Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.106  Word version:  17.0.0

Top   Top   None   None   Next
0…   5…   A…

 

0  Introductionp. 4

This Technical Specification was produced by the 3GPP TSG SA to allow for the standardisation in the area of Lawful Interception (LI) of telecommunications. This document describes in general the requirements for lawful interception for legacy 2G, 3G and 4G systems, implemented using Rel-14 and earlier specifications.
Laws of individual nations and regional institutions (e.g. European Union), and sometimes licensing and operating conditions define a need to intercept telecommunications traffic and related information in modern telecommunications systems. It has to be noted that lawful interception shall always be done in accordance with the applicable national or regional laws and technical regulations.
This specification is replaced by TS 33.126 from Rel-15 onwards and should only be used as a historical reference to pre Rel-15 LI requirements.
Up

1  Scopep. 5

The present document contains historical Stage 1 lawful interception requirements within a 3GPP network for Rel-14 and earlier.
This specification is replaced by TS 33.126 from Rel-15 onwards and should only be used as a historical reference to pre Rel-15 LI requirements.

2  Referencesp. 5

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] - [3]  Void.
[4]  ETSI ES 201 671(V3.1.1 May 2007): "Handover Interface for the lawful interception of telecommunications traffic".
[5] - [7]  Void.
[8]  ANSI J-STD-025 A: (April 2003): "Lawfully Authorized Electronic Surveillance".
[9]  TS 33.107: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Lawful interception architecture and functions".
[10]  TS 33.108: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Handover interface for Lawful Interception".
[11]  TS 22.220: "Service Requirements for Home NodeBs and Home eNodeBs".
[12]  TS 22.182: "Customized Alerting Tones (CAT) Requirements; Stage 1".
[13]  TR 23.872: "Study on Architecture of IP Mulimedia subsystem (IMS) based Customized Alerting Tone (CAT)".
[14]  TS 24.182: "IP Multimedia Subsystem (IMS) Customized Alerting Tones (CAT); Protocol Specificiation".
[15]  TR 29.882: "Customized Alerting Tone (CAT) in 3G CS Domain".
[16]  TS 22.183: "Customized Ringing Signal (CRS) Requirements; Stage 1".
[17]  TS 24.183: "IP Multimedia Subsystem (IMS) customized Ringing Signal (CRS); Protocol Specification".
[18]  ETSI TS 101 671 (V3.11.1 November 2012): "Lawful Interception (LI) Handover Interface for the lawful interception of telecommunications traffic".
[19]  TR 21.905: " 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Vocabulary for 3GPP Specifications".
[20]  ETSI TS 102 232-7 (V3.1.1 June 2012): " Service-specific details for Mobile Services"
[21]  TS 23.040: "Technical realization of the Short Message Service (SMS)".
[22]  OMA OMA-AD-MMS-V1_3-20110913-A.:"Multimedia Messaging Service Architecture".
[23]  TS 22.071: "Location Services (LCS); Service description; Stage 1".
[24]  TS 23.271: "Functional stage 2 description of Location Services (LCS)".
[25]  TS 22.173: "IP Multimedia Core Network Subsystem (IMS) Multimedia Telephony Service and supplementary services; Stage 1".
[26]  TS 22.179: "Mission Critical Push To Talk (MCPTT) over LTE; Stage 1".
[27]  OMA - OMA-TS-PoC_System_Description-V2_1-20110802-A: "OMA PoC System Description"
[28]  TS 33.126: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Lawful Interception Requirements".
Up

