Utimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems
|
|
- Kelly Bishop
- 5 years ago
- Views:
Transcription
1 Techpaper Lawful Interception with Umbrella Systems
2 Table of contents 1 The Challenge Umbrella Systems Abbreviations Aug 2010 Copyright Utimaco Safeware AG 2 of 8
3 1 The Challenge The sheer number of lawful interception decisions is constantly increasing, as the method of electronic surveillance of telecommunications services becomes the prominent and accepted choice of law enforcement agencies (LEAs) and government bodies in their fight against crime and terrorism. Today, most fixed and mobile network operators and telecommunication service providers have installed systems to enable lawful interception (LI) for the various voice and data services they offer to their customers. Comprehensive national laws have been established enabling LEAs to engage communications service providers (CSPs) to arrange electronic surveillance of specific individuals (also referred to as targets). In reality, however, the range of different networks, services, and interception systems together with the increasing number of intercepts pose considerable challenges for LEAs and monitoring centers. In practice, the sheer complexity of lawful interception in such a heterogeneous and dispersed LI environment inevitably leads to errors and delays during the activation of LI decisions or in the collection of interception data. Furthermore, authorities require an immediate overview of all active intercepts to facilitate analysis and statistics of nationwide LI activity. 25. Aug 2010 Copyright Utimaco Safeware AG 3 of 8
4 2 Umbrella Systems Utimaco has addressed these needs and challenges by developing an umbrella management system that is capable of interconnecting various LI management systems via an automated HI1 interface (see also ETSI TS for a definition of HI1-HI3 interfaces). As shown in figure 1), the umbrella LIMS is a single interface and management platform for all monitoring centers. Intercept targets entered at the umbrella system are provisioned to the various operator LI systems. Delivery of communications content (CC) is effected directly between the mediation devices or interception access points of the operator s network and the collection devices of the monitoring center. Intercept related information (IRI) is first handed over to one mediation device per service provider participating in the umbrella system. This guarantees that all IRI is logged, tagged and delivered to the appropriate monitoring center in a standardized format that enables the monitoring center to correlate CC and IRI with the original intercept. Figure 1 : Architecture of the Umbrella LI System 25. Aug 2010 Copyright Utimaco Safeware AG 4 of 8
5 As shown in the diagram, the LI systems of the providers maintain an important role in the network as they connect to the proprietary interfaces of the various network elements and incorporate mediation and delivery functions for each type of service. The use of an umbrella system has various advantages for administrative bodies: Immediate access: Intercept targets can be activated instantly and provisioned automatically on one or more operator networks. There is no delay due to paper fax or manual configurations on several systems. Central database: The central storage and maintenance of all intercept targets enables full control of all active interception requests. It facilitates security audits and consistency checks, and allows detailed statistics and instant failure recognition. Transparency: Administration and delivery channels between the connected service provider systems are strictly segregated. This ensures that operator network personnel have no access to any details of interception decisions in other networks. No performance loss: Although the administration function is centralized, delivery of intercept data is effected directly from the distributed mediation devices (DF2) and network elements to the monitoring center. Reliability: The central management of all LI systems enhances the reliability of the entire LI network. System failures can be detected automatically by alarm messages so that operators can immediately take appropriate action or require the administrator of the faulty network to analyze the problem locally. To further enhance the availability of the system, a redundant management server can be operated in hot standby mode. Should local failure recovery fail, the system can instantly switch to the standby server. Automation of the provisioning process further reduces the risk of human error. Cost reduction: Automation of the provisioning interfaces (HI1) leads to an acceleration of processes and thus reduces the costs of operation for both the LEA and the service provider. 25. Aug 2010 Copyright Utimaco Safeware AG 5 of 8
6 Extensibility: The modular architecture of the Utimaco umbrella system provides a solid basis for future extensions of the LI system. In fact there is virtually no limit to the number of client systems that can be connected to the umbrella LIMS. Similarly, the maximum number of interception targets and the range of supported communication services can be scaled to need by adding new mediation devices. Furthermore, LIMS includes a granular access rights management system for multiple local or remote operators. For instance, it would be possible to have multiple LEAs operating on the same umbrella LIMS while maintaining individual security profiles for each LEA. 25. Aug 2010 Copyright Utimaco Safeware AG 6 of 8
7 3 Abbreviations CC: Content of Communication CSP: Communication Service Provider DF2: Distribution Function for IRI DF3: Distribution Function for CC HI1, HI2, HI3: Standardized hand-over interfaces to LEAs IRI: Interception Related Information LEA: Law Enforcement Agency MC: Monitoring Center 25. Aug 2010 Copyright Utimaco Safeware AG 7 of 8
8 Utimaco Safeware AG Germanusstr Aachen Germany Phone: +49 (241) Fax: +49 (241) li-contact@utimaco.com Copyright Information Utimaco Safeware AG All rights reserved. The Information in this document must not be changed without the expressed written agreement of Utimaco Safeware AG. is a trademark of Utimaco Safeware AG. All other named trademarks are trademarks of the particular copyright holder. Individual functions may have different characteristics according to the different capabilities of the operating systems. 25. Aug 2010 Copyright Utimaco Safeware AG 8 of 8
