Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Lawful Interception in the Netherlands and Germany

URL
http://ftp.ccc.de/congress/2001/mp3/vortraege/tag2/saal2/28-s2-1900-Lawfull-Interceptions.mp3
File name
28-s2-1900-Lawfull-Interceptions.mp3
File size
7.6 MB
MD5
902de9ec69ac058991594fac52c0211f
SHA1
01b92378e2877b332c2c021c8b0c308f8db9e162

Meant by its designers to be a public specification, the Transport of Intercepted IP Traffic is a "secret" document describing the interception and handover of a user's internet data from suspect to government. We'll examine what happens at the sniffer box(S1), the collector box (S2) and the government receivers (T1 and T2), and the encryption used. We'll discuss how the government will tunnel this data to themselves, or what data can't possible be tapped with the current specification. Finally, we'll describe what we know about the digital tapping room, and what a possible target can do to make things really hard for the ISP's and the government.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !