- 3GPP - 3rd Generation Partnership Project.
- 5GC - 5G Core.
- 5G SA - 5G stand-alone (The 5G network is not reliant on any other network infrastructure and can operate independently). Unleashes 5G best performance.
- 5G NSA - 5G non-standalone (5G radio access network integrated to 4G LTE core (EPC-Evolved Packet Core)).
- ADMF - LI Administration Function.
- AMF - Access and Mobility Management Function.
- API - Application Interface.
- ARP - Address Resolution Protocol.
- AUSF - Authentication Server Function.
- AWS - Amazon Web Services.
- CDR - Call Detail Record.
- CCE - COTS Cloud Extractor.
- CI - Cyber Intelligence.
- CI type-1 - Cyber Intelligence which exploits edge device operating system and software zero-day vulnerabilities to overcome encryption (including E2EE).
- CI type-2 - Cyber Intelligence which exploits edge device hardware vulnerabilities (side channel attacks and fault injection attacks) to overcome encryption (including E2EE) and other security mechanisms such as authentication, secure boot, as a non-exhaustive list.
- CI type-3 - Cyber Intelligence which uses various manipulation techniques in order to detect target hidden virtual identities, IP addresses and credentials (usernames and passwords).
- CI^2 - Cyber Intelligence Injection.
- Compliance LI - LI facilities installed at CSPs to comply with the LI regulation.
- COTS - Commercial off-the-shelf.
- CSP - Communication Service Provider.
- CSRF - Cross Site Request Forgery.
- DNS - Domain Name Server.
- DPI - Deep Packet Inspection.
- DSP - Demand-side Platform.
- E2EE - End-to-End Encryption.
- EC3 - European Cybercrime Center.
- EPC - Evolved Packet Core.
- EPS - Evolved Packet System.
- ETSI - European Telecommunications Standards Institute.
- GNSS - Global Navigation Satellite System.
- GUTI - Globally Unique Temporary Identity.
- HI - Handover Interface.
- HIQR - Handover Interface Query Response.
- HTTP - Hypertext Transfer Protocol.
- HTTPS - Hypertext Transfer Protocol Secure.
- I2 - Injection Interface (for CI agents).
- ICF - Identifier Caching Function.
- IEF - Identifier Event Function.
- IMSI - International Mobile Subscriber Identification (it is the individual number of the mobile phone card, known as SIM card).
- IP - Internet Protocol.
- IPDR - IP detailed Record.
- IQF - Identity Query Function.
- IRI - Intercept Related Information.
- JS - JavaScript.
- LCS - Location services.
- LEA - Law Enforcement Agency.
- LEMF - Law Enforcement Monitoring Facility.
- LI - Lawful Interception.
- LICF - Lawful Interception Control Function.
- LIPF - Lawful Interception Provisioning Function.
- LI_X1 - Intercept management and Provisioning.
- LI_X2 - Intercept Related Information (IRI), intercepted communication metadata.
- LI_X3 - Communication Content (CC).
- LMF - Location Management Function.
- LTE - Long Term Evolution.
- MAC - Media Access Control.
- MC - Monitoring Center.
- MDF - Mediation Delivery Function.
- MEC - Multi Access Edge Computing.
- NF - Network Function.
- NR - New Radio.
- NSA - Non Stand Alone.
- NRF - Network Repository Function.
- PEI - Permanent Equipment Identifier.
- POI - Point of Interception.
- POLEX - POLIIICE Exchange of hash encoded identifiers.
- QC - Quantum Compression.
- QUDDaaS - Quantum Unlock, Detection and Decryption as a Service.
- RAN - Radio Access Network.
- RTB - Real Time Bidding (platform).
- SF - Smart Filtering.
- SSL - Secure Sockets Layer.
- SSP - Supply-side Platform.
- SMF - Session Management Function.
- SMLC - Service mobile location centers.
- SMS - Short Messaging Service.
- SUCI - Subscriber concealed Identifier.
- SUPI - Subscriber Permanent Identifier.
- UPF - User Plane Function.
- VNF - Virtual Network Function.
- VNFC - Virtual Network Function Component.
- X1/HI1 - Intercept management and Provisioning.
- X2/HI2 - Intercept Related Information (IRI), intercepted communication metadata.
- X3/HI3 - Communication Content (CC).
- XSS - Cross Site Scripting.
