hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.4 Macro Obtain_Authent_Para_VLR | .......................................................................................................... 842 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.5 Process Obtain_Auth_Sets_HLR | ............................................................................................................. 843 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.6 Process Obtain_Authent_Para_SGSN | ...................................................................................................... 854 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.7 Process Authentication_Failure_Report | ................................................................................................... 857 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.7.1 General | ............................................................................................................................................... 857 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.7.2 Process in the VLR | ............................................................................................................................. 858 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.7.3 Process in the SGSN | ........................................................................................................................... 859 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.5.7.4 Process in the HLR | ............................................................................................................................. 860 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6 IMEI Handling Macros | .................................................................................................................................. 861 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6.1 Macro Check_IMEI_MSC | ....................................................................................................................... 861 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6.2 Macro Check_IMEI_VLR | ........................................................................................................................ 861 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6.3 Process Check_IMEI_EIR | ....................................................................................................................... 862 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6.4 Macro Obtain_IMEI_MSC | ...................................................................................................................... 862 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6.5 Macro Obtain_IMEI_VLR | ....................................................................................................................... 862 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.6.6 Process Check_IMEI_SGSN | .................................................................................................................... 869 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7 Insert Subscriber Data Macros | ....................................................................................................................... 872 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7.1 Macro Insert_Subs_Data_VLR | ................................................................................................................ 872 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7.2 Process Insert_Subs_Data_Stand_Alone_HLR | ........................................................................................ 874 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7.3 Macro Wait_for_Insert_Subs_Data_Cnf | .................................................................................................. 880 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7.4 Process Send_Insert_Subs_Data | .............................................................................................................. 882 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7.5 Macro Insert_Subs_Data_SGSN | .............................................................................................................. 882 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.7.6 Macro Wait_for_Insert_GPRS_Subs_Data_Cnf | ...................................................................................... 884 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.8 Request IMSI Macros | .................................................................................................................................... 886 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.8.1 Macro Obtain_IMSI_MSC | ....................................................................................................................... 886 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.8.2 Macro Obtain_IMSI_VLR | ....................................................................................................................... 886 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9 Tracing macros | .............................................................................................................................................. 888 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9.1 Macro Trace_Subscriber_Activity_MSC | ................................................................................................. 888 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9.2 Macro Trace_Subscriber_Activity_VLR | ................................................................................................. 888 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9.3 Macro Activate_Tracing_VLR | ................................................................................................................. 888 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9.4 Macro Control_Tracing_HLR | .................................................................................................................. 889 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9.5 Macro Trace_Subscriber_Activity_SGSN | ............................................................................................... 889 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.9.6 Macro Activate_Tracing_SGSN | .............................................................................................................. 889 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.10 Short Message Alert procedures | .................................................................................................................... 890 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.10.1 Subscriber_Present_VLR process | ............................................................................................................ 890 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.10.2 Macro Alert_Service_Centre_HLR | .......................................................................................................... 890 |
