- 3GPP – 3rd Generation Partnership Project.
- 5GC – 5G Core.
- 5G SA – 5G stand-alone (The 5G network is not reliant on any other network infrastructure and can operate independently). Unleashes 5G best performance.
- 5G NSA – 5G non-standalone (5G radio access network integrated to 4G LTE core (EPC-Evolved Packet Core)).
- ADMF – LI Administration Function.
- AMF – Access and Mobility Management Function.
- API – Application Interface.
- ARP – Address Resolution Protocol.
- AUSF – Authentication Server Function.
- AWS – Amazon Web Services.
- CDR – Call Detail Record.
- CCE – COTS Cloud Extractor.
- CI – Cyber Intelligence.
- CI type-1 – Cyber Intelligence which exploits edge device operating system and software zero-day vulnerabilities to overcome encryption (including E2EE).
- CI type-2 – Cyber Intelligence which exploits edge device hardware vulnerabilities (side channel attacks and fault injection attacks) to overcome encryption (including E2EE) and other security mechanisms such as authentication, secure boot, as a non-exhaustive list.
- CI type-3 – Cyber Intelligence which uses various manipulation techniques in order to detect target hidden virtual identities, IP addresses and credentials (usernames and passwords).
- CI^2 – Cyber Intelligence Injection.
- Compliance LI – LI facilities installed at CSPs to comply with the LI regulation.
- COTS – Commercial off-the-shelf.
- CSP – Communication Service Provider.
- CSRF – Cross Site Request Forgery.
- DNS – Domain Name Server.
- DPI – Deep Packet Inspection.
- DSP – Demand-side Platform.
- E2EE – End-to-End Encryption.
- EC3 – European Cybercrime Center.
- EPC – Evolved Packet Core.
- EPS – Evolved Packet System.
- ETSI – European Telecommunications Standards Institute.
- GNSS – Global Navigation Satellite System.
- GUTI – Globally Unique Temporary Identity.
- HI – Handover Interface.
- HIQR – Handover Interface Query Response.
- HTTP – Hypertext Transfer Protocol.
- HTTPS – Hypertext Transfer Protocol Secure.
- I2 – Injection Interface (for CI agents).
- ICF – Identifier Caching Function.
- IEF – Identifier Event Function.
- IMSI – International Mobile Subscriber Identification (it is the individual number of the mobile phone card, known as SIM card).
- IP – Internet Protocol.
- IPDR – IP detailed Record.
- IQF – Identity Query Function.
- IRI – Intercept Related Information.
- JS – JavaScript.
- LCS – Location services.
- LEA – Law Enforcement Agency.
- LEMF – Law Enforcement Monitoring Facility.
- LI – Lawful Interception.
- LICF – Lawful Interception Control Function.
- LIPF – Lawful Interception Provisioning Function.
- LI_X1 – Intercept management and Provisioning.
- LI_X2 – Intercept Related Information (IRI), intercepted communication metadata.
- LI_X3 – Communication Content (CC).
- LMF – Location Management Function.
- LTE – Long Term Evolution.
- MAC –Media Access Control.
- MC – Monitoring Center.
- MDF – Mediation Delivery Function.
- MEC – Multi Access Edge Computing.
- NF – Network Function.
- NR – New Radio.
- NSA – Non Stand Alone.
- NRF – Network Repository Function.
- PEI – Permanent Equipment Identifier.
- POI – Point of Interception.
- POLEX – POLIIICE Exchange of hash encoded identifiers.
- QC – Quantum Compression.
- QUDDaaS – Quantum Unlock, Detection and Decryption as a Service.
- RAN – Radio Access Network.
- RTB – Real Time Bidding (platform).
- SF – Smart Filtering.
- SSL – Secure Sockets Layer.
- SSP – Supply-side Platform.
- SMF – Session Management Function.
- SMLC – Service mobile location centers.
- SMS – Short Messaging Service.
- SUCI – Subscriber concealed Identifier.
- SUPI – Subscriber Permanent Identifier.
- UPF – User Plane Function.
- VNF – Virtual Network Function.
- VNFC – Virtual Network Function Component.
- X1/HI1 – Intercept management and Provisioning.
- X2/HI2 – Intercept Related Information (IRI), intercepted communication metadata.
- X3/HI3 – Communication Content (CC).
- XSS – Cross Site Scripting.