Utimaco OX Summit
Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany
More informationUtimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1
Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,
More informationEAGLE EYE MC. 1. Introduction
1. Introduction Worldwide explosion of communication technologies creates a significant challenge for law enforcement agencies, national security organizations and enterprise security responsible for battling
More informationTrends in Lawful Interception and Its Applications in National Security
Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication
More informationETSI LI Standards Overview
http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including
More informationUtimaco LIMS. Lawful Interception of Telecommunication Services
Lawful Interception of Telecommunication Services 2 LIMS worldwide Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telecommunication services, and has become an important
More informationAlcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement
More information2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data
2nd ETSI Security Workshop Future Security Activities in ETSI/TC LI Lawful Interception standardisation, Retained Data Peter van der Arend Royal KPN Netherlands; Chairman ETSI/TC LI 1 Why Lawful Interception
More informationDATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION
DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION 2 Data Retention Data Retention has become a buzzword in intense debates between data protectors and law makers over the last few years. It refers
More informationLawful Intercept Overview
CHAPTER 1 This chapter provides information about Lawful Intercept and contains the following sections: Information About Lawful Intercept, page 1-1 Network Components Used for Lawful Intercept, page 1-3
More informationMONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.
MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take
More informationUtimaco LIMS TM. Lawful Interception in the Digital Age: Vital Elements of an Effective Solution
TM Lawful Interception in the Digital Age: Vital Elements of an Effective Solution TM Table of contents 1 Challenges to Lawful Interception... 3 2 Lawful Interception in the 21st Century... 4 2.1 An Increasing
More informationGerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved
ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery
More informationMonitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring
Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring DataBridge Flexible communications monitoring 2 Meeting your obligations flexibly As terrorists and organised criminals
More informationIntegrating Communications Compliance into the Next Generation 4G LTE Network
SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or
More informationGSM V8.0.0 ( )
Technical Report Digital cellular telecommunications system (Phase 2+); Lawful Interception requirements for GSM (GSM 01.33 version 8.0.0) (formally known as GSM 10.20) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS
More informationCisco Hosted Unified Communications Services
Cisco Hosted Unified Communications Services Cisco Unified Communications is a comprehensive, converged IP communications system of data, voice, video, and mobility applications. It enables more effective
More information3GPP TS V ( )
TS 33.106 V13.3.0 (2016-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Lawful interception requirements (Release
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationWHITE PAPER. The Growing Impact of Social Networking Trends on Lawful Interception
WHITE PAPER The Growing Impact of Social Networking Trends on Lawful Interception www.ixiacom.com 915-6913-01 Rev. A, July 2014 2 Table of Contents How Bin Laden Evaded Lawful Interception... 4 A Fast-Changing
More informationCorporate Guideline. Export Compliance Policy
Export Compliance Policy Table of contents EXPORT INFORMATION ON UTIMACO PRODUCTS... 3 GLOBAL EXPORT CONTROLS... 4 GOBAL EXPORT CONTROLS PRODUCT CLASSIFICATION... 5 2 EXPORT INFORMATION ON UTIMACO PRODUCTS
More informationAAA Authentication: New Use Cases
AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf
More informationBWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF
BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal Geneve Switzerland, August 26th 2010 1 NATION WIDE PUBLIC SAFETY NETWORK THE BACKBONE An advanced telecommunications and information
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA
Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011
More informationETSI TS V2.2.1 ( )
TS 102 232-6 V2.2.1 (2007-05) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services
More informationETSI TS V1.1.1 ( )
TS 103 307 V1.1.1 (2016-04) TECHNICAL SPECIFICATION CYBER; Security Aspects for LI and RD Interfaces 2 TS 103 307 V1.1.1 (2016-04) Reference DTS/CYBER-0005 Keywords cyber security, lawful interception,
More informationOregon State Police. Information Technology. Honor Loyalty. Pride Dedication
Oregon State Police Information Technology Pride Dedication Honor Loyalty Presented by: David Alamein, CIO & Tom M. Worthy, Captain Presentation Date: March 31, 2015 OSP I.T. Mission and Strategy Modernize
More informationETSI TS V ( ) Technical Specification
TS 133 106 V10.0.0 (2011-05) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Lawful interception requirements (3GPP TS 33.106 version 10.0.0 Release 10) 1 TS 133 106 V10.0.0
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationRECUEIL DE LEGISLATION. A Annexe N 5 18 décembre S o m m a i r e
MEMORIAL Journal Officiel du Grand-Duché de Luxembourg 1845 MEMORIAL Amtsblatt des Großherzogtums Luxemburg RECUEIL DE LEGISLATION A Annexe N 5 18 décembre 2008 S o m m a i r e Règlement 08/134/ILR du
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More information[Utility Name] Identity Theft Prevention Program
[Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed
More informationDelivering. Effective Element Management Networks
Delivering Effective Element Management RELIABLE for Networks Reducing Costs While Improving NETWORK PERFORMANCE is the PROBLEM NODE D NODE D NODE E Central Office B Central Office A NODE D Central Office
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationDepartment of Justice Policing and Victim Services BUSINESS PLAN
Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.
More informationSystemic Analyser in Network Threats
Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication
More informationETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4
ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4 Plugtests 2007 Test Cases page 1 of 53 Table of contents 1 Introduction...3 1.1 Scope of the tests... 4 1.2 Test Environment and Setup...
More information3.4 NON-DOMESTIC SERVICES (L )
3.4 NON-DOMESTIC SERVICES (L.34.1.3.4) Qwest uses a combination of owned assets and strategic international alliances to deliver non-domestic services ensuring that providers with local knowledge are leveraged.
More informationOver the Top (OTT) Provision of Telecoms Services in Nigeria
Over the Top (OTT) Provision of Telecoms Services in Nigeria Presentation Delivered at the Bicsi Conference & Exhibition 2017 By Engr. Gbenga Adebayo ALTON Chairman August 17, 2017 Introduction The Association
More informatione/pop Secure Instant Messaging
by Perry Molendijk e/pop Professional is a secure, company-wide instant messaging (IM) system. It offers a comprehensive feature-set, easy install, no shared DLL's and hard client lock-down to completely
More informationETSI TS V1.1.1 ( )
TS 101 331 V1.1.1 (2001-08) Technical Specification Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies 2 TS 101 331 V1.1.1 (2001-08) Reference DTS/SEC-003011-1
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 27011 Second edition 2016-12-01 Information technology Security techniques Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications
More informationNokia AirGile cloud-native core: shaping networks to every demand
Nokia AirGile cloud-native core: shaping networks to every demand The future of core networks? Today s networks focus on delivering voice and broadband services to people. Yet the rise of the Internet
More informationEDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017
This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationACCESSNET -T IP For professional TETRA communications. /en
For professional TETRA communications is the comprehensive and efficient solution for all professional mobile radio applications. www.hytera.de /en At a glance For professional TETRA Communications TETRA
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More information3GPP TS V8.1.0 ( )
TS 03.33 V8.1.0 (2000-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Lawful Interception; Stage 2 (Release 1999)
More informationA Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist
A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering
More information2 ESF 2 Communications
2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationETSI GS NFV-SEC 004 V1.1.1 ( )
GS NFV-SEC 004 V1.1.1 (2015-09) GROUP SPECIFICATION Network Functions Virtualisation (NFV); NFV Security; Privacy and Regulation; Report on Lawful Interception Implications Disclaimer This document has
More informationSECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability
SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security
More informationa member of the Sophos Group Utimaco Safeware AG GermanusstraKe Aachen Germany Phone +49 (0)
a member of the Sophos Group Utimaco Safeware AG GermanusstraKe 4 52080Aachen Germany Phone +49 (0) 241-16 96-0 Ii-contact@utimaco.com a member of the Sophoc Group Utimaco L---3" LaW Interception of mu
More informationLawful Interception of telecommunication traffic
Federal Department of Justice and Police FDJP IT Service Centre ISC-FDJP Post and Telecommunications Surveillance Service Lawful Interception of telecommunication traffic Organisational and administrative
More informationeidas compliant Trust Services with Utimaco HSMs
eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationPROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM
PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y 2 0 1 7 Introduction The rapid spread of wireless voice and data networking teaches
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationThe Next Generation Signaling Transfer Point
The Next Generation Signaling Transfer Point Overview As the Global network is undergoing immense changes and the Next-Generation IP networks become a reality, it signals an evolution towards using Internet
More informationSUCCESS STORY ÖBB A WinGuard Reference Project
SUCCESS STORY ÖBB A WinGuard Reference Project Eng. Werner Casett ÖBB IKT GmbH, Solution Management We were searching for a vendor neutral system, suitable for a nationwide application. Fast reaction times
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationLawful Intercept Interface
Lawful Intercept Interface Specification Guide Release 14.0 Document Version 1 220 Perry Parkway Gaithersburg, MD USA 20877 Tel +1 301.977.9440 Fax +1 301.977.8846 WWW.BROADSOFT.COM BroadWorks Guide Copyright
More informationSchneider Electric Data Center Software
Schneider Electric Data Center Software StruxureWare Operations 7.0 Software Platform End to end Data Center Infrastructure Management (DCIM) software for monitoring, control of power, cooling, security
