hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.4 Macro Obtain_Authent_Para_VLR
.......................................................................................................... 842
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.5 Process Obtain_Auth_Sets_HLR
............................................................................................................. 843
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.6 Process Obtain_Authent_Para_SGSN
...................................................................................................... 854
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.7 Process Authentication_Failure_Report
................................................................................................... 857
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.7.1 General
............................................................................................................................................... 857
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.7.2 Process in the VLR
............................................................................................................................. 858
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.7.3 Process in the SGSN
........................................................................................................................... 859
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.5.7.4 Process in the HLR
............................................................................................................................. 860
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6 IMEI Handling Macros
.................................................................................................................................. 861
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6.1 Macro Check_IMEI_MSC
....................................................................................................................... 861
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6.2 Macro Check_IMEI_VLR
........................................................................................................................ 861
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6.3 Process Check_IMEI_EIR
....................................................................................................................... 862
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6.4 Macro Obtain_IMEI_MSC
...................................................................................................................... 862
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6.5 Macro Obtain_IMEI_VLR
....................................................................................................................... 862
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.6.6 Process Check_IMEI_SGSN
.................................................................................................................... 869
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7 Insert Subscriber Data Macros
....................................................................................................................... 872
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7.1 Macro Insert_Subs_Data_VLR
................................................................................................................ 872
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7.2 Process Insert_Subs_Data_Stand_Alone_HLR
........................................................................................ 874
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7.3 Macro Wait_for_Insert_Subs_Data_Cnf
.................................................................................................. 880
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7.4 Process Send_Insert_Subs_Data
.............................................................................................................. 882
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7.5 Macro Insert_Subs_Data_SGSN
.............................................................................................................. 882
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.7.6 Macro Wait_for_Insert_GPRS_Subs_Data_Cnf
...................................................................................... 884
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.8 Request IMSI Macros
.................................................................................................................................... 886
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.8.1 Macro Obtain_IMSI_MSC
....................................................................................................................... 886
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.8.2 Macro Obtain_IMSI_VLR
....................................................................................................................... 886
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9 Tracing macros
.............................................................................................................................................. 888
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9.1 Macro Trace_Subscriber_Activity_MSC
................................................................................................. 888
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9.2 Macro Trace_Subscriber_Activity_VLR
................................................................................................. 888
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9.3 Macro Activate_Tracing_VLR
................................................................................................................. 888
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9.4 Macro Control_Tracing_HLR
.................................................................................................................. 889
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9.5 Macro Trace_Subscriber_Activity_SGSN
............................................................................................... 889
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.9.6 Macro Activate_Tracing_SGSN
.............................................................................................................. 889
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.10 Short Message Alert procedures
.................................................................................................................... 890
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.10.1 Subscriber_Present_VLR process
............................................................................................................ 890
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.10.2 Macro Alert_Service_Centre_HLR
.......................................................................................................... 890
8fe1bf7c3f9fa0108bbad5bdf8793e81
129 002
25.10.3 The Mobile Subscriber is present
............................................................................................................. 891 ETSI 3G TS 29.002 version 3.5.2 Release 1999 24 ETSI TS 129 002 V3.5.2 (2000-08) Annex A (informative): Cross-reference for abstract syntaxes of MAP.........................................892 Annex B (info...
6415f963a1132f0296af8c07ba03f700
104 137
1 Scope
The present document will aim to provide guidance and information about social media networks and messaging applications, and their many issues regarding user safety, privacy, and content. When tackling these issues, one tends to think of a single service or application. The present document moves to a holistic approac...
6415f963a1132f0296af8c07ba03f700
104 137
2 References
6415f963a1132f0296af8c07ba03f700
104 137
2.1 Normative references
Normative references are not applicable in the present document.
6415f963a1132f0296af8c07ba03f700
104 137
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i...
6415f963a1132f0296af8c07ba03f700
104 137
3 Definition of terms, symbols and abbreviations
6415f963a1132f0296af8c07ba03f700
104 137
3.1 Terms
For the purposes of the present document, the following terms apply: age assurance: techniques for estimating, inferring or verifying the ages of a person algorithm: in social media networks and services, algorithms are rules, signals and data that govern the platform's operation. These algorithms determine how content...
6415f963a1132f0296af8c07ba03f700
104 137
3.2 Symbols
Void.
6415f963a1132f0296af8c07ba03f700
104 137
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: 2FA Two Factor Authentication AI Artificial Intelligence API Application Programming Interface AppDev Application Developer ARF Architecture and Reference Framework AVMSD Audio-Visual Media Services Directive BBM BlackBerry Messenger CD Compac...
