Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
CH Interception of communications: OAR

CH Interception of communications: OAR

Ratings: (0)|Views: 119|Likes:
Published by calmansi
Was attached to "Überwachung Mit dem Staat ins Internet" by Heiner Busch und Dinu Gautier, WOZ, July 16, 2009 http://www.woz.ch/artikel/2009/nr29/schweiz/18143.html (archived in http://www.webcitation.org/5iIsuZiFV )

Full title: "Lawful Interception of telecommunications traffic - Organisational and administrative requirements (OAR)
This is an image PDF.It's OCRed text version can be viewed in http://docs.google.com/View?id=dhrq6wzn_248fjrxptcx
Was attached to "Überwachung Mit dem Staat ins Internet" by Heiner Busch und Dinu Gautier, WOZ, July 16, 2009 http://www.woz.ch/artikel/2009/nr29/schweiz/18143.html (archived in http://www.webcitation.org/5iIsuZiFV )

Full title: "Lawful Interception of telecommunications traffic - Organisational and administrative requirements (OAR)
This is an image PDF.It's OCRed text version can be viewed in http://docs.google.com/View?id=dhrq6wzn_248fjrxptcx

More info:

Categories:Types, Business/Law
Published by: calmansi on Jul 16, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/06/2010

pdf

text

original

 
FederalDepartment of JusticeandPoliceFDJP
ITServiceCenter ISC-FDJP
PostalServiceandTelecommunicationsSurveillancePSTS
Lawful Interceptionoftelecommunicationstraffic
 
Organisationalandadministrativerequirements(OAR)
Date: May19
th
, 2009Version: 2.10
Confidential
 
Lawful Interceptionoftelecommunicationstraffic Confidential
2/36
ContentsLawful Interceptionof telecommunications traffic.......................................................................1Organisationalandadministrativerequirements......................................................................1Document History.......................................................................................................................41.Scope..................................................................................................................................52.References..........................................................................................................................53.Abbreviations.......................................................................................................................64.Definitions............................................................................................................................85.Responsibilities....................................................................................................................86.Interceptionprocedure.........................................................................................................96.1.Interception types.........................................................................................................96.1.1.Circuit switchedservices.......................................................................................96.1.2.Packet switchedservices.....................................................................................106.1.3.EmergencyPaging..............................................................................................116.2.Activationbases.........................................................................................................116.3.Recipientsof interceptionorders.................................................................................126.3.1.Assigning target identities toTISP's.....................................................................126.3.2.MultipleTISPinvolvement...................................................................................126.4.Activationprocedure...................................................................................................126.4.1.SteponeInitiation.............................................................................................126.4.2.Step twoActivation...........................................................................................136.4.3.Step three-Confirmation.....................................................................................136.5.Modificationprocedures..............................................................................................146.5.1.SteponeInitiation.............................................................................................146.5.2.Step twoModification........................................................................................156.5.3.Step three-Confirmation.....................................................................................156.6.Deactivationprocedures.............................................................................................156.6.1.SteponeInitiation.............................................................................................156.6.2.Step twoDeactivation.......................................................................................166.6.3.Step three-Confirmation.....................................................................................166.7.Cancellationof orders.................................................................................................166.7.1.Stepone- Initiation..............................................................................................166.7.2.Step two-Confirmation.......................................................................................177.Informationrequests..........................................................................................................177.1.Informationrequest procedure....................................................................................187.1.1.Request...............................................................................................................187.1.2.Response............................................................................................................187.1.3.Confirmation........................................................................................................188.Technicalinterface(HI1)....................................................................................................199.Timing Issues....................................................................................................................229.1.Operatinghours..........................................................................................................229.2.Delivery times.............................................................................................................229.2.1.Interceptionorders...............................................................................................229.2.2.Informationrequests............................................................................................2410.Reporting.......................................................................................................................2410.1.Notifications............................................................................................................2410.1.1.Errors...............................................................................................................2410.1.2.Out-Of-Service.................................................................................................25
 
Lawful Interceptionoftelecommunicationstraffic Confidential
3/36
10.1.3.Systemupdate.................................................................................................2510.1.4.Document update.............................................................................................2510.1.5.Newservices....................................................................................................2610.2.Tables.....................................................................................................................2711.Security..........................................................................................................................2711.1.Communication.......................................................................................................2711.2.Dataprotection........................................................................................................2711.3.Hardwaresecurity...................................................................................................2711.4.Personnelsecurityaspects......................................................................................2712.Acceptanceprocedure...................................................................................................2812.1.Acceptance.............................................................................................................2812.2.Permanent test environment...................................................................................2813.Finalprovisions..............................................................................................................2914.Annex.............................................................................................................................3014.1.Information typerequest combinations....................................................................3014.1.1.Target identityinformationA_1.........................................................................3014.1.2.SubscriberinformationA_2..............................................................................3014.1.3.NetworkinformationA_3..................................................................................3114.1.4.ServiceinformationA_4...................................................................................3114.2.XMLdocument structures.......................................................................................3114.2.1.Datastructure fororders..................................................................................3114.2.2.Datastructure forrequests...............................................................................35

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->