Trends in Lawful Interception and Its Applications in National Security
|
|
- Oswald Warren
- 5 years ago
- Views:
Transcription
1 Vol.1 No. 2, (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication Engineering Ajay Kumar Garg Engineering College, Ghaziabad, India A fast changing environment opens new doors to terrorism and crime. Nowadays network and content providers are very much required to corporate with LEAs in order to provide LI similarly as it is required from massive telecommunication operators. Availability of communication data is very important for law enforcement but unfortunately the significance just emerged after the crime take place. Now we have to take a step ahead to stop the terrorism and other suspicious activities before they actually taken place. The security threat burgeoning in new direction.li is become priority and major forces of LIA. In the present paper we are trying to reduce terrorism and other suspicious activity with the help of application of LI.In order to find out the suspicious activity it is necessary to make the system learn the usual habits of telecommunication user. Increase of any suspicious activity generally the behaviour of caller changes. A lot of filters can be developed that can go for DPI and identify those packets for LIA where the behaviour pattern changes. The filter can be design depending on the characteristic of criminals and by this process we would in position to narrowdown the antisocial elements trying to use network of national activity. Introduction In some countries, for the national security and for investigation of criminal evidence, the lawful interception is required.3gpp provides specifications on lawful interception in [1],[2] and [3].This paper discusses the overview of LI and its application for private communication. Lawful Interception is a very delicate issue. Authorities capture the communications of certain users in order to tackle criminal activity. Ability to perform LI may be a precondition for a licence to operate telecommunications network. Lawful intercept (LI) is a process for obtaining communications network data related to an individual (a target), as authorized by a judicial or administrative order. To facilitate the lawful intercept process, certain legislation and regulations require service providers (SPs) and Internet service providers (ISPs) to explicitly support authorized electronic Surveillance on their networks to facilitate the interception of telecommunications by law enforcement agencies (LEAs), regulatory or administrative agencies, 95
2 and intelligence services, in accordance with local law. The LEAs are regulatory, administrative, or intelligence agencies. These agencies are required to monitor an individual s or organization s voice, video, are text communications as authorized by judicial authorities. Data which is monitored are primarily collected as evidence or for investigative analysis. The monitored individual s or organization s calls are tapped at the SP network and data is sent directly to LEAs. The data collection and its consumption are all done in accordance with local laws. Data would be collected and examined in real time and the collected data would be preserved for future use. The process of collection of tapped data is Lawful Intercept. LEMF LEA INTERCEPT REQUEST IRI CC Administrati on Delivery Function TECHNICAL INTERCEPTION HANDOVER C 3GPP Network IRI CC User INTERCEPT REQUEST 3GPP Network Overview of Li Model LI may target two types of data: the actual contents of communications (CC) which may include voice, video or text message contents, and Intercept Related Information (IRI, Call Data (CD) in the United States). IRI consists of information about the targeted communication itself: signalling information, source and destination (telephone numbers, IP or MAC addresses, etc), frequency, duration, time and date of communications. On mobile networks, it may also be possible to trace the geographical origin of the call. Network operators have always been collecting some IRI for billing and network management purposes and so it is relatively easy for law enforcement agencies to gain access to this information. Three main functions are defined for LI applications: Capturing For LI applications, capturing of packets includes the task of extracting information from the communications network. Capturing should not affect the SP network that carrying traffic. This function includes identifying the sources that will be able to provide the requested information. For instance, this could involve isolating routers or gateways in the network that are carrying the information and extracting this information from these devices. Filtering LI requires that unauthorized information cannot be extracted from the network. Thus, information captured has to be filtered to include only authorized information. Delivery Filtered information has to be delivered to the Law Enforcement Monitoring Facility (LEMF). The LEMF may not reside in the same premise as the Service Provider. In this case, 96
3 information is encrypted if it has to be transported over a public network. Security of processes The intercept function shall only be accessible by authorised personnel. Only authorised personnel can be aware that an intercept function has been activated on a target. No indication shall be given to any person except authorised personnel that the intercept function has been activated on a target. To be effective, interception must take place without the knowledge of any party to the communication. Authentication, encryption, log files and other mechanisms may be used to maintain security in the system. CSPs shall ensure that its equipment, facilities, or services that provide a subscriber with the ability to originate, terminate, or direct communications are capable of facilitating authorized communications interceptions and access to intercept related information unobtrusively and with a minimum of interference with any subscriber's telecommunications service and in a manner that protects: - The privacy and security of communications (both signalling and content of communication) not authorized to be intercepted; and - Information