- 3GPP – 3rd Generation Partnership Project.
- 5GC – 5G Core.
- 5G SA – 5G stand-alone (The 5G network is not reliant on any other network infrastructure and can operate independently). Unleashes 5G best performance.
- 5G NSA – 5G non-standalone (5G radio access network integrated to 4G LTE core (EPC-Evolved Packet Core)).
- ADMF – LI Administration Function.
- AMF – Access and Mobility Management Function.
- API – Application Interface.
- ARP – Address Resolution Protocol.
- AUSF – Authentication Server Function.
- AWS – Amazon Web Services.
- CDR – Call Detail Record.
- CCE – COTS Cloud Extractor.
- CI – Cyber Intelligence.
- CI type-1 – Cyber Intelligence which exploits edge device operating system and software zero-day vulnerabilities to overcome encryption (including E2EE).
- CI type-2 – Cyber Intelligence which exploits edge device hardware vulnerabilities (side channel attacks and fault injection attacks) to overcome encryption (including E2EE) and other security mechanisms such as authentication, secure boot, as a non-exhaustive list.
- CI type-3 – Cyber Intelligence which uses various manipulation techniques in order to detect target hidden virtual identities, IP addresses and credentials (usernames and passwords).
- CI^2 – Cyber Intelligence Injection.
- Compliance LI – LI facilities installed at CSPs to comply with the LI regulation.
- COTS – Commercial off-the-shelf.
- CSP – Communication Service Provider.
- CSRF – Cross Site Request Forgery.
- DNS – Domain Name Server.
- DPI – Deep Packet Inspection.
- DSP – Demand-side Platform.
- E2EE – End-to-End Encryption.
- EC3 – European Cybercrime Center.
- EPC – Evolved Packet Core.
- EPS – Evolved Packet System.
- ETSI – European Telecommunications Standards Institute.
- GNSS – Global Navigation Satellite System.
- GUTI – Globally Unique Temporary Identity.
- HI – Handover Interface.
- HIQR – Handover Interface Query Response.
- HTTP – Hypertext Transfer Protocol.
- HTTPS – Hypertext Transfer Protocol Secure.
- I2 – Injection Interface (for CI agents).
- ICF – Identifier Caching Function.
- IEF – Identifier Event Function.
- IMSI – International Mobile Subscriber Identification (it is the individual number of the mobile phone card, known as SIM card).
- IP – Internet Protocol.
- IPDR – IP detailed Record.
- IQF – Identity Query Function.
- IRI – Intercept Related Information.
- JS – JavaScript.
- LCS – Location services.
- LEA – Law Enforcement Agency.
- LEMF – Law Enforcement Monitoring Facility.
- LI – Lawful Interception.
- LICF – Lawful Interception Control Function.
- LIPF – Lawful Interception Provisioning Function.
- LI_X1 – Intercept management and Provisioning.
- LI_X2 – Intercept Related Information (IRI), intercepted communication metadata.
- LI_X3 – Communication Content (CC).
- LMF – Location Management Function.
- LTE – Long Term Evolution.
- MAC –Media Access Control.
- MC – Monitoring Center.
- MDF – Mediation Delivery Function.
- MEC – Multi Access Edge Computing.
- NF – Network Function.
- NR – New Radio.
- NSA – Non Stand Alone.
- NRF – Network Repository Function.
- PEI – Permanent Equipment Identifier.
- POI – Point of Interception.
- POLEX – POLIIICE Exchange of hash encoded identifiers.
- QC – Quantum Compression.
- QUDDaaS – Quantum Unlock, Detection and Decryption as a Service.
- RAN – Radio Access Network.
- RTB – Real Time Bidding (platform).
- SF – Smart Filtering.
- SSL – Secure Sockets Layer.
- SSP – Supply-side Platform.
- SMF – Session Management Function.
- SMLC – Service mobile location centers.
- SMS – Short Messaging Service.
- SUCI – Subscriber concealed Identifier.
- SUPI – Subscriber Permanent Identifier.
- UPF – User Plane Function.
- VNF – Virtual Network Function.
- VNFC – Virtual Network Function Component.
- X1/HI1 – Intercept management and Provisioning.
- X2/HI2 – Intercept Related Information (IRI), intercepted communication metadata.
- X3/HI3 – Communication Content (CC).
- XSS – Cross Site Scripting.