of— the Internet is that there is no central Body to manage it, so it is impossible to control who places the signs on this road network or whether their indications are authentic. This is the so-called BGP trust game, and it can Be used to carry out attacks, censor, and spy on users. When we visit a weBsite, Both endpoints (our device and the server hosting the portal) have an IP address that allows their identification. Thus, data packets have a source and a destination, But what happens on the way? 3 <https://www-public.imtBs-tsp.eu/~maigron/RIR_Stats/RIR_Delegations/World/ASN-ByNB.html> 6 In the postal system, letters are not sent straight to their destination, but to intermediaries, the post offices.4 When using this system, the letter goes to a local post office and may go through several intermediary post offices until it arrives at the city where it will reach its final address. On the Internet, when data packets are sent from our device to the desired endpoint, these are first sent to the “post offices”, i.e., the autonomous systems. An autonomous system is a network or a network set managed By an organization and has a common routing policy. Generally, autonomous systems are ISPs or organizations that connect multiple ISPs. Just like devices connected to the Internet are identified with an IP address, autonomous systems are identified with a 16- or 32-bit number, called ASN (Autonomous System NumBer).
Recommended publications
  • Securing Interdomain Network Routing with Resource Public Key Infrastructure (RPKI)
    Securing Interdomain Network Routing with Resource Public Key Infrastructure (RPKI) A Technical Paper prepared for SCTE•ISBE by Mark Goodwin IP Design Engineer Cox Communications, Inc 6305-B Peachtree Dunwoody Rd, Atlanta, GA 30328 404-269-8267 [email protected] © 2019 SCTE•ISBE and NCTA. All rights reserved. Table of Contents Title Page Number Table of Contents .................................................................................................................................... 2 1. Introduction .................................................................................................................................... 4 2. Motivations .................................................................................................................................... 4 2.1. BGP Security Analysis ....................................................................................................... 4 3. RPKI Components ......................................................................................................................... 6 3.1. Certificate Authority (CA) ................................................................................................... 7 3.2. Resource Certificate .......................................................................................................... 7 3.3. Route Origin Authorizations (ROAs)................................................................................... 8 3.4. RPKI Validating Cache .....................................................................................................
    [Show full text]
  • The Regional Internet Registry (RIR) System
    The Regional Internet Registry (RIR) System Hisham Ibrahim | Turkey | August 2017 1 Regional Internet Registry (RIR) The Regional Internet Registry (RIR) and bottom-up community driven number resource management model 2 Hisham Ibrahim | Turkey | August 2017 Regional Internet Registry (RIR) The Regional Internet Registry (RIR) and bottom-up community driven number resource management model 3 Hisham Ibrahim | Turkey | August 2017 Identification Sender and Receiver Addresses Internet Number Resources 11000000000000000000001000110101 192.0.2.53 IP version 4 (IPv4) • Initially deployed: 1 January 1983. • IPv4 addresses are 32-bit numbers. (4.2 Billion) 11000000000000000000001000110100 • Still the most commonly used 192.0.2.52 version. Hisham Ibrahim | Turkey | August 2017 5 Internet Number Resources 192.0.2.52 ? 192.0.2.53 192.0.2.52 Hisham Ibrahim | Turkey | August 2017 6 Internet Number Resource Management John Postal used to manually distribute IP addresses Hisham Ibrahim | Turkey | August 2017 7 Internet Number Resource Management IANA RIR RIR RIR RIR RIR End Site ISP Hisham Ibrahim | Turkey | August 2017 8 Regional Internet Registry (RIR) The Regional Internet Registry (RIR) and bottom-up community driven number resource management model Hisham Ibrahim | Turkey | August 2017 9 RIPE Policy Development The RIPE community develops and sets policies through a long established, open, bottom-up process of discussion and consensus-based decision making. Where does it happen? Policy development happens at RIPE Meetings (where RIPE Working Groups meet) and the RIPE Working Group mailing lists. 10 Hisham Ibrahim | Turkey | August 2017 RIPE Policy Development To promote and support the inclusive and open process: • Everyone is welcome and encouraged to take part in the workings of RIPE by attending RIPE Meetings and participating on RIPE Working Group mailing lists; • Mailing lists are publicly archived; • The minutes of working group sessions at RIPE Meetings are publicly archived; • All policies are formally documented and publicly available.
    [Show full text]
  • Bambauer-Macro-V2-Nov 28.Docx (Do Not Delete) 12/12/14 6:26 Pm
    BAMBAUER-MACRO-V2-NOV 28.DOCX (DO NOT DELETE) 12/12/14 6:26 PM FOXES AND HEDGEHOGS IN TRANSITION DEREK E. BAMBAUER* INTRODUCTION .......................................................................................... 1 I. A FLATTER NETWORK ........................................................................... 2 II. UNIVERSAL SERVICE? .......................................................................... 7 III. THE CAST OF CHARACTERS .............................................................. 10 CONCLUSION ........................................................................................... 16 INTRODUCTION The migration from a congeries of communications protocols and technologies to an Internet Protocol-based system is an architectural shift of profound magnitude: it is as though people returned to the city of Babel, abandoning their native tongues for a single lingua franca. Perhaps, after this shift, nothing will be restrained from those who use the Internet.1 And yet, there will inevitably be problems that arise from the shift. Scholars and activists have already raised concerns about equal access to communications capabilities; about the security and resiliency of the new architecture; and about the tension between competing speech interests on the network. One way of thinking about these problems, and potential solutions, is to classify them as either hedgehogs or foxes. The British philosopher Isaiah Berlin suggested that intellectuals can be classified into these two camps, puckishly borrowing from the Greek
    [Show full text]
  • BGP Interconnection in the Region of Latin America and the Caribbean
    BGP Interconnection in the Region of Latin America and the Caribbean Author: Augusto Mathurín Coordination/Revision: Guillermo Cicileo Edition and Design: Maria Gayo, Carolina Badano, Martín Mañana Project: Strengthening Regional Internet Infrastructure Department: Internet Infrastructure R&D Contents Contents 2 Introduction 4 Methodology 4 Stated Objectives 4 Data Sources 4 Data Processing 6 Generated Datasets 8 Data by Country 10 Argentina 10 Aruba 12 Bolivia 13 Brazil 15 Belize 17 Chile 19 Colombia 21 Costa Rica 23 Cuba 25 Dominican Republic 27 Ecuador 29 French Guiana 31 Guatemala 32 Guyana 34 Honduras 36 Haiti 38 Mexico 40 Nicaragua 42 Panama 44 2 Peru 46 Paraguay 48 Suriname 50 El Salvador 52 Trinidad and Tobago 54 Uruguay 56 Venezuela 58 Regional Data Analysis 60 Connection to the Other Regions 62 Conclusions and Future Work 65 3 Introduction Internet development and the quality of user connectivity depend on the existence of good communications infrastructure and proper connectivity between countries. In Latin America, there are still some deficiencies in this regard which result in many people experiencing high latencies in their connections. The main reason for these latencies is the lack of local interconnection between different network operators, which means that traffic between nearby countries must often use distant Internet exchange points, located in the United States or Europe. The deployment of various Internet exchange points (IXPs) has helped improve this situation, although the actual status of connectivity between countries and networks remains a mystery. To find answers to these unknowns, some time ago LACNIC created Simón1, a project that seeks to generate information by measuring latency levels between countries and in this way estimate traffic volumes.
    [Show full text]
  • Using Whois Based Geolocation and Google Maps API for Support Cybercrime Investigations
    Recent Advances in Telecommunications and Circuits Using Whois Based Geolocation and Google Maps API for support cybercrime investigations Asmir Butkovic*, Fahrudin Orucevic**, Anel Tanovic*** * Sector for Informatics, Police Support Agency of Bosnia and Herzegovina Aleja Bosne Srebrene bb, Sarajevo 71000, Bosnia and Herzegovina ** Department of Computer Science and Informatics University of Sarajevo, Faculty of Electrical Engineering Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina *** Department of Computer Science and Informatics University of Sarajevo, Sarajevo School of Science and Technology Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina [email protected], [email protected], [email protected] Abstract: - A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Cybercrime refers to any crime that involves a computer and network, where computer may or may not play an instrumental part in the commission of the crime. Detection and investigation of cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. In this paper, we are focusing on technologies that can help to improve the effective investigation of cybercrime, facilitate police work and enable investigators to allocate their time to other tasks. We have developed an IP mapping tool called MIPA that combines online mapping techniques and IP geolocation technology, and uses application functionality from disparate web sources. The emergence of the Web 2.0 and user-friendly online mapping techniques have created public interest in contributing information through Web- enabled geospatial tools.
