Lawful Interception – Obligation in Australia

  The Law Interception obligations Interception capability plans   >>> The Law For law enforcement and security intelligence agencies, telecommunications interception is an important source of information which is generally agreed to be less intrusive into the lives of individuals than other methods which may cast suspicion on people who... Read more

Hardware Encryption

  The HSM concept The basic idea behind a hardware security module 3D approach to HSM 3 dimensional security Philosophy Simply secure   The HSM Concept Because business-critical information of all kinds needs reliable protection against unauthorised access, manipulation, and theft, IT security is one of management’s most important tasks... Read more

Lawful Interception

  Challenges to lawful interception Regulatory environment National laws Solution considerations   Challenges to Lawful Interception With a worldwide landscape characterized by entirely new forms of electronic communication the nature of lawful interception (LI) has changed substantially. Regulatory mandates implemented in many countries present a significant challenge to the telecommunications... Read more

MEPs Call for Private Security Regulations

Private security companies (PSCs) in Europe should be regulated by the EU to ensure compliance with international conventions and human rights, a bloc of both conservative and socialist members of the European Parliament have argued. Growing support for such measures was evident during a European Parliament sub-committee on defence and... Read more

NATO Edges Towards ACCS Software Validation

After years of initial cost overruns, delays and interoperability problems, NATO’s Air Command and Control System (ACCS) is entering the final stretch of software testing and validation, with national-level replication sites beginning to roll out across the alliance. Although some data-exchange interoperability problems continue to beleaguer the system, ACCS is... Read more

Page 1 of 212