Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Surveillance Technology
|
gptkbp:canBe |
Unauthorized Surveillance
|
gptkbp:canBeCaptured |
Location Data
Call Metadata Content of Communication |
gptkbp:challenge |
Encryption
Cross-border Data Access Jurisdictional Issues |
gptkbp:concerns |
gptkb:Data_Security
Privacy |
gptkbp:enables |
Data Collection
Real-time Monitoring Evidence Gathering |
https://www.w3.org/2000/01/rdf-schema#label |
Lawful Interception Systems
|
gptkbp:implementedIn |
gptkb:Mobile_Networks
gptkb:Internet_Service_Providers gptkb:Fixed-line_Networks |
gptkbp:integratesWith |
Network Infrastructure
Service Provider Systems |
gptkbp:mainVendors |
gptkb:Ericsson
gptkb:Nokia gptkb:Verint gptkb:Hacking_Team gptkb:NSO_Group |
gptkbp:monitors |
gptkb:Regulatory_Authorities
|
gptkbp:purpose |
Intercept Communications
Monitor Telecommunications |
gptkbp:regulates |
International Standards
National Laws |
gptkbp:relatedTo |
Mass Surveillance
Targeted Surveillance |
gptkbp:requires |
Data Retention
Legal Authorization Technical Interface Telecom Operators Compliance |
gptkbp:standardizedBy |
gptkb:3GPP
gptkb:ETSI |
gptkbp:subject |
Judicial Oversight
|
gptkbp:supports |
gptkb:VoIP
SMS Internet Traffic Voice Communications |
gptkbp:usedBy |
gptkb:Intelligence_Agencies
Law Enforcement Agencies |
gptkbp:usedIn |
Counterterrorism
National Security Criminal Investigations |
gptkbp:bfsParent |
gptkb:Centre_for_Development_of_Telematics
|
gptkbp:bfsLayer |
7
|