6415f963a1132f0296af8c07ba03f700
104 137
4 Harmful Actions, Attacks, and Societal Risks
6415f963a1132f0296af8c07ba03f700
104 137
4.0 Overview
A significantly diverse array of analyses and legislative findings makes plain that social media networks, messaging applications, and associated support services, including search engines, give rise to a broad array of harmful actions and attacks on individual users, institutions, and society, including fundamental hu...
6415f963a1132f0296af8c07ba03f700
104 137
4.1 Hate Speech and Hate Crime
6415f963a1132f0296af8c07ba03f700
104 137
4.1.1 Xenophobia, Racism, Antisemitism
Various discussions on social media are driven and dominated by extremist and/or fringe views [i.7]. Societal fissures along national, racial and economic lines are exploited to expand certain views for social media footprint and amplify their message. These and other users often seek to create a crude 'us'/'them' bina...
6415f963a1132f0296af8c07ba03f700
104 137
4.1.2 Religious Intolerance
Religious intolerance can be understood as an intolerance of a person's religion, religious beliefs, or practices. It is rooted in negative attitudes, values, and beliefs toward those of a particular religion. While attitudes of religious intolerance can be challenging to measure and quantify, actions are more recogniz...
6415f963a1132f0296af8c07ba03f700
104 137
4.1.3 Misogyny and Sexual Orientation
Misogyny can be defined as a hatred of, aversion to, or prejudice against women and Sexual Orientation, also known as sexuality, refers to a person's sexual attraction to other people, or lack thereof [i.10]. This includes emotional, romantic, sexual or affectionate attraction to other people. On social media, these tw...
6415f963a1132f0296af8c07ba03f700
104 137
4.2 Disinformation and Misinformation
6415f963a1132f0296af8c07ba03f700
104 137
4.2.0 Overview
The following clauses are not the only types of disinformation and misinformation found online. They are non-exhausted list of examples of how disinformation and misinformation are created and spread online. ETSI ETSI TR 104 137 V1.1.1 (2026-03) 16
6415f963a1132f0296af8c07ba03f700
104 137
4.2.1 Abetting hate speech
Social media is used by members of the public to publish content online. The majority of posts on social media are ordinary and harmless (such as posts on daily activities, comments on TV shows or news stories, sharing photos and videos of friends and family) [i.12]. However, a small number of social media users post c...
6415f963a1132f0296af8c07ba03f700
104 137
4.2.2 Anti-vaccination promotion
This term refers to efforts or campaigns that seek to discourage or prevent people from receiving vaccines, oftentimes by spreading misinformation, misleading arguments or unfounded fears. Such efforts can take place through various channels, such as social media, websites and sometimes through public figures, includin...
6415f963a1132f0296af8c07ba03f700
104 137
4.2.3 Election Integrity Attacks
These refer to efforts or activities designed to undermine or disrupt the fairness, transparency, or accuracy of an election process. These can take various forms, including disinformation campaigns aiming to confuse or manipulate voters. The overall objective of such attacks is to influence the outcome of an election,...
6415f963a1132f0296af8c07ba03f700
104 137
4.2.4 Attacks on established science
These refer to efforts to undermine or distort well-established scientific research. One of the forms that such attacks can take are public misinformation campaigns with an aim to create confusion and doubt or weaken public trust in scientifically established conclusions. For example, this can consist of spreading inco...
6415f963a1132f0296af8c07ba03f700
104 137
4.2.5 Attacks on the rule of law and societal institutions
The rule of law is the foundation that supports a country's democracy, and the societal institutions required to maintain it. It creates a social contract and is the arbiter of disputes as well as the insurer of basic human rights. The size and reach of online social networks can affect trust in the rule of law [i.18]....
6415f963a1132f0296af8c07ba03f700
104 137
4.3 Personal safety and health
6415f963a1132f0296af8c07ba03f700
104 137
4.3.1 Harassment and Cyberbullying
Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming, where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negati...
6415f963a1132f0296af8c07ba03f700
104 137
4.3.2 Doxing/Doxxing
Doxxing (alternative spelling doxing) is the action or process of searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent, without that individual's consent. People are 'doxed' for a variety of different reasons, and doxxing is often...
6415f963a1132f0296af8c07ba03f700
104 137
4.3.3 Swatting
Swatting is the act of harassing or deceiving an emergency service (via such means as hoaxing an emergency services dispatcher) into sending a police or emergency service response team to another person's address. It is often linked to doxing. Swatting occurs when a hoaxer gathers information about their intended targe...
6415f963a1132f0296af8c07ba03f700
104 137
4.3.4 Online Grooming
It is an action or behaviour used to establish an emotional connection with a vulnerable person and sometimes the victim's family. This can be, for example, to extort them financially (more likely adults) or sexually abuse (more likely children). Groomers are skilled at deceiving others about their identity, particular...
