The Law Interception obligations Interception capability plans >>> The Law For law enforcement and security intelligence agencies, telecommunications interception is an important source of information which is generally agreed to be less intrusive into the lives of individuals than other methods which may cast suspicion on people who... Read more
Yearly Archive: 2012
Hardware Encryption
The HSM concept The basic idea behind a hardware security module 3D approach to HSM 3 dimensional security Philosophy Simply secure The HSM Concept Because business-critical information of all kinds needs reliable protection against unauthorised access, manipulation, and theft, IT security is one of management’s most important tasks... Read more
Lawful Interception
Challenges to lawful interception Regulatory environment National laws Solution considerations Challenges to Lawful Interception With a worldwide landscape characterized by entirely new forms of electronic communication the nature of lawful interception (LI) has changed substantially. Regulatory mandates implemented in many countries present a significant challenge to the telecommunications... Read more
MEPs Call for Private Security Regulations
Private security companies (PSCs) in Europe should be regulated by the EU to ensure compliance with international conventions and human rights, a bloc of both conservative and socialist members of the European Parliament have argued. Growing support for such measures was evident during a European Parliament sub-committee on defence and... Read more
NATO Edges Towards ACCS Software Validation
After years of initial cost overruns, delays and interoperability problems, NATO’s Air Command and Control System (ACCS) is entering the final stretch of software testing and validation, with national-level replication sites beginning to roll out across the alliance. Although some data-exchange interoperability problems continue to beleaguer the system, ACCS is... Read more