regarding the LEA s interception of communications. Audit procedures, performed by the CSP, should have access to accurate logs of administration commands and accesses to functions and interception information. Log files shall only be accessible by authorised personnel. Primary Requirement for Lawful Intercept Junos Operating System uses the flow-tap application to dynamically capture network flows for lawful intercept. Dynamic Flow Capture uses DTCP requests to capture packet flows based on dynamic filtering criteria. The primary requirement for lawful interception includes; It must provide an interface by which a mediation device can connect to the routing device and request a copy of packets sent to and from an intended target. It must maintain separation of different LEAs on the device. If multiple agencies are requesting LI action on the same device or for the same target, the agencies must not be aware of each other s presence, and they must not be able to see each other s LI configuration and status. The authorized personnel are only allowed for seeing the configuration for deciding which packet flow to capture and the intercept function on the router. The intended target of the LI interception must not be aware of the interception. A mediation device is required to test the interception application (flow-tap). The mediation device can be a Linux server with SSH capabilities. 97
4 Need of Lawful Interception How Bin Laden Evaded Lawful Interception; Laden was able to circumvent the Internet and yet send an almost uncountable number of s pointing out frustrations that Lawful Interception personnel can encounter when monitoring suspicious activities and people. Although his compound had no phone or Internet capabilities, Laden was able to stay in touch with his far-flung network of operatives without leaving digital fingerprints. He merely typed a message on his unconnected computer, saved it to a thumb drive and passed that to a courier who later plugged it into a memory drive at an Internet café, copied Laden s message into an and sent it. Any responses would be copied to the flash drive and transported back to Laden. Though arduous, the effectiveness of his strategy left officials amazed that he could sustain such a breadth of communication for so long. With the help of this example we can see that, in the past Lawful Interception was simpler and more straightforward because it was confined to traditional voice traffic. Even in the earlier days of the Internet, it was still possible to intercept a target s communication data fairly easily. Earlier terrorist can easily evade it but now the time has changed. Today, LI applications focus purely on intercepting content and have very low accuracy location context provided by cell tower location techniques like Cell- ID (CID) or Enhanced Cell-ID (ECID). This can render the applications ineffective because the target's actual location is relatively unknown; whereas, with accurate location data the LI mission can be accomplished with a much higher success rate. Using GPS for LI applications is not feasible because it does not work indoors and in dense urban areas, and the target user has the option to disable or jam GPS location tracking capabilities on their phone. Location technologies such as multi-lateration (UTDOA) require radio hardware on every cell tower making it extremely cost intensive with a large degree of complexity in terms of deployment and maintenance. Polaris WLS is the only high accuracy, software-only location technology that is low cost, scalable, and reliably provides high accuracy across all types of environments. Besides high accuracy (sub 50m) and scalability, one of the key unique features of WLS is its ability to perform mass (bulk) location of all subscribers, on a near real-time basis, enabling applications such as mass location interception along with postevent analytics. Polaris WLS in conjunction with its intelligent zone services software platform also powers border zone interception with a high degree of precision. Conclusion In this paper we have defined the overview of lawful interception. The three main functions of LI have been discussed. With the help of present paper 98
5 primary requirement of lawful interception can easily be understood. The LI processes are delineated by architectures, such as those specified by ETSI, 3GPP, the WiMAX Forum, and other standards bodies, that facilitate systematic implementations and provisioning of lawful interception systems. However, challenges to lawful interception remain, including the need to support a diversity of services, vendor technologies, wireless networking technologies, voice, and a multiplicity of high speed speed data services. References 1. 3GPP TS : 3rd Generation System Aspects; 3G Security; Lawful Interception Requirements. 2. 3GPP TS : 3rd Generation System Aspects; 3G Security; Lawful Interception Architecture and Functions. 3. 3GPP TS : 3rd Generation System Aspects; 3G Security; Handover Interface for Lawful Interception (LI). 99
WHITE PAPER. The Growing Impact of Social Networking Trends on Lawful Interception
WHITE PAPER The Growing Impact of Social Networking Trends on Lawful Interception www.ixiacom.com 915-6913-01 Rev. A, July 2014 2 Table of Contents How Bin Laden Evaded Lawful Interception... 4 A Fast-Changing
More informationLawful Intercept Overview
CHAPTER 1 This chapter provides information about Lawful Intercept and contains the following sections: Information About Lawful Intercept, page 1-1 Network Components Used for Lawful Intercept, page 1-3
More informationUtimaco OX Summit
Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany
More informationETSI LI Standards Overview
http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including
More informationUtimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems
Techpaper Lawful Interception with Umbrella Systems Table of contents 1 The Challenge... 3 2 Umbrella Systems... 4 3 Abbreviations... 7 25. Aug 2010 Copyright Utimaco Safeware AG 2 of 8 1 The Challenge
More informationAlcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement
More informationMONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.
MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take
More informationMonitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring
Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring DataBridge Flexible communications monitoring 2 Meeting your obligations flexibly As terrorists and organised criminals
More informationAAA Authentication: New Use Cases
AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf
More informationThis regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.
UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities
More informationETSI TS V ( ) Technical Specification
TS 133 106 V10.0.0 (2011-05) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Lawful interception requirements (3GPP TS 33.106 version 10.0.0 Release 10) 1 TS 133 106 V10.0.0
More informationGerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved
ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery
More informationWireless Network Policy and Procedures Version 1.5 Dated November 27, 2002
Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made
More informationEAGLE EYE MC. 1. Introduction
1. Introduction Worldwide explosion of communication technologies creates a significant challenge for law enforcement agencies, national security organizations and enterprise security responsible for battling
More informationDATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION
DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION 2 Data Retention Data Retention has become a buzzword in intense debates between data protectors and law makers over the last few years. It refers
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationwi4 Fixed Point-to-Multipoint Canopy Solutions
wi4 Fixed Point-to-Multipoint Canopy Solutions Canopy Technology is as Simple as it is Powerful The wi4 Fixed Point-to-Multipoint Canopy solution is streamlined, powerful and simple, with built-in installation
More informationIntegrating Communications Compliance into the Next Generation 4G LTE Network
SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or
More information3GPP TS V ( )
TS 33.106 V13.3.0 (2016-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Lawful interception requirements (Release
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4
ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4 Plugtests 2007 Test Cases page 1 of 53 Table of contents 1 Introduction...3 1.1 Scope of the tests... 4 1.2 Test Environment and Setup...
More informationIMEI Security Technical Design Principles
IMEI Security Technical Design Principles Enabling stolen mobile device blocking V4.0 August 2016 Table of Contents 1. Introduction... 1 2. Device Identity Security... 1 3. Design Principles... 2 4. IMEI
More informationWiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic
0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright
More informationSession 3: Lawful Interception
Session 3: Lawful Interception Secure, verifiable and intelligible audit logs to support computer forensics in lawful interception 3 rd ETSI Security Workshop Elena de la Calle Vian Ministry of Industry
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA
Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011
More informationSTAATSKOERANT, 28 NOVEMBER 2005 No SCHEDULE C,
STAATSKOERANT, 28 NOVEMBER 2005 No. 28271 69 SCHEDULE C, DIRECTIVE FOR INTERNET SERVICE PROVIDERS IN TERMS OF SECTION 30(7)(a) READ WITH SECTION 30(2) OF THE REGULATION OF INTERCEPTION OF COMMUNICATIONS
More informationStreamlining Lawful Intercept for WiMAX Networks
White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept
More information4G: Convergence, Openness for Excellence and Opportunity Cisco Systems, Inc
4G: Convergence, Openness for Excellence and Opportunity, Inc 1 4G Not Just for Mobility This next generation of mobility networks will have over the air throughput speeds that will approach those of wireless
More informationMcAfee Total Protection for Data Loss Prevention
McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure
More informationExperimental Analysis of the Femtocell Location Verification Techniques
Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche
More informationPaper on Handling Menace of International Grey Traffic
Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in
More informationETSI TS V1.3.1 ( )
TS 102 233 V1.3.1 (2006-09) Technical Specification Lawful Interception (LI); Service specific details for E-mail services 2 TS 102 233 V1.3.1 (2006-09) Reference RTS/LI-00035 Keywords email, handover,
More informationINCREASING TRUST IN CALLING LINE IDENTIFICATION AND ORIGINATING IDENTIFICATION
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) INCREASING TRUST IN CALLING LINE IDENTIFICATION AND ORIGINATING IDENTIFICATION
More informationISSP Network Security Plan
ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationSOLUTION BRIEF. Video Changes the Future of Policing
SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to
More informationWZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018
White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationUtimaco LIMS. Lawful Interception of Telecommunication Services
Lawful Interception of Telecommunication Services 2 LIMS worldwide Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telecommunication services, and has become an important
More informationThis procedure sets out the usage of mobile CCTV units within Arhag.
CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards
More informationTuesday, May :00 AM - 5:00 PM
Tuesday, May 15 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day One of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationA Plexos International Network Operating Technology May 2006
A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies
More informationMoving The Complex To The Understandable
Massachusetts Telecommunications Symposium Moving The Complex To The Understandable John Reynolds Integrated Architectures July 26, 2004 Thoughts For The Day Subscriber services drive all revenues. providers
More information5G Network Architecture
5G Network Architecture A healthy balance between Evolution and Revolution Peter Merz Head of Radio Systems Technology and Innovation Nokia Networks 1 Nokia 2015 Johannesberg Summit 2015 Peter Merz NGMN
More informationLawful Interception of telecommunication traffic
Federal Department of Justice and Police FDJP IT Service Centre ISC-FDJP Post and Telecommunications Surveillance Service Lawful Interception of telecommunication traffic Organisational and administrative
More informationΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES
ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection
More informationTelecoms Privacy Policy
Telecoms Privacy Policy This policy is to be read in conjunction with, and makes reference to the main Privacy Policy of Post Office Limited. This Telecoms Policy deals with the data processing activities
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationTetraNode Scalability and Performance. White paper
White paper Issue 1.0, May 2017 Introduction Rohill solutions are known for performance, flexibility, scalability, security and affordability. Also, the strong TetraNode system architecture, open standards-based
More informationOptimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,
Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing
More informationETSI TS V1.1.1 ( )
TS 101 331 V1.1.1 (2001-08) Technical Specification Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies 2 TS 101 331 V1.1.1 (2001-08) Reference DTS/SEC-003011-1
More informationPART 11 - Operator Services SECTION 4 - Other Operator Services Original Sheet 1
SECTION 4 - Other Operator Services Original Sheet 1 BUSY LINE VERIFICATION AND INTERRUPTION OF CONVERSATION Upon request, where the type of customer facilities will permit, the operator will verify and
More informationThe University of Sheffield CCTV Privacy Impact Assessment
Security Services. The University of Sheffield CCTV Privacy Impact Assessment Richard Yates Security Services Manager Arts Tower, Western Bank. Et : 29232 r.yates@sheffield.ac.uk March 2016 Version: 01
More informationHelping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching
Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching Against the backdrop of budget constraints, threats from terrorism, organised
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationBasic SAE Management Technology for Realizing All-IP Network
LTE SAE EPC Special Articles on SAE Standardization Technology Basic SAE Management Technology for Realizing All-IP Network The standardization of 3GPP Release 8 brings new provisions for All-IP networks
More informationRepublic of the Sudan National Telecom Corporation. Country case study Incident management capability
Republic of the Sudan National Telecom Corporation Country case study Incident management capability Introduction Due to the ever-increasing role of ICT and their services in the development of nations
More informationVOIP in the TAL group. June 15 th, 2005 Buenos Aires, Argentina
VOIP in the TAL group June 15 th, 2005 Buenos Aires, Argentina IP Telephony: IP Telephony shall be defined as the SERVICE and PROTOCOL suite associated with the transport of voice communication over the
More information2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data
2nd ETSI Security Workshop Future Security Activities in ETSI/TC LI Lawful Interception standardisation, Retained Data Peter van der Arend Royal KPN Netherlands; Chairman ETSI/TC LI 1 Why Lawful Interception
More informationDOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL
DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL WHITE PAPER Small cells can be used to increase wireless network capacity, provide coverage in
More informationCYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012
CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,
More informationIPv6-based Beyond-3G Networking
IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless
More informationHIPAA Federal Security Rule H I P A A
H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created
More informationPCC (Policy and Charging Control) In Mobile Data. EFORT
PCC (Policy and Charging Control) In Mobile Data EFORT http://www.efort.com By implementing policy and charging control (PCC) procedures in their mobile data network, mobile service providers are able
More informationNetwork Service Description
Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationPersonal Handyphone Systems in Urban Infrastructure
Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationT-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation
www.coe.int/tcy Strasbourg, 12 November 2013 (draft) T-CY (2013) 26 Cybercrime Convention Committee (T-CY) T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationOlli-Pekka Hiironen, Antti Pietiläinen, Arne Nylund, Nokia. 1 Privacy in EPON.PPT/ / OPH, AP, AN IEEE802.3ah Ethernet in the First Mile
Olli-Pekka Hiironen, Antti Pietiläinen, Arne Nylund, Nokia 1 Privacy in EPON.PPT/ 20.-22.5.2002 / OPH, AP, AN IEEE802.3ah Ethernet in the First Mile Carlos Ribeiro, CTBC Telecom Kent G. McCammon, SBC Yukihiro
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationData Preservation Checklists
Data Preservation Checklists At the G8 meeting of Justice and Interior Ministers in Moscow in October 1999, the Ministers recognized that law enforcement authorities conducting criminal investigations
More informationRECUEIL DE LEGISLATION. A Annexe N 5 18 décembre S o m m a i r e
MEMORIAL Journal Officiel du Grand-Duché de Luxembourg 1845 MEMORIAL Amtsblatt des Großherzogtums Luxemburg RECUEIL DE LEGISLATION A Annexe N 5 18 décembre 2008 S o m m a i r e Règlement 08/134/ILR du
More informationETSI TS V1.1.1 ( )
TS 103 307 V1.1.1 (2016-04) TECHNICAL SPECIFICATION CYBER; Security Aspects for LI and RD Interfaces 2 TS 103 307 V1.1.1 (2016-04) Reference DTS/CYBER-0005 Keywords cyber security, lawful interception,
More informationCINCINNATI BELL TELEPHONE COMPANY LLC Residence Service Agreement - Local Telephone Services Nonresidence Service Agreement - Local Telephone Services
A. TERMS AND CONDITIONS Custom Calling Services are offered only from select central offices where the Company has arranged the facilities for these services and are furnished subject to the availability
More informationNLETS & CLOUD SECURITY. Bill Phillips, Information Security Officer
NLETS & CLOUD SECURITY Bill Phillips, Information Security Officer Overview Enhancing Nlets Audit Capabilities Nova Architecture Nova Security Services Audit Enhancing Nlets Audits Revising the existing
More informationCUSTOM CALLING SERVICE GTE CALLING SERVICES_ AND CLASS SERVICE 1 B. CONDITIONS GTE CALLING SERVICES_ 1 C. DESCRIPTIONS GTE CALLING SERVICES_ 2
3rd Revised Cal. P.U.C. Index Sheet No. 1 Canceling 2nd Revised Cal. P.U.C. Index Sheet No. 1 INDEX SHEET NO. GTE CALLING SERVICES_ AND CLASS SERVICE 1 A. GENERAL B. CONDITIONS GTE CALLING SERVICES_ 1
More informationElectronic evidence: Worth it!s weight in gold?
Electronic evidence: Worth it!s weight in gold? endace power to see all europe P +44 1223 370 176 E eu@endace.com americas P +1 703 964 3740 E usa@endace.com asia pacific P +64 9 262 7260 E asia@endace.com
More informationInformation technology security and system integrity policy.
3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values
More informationETSI TS V3.2.1 ( )
TS 102 232-2 V3.2.1 (2012-06) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services
More informationTackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief
Tackling Crime, Protecting Citizens and Assisting First Responders IN COLLABORATION WITH A Frost & Sullivan Executive Brief Information and Communications Technology 50 Years of Growth, Innovation and
More informationWHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System
AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More information4G Americas The Voice of 5G for the Americas
4G Americas The Voice of 5G for the Americas Perspective from Industrial Associations 5G Standardization Dr. Håkan Andersson, Ericsson presenting on behalf of Chris Pearson, President, 4G Americas 5G Workshop
More informationEuropol Unclassified Basic Protection Level. Council Working Party on Information Exchange and Data Protection (DAPIX) Friends of Presidency
Council Working Party on Information Exchange and Data Protection (DAPIX) Friends of Presidency The Hague, 11 May 2017 EDOC# 895573v8 Data categories to be retained for law enforcement purposes DAPIX Friends
More informationUtimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1
Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationUnited Telephone Company of Indiana, Inc. d/b/a CenturyLink Section 1 CENTURYLINK GUIDEBOOK EXPLANATION OF TERMS
Original Sheet 1 Access Line - This term denotes the line between the central office equipment and the customer's premises, up to and including protection equipment. Accessories - The term denotes devices
More informationLawful Intercept Architecture
The Lawful Intercept (LI) feature supports service providers in meeting the requirements of law enforcement agencies (LEA) to provide electronic surveillance as authorized by a judicial or administrative
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Host Intrusion The Host Intrusion employs a response to a perceived incident of interference on a host-based system
More informationGSM V8.0.0 ( )
Technical Report Digital cellular telecommunications system (Phase 2+); Lawful Interception requirements for GSM (GSM 01.33 version 8.0.0) (formally known as GSM 10.20) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS
More informationReachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture
Reachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture Harri Toivonen HT Nuclear Ltd, Finland Magic Maggiore, Technical Reachback Workshop, EC/JRC/ERNCIP and GICNT ISPRA,
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationProject Proposal for:
Page1 Project Proposal for: Asterisk IP Telephony Mobility Facility Over the existing Office LAN/WAN and Wi-Fi Network, WiMAX, 3G/4G, CDMA, and GSM Technology Solutions & Design For: o Commercial Bank
More information