    [Show full text]
  • Uaenic-Cctld Worksho#2D3BA2
    UAEnic United Arab Emirates Amani Mohammed Bin Sewaif Zain Al Abdeen Baig November 2007 Agenda What is UAEnic? The Objectives UAEnic Time Lines Domain Names Statistics Evolution of (.ae) Domain Names UAEnic Technical Operations Domain Name System DNS Architecture Arabic GCC IDN Test Additional Services What is UAEnic? UAE Network Information Center (UAEnic) The (.ae) Domain Name Registry – ccTLD of the UAE since 1995 Local Internet Registry (LIR) 1.7.9.e164.arpa maintainer IDN’s Arabic Root technical implementer Objectives Give the UAE an extensive global presence in the cyber world. Treat all eligible applicants equally on a first come, first served basis. Promote the use of Internet in UAE for economical, educational and cultural development. UAEnic Time Lines 1994 2002 UAE University was delegated by Developed Domain Name Dispute IANA to run (.ae) Domain Name Resolution Policy 3 & 10 years Space. registration contract 1995 Was authorized by ITU to run ENUM UAEnic was re-delegated to run (.ae) (+971) Registry (among the first in the Domain Name Space with mutual world) agreement with UAE University. 2004 UAEnic was an authorized LIR by Hosting of “F” Root Name Server in RIPE NCC Dubai 2001 2005 UAEnic was allocated IPv6 Addresses. Hosting of “K” Root Name Server in (first in the region). Abu Dhabi 50 years registration contract 2007 Discussions with TRA about the future of .ae Domain Statistics Breakdown of .ae Domains ae 43300 co.ae 3378 net.ae 101 org.ae 189 sch.ae 739 ac.ae 128 mil.ae 9 gov.ae 463 Total
    [Show full text]
  • Exploring and Analysing the African Web Ecosystem
    1 Exploring and Analysing the African Web Ecosystem 2 3 4 RODÉRICK FANOU ?, CAIDA/University of California, San Diego (UCSD), USA 5 † GARETH TYSON, Queen Mary University of London, United Kingdom 6 7 EDER LEAO FERNANDES, Queen Mary University of London, United Kingdom 8 PIERRE FRANCOIS, Independent Contributor, France 9 10 FRANCISCO VALERA, Universidad Carlos III de Madrid (UC3M), Spain 11 ARJUNA SATHIASEELAN, University of Cambridge, United Kingdom 12 13 It is well known that Internet infrastructure deployment is progressing at a rapid pace in the African continent. A urry of recent 14 research has quantied this, highlighting the expansion of its underlying connectivity network. However, improving the infrastructure 15 is not useful without appropriately provisioned services to exploit it. This paper measures the availability and utilisation of web 16 17 infrastructure in Africa. Whereas others have explored web infrastructure in developed regions, we shed light on practices in developing 18 regions. To achieve this, we apply a comprehensive measurement methodology to collect data from a variety of sources. We rst focus 19 on Google to reveal that its content infrastructure in Africa is, indeed, expanding. That said, we nd that much of its web content is still 20 served from the US and Europe, despite being the most popular website in many African countries. We repeat the same analysis across 21 a number of other regionally popular websites to nd that even top African websites prefer to host their content abroad. To explore 22 the reasons for this, we evaluate some of the major bottlenecks facing content delivery networks (CDNs) in Africa.
