etsi activ ities on retain ed dat a hand ling and law fu l ... · bel g iu m 2 2 in d ia 7 ru s s...
TRANSCRIPT
![Page 1: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/1.jpg)
1
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 1
ETSI activities onRetained Data handling
and Lawful Interception standardisation
World Class Standards
Peter van der Arend Chairman ETSI/TC LI
(Technical Committee on Lawful Interception)
![Page 2: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/2.jpg)
2
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 2
Lawful Interception
Security LI & RDenvironment
Retained Data
EuropeanTelecommunications
StandardsInstitute
Technical Committee Lawful Interception
Handover Interfaces for transport ofLawful Interception and Retained Data
are standardised by
TISPANATTMTETRA
![Page 3: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/3.jpg)
3
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 3
q A European standards organization, created in 1988, active in all areas of telecommunications " including radio communications, broadcasting and
Information Technologyq Supporting EU and EFTA regulation and initiativesq Favours international collaborationq A not-for-profit organizationq Members: Administrations, Administration Bodies and NSOs
Network Operators, Service Providers, Manufacturers, Usersq Creates different deliverables to meet market needsq All publications freely available! Downloadable from ETSI Website
Intro on ETSI
http://pda.etsi.org/pda/queryform.asp
http://portal.etsi.org
![Page 4: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/4.jpg)
4
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 4
ETSI Members per countryAlbania 1 Great Britain 123 Poland 5Andorra 1 Greece 8 Portugal 2Australia 3 Hungary 6 Qatar 1Austria 11 Iceland 1 Romania 4Belgium 22 India 7 Russia 8Bosnia Herzegovina 2 Iran 1 Serbia 1Bulgaria 3 Ireland 12 Singapore 1Brazil 2 Israel 8 Slovakia 3Canada 9 Italy 28 Slovenia 3China 8 Japan 7 South Africa 3Croatia 4 Jordan 1 Spain 15Cyprus 2 Korea 1 Sweden 24Czech Republic 4 Latvia 2 Switzerland 20Denmark 20 Lesotho 1 Taiwan 11Egypt 1 Lichtenstein 1 Turkey 5Estonia 2 Lithuania 1 Ukraine 1Finland 15 Luxembourg 5 United Arab Emirates 2France 71 Malaysia 1 United States 65FYROM (Macedonia) 1 Malta 2 Uzbekistan 1Georgia 1 Netherlands 29 Yemen 1Germany 90 Norway 8 62 countries 707
(March 2008)
![Page 5: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/5.jpg)
5
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 5
Interregional collaboration on selected standardization subjects between partners
Global Standards Collaboration
(Canada)
(USA)
Communication Alliance(Australia)
(Japan)
(Korea)
(Japan)
(USA)
(China)
(International)
![Page 6: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/6.jpg)
6
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 6
3rd Generation Partnership Projectspecifying a W-CDMA system based onan evolution of the GSM core network, amember of )*e IT-.s IMT-2000 familyhttp://www.3gpp.org
Organizational Partners:ETSI (Europe) CCSA (China) ARIB (Japan) ATIS (USA) TTA (Korea) TTC (Japan)
Partnership Project
![Page 7: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/7.jpg)
7
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 7
Main body in ETSI forLawful Interception Standards development
and Retained Data handover Standardisation is
ETSI/TC LITechnical Committee on Lawful Interception
![Page 8: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/8.jpg)
8
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 8
Intro on ETSI/TC LI .q Created as stand-alone TC in October 2002q Meetings
" Three plenary meetings a year are organised (35-84 participants)
" De2ica)e2 Ra77or)eur.s mee)ings can be organise2 on a s7ecific issueq The meetings can be attended by ETSI members
" Non-ETSI members can participate by invitation of the chairman" Next meeting: ETSI/TC LI#21, 29 June ! 1 July 2009
q Dedicated TC LI e-mail server and document server" Open to all (registered) ETSI members
q Producing reports and specifications" On Lawful Interception and Retained Data" Mainly on the Handover Interface
q Promoting globally ETSI Lawful Interception and Data Retention standards amongst operators and national bodies
![Page 9: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/9.jpg)
9
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 9
Delivarables of ETSI/TC LIq ETSI/Technical Committee Security (TC SEC)
" Working Group Lawful Interception (SEC-WGLI) (1997)" on LI: TR 102 053 v1.1.1 ES 201 158 v1.2.1
q ETSI/Technical Committee Lawful Interception (TC LI) " Established as stand-alone TC in October 2002" on Lawful Interception:" TR 101 943 v2.2.1 TR 102 503 v1.4.1 TR 102 519 v1.1.1 " TR 102 528 v1.1.1" TS 101 331 v1.2.1 TS 101 671 v3.4.1 ES 201 671 v3.1.1 " TS 102 232-1 v2.4.1 TS 102 232-2 v2.3.1 TS 102 232-3 v2.2.1 " TS 102 232-4 v2.1.1 TS 102 232-5 v2.3.1 TS 102 232-6 v2.3.1" TS 102 232-7 v2.1.1" on Data Retention: TS 102 656 v1.2.1 TS 102 657 v1.2.1" Security Report on LI and DR: TR 102 661 v1.1.1
