tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TS 33.106 (SA3)
3G Security – Lawful Interception requirements

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.1.0    2017/06    27 p.
(P) V13.4.0    2016/06    25 p.
(P) V12.6.0    2015/06    20 p.
(P) V11.2.0    2015/06    19 p.
(P) V10.1.0    2015/06    16 p.
(P) V9.0.0    2009/12    13 p.
(P) V8.1.0    2008/03    13 p.
(P) V7.0.1    2006/01    13 p.
(P) V6.1.0    2004/06    13 p.
(P) V5.1.0    2002/09    13 p.
(P) V4.0.0    2001/04    12 p.
(P) V3.1.0    1999/12    12 p.

Rapporteur:  Mr. Jaspers, Koen
See also:  LI-related TS/TR    

Laws of individual nations and regional institutions (e.g. European Union), and sometimes licensing and operating conditions define a need to intercept telecommunications traffic and related information in modern telecommunications systems. It has to be noted that lawful interception shall always be done in accordance with the applicable national or regional laws and technical regulations.

This TS describes the service requirements from a Law Enforcement point of view only. The aim of this document is to define an interception system for 3GPP networks that supports a number of regional interception regulations, but these regulations are not repeated here as they vary. Regional interception requirements shall rely on this specification to derive such information as they require.

These interception requirements shall be used to derive specific network requirements.


Here          Top



1   Scope [R3]   PDF-p. 5
2   References [R3]
3   Definitions and abbreviations [R3]   PDF-p. 6
4   Relationship to regional requirements [R3]   PDF-p. 8
5   Requirements [R3]
5.1   Description of requirements
5.2   Normal operation   PDF-p. 11
5.3   Exceptional procedures
5.4   Interworking considerations
5.5   Charging aspects   PDF-p. 14
5.6   Minimum service requirements
5.7   LI Requirements for encrypted services [R10]
5.8   Lawful Interception for Customized Alerting Tone (CAT) [R10]   PDF-p. 15
5.9   Lawful Interception for Customized Ringing Signal (CRS) [R10]
5.10   Lawful Interception for Home Node B and Home enhanced Node B (H(e)NB) [R10]   PDF-p. 16      Up
5.11   Location information [R11]   PDF-p. 17
5.12   LI requirements for IMS VoIP Service [R11]
5.13   Delivery requirements for messaging [R12]
5.14   LI requirements for management of IMS supplementary services settings [R12]
5.15   LI requirements for IMS Video Service [R14]   PDF-p. 19
5.16   LI requirements for IMS based Push-to-Talk [R14]
6   Handover interface requirements [R3]
A   Bibliography [R11]   PDF-p. 20      Up
B  (Normative)   Lawful access usage of Location Services (LCS) [R13]   PDF-p. 21
C   Change history   PDF-p. 23

Up          Top