    [Show full text]
  • IANA Report on Recognition of Afrinic As a Regional Internet Registry
    IANA Report Subject: Recognition of AfriNIC as a Regional Internet Registry Date: 6 April 2005 The Internet Assigned Numbers Authority (the IANA), as part of the administrative functions associated with management of the Internet Protocol (IP) address space, is responsible for evaluating applications for approval of new Regional Internet Registries. ICANN has received an application for final approval and recognition of the African Internet Numbers Registry (AfriNIC) as the fifth Regional Internet Registry (RIR). Background The role and responsibilities of ICANN/IANA in this area are defined in the Address Supporting Organization Memorandum of Understanding <http://www.icann.org/aso/aso- mou-29oct04.htm> (ASO MOU), and ICP-2 <http://www.icann.org/icp/icp-2.htm> ("Criteria for Establishment of New Regional Internet Registries"). In September 2004, an application was submitted by the AfriNIC organization for recognition, together with a detailed transition which included draft bylaws, policies, funding model, and staff resumes. On request of the ICANN President, the IANA staff conducted a preliminary evaluation. In September 2004 the President reported to the Board his conclusion that the application and transition plan constituted a reasonable basis for eventual recognition, though he noted that some adjustments would be necessary. Also in September 2004, the existing RIRs, APNIC, ARIN, LACNIC and RIPE NCC, through the Number Resource Organization (NRO), issued a statement expressing their ongoing and continuing support for AfriNIC, and recommending a favorable response to the application by recognizing AfriNIC's accomplishments thus far. Consistent with the IANA©s preliminary evaluation and the recommendations of the existing RIRs, the ICANN Board on 30 September 2004 gave provisional approval <http://www.icann.org/minutes/resolutions-30sep04.htm> to the AfriNIC application, with the expectation that the transition plan would be completed and an amended or revised application for recognition would be submitted.
    [Show full text]
  • Overview of Routing Security Landscape for the Quilt Member Meeting, Winter 2019 Mark Beadles, CISO, Oarnet [email protected] BGP IDLE
    Overview of Routing Security Landscape for the Quilt Member Meeting, Winter 2019 Mark Beadles, CISO, OARnet [email protected] BGP IDLE CONNECT ACTIVE OPEN OPEN SENT CONFIRM ESTAB- LISHED 2/13/2019 Routing Security Landscape - The Quilt 2 Overview of Routing Security Landscape • Background • Threat environment • Current best practices • Gaps 2/13/2019 Routing Security Landscape - The Quilt 3 Background - Definitions • BGP • Border Gateway Protocol, an exterior path-vector gateway routing protocol • Autonomous System & Autonomous System Numbers • Collection of IP routing prefixes under control of a network operator on behalf of a single administrative domain that presents a defined routing policy to the Internet • Assigned number for each AS e.g. AS600 2/13/2019 Routing Security Landscape - The Quilt 4 Background - The BGP Security Problem By design, routers running BGP accept advertised routes from other BGP routers by default. (BGP was written under the assumption that no one would lie about the routes, so there’s no process for verifying the published announcements.) This allows for automatic and decentralized routing of traffic across the Internet, but it also leaves the Internet potentially vulnerable to accidental or malicious disruption, known as BGP hijacking. Due to the extent to which BGP is embedded in the core systems of the Internet, and the number of different networks operated by many different organizations which collectively make up the Internet, correcting this vulnerabilityis a technically and economically challenging problem. 2/13/2019 Routing Security Landscape - The Quilt 5 Background – BGP Terminology • Bogons • Objects (addresses/prefixes/ASNs) that don't belong on the internet • Spoofing • Lying about your address.
    [Show full text]
  • High Volume of European Network Traffic Re-Routed Through China
    Memo 11/06/2019 - TLP:WHITE High volume of European network traffic re-routed through China Telecom Reference: Memo [190611-1] Date: 11/06/2019 - Version: 1.0 Keywords: BGP, digital infrastructure, China Sources: publicly available information Key Points A routing incident led to 70 000 routes used for European traffic being redirected through China Telecom for over 2 hours. Border Gateway Protocol (BGP) errors are a relatively common issue but usually last just a few minutes. China Telecom has still not implemented some basic routing safeguards to detect and remediate them in a timely manner. Summary On June 6, a routing incident led to over 70 000 routes used for European mobile networks being redirected through China Telecom for over two hours. The incident began at 09:43 UTC when Swiss data centre colocation company Safe Host (AS21217) unintentionally leaked over 70 000 routes to China Telecom (AS4134) in Frankfurt, Germany. China Telecom then announced these routes on to the global internet redirecting large amounts of traffic destined for some of the largest European mobile networks through China Telecom’s network. Some of the most impacted European networks included Swisscom (AS3303) of Switzerland, KPN (AS1136) of Holland, Bouygues Telecom (AS5410) and Numericable-SFR (AS21502) of France. Often routing incidents only last for a few minutes, but in this case, many of the leaked routes were in circulation for over two hours. Comments China Telecom, a major international carrier, has still not implemented neither the basic routing safeguards necessary to prevent propagation of routing leaks nor the processes and procedures necessary to detect and remediate them in a timely manner when they inevitably occur.