![Page 10: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/10.jpg)
10
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 10
Terms of Reference ETSI/TC LIq To capture the requirements of ;La= >nforcemen) Agencies@ Aon
Lawful Interception and Data Retention) and translating those into requirements to be applied to Technical Specifications
q To develop and publish handover interfaces, and rules for the carriage of technology specific interception across these interfaces
q To develop a set of standards that allow ETSI standards to support industry compliance to the requirements of national and international law
![Page 11: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/11.jpg)
11
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 11
q Law Enforcement Agencies / Governments organisations / Research organisations" NL, UK, DE, AS, S, GR, ES, FR, RU, FIN, IT, NO, CY, HU, UA" AU, CA, USA, KR
q Communication Service Providers" Vodafone, KPN (NL), BT (UK), DT (DE), TeliaSonera (S), Telstra (AU)
Inmarsat, UPC, Telenor, RIM, Telecom Italia, T-Mobile, SwisscomWind, TDC (DK)
q Manufacturers (switch / mediation / LEA equipment)" Nokia Siemens Networks, Siemens, Ericsson, Cisco, Alcatel-Lucent
Pine Digital Security, Aqsacom, ETI, VeriSign, Nortel, GTEN, AREA Verint, Detica, Thales, NICE Systems, Utimaco Safeware, IskratelATIS Systems, SS8, Spectronic, Group 2000, ZTE, HP, IPS, Suntech
Manufacturers may be active in more areas
Participation in ETSI/TC LI
![Page 12: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/12.jpg)
12
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 12
;TB LI@- companies also active in ISS World
&
![Page 13: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/13.jpg)
13
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 13
Activities in ETSI/TC LI on
Retained Data Handover Interface
![Page 14: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/14.jpg)
14
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 14
Why study on Retained Data in EU
15th of March 2006: the European Parliamentand the Council of the European Union adopted
Directive 2006/24/EC on Data Retention
Data generated or processed in connection with the provision of publicly available electronic communications services
or ofpublic communications networks
need to be retained
![Page 15: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/15.jpg)
15
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 15
Applicability Directiveq The content of the communication is not part of the directiveq Data to be Retained
" Successful and unsuccessful communication attempts" Wireline network telephony / Wireless network telephony" Internet access / Internet e-mail / Internet telephony
q Categories of data to be retained" data to trace and identify the source of a communication" data to identify the destination of a communication" data to identify the date, time and duration of a communication" data to identify the type of communication" data to identify users' communication equipment or what purports to
be their equipment" data to identify the location of mobile communication equipment
q Proportional requirements shall be defined by each Member State in its national law
![Page 16: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/16.jpg)
16
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 16
Handover
Retrieval
Cost
Analysis
Political
LegalBusiness
Relations
process
Storage
CommunicationServiceProvider
AuthorisedOrganisation
ETSI/TC LI
The Data Retention Puzzle
Request
![Page 17: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/17.jpg)
17
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 17
Why standardisation of RD handlingq Easier to define own storage and delivery mechanism
" No need to define/invent complete own delivery / receiving system" National options are possible
q ;B*ea7er@ 7ro2uc)s" Manufacturers need to develop one basic product" National options are additional
q Data Retention result is meeting international and national requirements
q RD Standards in ETSI are actively developed in good harmonization and are approved by all involved parties
q Common way for all involved partiesq Continuous increase in types of Retained Data
" Use of the telecommunication" Number of different services used" Number of different access networks used
![Page 18: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/18.jpg)
18
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 18
Functional Model
AdministrativeFunction
Data storeManagement
Function
Data Collection Function
AuthorisedOrganisation
IssuingAuthority
ReceivingAuthority
Communication Service Provider
Handover Interface HI-B
Handover Interface HI-A
Network elements
HI-A: various kinds of administrative, request and response information from/to theIssuing Authority and the responsible organization at the CSP for RD matters.
