Utimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems

Size: px
Start display at page:

Download "Utimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems"

Transcription

1 Techpaper Lawful Interception with Umbrella Systems

2 Table of contents 1 The Challenge Umbrella Systems Abbreviations Aug 2010 Copyright Utimaco Safeware AG 2 of 8

3 1 The Challenge The sheer number of lawful interception decisions is constantly increasing, as the method of electronic surveillance of telecommunications services becomes the prominent and accepted choice of law enforcement agencies (LEAs) and government bodies in their fight against crime and terrorism. Today, most fixed and mobile network operators and telecommunication service providers have installed systems to enable lawful interception (LI) for the various voice and data services they offer to their customers. Comprehensive national laws have been established enabling LEAs to engage communications service providers (CSPs) to arrange electronic surveillance of specific individuals (also referred to as targets). In reality, however, the range of different networks, services, and interception systems together with the increasing number of intercepts pose considerable challenges for LEAs and monitoring centers. In practice, the sheer complexity of lawful interception in such a heterogeneous and dispersed LI environment inevitably leads to errors and delays during the activation of LI decisions or in the collection of interception data. Furthermore, authorities require an immediate overview of all active intercepts to facilitate analysis and statistics of nationwide LI activity. 25. Aug 2010 Copyright Utimaco Safeware AG 3 of 8

4 2 Umbrella Systems Utimaco has addressed these needs and challenges by developing an umbrella management system that is capable of interconnecting various LI management systems via an automated HI1 interface (see also ETSI TS for a definition of HI1-HI3 interfaces). As shown in figure 1), the umbrella LIMS is a single interface and management platform for all monitoring centers. Intercept targets entered at the umbrella system are provisioned to the various operator LI systems. Delivery of communications content (CC) is effected directly between the mediation devices or interception access points of the operator s network and the collection devices of the monitoring center. Intercept related information (IRI) is first handed over to one mediation device per service provider participating in the umbrella system. This guarantees that all IRI is logged, tagged and delivered to the appropriate monitoring center in a standardized format that enables the monitoring center to correlate CC and IRI with the original intercept. Figure 1 : Architecture of the Umbrella LI System 25. Aug 2010 Copyright Utimaco Safeware AG 4 of 8

5 As shown in the diagram, the LI systems of the providers maintain an important role in the network as they connect to the proprietary interfaces of the various network elements and incorporate mediation and delivery functions for each type of service. The use of an umbrella system has various advantages for administrative bodies: Immediate access: Intercept targets can be activated instantly and provisioned automatically on one or more operator networks. There is no delay due to paper fax or manual configurations on several systems. Central database: The central storage and maintenance of all intercept targets enables full control of all active interception requests. It facilitates security audits and consistency checks, and allows detailed statistics and instant failure recognition. Transparency: Administration and delivery channels between the connected service provider systems are strictly segregated. This ensures that operator network personnel have no access to any details of interception decisions in other networks. No performance loss: Although the administration function is centralized, delivery of intercept data is effected directly from the distributed mediation devices (DF2) and network elements to the monitoring center. Reliability: The central management of all LI systems enhances the reliability of the entire LI network. System failures can be detected automatically by alarm messages so that operators can immediately take appropriate action or require the administrator of the faulty network to analyze the problem locally. To further enhance the availability of the system, a redundant management server can be operated in hot standby mode. Should local failure recovery fail, the system can instantly switch to the standby server. Automation of the provisioning process further reduces the risk of human error. Cost reduction: Automation of the provisioning interfaces (HI1) leads to an acceleration of processes and thus reduces the costs of operation for both the LEA and the service provider. 25. Aug 2010 Copyright Utimaco Safeware AG 5 of 8

6 Extensibility: The modular architecture of the Utimaco umbrella system provides a solid basis for future extensions of the LI system. In fact there is virtually no limit to the number of client systems that can be connected to the umbrella LIMS. Similarly, the maximum number of interception targets and the range of supported communication services can be scaled to need by adding new mediation devices. Furthermore, LIMS includes a granular access rights management system for multiple local or remote operators. For instance, it would be possible to have multiple LEAs operating on the same umbrella LIMS while maintaining individual security profiles for each LEA. 25. Aug 2010 Copyright Utimaco Safeware AG 6 of 8