More informationWe manage network capacity
We manage network capacity LIMA NETWORK PROTECT ARCHITECTS IN SAFETY AND INTELLIGENCE Overload Protection. Make your network more resilient against disasters. Perimeter Control. Manage service availability
More informationISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of
More informationETSI TS V2.1.1 ( ) Technical Specification
TS 102 232-7 V2.1.1 (2008-03) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationSTAATSKOERANT, 28 NOVEMBER 2005 No SCHEDULE C,
STAATSKOERANT, 28 NOVEMBER 2005 No. 28271 69 SCHEDULE C, DIRECTIVE FOR INTERNET SERVICE PROVIDERS IN TERMS OF SECTION 30(7)(a) READ WITH SECTION 30(2) OF THE REGULATION OF INTERCEPTION OF COMMUNICATIONS
More informationETSI TS V ( )
TS 102 232-2 V3.11.1 (2017-11) TECHNICAL SPECIFICATION Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services
More informationPartner Program Overview
Partner Program Overview Utimaco TS GmbH November 2014 Utimaco TS GmbH Aachen, Germany Nov 2014 Page 1 Utimaco s goal is. to implement a successful and trustworthy partnership with our partners leading
More informationWiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic
0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright
More informationSeattle University Identity Theft Prevention Program. Purpose. Definitions
Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
More informationTEL2813/IS2621 Security Management
TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information
More informationETSI TR V1.1.1 ( )
TR 101 303 V1.1.1 (2001-06) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Overview and Introduction 2 TR 101
More informationA MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page
More informationUNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING
01010101000101010 10001010010001001 ZMS UNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING SINGLE MANAGEMENT SYSTEM FOR THE ENTIRE LOCAL
More informationUtimaco Safeware AG. What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30!
Utimaco Safeware AG What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30! 14:00 2 Contents! Introductions! Anti-SPAM and LI! Anti-Virus
More informationQuadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters
Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland
More informationUnderstanding how MRA works and realizing the benefits for both Customs and Trade
Understanding how MRA works and realizing the benefits for both Customs and Trade CTPAT Program Overview CTPAT is a voluntary public-private sector partnership program to strengthen the security of international
More informationPassive Detection. What is KIVOX Passive Detection? Product Datasheet. Key Benefits. 3 APIs in one product
Passive Detection Product Datasheet KIVOX Passive Detection is part of the KIVOX 4.0 family of products. KIVOX 4.0 brings our partners the full potential of real voice biometrics technology by providing
More informationCloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results Keyun Ruan, Joe Carthy, Tahar Kechadi, Ibrahim Baggili Digital Investigation 10, No.1, pp
More informationSAP security solutions Is your business protected?
www.pwc.com SAP security solutions Is your business protected? SAP security overview Background SAP Security is becoming more difficult to control due to a constantly evolving compliance landscape and
More information5.2.2 COLLOCATED HOSTING SERVICES (CHS) (L , M.2.1.4)
5.2.2 COLLOCATED HOSTING SERVICES (CHS) (L.34.1.5.4, M.2.1.4) Qwest s Networx Collocated Hosting Service (CHS) provides the groundwork solution for the fundamental elements of Agency hosting: space, power
More informationSession 3: Lawful Interception
Session 3: Lawful Interception Secure, verifiable and intelligible audit logs to support computer forensics in lawful interception 3 rd ETSI Security Workshop Elena de la Calle Vian Ministry of Industry
More informationJuly 13, Via to RE: International Internet Policy Priorities [Docket No ]
July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationETSI TS V3.2.1 ( )
TS 102 232-2 V3.2.1 (2012-06) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services
More informationIP/MPLS Network Infrastructure for Video Surveillance
IP/MPLS Network Infrastructure for Video Surveillance Robert M. Dallas May 2009 Agenda 1. Video Surveillance Market and Applications 2. Trends 3. IP/MPLS Networking Infrastructure Importance 4. Why is
More informationStreamlining Lawful Intercept for WiMAX Networks
White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationSECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability
SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationETSI GS MEC 026 V2.1.1 ( )
GS MEC 026 V2.1.1 (2018-09) GROUP SPECIFICATION Multi-access Edge Computing (MEC); Support for regulatory requirements Disclaimer: This DRAFT is a working document of ISG MEC. It is provided for information
More informationRFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template
RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline
More information