SCHEDULES

F2SCHEDULE 3CF1Defence and Security Goods and Defence and Security Technology

Annotations:

PART 2Interception and monitoring goods and interception and monitoring technology

Interception and monitoring equipment

1

This Part applies to any goods which can perform any of the following functions (whether individually or as part of a system)—

a

deep packet inspection;

b

network interception, including associated systems management and data retention functions;

c

radio frequency monitoring, including associated processing or examination;

d

network and satellite jamming;

e

remote infection;

f

speaker recognition, including associated processing functions;

g

IMSI, MSISDN, IMEI and TMSI interception and monitoring;

h

tactical SMS, GSM, GPS, GPRS, UMTS, CDMA, and PSTN interception and monitoring;

i

DHCP, SMTP and GTP information interception and monitoring;

j

pattern recognition and pattern profiling;

k

remote forensics;

l

semantic processing;

m

WEP and WPA code breaking;

n

interception of VoIP (including proprietary and standard protocols).

2

Any software which can perform any of the functions described in paragraph 1(a) to (n) (whether individually or as part of a system).

Other software and other technology3

Any software or other technology which is specially designed for the development, production or use of any goods or software described in paragraph 1 or 2.

Interpretation4

For the purposes of this Part, the following terms have the meaning given to them in the Dual-Use Regulation—

  • “development”;

  • “production”;

  • “software”;

  • “technology”;

  • “use”.