6415f963a1132f0296af8c07ba03f700
104 137
4.3.5 Sextortion
'Financially Motivated Sexual Extortion', a type of online blackmail often referred to as 'sextortion'. It is a type of online blackmail where malicious actors threaten to share sexual pictures, videos, or information about someone. They may be trying to take money from them or forcing them to do something else they do...
6415f963a1132f0296af8c07ba03f700
104 137
4.4 Dark Number/Dark Figure
The dark number or dark figure, which comes from criminology, is a term that is used by crime experts and sociologists to illustrate the number of committed crimes that are never reported or are never discovered, and this puts into doubt the effectiveness and efficiency of the official crime data [i.6]. Among the crime...
6415f963a1132f0296af8c07ba03f700
104 137
5 Factors Affecting Harms and Risks
6415f963a1132f0296af8c07ba03f700
104 137
5.1 Scale, Dominance and Presence
There are two key scales. The first is the scale from the most private to the most public. The second is the scale from the smallest group to the largest group. At one end of both of these scales, there are private dyadic conversations and at the other end, there is fully public broadcasting [i.5]. ETSI ETSI TR 104 137...
6415f963a1132f0296af8c07ba03f700
104 137
5.2 Devices and Apps
The number of internet-connected devices a person or household uses can range from the single digits to potentially the hundreds if they have a smart home with many IoT devices. Though these will be part of the furniture and fittings of the house. A small number of devices would be used daily, such as smart TVs and spe...
6415f963a1132f0296af8c07ba03f700
104 137
5.3 Algorithms
Algorithms in social media platforms can be defined as technical means of sorting posts based on relevance instead of publication time, and to prioritize the content a user sees first according to the likelihood that they will engage with such content [i.25]. The function of an algorithm is to deliver relevant content ...
6415f963a1132f0296af8c07ba03f700
104 137
5.4 AI LLM Risks
An LLM is where an algorithm has been trained on a large amount of text-based data, typically scraped from the open internet, and so covers web pages and, depending on the LLM, other sources such as scientific research, books or social media posts [i.28]. This covers such a large volume of data that it is not possible ...
6415f963a1132f0296af8c07ba03f700
104 137
5.5 The Theory of Polymedia
In the past, the reason people chose one media rather than another was usually a question of either cost or access. Today, societies have a much wider range of communicative tools at their disposal, for example, smartphones, fixed telephones, text messages, broadband internet, email and all kinds of social media platfo...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.1 Introduction
This present clause aims to provide a broad understanding of how different people, divided into age ranges, use apps and devices. This is a constantly changing area, and what is true today might not be true tomorrow. Also, this clause does not cover the other factors that can affect how different users use apps and dev...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.2 Ages 6 and Under
This includes children who are in pre-school and at the beginning of the primary education level. Preschoolers learn by interacting with the world around them. Parents are using digital devices with their young children both to support learning and to keep them quiet. They are also using the internet and social media t...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.2 Ages 7 to 11
This includes children who are at the primary education level. At this age, most children use apps and websites for entertainment and begin to use devices for schoolwork. Typically, children will have their first user experience with a parent's computer, tablet, smartphone, etc. designed and sized for adult users. At t...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.3 Ages 12 to 18
These are children who are in secondary school, going through their teenage or adolescent years, which brings many changes not only physically, but also mentally and socially. As children transition from primary education to secondary, they experience many digital firsts, with many getting their first smartphone [i.33]...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.4 Ages 19 to 29
This age range includes people in tertiary education, who are beginning to start their working life. During this time, people are now legally adults (the age of majority), though the age varies from country to country. In the majority of places, the age is 18, but in some countries, it is younger, while in others, it i...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.5 Ages 30 to 55
This age range is broad and diverse. Generally, people in this age will have their careers and have their own families. Generally, use a wide variety of apps and services for work and personal use. They will be the likeliest to respond to push notifications. They may prefer personal interaction rather than visual stimu...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.6 Ages 56 to 75
This age range tends to be nearer the end of their working life and beginning to look towards retirement. They may be more financially secure, for example, their mortgage is paid off, and their children have left home. They generally use apps and services that help maintain a better quality of life, but not all in this...
6415f963a1132f0296af8c07ba03f700
104 137
5.6.7 Ages 76 and Older
While this age group is increasingly online, there are still people who do not use the internet and do not have a smartphone. Digital technology is playing an increasing role in our lives, and for many people, it is essential to the way that they socialise, work, shop, manage their finances, access services, and get en...
