Difference between revisions of "ETSI"
From Buggedplanet.info
Jump to navigationJump to search(11 intermediate revisions by 2 users not shown) | |||
Line 16: | Line 16: | ||
|- | |- | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20130909||fm4.orf.at||[http://fm4.orf.at/stories/1724549/ Wie NSA und GCHQ Verschlüsselung unterminieren: Das neueste, bekanntgewordene NSA-Projekt "Bullrun" sieht dem "Facebook-Überwachungsstandard" des European Telecom Standards Institute frappierend ähnlich.]||[[ETSI]] / [[NSA]] / [[GCHQ]] / [[BULLRUN]] / [[EDGEHILL]] | ||
+ | |- | ||
+ | |20121214||telepolis.de||[http://www.heise.de/tp/blogs/8/153366 Schnüffler drängen in die Wolke: Unter Missachtung des Trennungsgebots forschen Polizeien und der Inlandsgeheimdienst an der Telekommunikationsüberwachung von Cloud-Dienste]||[[DE]] / [[ETSI]] / [[Cloud Computing]] | ||
+ | |- | ||
+ | |28.10.2012||anrej-hunko.de||[http://www.andrej-hunko.de/start/download/doc_download/256-deutsche-mitarbeit-an-ueberwachungsstandards-im-eu-ropaeischen-institut-fuer-telekommunikationsnormen-etsi Deutsche Mitarbeit an Überwachungsstandards im ETSI]||[[DE]] / [[ETSI]] | ||
|- | |- | ||
|20.07.2012||fm4.orf.at||[http://fm4.orf.at/stories/1701899/ Der Facebook-Überwachungsstandard: Das bereits praktizierte Einlesen und Speichern von Chats, privaten Postings oder Webmail samt Brechen der Https-Verschlüsselung von Web-2.0-Diensten soll auch als Telekom-Standard verankert werden]||[[ETSI-LI]] / [[GB]] | |20.07.2012||fm4.orf.at||[http://fm4.orf.at/stories/1701899/ Der Facebook-Überwachungsstandard: Das bereits praktizierte Einlesen und Speichern von Chats, privaten Postings oder Webmail samt Brechen der Https-Verschlüsselung von Web-2.0-Diensten soll auch als Telekom-Standard verankert werden]||[[ETSI-LI]] / [[GB]] | ||
+ | |- | ||
+ | |23.12.2009||cryptome.org||[http://cryptome.org/0001/spook-wishlist2.htm The Modern Spook's Wish List]||[[GCHQ]] / [[ETSI]] | ||
+ | |- | ||
+ | |02.12.2009||crypome.org||[http://cryptome.org/spook-wishlist.htm The Modern Spook's Data Retention Wish List]||[[GCHQ]] / [[ETSI]] / [[EU]] / [[Data Retention]] | ||
|- | |- | ||
|01.06.2009||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/etsi-tc-li/47_etsi-activities-on-retained-data-handling-and-lawful.html ETSI activities on Retained Data handling and Lawful Interception standardisation]|| LI, DR,ETSI | |01.06.2009||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/etsi-tc-li/47_etsi-activities-on-retained-data-handling-and-lawful.html ETSI activities on Retained Data handling and Lawful Interception standardisation]|| LI, DR,ETSI | ||
|- | |- | ||
− | |01.10.2008||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/etsi/28_etsi-tc-li-overview-on-lawful-interception-and-retained-data.html ETSI/TC LI Overview on Lawful Interception and Retained Data handling]||LI | + | |01.10.2008||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/etsi/28_etsi-tc-li-overview-on-lawful-interception-and-retained-data.html ETSI/TC LI Overview on Lawful Interception and Retained Data handling]||[[ETSI-LI]] [[Lawful Interception]] / [[Data Retention]] |
|- | |- | ||
|01.10.2008||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/etsi-tc-li/26_data-retention-requirements.html Data Retention Requirements]||[[ETSI-LI]] / [[Data Retention]] | |01.10.2008||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/etsi-tc-li/26_data-retention-requirements.html Data Retention Requirements]||[[ETSI-LI]] / [[Data Retention]] | ||
Line 32: | Line 42: | ||
|- | |- | ||
|} | |} | ||
+ | |||
+ | [[Category:Interception Standards]] |