7 3 Abbreviations CC: Content of Communication CSP: Communication Service Provider DF2: Distribution Function for IRI DF3: Distribution Function for CC HI1, HI2, HI3: Standardized hand-over interfaces to LEAs IRI: Interception Related Information LEA: Law Enforcement Agency MC: Monitoring Center 25. Aug 2010 Copyright Utimaco Safeware AG 7 of 8

8 Utimaco Safeware AG Germanusstr Aachen Germany Phone: +49 (241) Fax: +49 (241) li-contact@utimaco.com Copyright Information Utimaco Safeware AG All rights reserved. The Information in this document must not be changed without the expressed written agreement of Utimaco Safeware AG. is a trademark of Utimaco Safeware AG. All other named trademarks are trademarks of the particular copyright holder. Individual functions may have different characteristics according to the different capabilities of the operating systems. 25. Aug 2010 Copyright Utimaco Safeware AG 8 of 8

Utimaco OX Summit

Utimaco OX Summit Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany

More information

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,

More information

EAGLE EYE MC. 1. Introduction

EAGLE EYE MC. 1. Introduction 1. Introduction Worldwide explosion of communication technologies creates a significant challenge for law enforcement agencies, national security organizations and enterprise security responsible for battling

More information

Trends in Lawful Interception and Its Applications in National Security

Trends in Lawful Interception and Its Applications in National Security Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication

More information

ETSI LI Standards Overview

ETSI LI Standards Overview http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including

More information

Utimaco LIMS. Lawful Interception of Telecommunication Services

Utimaco LIMS. Lawful Interception of Telecommunication Services Lawful Interception of Telecommunication Services 2 LIMS worldwide Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telecommunication services, and has become an important

More information

Alcatel-Lucent 1357 ULIS

Alcatel-Lucent 1357 ULIS Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement

More information

2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data

2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data 2nd ETSI Security Workshop Future Security Activities in ETSI/TC LI Lawful Interception standardisation, Retained Data Peter van der Arend Royal KPN Netherlands; Chairman ETSI/TC LI 1 Why Lawful Interception

More information

DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION

DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION 2 Data Retention Data Retention has become a buzzword in intense debates between data protectors and law makers over the last few years. It refers

More information

Lawful Intercept Overview

Lawful Intercept Overview CHAPTER 1 This chapter provides information about Lawful Intercept and contains the following sections: Information About Lawful Intercept, page 1-1 Network Components Used for Lawful Intercept, page 1-3

More information

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take

More information

Utimaco LIMS TM. Lawful Interception in the Digital Age: Vital Elements of an Effective Solution

Utimaco LIMS TM. Lawful Interception in the Digital Age: Vital Elements of an Effective Solution TM Lawful Interception in the Digital Age: Vital Elements of an Effective Solution TM Table of contents 1 Challenges to Lawful Interception... 3 2 Lawful Interception in the 21st Century... 4 2.1 An Increasing

More information

Gerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved

Gerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery

More information

Monitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring

Monitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring DataBridge Flexible communications monitoring 2 Meeting your obligations flexibly As terrorists and organised criminals

More information

Integrating Communications Compliance into the Next Generation 4G LTE Network

Integrating Communications Compliance into the Next Generation 4G LTE Network SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or

More information

GSM V8.0.0 ( )

GSM V8.0.0 ( ) Technical Report Digital cellular telecommunications system (Phase 2+); Lawful Interception requirements for GSM (GSM 01.33 version 8.0.0) (formally known as GSM 10.20) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS

More information

Cisco Hosted Unified Communications Services

Cisco Hosted Unified Communications Services Cisco Hosted Unified Communications Services Cisco Unified Communications is a comprehensive, converged IP communications system of data, voice, video, and mobility applications. It enables more effective

More information

3GPP TS V ( )

3GPP TS V ( ) TS 33.106 V13.3.0 (2016-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Lawful interception requirements (Release

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

WHITE PAPER. The Growing Impact of Social Networking Trends on Lawful Interception

WHITE PAPER. The Growing Impact of Social Networking Trends on Lawful Interception WHITE PAPER The Growing Impact of Social Networking Trends on Lawful Interception www.ixiacom.com 915-6913-01 Rev. A, July 2014 2 Table of Contents How Bin Laden Evaded Lawful Interception... 4 A Fast-Changing