8fe1bf7c3f9fa0108bbad5bdf8793e81 | 129 002 | 25.10.3 The Mobile Subscriber is present | ............................................................................................................. 891 ETSI 3G TS 29.002 version 3.5.2 Release 1999 24 ETSI TS 129 002 V3.5.2 (2000-08) Annex A (informative): Cross-reference for abstract syntaxes of MAP.........................................892 Annex B (info... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 1 Scope | The present document will aim to provide guidance and information about social media networks and messaging applications, and their many issues regarding user safety, privacy, and content. When tackling these issues, one tends to think of a single service or application. The present document moves to a holistic approac... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 2 References | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 2.1 Normative references | Normative references are not applicable in the present document. |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 2.2 Informative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 3 Definition of terms, symbols and abbreviations | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 3.1 Terms | For the purposes of the present document, the following terms apply: age assurance: techniques for estimating, inferring or verifying the ages of a person algorithm: in social media networks and services, algorithms are rules, signals and data that govern the platform's operation. These algorithms determine how content... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 3.2 Symbols | Void. |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: 2FA Two Factor Authentication AI Artificial Intelligence API Application Programming Interface AppDev Application Developer ARF Architecture and Reference Framework AVMSD Audio-Visual Media Services Directive BBM BlackBerry Messenger CD Compac... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4 Harmful Actions, Attacks, and Societal Risks | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.0 Overview | A significantly diverse array of analyses and legislative findings makes plain that social media networks, messaging applications, and associated support services, including search engines, give rise to a broad array of harmful actions and attacks on individual users, institutions, and society, including fundamental hu... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.1 Hate Speech and Hate Crime | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.1.1 Xenophobia, Racism, Antisemitism | Various discussions on social media are driven and dominated by extremist and/or fringe views [i.7]. Societal fissures along national, racial and economic lines are exploited to expand certain views for social media footprint and amplify their message. These and other users often seek to create a crude 'us'/'them' bina... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.1.2 Religious Intolerance | Religious intolerance can be understood as an intolerance of a person's religion, religious beliefs, or practices. It is rooted in negative attitudes, values, and beliefs toward those of a particular religion. While attitudes of religious intolerance can be challenging to measure and quantify, actions are more recogniz... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.1.3 Misogyny and Sexual Orientation | Misogyny can be defined as a hatred of, aversion to, or prejudice against women and Sexual Orientation, also known as sexuality, refers to a person's sexual attraction to other people, or lack thereof [i.10]. This includes emotional, romantic, sexual or affectionate attraction to other people. On social media, these tw... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2 Disinformation and Misinformation | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2.0 Overview | The following clauses are not the only types of disinformation and misinformation found online. They are non-exhausted list of examples of how disinformation and misinformation are created and spread online. ETSI ETSI TR 104 137 V1.1.1 (2026-03) 16 |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2.1 Abetting hate speech | Social media is used by members of the public to publish content online. The majority of posts on social media are ordinary and harmless (such as posts on daily activities, comments on TV shows or news stories, sharing photos and videos of friends and family) [i.12]. However, a small number of social media users post c... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2.2 Anti-vaccination promotion | This term refers to efforts or campaigns that seek to discourage or prevent people from receiving vaccines, oftentimes by spreading misinformation, misleading arguments or unfounded fears. Such efforts can take place through various channels, such as social media, websites and sometimes through public figures, includin... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2.3 Election Integrity Attacks | These refer to efforts or activities designed to undermine or disrupt the fairness, transparency, or accuracy of an election process. These can take various forms, including disinformation campaigns aiming to confuse or manipulate voters. The overall objective of such attacks is to influence the outcome of an election,... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2.4 Attacks on established science | These refer to efforts to undermine or distort well-established scientific research. One of the forms that such attacks can take are public misinformation campaigns with an aim to create confusion and doubt or weaken public trust in scientifically established conclusions. For example, this can consist of spreading inco... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.2.5 Attacks on the rule of law and societal institutions | The rule of law is the foundation that supports a country's democracy, and the societal institutions required to maintain it. It creates a social contract and is the arbiter of disputes as well as the insurer of basic human rights. The size and reach of online social networks can affect trust in the rule of law [i.18].... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.3 Personal safety and health | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.3.1 Harassment and Cyberbullying | Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming, where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negati... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.3.2 Doxing/Doxxing | Doxxing (alternative spelling doxing) is the action or process of searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent, without that individual's consent. People are 'doxed' for a variety of different reasons, and doxxing is often... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.3.3 Swatting | Swatting is the act of harassing or deceiving an emergency service (via such means as hoaxing an emergency services dispatcher) into sending a police or emergency service response team to another person's address. It is often linked to doxing. Swatting occurs when a hoaxer gathers information about their intended targe... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.3.4 Online Grooming | It is an action or behaviour used to establish an emotional connection with a vulnerable person and sometimes the victim's family. This can be, for example, to extort them financially (more likely adults) or sexually abuse (more likely children). Groomers are skilled at deceiving others about their identity, particular... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.3.5 Sextortion | 'Financially Motivated Sexual Extortion', a type of online blackmail often referred to as 'sextortion'. It is a type of online blackmail where malicious actors threaten to share sexual pictures, videos, or information about someone. They may be trying to take money from them or forcing them to do something else they do... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 4.4 Dark Number/Dark Figure | The dark number or dark figure, which comes from criminology, is a term that is used by crime experts and sociologists to illustrate the number of committed crimes that are never reported or are never discovered, and this puts into doubt the effectiveness and efficiency of the official crime data [i.6]. Among the crime... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5 Factors Affecting Harms and Risks | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.1 Scale, Dominance and Presence | There are two key scales. The first is the scale from the most private to the most public. The second is the scale from the smallest group to the largest group. At one end of both of these scales, there are private dyadic conversations and at the other end, there is fully public broadcasting [i.5]. ETSI ETSI TR 104 137... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.2 Devices and Apps | The number of internet-connected devices a person or household uses can range from the single digits to potentially the hundreds if they have a smart home with many IoT devices. Though these will be part of the furniture and fittings of the house. A small number of devices would be used daily, such as smart TVs and spe... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.3 Algorithms | Algorithms in social media platforms can be defined as technical means of sorting posts based on relevance instead of publication time, and to prioritize the content a user sees first according to the likelihood that they will engage with such content [i.25]. The function of an algorithm is to deliver relevant content ... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.4 AI LLM Risks | An LLM is where an algorithm has been trained on a large amount of text-based data, typically scraped from the open internet, and so covers web pages and, depending on the LLM, other sources such as scientific research, books or social media posts [i.28]. This covers such a large volume of data that it is not possible ... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.5 The Theory of Polymedia | In the past, the reason people chose one media rather than another was usually a question of either cost or access. Today, societies have a much wider range of communicative tools at their disposal, for example, smartphones, fixed telephones, text messages, broadband internet, email and all kinds of social media platfo... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.1 Introduction | This present clause aims to provide a broad understanding of how different people, divided into age ranges, use apps and devices. This is a constantly changing area, and what is true today might not be true tomorrow. Also, this clause does not cover the other factors that can affect how different users use apps and dev... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.2 Ages 6 and Under | This includes children who are in pre-school and at the beginning of the primary education level. Preschoolers learn by interacting with the world around them. Parents are using digital devices with their young children both to support learning and to keep them quiet. They are also using the internet and social media t... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.2 Ages 7 to 11 | This includes children who are at the primary education level. At this age, most children use apps and websites for entertainment and begin to use devices for schoolwork. Typically, children will have their first user experience with a parent's computer, tablet, smartphone, etc. designed and sized for adult users. At t... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.3 Ages 12 to 18 | These are children who are in secondary school, going through their teenage or adolescent years, which brings many changes not only physically, but also mentally and socially. As children transition from primary education to secondary, they experience many digital firsts, with many getting their first smartphone [i.33]... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.4 Ages 19 to 29 | This age range includes people in tertiary education, who are beginning to start their working life. During this time, people are now legally adults (the age of majority), though the age varies from country to country. In the majority of places, the age is 18, but in some countries, it is younger, while in others, it i... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.5 Ages 30 to 55 | This age range is broad and diverse. Generally, people in this age will have their careers and have their own families. Generally, use a wide variety of apps and services for work and personal use. They will be the likeliest to respond to push notifications. They may prefer personal interaction rather than visual stimu... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.6 Ages 56 to 75 | This age range tends to be nearer the end of their working life and beginning to look towards retirement. They may be more financially secure, for example, their mortgage is paid off, and their children have left home. They generally use apps and services that help maintain a better quality of life, but not all in this... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 5.6.7 Ages 76 and Older | While this age group is increasingly online, there are still people who do not use the internet and do not have a smartphone. Digital technology is playing an increasing role in our lives, and for many people, it is essential to the way that they socialise, work, shop, manage their finances, access services, and get en... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6 Preventive and Mitigation Measures | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1 Regulatory Conformance | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.1 Introduction | There are different regulatory pieces at the time this present document is published that companies, organizations and service providers have to conform to. See Annex A. These relate to online safety, disinformation and harms that affect users online. They have to take action to mitigate the impact of disinformation, p... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.2 Conforming to The Code of Conduct on Disinformation | Platform services and providers of social networks, messaging apps and content-sharing platforms can potentially reduce the spread of disinformation by conforming to the measures in The Code of Conduct [i.36], [i.37], [i.38], which aims to combat disinformation risks while fully upholding the freedom of speech and enha... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3 Age Assurance Conformance | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3.1 Introduction | Age assurance methods are used to determine the age or age range of an individual, including age verification, estimation, and self-declaration. They are required for online platforms and services to comply with regulations like the UK Online Safety and the EU Digital Service Act, to ensure users, particularly underage... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3.2 Age Verification | Age verification is any method designed to verify the exact age of users or confirm that a user is over 18. There are different approaches to age verification: • Verifying the user's age through scanning a 'hard identifier' such as a driver's license or passport. • Verifying a person's age through a third-party provide... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3.3 Age Estimation | Age estimation is any method designed to estimate the age, or age range, of a user, often by algorithmic means. Platforms could use age estimation approaches for initial onboarding or account creation, or for ongoing monitoring. These approaches estimate the age of a person, rather than confirming whether someone is a ... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3.4 Self-declaration | Self-declaration is a method where a user states their age but is not required to provide evidence to confirm it. It is a popular approach because there are relatively few steps to follow, and because it requires minimal personal information. It often takes the form of a tick box to self-affirm that the person meets th... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3.5 Waterfall techniques and age buffers | The waterfall technique combines different age assurance approaches. Waterfall techniques build on the output of successive age assurance approaches to provide a cumulative result with a greater level of confidence than any of these approaches in isolation. Waterfall techniques have the potential to offer high levels o... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.3.6 EU Age Verification Solution | The European Commission is developing a harmonised, EU-wide approach to age verification, accompanied by a comprehensive age verification blueprint that is intended to facilitate practical adoption across all Member States and can be customized to the national context [i.42]. This approach defines the structural and fu... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4 Digital Content and Services Conformance | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.1 Introduction | Recent legislative changes, the EU Digital Services Act [i.44]. and the UK Online Safety Act [i.45], have introduced stronger legal obligations on online service and content providers to provide a safer online experience for all users. This includes removing harmful and illegal content. In the EU, there is a stronger p... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2 EU Digital Service Act (DSA) | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2.1 Reporting of illegal Content | The DSA requires platforms to put in place measures to counter the spreading of illegal goods, services or content online, such as mechanisms for users to flag such content and for platforms to cooperate with "trusted flaggers". |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2.2 Transparency in content moderation and options to appeal | Online platforms are a digital space where users express themselves, showcase their work, and are in contact with friends or customers. This is why it is particularly frustrating when their content gets removed or the reach of their posts is inexplicably reduced. With the DSA, providers of intermediary services, includ... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2.3 Control on personalization options | The DSA obliges providers of online platforms to guarantee greater transparency and control over what users see in their feeds. This should allow them to discover on what basis online platforms rank content on their feeds and to decide whether users want to opt out of personalized recommendations, since VLOPs have to o... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2.5 Protection for minors | Under the DSA, online platforms that are accessible to minors should protect the privacy and security of those users, as well as their mental and physical well-being. The European Commission has adopted guidelines for protecting children and created a blueprint for an age verification solution, see clause 6.1.3.6. The ... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2.6 Integrity of Elections | The DSA requires VLOPs and VLOSEs to identify, analyse, and mitigate with effective measures risks related to the electoral processes and civic discourse, while ensuring the protection of freedom of expression. ETSI ETSI TR 104 137 V1.1.1 (2026-03) 36 |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.2.7 Obligations on traceability of business users in online marketplaces | The DSA introduces obligations for providers of online marketplaces to counter the spread of illegal goods. In particular, such providers have to ensure that sellers provide verified information on their identity before they can start selling their goods on those online marketplaces. Such providers have to guarantee th... |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.3 UK Online Safety Act | |
6415f963a1132f0296af8c07ba03f700 | 104 137 | 6.1.4.3.1 Illegal content safety duties for user-to-user services | "The provider of a user-to-user service shall": • take proportionate steps to prevent their users from encountering illegal content • mitigate and manage the risk of offences taking place through their service • mitigate and manage the risks identified in their illegal content risk assessment • swiftly remove illegal c... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.