HI-B: retained data information from the CSP to the Receiving AuthorityHI-A and HI-B may be crossing borders between countries:
subject to corresponding national law and/or international agreements.
administrative
transmission RDmaterial
![Page 19: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/19.jpg)
19
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 19
Retained Data Specifications in ETSI/TC LIq ETSI TS 102 656 (v1.2.1)
Requirements of LEAs for handling Retained Data" guidance and requirements for the delivery and associated issues of
retained data of telecommunications and subscribers " set of requirements relating to handover interfaces for retained traffic
and subscriber data" requirements to support the implementation of Directive 2006/24/EC" freedom for national regulations, procedures and processes
q ETSI TS 102 657 (v1.2.1)Handover interface for the request and delivery of Retained Data" handover requirements and handover specification for the data that
is identified in EU Directive 2006/24/EC on Retained Data and in national legislations as defined in TS 102 656
" considers both the requesting of retained data and the delivery of the results
" defines an electronic interface
![Page 20: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/20.jpg)
20
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 20
Retained Data Handover Signalling principle
Response: Results of RD request (HI-B)
RESPONS(ACK): Acknowledge response message (HI-A)
REQUEST(ACK): Acknowledge request message (HI-A)
REQUEST: Request for Retained Data (HI-A)
AOCSP Successful delivery
q Data exchange techniques" ;2irec) TBC@ =i)* D>R enco2ing 2erive2 from )*e ASGHI" ;JTTC@ =i)* KML enco2ing
! on top of the standard TCP/IP stack! choice of technique is a national option
![Page 21: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/21.jpg)
21
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 21
Modular approach RDHI specification
Framework for Retained Data Handover Interface
Telephony services
Asynchronous
message services
Synchronous Multi-media services
NetworkAccessservices
PSTN/ISDNGSM/UMTS-cs
SMS
E-mailwebmail
chat InternetGPRS
UMTS-ps
![Page 22: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/22.jpg)
22
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 22
RetainedDataRecord
telephonyRecord messageRecordnetworkAccess
telephonySubscriber
telephonyServiceUsage
telephonyDevice
telephonyNetworkElement
naSubscriber
naServiceUsage
naDevicenaNetworkElement
msgSubscriber
msgServiceUsage
Schematic representation of top level ASN.1
telephonyBillingDetails
![Page 23: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/23.jpg)
23
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 23
telephonySubscribersubscriberIDGENERIC SUBSCRIBER INFOtelephonySubscriberInfosubscribedTelephonyServices
SubscribedTelephonyServicesserviceIDproviderIDtimeSpanregisteredNumbers
serviceTyperegisteredICCID
installationAddress
iMSIconnectionDate
carrierPreselectlineStatus
telephonyBillingDetailssubscriberIDserviceIDbillingAddressbillingIdentifier
BillingRecordsbillingRecords
timeplaceamountcurrencymethod
TelephonyRecord: Subscriber and ServiceUsage
![Page 24: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/24.jpg)
24
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 24
TelephonyRecord: ServiceUsage, Device and NetworkElement
telephonyServiceUsagePartyInformation
communicationTimeeventInformation
endReason
partyInformation
communicationTypebearerServicesmsInformation
partyRolepartyNumbersubscriberIDdeviceIDlocations
EventInformationtimetypepartylocation
communicationTimeiCCIDiMSInatureOfAddressforwardingTransferredNumberterminatingTransferredNumber
ringingDuration
telephonyDevicetelephonyDeviceID
deviceIDType
telephonyNetworkElementtelephonyNetworkID
cellInformation
![Page 25: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/25.jpg)
25
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 25
Generic Subscriber Information detailsGenericSubscriberInfo
organizationInfo
name
contactDetails
nationalRegistration
individualInfo
name
contactAddress
dateOfBirth
gender
identificationNumber
authenticationInfo
![Page 26: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/26.jpg)
26
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 26
Security Reportq ETSI TR 102 661
Security framework in Lawful Interception and Retained Data environment" defining a security framework for securing Lawful Interception and
Retained Data environment of the CSP and the Handover of the information
" Advice on Security measurements" Advice on Physical security
CSP= Communication Service Provider
![Page 27: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/27.jpg)
27
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 27
L*a).s neM)Nq ETSI/TC LI is keeping a close working relation with the >B/>M7er)s Prou7 ;T*e Cla)form on >lec)ronic Da)a Re)en)ion for )*e Inves)iga)ionR De)ec)ion an2 Crosecu)ion of Serious Brime@
q ETSI/TC LI will maintain the Retained Data standards" Add synchronous multi-media services" Add new internet services as technology progress" Add new parameters in line with national requirements
q ETSI/TC LI can organise an interoperability test, if required" ETSI Plugtest for checking the specifications
q ETSI/TC LI is encouraging widespread use of the RD standards!" The use of the Handover standard is already promoted in
international conferences and workshops
![Page 28: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/28.jpg)
28
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 28
Details on ETSI Lawful Interception Standardisation
![Page 29: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/29.jpg)
29
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 29
Why Lawful Interception implementation in EU
17th January 1995: EU Council of Ministersadopted resolution COM 96/C329/01 on Lawful Interception
The providers of public telecommunications networks and services are legally required to make available to the authorities the
information necessary to enable them to investigate telecommunications
![Page 30: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/30.jpg)
30
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 30
Why standardisation of LI handlingq Easier to define own LI mechanism
" Guidance is given for network architecture" No need to define/invent complete own LI system" National options are possible
q ;B*ea7er@ LI 7ro2uc)s" Manufacturers need to develop one basic product" National options are additional
q Intercepted result is meeting international requirements by Law Enforcement Agencies
q LI Standards in ETSI/TC LI are actively developed in good harmonization and are approved by all involved parties
![Page 31: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/31.jpg)
31
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 31
LEA requirements (step 1)q ETSI TS 101 331
Requirements of Law Enforcement Agencies" Provides guidance in the area of co-operation by network
operators/service providers with the lawful interception of telecommunications
" Provides a set of requirements relating to handover interfaces for the interception
![Page 32: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/32.jpg)
32
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 32
Types of Lawful Intercepted data (TS 101 331)
q Intercept Related Information (IRI)" Collection of information or data associated with telecommunication
services involving the target identity:! communication associated information or data
(including unsuccessful communication attempts)! service associated information or data
(e.g. service profile management by subscriber)! location information
q Content of Communication (CC)" Information exchanged between two or more users of a
telecommunications service
![Page 33: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/33.jpg)
33
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 33
General network arrangements (TS 101 331) netw ork
result of in terception (IR I + C C )
H andover Interface
location inform ation
C ontent of C om m unication
com m unication associated inform ation
service associated inform ation
in terception in terface (in ternal)
Law Enforcem ent M onitoring Facility !
![Page 34: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/34.jpg)
34
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 34
General on security of LI featureq Parties in the communications
" Neither the target nor the other parties involved in the communications should be able to detect that interception is (de)activated or that interception is taking place
q Other users" Other users of any telecommunications service should not be able,
by any means, to detect that any interception facility has been (de)activated or that interception is taking place
q Protection of Target information " Protection of Rooms, Systems, Connections
q Local staff" Only authorised personnel may have knowledge that interception has
been activated on a target" Unauthorised persons shall not be able to detect that any
interception is active on certain subscribers
![Page 35: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/35.jpg)
35
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 35
LI requirements Network (step 2)q ETSI ES 201 158
Requirements for Network Functions " Provision of lawful interception, with particular reference to the
Handover Interface" To make available results of interception, related to specific identities" Functional role model and involved parties" Description of Handover Interfaces" Guidance on Performance and quality " Guidance on Security aspects" Guidance on Billing and Charging
![Page 36: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/36.jpg)
36
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 36
LI Handover Interface (step 3)q ETSI TS 101 671 (ETSI ES 201 671)
Handover Interface for the Lawful Interception of Telecommunications Traffic" Generic flow of information and procedures and information
elements, applicable to any future telecommunication network or service
" Circuit switched and packet data" Covered technologies:
PSTN, ISDN, GSM, UMTS (CS), GPRS, TETRAwireline NGN (including PSTN/ISDN emulation)wireline IMS PSTN simulation
q ETSI TR 102 053Notes on ISDN LI functionalities" Implementation advice of TS 101 671 for operators
![Page 37: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/37.jpg)
37
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 37
Handover Interface ports (TS 101 671)
q HI1: for Administrative Information" Request for lawful interception:
target identity, LIID, start/duration, IRI or IRI+CC, IRI delivery address, CC delivery address, ...
" Management information
q HI2: for delivery of Intercept Related Information" All data related to establish the telecommunication service and to
control its progress" Correlation information
q HI3: for delivery of Content of Communication" Transparent en-clair copy of the communication" Correlation information
![Page 38: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/38.jpg)
38
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 38
Handover Interface Concept (TS 101 671)
![Page 39: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/39.jpg)
39
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 39
Details on HI2 Interface (IRI) (TS 101 671)
q IRI data is defined according ASN.1 description" ITU-T Recommendation X.680 (Abstract Syntax Notation One)
q IRI Communication Associated Information" IRI-Begin
! At first event of the communication attempt" IRI-Continue
! Any time during the communication (attempt)" IRI-End
! At the end of the communication (attempt)
q IRI Service Associated Information" IRI-Report
! For any non-communication related events
![Page 40: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/40.jpg)
40
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 40
Parameters in IRI records (TS 101 671)
q LI related identities" LIID, target, network operator, network element, call ID, ...
q Timestampq Intercepted call direction (to / from target)q Intercepted call state (in progress, connected)q Address: Calling party / Called party / Forwarded-to-party / ..
" >HISTR T>IR IMSIR IM>IR MSISDGR SIC -RIR …q Ringing tone duration / conversation duration q Type of intercept:
" PSTN, ISDN, GSM (CS), TETRA, GPRS (PD), UMTS (CS)q Supplementary service informationq Location informationq National parametersq IRI record type (Begin, Continue, End, Report)q ....
![Page 41: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/41.jpg)
41
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 41
IIF
IIF
INI
HI2(IRI)
HI3(CC)
ManagementSystem
HI(TS 101 671)
Law EnforcementMonitoring
Facility
HI: Handover InterfaceHI1: AdministrationHI2: Intercept Related InformationHI3: Content of Communication
HI1
AuthorisationAuthority /
Law Enforcement
Agency
IRI: Intercept Related InformationCC: Content of CommunicationINI: Internal Network InterfaceIIF: Internal Intercepting FunctionAI: Administrative Interface
Switching functions
AdministrationFunction 1
AI
MediationFunction 2
MediationFunction 3
I/O
Mediator
INI1
INI3
INI2
Warrant
Data
Call Content
ISDN
ISDN
Interception networkISDN/PSTN Servicesstep-by-step
![Page 42: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/42.jpg)
42
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 42
#
Architecture Reports from TC LIq ETSI TR 101 943
Concepts of Interception in a Generic Network Architecture" High-level informative overview and principles regarding
implementation of LI for telecommunications
q ETSI TR 102 528Interception domain Architecture for IP networks" High level reference architecture for supporting lawful interception
for IP networks " High level description of Internal Network Functions and Interfaces" Application of the reference model to voice and multimedia over IP
services, data layer 3 and layer 2 services" Reference model in the network operator and communication service
provider (CSP) domain #
![Page 43: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/43.jpg)
43
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 43
L I Administration Function (A F)
LawfulInterceptionM ediation Function
(M F)
H I1
H I2(IRI)
H I3(C C)
INI2
INI3
H I
INI1a
CCCI
L E A Domain CSP Domain
CCTI
Intercept Related Information
Internal Interception Function (IRI-IIF)
Content of Communication
Internal Interception Function (CC- IIF)
Content of Communication Trigger Function
(CCTF)
INI1b INI1c
LawEnforcementMonitoring
Facility
Authorisationauthority /
Law Enforcement
Agency
(TS 102 232-xx)
Reference model for LI in IP networks (TR 102 528)
![Page 44: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/44.jpg)
44
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 44
Handover of LI via IP Networks (step 3)q ETSI TS 102 232 part 01 (formerly TS 102 232)
Delivery of IP based interception " General aspects of handover for HI2 and HI3
(as defined by TS 101 671) where the underlying transport system is based on the Internet Protocol stack.
" Modular approach used for specifying IP based handover interfaces" Header(s) to be added to IRI and CC sent over the HI2 and HI3
interfaces" Protocols for the transfer of IRI and CC across the handover
interfaces" To be used in conjunction with other deliverables that define the
service-specific IRI data formats" Protocol is defined according ASN.1 description
ITU-T Recommendation X.680 (Abstract Syntax Notation One)
![Page 45: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/45.jpg)
45
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 45
q Generic header information to be added to HI2 and HI3 traffic" LIID" Authorization country code" Communication Identifier" Sequence number" Timestamp" Payload direction" Payload type" Interception Type" IRI record type (Begin, Continue, End, Report)" ...
Generic header information (TS 102 232-1)
![Page 46: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/46.jpg)
46
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 46
IP service-specific details (applications)q ETSI TS 102 232 part 02 (formerly TS 102 233)
Service-specific details for E-Mail Services" Description for handover of E-mail messages; MTP, POP3, IMAP4
q ETSI TS 102 232 part 03 (formerly TS 102 234) Service-specific details for Internet Access Services" Handover of Internet Access Information and TCP/IP info; DHCP, RADIUS
q ETSI TS 102 232 part 04 (formerly TS 102 815)Service-specific details for Layer 2 Services
q ETSI TS 102 232 part 05 Service-specific details for IP Multimedia Services" Based on SIP and RTP, and services described by ITU-T H.323, H.248
q ETSI TS 102 232 part 06 Service-specific details for PSTN/ISDN Services
q ETSI TS 102 232 part 07 Service-specific details for Mobile Services
![Page 47: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/47.jpg)
47
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 47
TS 102 232 IP HO Family
TS 102 232 part 01
Generic Headers
part 02 part 03
SSDfor
Internet AccessServices
SSDfor
E-mailServices
Handover managerDelivery session Transport layerNetwork layer
Delivery network
part 04
SSDfor