More information

Corporate Guideline. Export Compliance Policy

Corporate Guideline. Export Compliance Policy Export Compliance Policy Table of contents EXPORT INFORMATION ON UTIMACO PRODUCTS... 3 GLOBAL EXPORT CONTROLS... 4 GOBAL EXPORT CONTROLS PRODUCT CLASSIFICATION... 5 2 EXPORT INFORMATION ON UTIMACO PRODUCTS

More information

AAA Authentication: New Use Cases

AAA Authentication: New Use Cases AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf

More information

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal Geneve Switzerland, August 26th 2010 1 NATION WIDE PUBLIC SAFETY NETWORK THE BACKBONE An advanced telecommunications and information

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011

More information

ETSI TS V2.2.1 ( )

ETSI TS V2.2.1 ( ) TS 102 232-6 V2.2.1 (2007-05) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 103 307 V1.1.1 (2016-04) TECHNICAL SPECIFICATION CYBER; Security Aspects for LI and RD Interfaces 2 TS 103 307 V1.1.1 (2016-04) Reference DTS/CYBER-0005 Keywords cyber security, lawful interception,

More information

Oregon State Police. Information Technology. Honor Loyalty. Pride Dedication

Oregon State Police. Information Technology. Honor Loyalty. Pride Dedication Oregon State Police Information Technology Pride Dedication Honor Loyalty Presented by: David Alamein, CIO & Tom M. Worthy, Captain Presentation Date: March 31, 2015 OSP I.T. Mission and Strategy Modernize

More information

ETSI TS V ( ) Technical Specification

ETSI TS V ( ) Technical Specification TS 133 106 V10.0.0 (2011-05) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Lawful interception requirements (3GPP TS 33.106 version 10.0.0 Release 10) 1 TS 133 106 V10.0.0

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

RECUEIL DE LEGISLATION. A Annexe N 5 18 décembre S o m m a i r e

RECUEIL DE LEGISLATION. A Annexe N 5 18 décembre S o m m a i r e MEMORIAL Journal Officiel du Grand-Duché de Luxembourg 1845 MEMORIAL Amtsblatt des Großherzogtums Luxemburg RECUEIL DE LEGISLATION A Annexe N 5 18 décembre 2008 S o m m a i r e Règlement 08/134/ILR du

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

Delivering. Effective Element Management Networks

Delivering. Effective Element Management Networks Delivering Effective Element Management RELIABLE for Networks Reducing Costs While Improving NETWORK PERFORMANCE is the PROBLEM NODE D NODE D NODE E Central Office B Central Office A NODE D Central Office

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Department of Justice Policing and Victim Services BUSINESS PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4

ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4 ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4 Plugtests 2007 Test Cases page 1 of 53 Table of contents 1 Introduction...3 1.1 Scope of the tests... 4 1.2 Test Environment and Setup...

More information

3.4 NON-DOMESTIC SERVICES (L )

3.4 NON-DOMESTIC SERVICES (L ) 3.4 NON-DOMESTIC SERVICES (L.34.1.3.4) Qwest uses a combination of owned assets and strategic international alliances to deliver non-domestic services ensuring that providers with local knowledge are leveraged.

More information

Over the Top (OTT) Provision of Telecoms Services in Nigeria

Over the Top (OTT) Provision of Telecoms Services in Nigeria Over the Top (OTT) Provision of Telecoms Services in Nigeria Presentation Delivered at the Bicsi Conference & Exhibition 2017 By Engr. Gbenga Adebayo ALTON Chairman August 17, 2017 Introduction The Association

More information

e/pop Secure Instant Messaging

e/pop Secure Instant Messaging by Perry Molendijk e/pop Professional is a secure, company-wide instant messaging (IM) system. It offers a comprehensive feature-set, easy install, no shared DLL's and hard client lock-down to completely

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 101 331 V1.1.1 (2001-08) Technical Specification Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies 2 TS 101 331 V1.1.1 (2001-08) Reference DTS/SEC-003011-1

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 27011 Second edition 2016-12-01 Information technology Security techniques Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications

More information

Nokia AirGile cloud-native core: shaping networks to every demand

Nokia AirGile cloud-native core: shaping networks to every demand Nokia AirGile cloud-native core: shaping networks to every demand The future of core networks? Today s networks focus on delivering voice and broadband services to people. Yet the rise of the Internet

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Postal Inspection Service Mail Covers Program

Postal Inspection Service Mail Covers Program Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.