6415f963a1132f0296af8c07ba03f700
104 137
6 Preventive and Mitigation Measures
6415f963a1132f0296af8c07ba03f700
104 137
6.1 Regulatory Conformance
6415f963a1132f0296af8c07ba03f700
104 137
6.1.1 Introduction
There are different regulatory pieces at the time this present document is published that companies, organizations and service providers have to conform to. See Annex A. These relate to online safety, disinformation and harms that affect users online. They have to take action to mitigate the impact of disinformation, p...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.2 Conforming to The Code of Conduct on Disinformation
Platform services and providers of social networks, messaging apps and content-sharing platforms can potentially reduce the spread of disinformation by conforming to the measures in The Code of Conduct [i.36], [i.37], [i.38], which aims to combat disinformation risks while fully upholding the freedom of speech and enha...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3 Age Assurance Conformance
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3.1 Introduction
Age assurance methods are used to determine the age or age range of an individual, including age verification, estimation, and self-declaration. They are required for online platforms and services to comply with regulations like the UK Online Safety and the EU Digital Service Act, to ensure users, particularly underage...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3.2 Age Verification
Age verification is any method designed to verify the exact age of users or confirm that a user is over 18. There are different approaches to age verification: • Verifying the user's age through scanning a 'hard identifier' such as a driver's license or passport. • Verifying a person's age through a third-party provide...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3.3 Age Estimation
Age estimation is any method designed to estimate the age, or age range, of a user, often by algorithmic means. Platforms could use age estimation approaches for initial onboarding or account creation, or for ongoing monitoring. These approaches estimate the age of a person, rather than confirming whether someone is a ...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3.4 Self-declaration
Self-declaration is a method where a user states their age but is not required to provide evidence to confirm it. It is a popular approach because there are relatively few steps to follow, and because it requires minimal personal information. It often takes the form of a tick box to self-affirm that the person meets th...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3.5 Waterfall techniques and age buffers
The waterfall technique combines different age assurance approaches. Waterfall techniques build on the output of successive age assurance approaches to provide a cumulative result with a greater level of confidence than any of these approaches in isolation. Waterfall techniques have the potential to offer high levels o...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.3.6 EU Age Verification Solution
The European Commission is developing a harmonised, EU-wide approach to age verification, accompanied by a comprehensive age verification blueprint that is intended to facilitate practical adoption across all Member States and can be customized to the national context [i.42]. This approach defines the structural and fu...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4 Digital Content and Services Conformance
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.1 Introduction
Recent legislative changes, the EU Digital Services Act [i.44]. and the UK Online Safety Act [i.45], have introduced stronger legal obligations on online service and content providers to provide a safer online experience for all users. This includes removing harmful and illegal content. In the EU, there is a stronger p...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2 EU Digital Service Act (DSA)
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2.1 Reporting of illegal Content
The DSA requires platforms to put in place measures to counter the spreading of illegal goods, services or content online, such as mechanisms for users to flag such content and for platforms to cooperate with "trusted flaggers".
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2.2 Transparency in content moderation and options to appeal
Online platforms are a digital space where users express themselves, showcase their work, and are in contact with friends or customers. This is why it is particularly frustrating when their content gets removed or the reach of their posts is inexplicably reduced. With the DSA, providers of intermediary services, includ...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2.3 Control on personalization options
The DSA obliges providers of online platforms to guarantee greater transparency and control over what users see in their feeds. This should allow them to discover on what basis online platforms rank content on their feeds and to decide whether users want to opt out of personalized recommendations, since VLOPs have to o...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2.5 Protection for minors
Under the DSA, online platforms that are accessible to minors should protect the privacy and security of those users, as well as their mental and physical well-being. The European Commission has adopted guidelines for protecting children and created a blueprint for an age verification solution, see clause 6.1.3.6. The ...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2.6 Integrity of Elections
The DSA requires VLOPs and VLOSEs to identify, analyse, and mitigate with effective measures risks related to the electoral processes and civic discourse, while ensuring the protection of freedom of expression. ETSI ETSI TR 104 137 V1.1.1 (2026-03) 36
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.2.7 Obligations on traceability of business users in online marketplaces
The DSA introduces obligations for providers of online marketplaces to counter the spread of illegal goods. In particular, such providers have to ensure that sellers provide verified information on their identity before they can start selling their goods on those online marketplaces. Such providers have to guarantee th...
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.3 UK Online Safety Act
6415f963a1132f0296af8c07ba03f700
104 137
6.1.4.3.1 Illegal content safety duties for user-to-user services
"The provider of a user-to-user service shall": • take proportionate steps to prevent their users from encountering illegal content • mitigate and manage the risk of offences taking place through their service • mitigate and manage the risks identified in their illegal content risk assessment • swiftly remove illegal c...