3  Definitions and abbreviationsp. 6

3.1  Definitionsp. 6

This specification has been replaced by TS 33.126 from Rel-15 onwards and should only be used as a historical reference to pre Rel-15 LI requirements.
For the purposes of the present document, the terms and definitions given in TR 21.905 and the following terms apply.
Content of Communication:
information exchanged between two or more users of a telecommunications service, excluding intercept related information. This includes information which may, as part of some telecommunications service, be stored by one user for subsequent retrieval by another.
Customized Alerting Tone:
An indication that is customized by the called party or the calling subscriber that is played to the calling party during call establishment or during an established call session indicating that the called party is being alerted, the progress of a communication request, or any alerting event during a call session. A Customized Alerting Tone may be a piece of recorded or composed music, greeting words, voice, advertisement or video.
Customized Ringing Signal:
An indication to the called party as an incoming communication indication during the establishment of a communication that is customized by the calling party or the called party. A Customized Ringing Signal (CRS) may e.g. be a picture, a piece of recorded or composed music, greeting words, voice, advertisement or video.
Intercept Related Information:
information or data associated with telecommunication services involving the target identity, specifically communication associated information or data (e.g. unsuccessful communication attempts), service associated information or data, and location information.
Interception Area:
is a subset of the Public Lands Mobile Network (PLMN) service area comprised of a set of cells which define a geographical zone.
Location Dependent Interception:
is interception within a PLMN service area that is restricted to one or several Interception Areas (IA).
Lawful Access Location Services:
action (based on the law), performed by a network operator/access provider/service provider, of making available Location Services (LCS) and providing that information to a law enforcement monitoring facility. Depending of legislation this can be part of interception or an additional action.
Lawful Interception (LI):
the action (based on the law) for specific target identity(s), by a network operator/access provider/service provider, of accessing and delivering in real-time certain current information to a Law Enforcement Monitoring Facility (LEMF). This information includes Intercept Related Information (IRI) and Content of Communications (CC).
LCS (Location Services):
LCS is a service concept in system (e.g. GSM, UMTS, UTRAN or EUTRAN) standardization. LCS specifies all the necessary network elements and entities, their functionalities, interfaces, as well as communication messages, due to implement the positioning functionality in a cellular network. Note that LCS does not specify any location based (value added) services except locating of emergency calls and Lawful Access Services.
LCS Client:
Software and/or hardware entity that interacts with a LCS Server for the purpose of obtaining location information for one or more Mobile Stations. LCS Clients subscribe to LCS in order to obtain location information. LCS Clients may or may not interact with human users. The LCS Client is responsible for formatting and presenting data and managing the user interface (dialogue).
LI-LCS Client:
describes the instance used by PLMN to provide LEA access to LCS services.
Location Dependent Interception:
is interception within a PLMN service area that is restricted to one or several Interception Areas (IA).
Location Information:
information relating to the geographic, physical or logical location of a target identity.
Push-to-Talk:
provides direct one-to-one and one-to-many voice communication service with speaker floor control based on half-duplex VoIP technology in the cellular network.
Subject Based Interception:
Interception that is invoked using a specific Target Identity
Target Identity:
A technical identity that uniquely identifies a target of interception. One target may have one or several identities.
Up

3.2Void

3.3  Abbreviationsp. 7

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply:
CAT
Customized Alerting Tone
CC
Content of Communication
CRS
Customized Ringing Signal
CS
Circuit Switched
CSG
Closed Subscriber Group
CSP
Communications Service Provider
HeNB
Home eNodeB
H(e)NB
HNB and HeNB
HNB
Home NodeB
IA
Interception Area
IP
Internet Protocol
IRI
Intercept Related Information
LALS
Lawful Access Location Services
LDI
Location Dependent Interception
LEA
Law Enforcement Agency
LEMF
Law Enforcement Monitoring Facility
LI
Lawful Interception
MMS
Multimedia Messaging Services
MS
Mobile Station
PS
Packet Switched
PTT
Push to Talk
QoS
Quality of Service
SIP
Session Initiation Protocol
UTC
Coordinated Universal Time
WLAN
Wireless Local Area Network
Up

4  Relationship to regional requirementsp. 8

Interception requirements are subject to national law and international treaties and should be interpreted in accordance with applicable national policies.
Requirements universally called out in regional interception regulatory requirements are supported by the system defined in this document. Requirements unique to a specific region are not addressed (some examples are given in clause 2 as references).
The intercept system defined here provides subject based interception. Other techniques are outside the scope of this specification.
This specification is replaced by TS 33.126 from Rel-15 onwards and should only be used as a historical reference to pre Rel-15 LI requirements.
Up

Up   Top   ToC