More information

ACCESSNET -T IP For professional TETRA communications. /en

ACCESSNET -T IP For professional TETRA communications.  /en For professional TETRA communications is the comprehensive and efficient solution for all professional mobile radio applications. www.hytera.de /en At a glance For professional TETRA Communications TETRA

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

3GPP TS V8.1.0 ( )

3GPP TS V8.1.0 ( ) TS 03.33 V8.1.0 (2000-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Lawful Interception; Stage 2 (Release 1999)

More information

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering

More information

2 ESF 2 Communications

2 ESF 2 Communications 2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

ETSI GS NFV-SEC 004 V1.1.1 ( )

ETSI GS NFV-SEC 004 V1.1.1 ( ) GS NFV-SEC 004 V1.1.1 (2015-09) GROUP SPECIFICATION Network Functions Virtualisation (NFV); NFV Security; Privacy and Regulation; Report on Lawful Interception Implications Disclaimer This document has

More information

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security

More information

a member of the Sophos Group Utimaco Safeware AG GermanusstraKe Aachen Germany Phone +49 (0)

a member of the Sophos Group Utimaco Safeware AG GermanusstraKe Aachen Germany Phone +49 (0) a member of the Sophos Group Utimaco Safeware AG GermanusstraKe 4 52080Aachen Germany Phone +49 (0) 241-16 96-0 Ii-contact@utimaco.com a member of the Sophoc Group Utimaco L---3" LaW Interception of mu

More information

Lawful Interception of telecommunication traffic

Lawful Interception of telecommunication traffic Federal Department of Justice and Police FDJP IT Service Centre ISC-FDJP Post and Telecommunications Surveillance Service Lawful Interception of telecommunication traffic Organisational and administrative

More information

eidas compliant Trust Services with Utimaco HSMs

eidas compliant Trust Services with Utimaco HSMs eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y 2 0 1 7 Introduction The rapid spread of wireless voice and data networking teaches

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

The Next Generation Signaling Transfer Point

The Next Generation Signaling Transfer Point The Next Generation Signaling Transfer Point Overview As the Global network is undergoing immense changes and the Next-Generation IP networks become a reality, it signals an evolution towards using Internet

More information

SUCCESS STORY ÖBB A WinGuard Reference Project

SUCCESS STORY ÖBB A WinGuard Reference Project SUCCESS STORY ÖBB A WinGuard Reference Project Eng. Werner Casett ÖBB IKT GmbH, Solution Management We were searching for a vendor neutral system, suitable for a nationwide application. Fast reaction times

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Lawful Intercept Interface

Lawful Intercept Interface Lawful Intercept Interface Specification Guide Release 14.0 Document Version 1 220 Perry Parkway Gaithersburg, MD USA 20877 Tel +1 301.977.9440 Fax +1 301.977.8846 WWW.BROADSOFT.COM BroadWorks Guide Copyright

More information

Schneider Electric Data Center Software

Schneider Electric Data Center Software Schneider Electric Data Center Software StruxureWare Operations 7.0 Software Platform End to end Data Center Infrastructure Management (DCIM) software for monitoring, control of power, cooling, security

More information

We manage network capacity

We manage network capacity We manage network capacity LIMA NETWORK PROTECT ARCHITECTS IN SAFETY AND INTELLIGENCE Overload Protection. Make your network more resilient against disasters. Perimeter Control. Manage service availability

More information

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of

More information

ETSI TS V2.1.1 ( ) Technical Specification

ETSI TS V2.1.1 ( ) Technical Specification TS 102 232-7 V2.1.1 (2008-03) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

STAATSKOERANT, 28 NOVEMBER 2005 No SCHEDULE C,

STAATSKOERANT, 28 NOVEMBER 2005 No SCHEDULE C, STAATSKOERANT, 28 NOVEMBER 2005 No. 28271 69 SCHEDULE C, DIRECTIVE FOR INTERNET SERVICE PROVIDERS IN TERMS OF SECTION 30(7)(a) READ WITH SECTION 30(2) OF THE REGULATION OF INTERCEPTION OF COMMUNICATIONS

More information

ETSI TS V ( )

ETSI TS V ( ) TS 102 232-2 V3.11.1 (2017-11) TECHNICAL SPECIFICATION Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services

More information

Partner Program Overview

Partner Program Overview Partner Program Overview Utimaco TS GmbH November 2014 Utimaco TS GmbH Aachen, Germany Nov 2014 Page 1 Utimaco s goal is. to implement a successful and trustworthy partnership with our partners leading

More information

WiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic

WiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic 0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

TEL2813/IS2621 Security Management

TEL2813/IS2621 Security Management TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 101 303 V1.1.1 (2001-06) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Overview and Introduction 2 TR 101

More information

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page

More information

UNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING

UNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING 01010101000101010 10001010010001001 ZMS UNIFIED MANAGEMENT OF CONVERGED VOICE, DATA, AND VIDEO TECHNOLOGIES WITH AUTOMATED SUBSCRIBER AND SERVICE PROVISIONING SINGLE MANAGEMENT SYSTEM FOR THE ENTIRE LOCAL

More information

Utimaco Safeware AG. What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30!

Utimaco Safeware AG. What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30! Utimaco Safeware AG What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30! 14:00 2 Contents! Introductions! Anti-SPAM and LI! Anti-Virus

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

Understanding how MRA works and realizing the benefits for both Customs and Trade

Understanding how MRA works and realizing the benefits for both Customs and Trade Understanding how MRA works and realizing the benefits for both Customs and Trade CTPAT Program Overview CTPAT is a voluntary public-private sector partnership program to strengthen the security of international

More information

Passive Detection. What is KIVOX Passive Detection? Product Datasheet. Key Benefits. 3 APIs in one product

Passive Detection. What is KIVOX Passive Detection? Product Datasheet. Key Benefits. 3 APIs in one product Passive Detection Product Datasheet KIVOX Passive Detection is part of the KIVOX 4.0 family of products. KIVOX 4.0 brings our partners the full potential of real voice biometrics technology by providing

More information

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results Keyun Ruan, Joe Carthy, Tahar Kechadi, Ibrahim Baggili Digital Investigation 10, No.1, pp

More information

SAP security solutions Is your business protected?

SAP security solutions Is your business protected? www.pwc.com SAP security solutions Is your business protected? SAP security overview Background SAP Security is becoming more difficult to control due to a constantly evolving compliance landscape and

More information

5.2.2 COLLOCATED HOSTING SERVICES (CHS) (L , M.2.1.4)

5.2.2 COLLOCATED HOSTING SERVICES (CHS) (L , M.2.1.4) 5.2.2 COLLOCATED HOSTING SERVICES (CHS) (L.34.1.5.4, M.2.1.4) Qwest s Networx Collocated Hosting Service (CHS) provides the groundwork solution for the fundamental elements of Agency hosting: space, power

More information

Session 3: Lawful Interception

Session 3: Lawful Interception Session 3: Lawful Interception Secure, verifiable and intelligible audit logs to support computer forensics in lawful interception 3 rd ETSI Security Workshop Elena de la Calle Vian Ministry of Industry

More information

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

July 13, Via  to RE: International Internet Policy Priorities [Docket No ] July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

ETSI TS V3.2.1 ( )

ETSI TS V3.2.1 ( ) TS 102 232-2 V3.2.1 (2012-06) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services

More information

IP/MPLS Network Infrastructure for Video Surveillance

IP/MPLS Network Infrastructure for Video Surveillance IP/MPLS Network Infrastructure for Video Surveillance Robert M. Dallas May 2009 Agenda 1. Video Surveillance Market and Applications 2. Trends 3. IP/MPLS Networking Infrastructure Importance 4. Why is

More information

Streamlining Lawful Intercept for WiMAX Networks

Streamlining Lawful Intercept for WiMAX Networks White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security

More information

Cloud First Policy General Directorate of Governance and Operations Version April 2017

Cloud First Policy General Directorate of Governance and Operations Version April 2017 General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...

More information

ETSI GS MEC 026 V2.1.1 ( )

ETSI GS MEC 026 V2.1.1 ( ) GS MEC 026 V2.1.1 (2018-09) GROUP SPECIFICATION Multi-access Edge Computing (MEC); Support for regulatory requirements Disclaimer: This DRAFT is a working document of ISG MEC. It is provided for information

More information

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline

More information