Layer 2Services
part 05
SSDforIP
MultimediaServices
SSDfor
PSTN/ISDN
Services
part 06
SSD -> Service-Specific Details on top
Application
Presentation
Session
Transport
Network andbelow
part 07
SSDfor
MobileServices
![Page 48: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/48.jpg)
48
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 48
SIPServer
InterceptionFunction
SBC
switch + (SPAN)
MGW
MGW
RG
2) All rtp is copied to the LI Switch and if needed to the IF
3) If needed rtp to be intercepted (local SBC traffic) iscopied from the SBC to the Interception Function
rtp
SIP
rtp
1) All SIP messages are copied over SPAN ports (or viamirrors) via the LI Switch to the Interception Function
SBC
rtp
cmd
CC
LISwitch
ManagementSystem
Law EnforcementMonitoring
FacilityAdministration
FunctionMediationFunction
SIP
IRI
3
1 1
22
LI possibility on a VoIP platformAuthorisation
Authority / Law
EnforcementAgency
Warrant
3HI
TS 102 232-xx
![Page 49: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/49.jpg)
49
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 49
ETSI TR 102 503ASN.1 Object Identifiers in Lawful InterceptionSpecifications
ASN.1 Object Tree for LI
identified-organization (4)
dod (6)
itu-t (0)
member-body (2)
iso (1)
root
etsi (0)
securityDomain (2)
lawfulIntercept (2)fraud (1)
ts101909 (1909) en301040 (1040)
part20 (20)
three-GPP (4) li-ps (5)him (3)hi3 (2)hi2 (1)hi1 (0)subpart (2)subpart (1)
specific version
internet (1)
private (4)
enterprise(1)
cable-TelevisionLaboratories-Inc (4491)
clapProject (6)
clapProjPacketCable (2)
pktcLawfulIntercept (5)
identified-organization (3)
pcesp (1)
US (840)
tia (113737)
laes (2)
tr45 (0)
j-std-025 (0)
ETSI domain
t1 (1)
T1-678 (0)
ETSI/TC TETRA
ETSI/TC AT 3GPP/SA3-LIETSI/TC LI ETSI/TC LI
ATIS PTCS LEAS
![Page 50: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/50.jpg)
50
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 50
LI specifications in 3GPP (UMTS)q ETSI TS 133 106 (3GPP TS 33.106)
Lawful interception requirements" provides basic interception requirements " partly based on ETSI TS 101 331
q ETSI TS 133 107 (3GPP TS 33.107)Lawful interception architecture and functions
q ETSI TS 133 108 (3GPP TS 33.108)Handover interface for Lawful Interception
![Page 51: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/51.jpg)
51
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 51
NGN Lawful Interceptionq ETSI TS 187 005 (TC TISPAN)
NGN Lawful Interception; Lawful Interception functional entities, information flow and reference points" Specification is developed in cooperation between
TC TISPAN WG7, TC LI and 3GPP/SA3-LI
ETSI TS 101 671LI-CS-handover
ETSI TS 102 232-xxLI-IP-handover
3GPP TS 33.108LI-3G-handover3GPP TS 33.108
InterceptDomain
ETSI TS 187 005NGN-R1-LINGN-R2-LI
ETSI TS 101 331LI-requirements LEMF
![Page 52: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/52.jpg)
52
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 52
L*a).s neM)Nq Development of Dynamic Triggering and CCTF Standardisation
" At the moment operators need tailor made integration to keep the complete service interceptable
" There is a need for rules how the Network is performing Basic LI for IP related services
" Also rules for triggering between networks are needed " International Dynamic Triggering might become an issue in the future
![Page 53: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/53.jpg)
53
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 53
Relationships with other bodiesq 3GPP/SA3-LI (LI for UMTS & GSM)
q ETSI/EP TETRA (LI for Tetra system)
q ETSI/TC TISPAN (LI for fixed NGN & fixed IMS)
q ETSI/TC ATTM (LI for IPCableCom)
q ETSI/TC SES (LI for satellite systems)q ETSI/TC PLT (LI for Powerline Communications)
q National and Regional Law Enforcement Agencies and STC/ILETSq ATIS/PTCS LAES SC (T1.678 v1 / J-STD-025-B)
![Page 54: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/54.jpg)
54
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 54
More details on ETSI/TC LI can be found on:
http://portal.etsi.org/li/Summary.asp
Chairman TC LI: [email protected]@DataRetention.eu
![Page 55: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/55.jpg)
55
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 55
![Page 56: ETSI activ ities on Retain ed Dat a hand ling and Law fu l ... · Bel g iu m 2 2 In d ia 7 Ru s s ia 8 Bo s n ia Her ze g o v in a 2 Ira n 1 S e rb ia 1 Bu lg a ria 3 Ire la n d 1](https://reader033.vdocuments.us/reader033/viewer/2022041613/5e3939efdf57ec69616db3b3/html5/thumbnails/56.jpg)
56
Track 3 ! 4 June 2009, Prague; ETSI/TC LI activities on Retained Data and Lawful Interception 56