    [Show full text]
  • Download the Report
    Index Algar Telecom Message from the Management Main Indicators for 2019 Purpose and Vision, Mission and Values Corporate Profile Our History Operating Segments Intangible Assets Corporate Governance Governance Structure Compliance and Risk Management Policies, Regiments and Codes Our People Customer Experience People Management Attraction and engagement Health and Safety Relationship with Suppliers Strengthening our Business Value-Creation Model Growth Strategy Algar Franquias Digital Transformation Brain and Estação Social and Environmental Management Sustainable Commitment Social Performance Environmental Performance Performance Sustainability Report 2/100 For a better content display, data formatting and report https://algar2019.blendon.com.br/en interactivity, check the online version: Business Performance Network Reliability Awards and Recognition Outlook Vision of the Future Measures against COVID-19 2019 Sustainability Report About the Report GRI Summary Supplement to GRI Indicators Credits Sustainability Report 3/100 For a better content display, data formatting and report https://algar2019.blendon.com.br/en interactivity, check the online version: Message from the Management GRI 102-14 Reflecting Algar Telecom’s strategy and its efficient implementation, our net revenue totaled R$2,126.6 million, up by 5.7% over 2018. We recorded the highest result in the history of the Company, with net income reaching R$303.2 million, up by 13.8% compared to the previous year. The numbers, even with a slower than expected recovery in the Brazilian economy, reflect the new products and services launched, efficiency improved and geographic growth, ensuring new market opportunities and increasing our capillarity. We are now operating in new locations and strengthened our operations in the Northeast with the expansion process started in 2018.
    [Show full text]
  • ALGAR TELECOM S/A Publicly-Held Company CNPJ (Corporate Tax) No.: 71.208.516/0001-74 NIRE (Company Register Identification Number): 313.000.117-98
    REGISTERED IN CATEGORY “B” ALGAR TELECOM S/A Publicly-Held Company CNPJ (Corporate Tax) No.: 71.208.516/0001-74 NIRE (Company Register Identification Number): 313.000.117-98 MANAGEMENT PROPOSAL Ordinary and Extraordinary General Meeting to be held on April 20, 2018. Page 1 of 9 REGISTERED IN CATEGORY “B” TABLE OF CONTENTS Item Subject Page 1. Ordinary General Meeting 3 1.1. Acknowledge the accounts of the Administrators, examine, discuss and vote on the Management Report, Financial Statements, accompanied by Reports issued by Independent Auditors and the Fiscal Council for the 3 fiscal year ended December 31, 2017. 1.2. Resolve on the proposed destination of net income for the 2017 fiscal 3 year. 1.3. Resolve on the number of members that will be part of the Board of 4 Directors. 1.4. Elect the members of the Board of Directors. 4 1.5. Resolve on the proposed remuneration for Directors. 6 1.6. Resolve on the non-installation of the Fiscal Council. 7 1.7. Resolve on the Company’s proposed capital budget for the fiscal year 7 ending on December 31, 2018. 2. Extraordinary General Meeting 8 2.1. Resolve on the proposed distribution of part of the profit reserve account 8 as dividends. 3. General Instructions 8 Page 2 of 9 REGISTERED IN CATEGORY “B” Dear Shareholders, This Management Proposal was prepared by the Board of Directors of ALGAR TELECOM S/A (the “Board” and “Company”, respectively), pursuant to Law 6.404, dated December 15, 1976 (“Law 6.404/76”), and CVM Instruction 480, dated December 7, 2009 (“CVM Instruction 480”), to inform and guide the Company's shareholders on the deliberations to be taken at the Ordinary and Extraordinary General Meeting to be held on first call on April 20, 2018, at 09:00 a.m.
    [Show full text]