1、STD-ETSI ETR 3b3-ENGL 4997 3q00855 035872?7 Yb9 E ? ETSI ETR 363 January 1997 Source: ETSI TC-SMG Reference: DTR/SMG-1 O1 020Q ICs: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications (GSM) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS Digital cellular tel
2、ecommunications system; Lawful Interception requirements for GSM (GSM 10.20 version 5.0.1) ETSI European Telecommunications Standards Institute ETSI Secretariat Postal address: F-O6921 Sophia Antipolis CEDEX - FRANCE Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE X.400
3、: c=fr, a=atlas, p=etsi, s=secretariat - Internet: secretariatetsi.fr Tel.: +33 4 92 94 42 O0 - Fax: +33 4 93 65 47 16 Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O Euro
4、pean Telecommunications Standards Institute 1997. All rights reserved. - STDSETSI ETR 3b3-ENGL 1797 W 3q00855 0358730 b8O Page 2 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Whilst every care has been taken in the preparation and publication of this document, errors in content, typographical or o
5、therwise, may occur. If you have comments concerning its accuracy, please write to “ETSI Editing and Committee Support Dept.“ at the address shown on the title page. Page 3 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Con tents Foreword . 5 Scope 7 References 7 Definitions and abbreviations 8 3.1
6、 Definitions 8 3.2 Abbreviations . 8 Telecom interception requirements . 9 4.1 Background 9 4.2 Background technical requirements 9 General technical requirements for legal interception in GSM/PCN networks 10 5.1 General principles 11 5.2 Capability . 11 5.3 Operation . 11 Summary of information pas
7、sed over the X-interface . 11 6.1 Intercept request, Set-up details for target (XI) . 11 6.2 Output (from PLMN to RF) . 12 6.2.1 X2, network related data . 12 6.2.2 X3, product (when requested) . 12 Interception mechanisms 12 Intercept Request Function (XI) 12 Interception output, product and networ
8、k related data 13 7.3 Delivery mechanisms . 13 Network Related Data (see subclause 6.2.1) 13 7.4.1 Security 14 Merging and processing of product and network related data . 14 7 .I 7.2 7.3.1 7.3.2 Product 13 7.4 Administration mechanism . 14 7.5 Annex A: Diagram of an example interception technical i
9、mplementation 15 History 16 STD.ETSI ETR 3b3-ENGL 1997 3400855 0358732 Y53 M Page 4 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Blank page Page 5 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Foreword This ETSI Technical Report (ETR) has been produced by the Special Mobile Group (SMG) Technica
10、l Committee of the European Telecommunications Standards Institute (ETSI). ETRs are informative documents resulting from ETSI studies which are not appropriate for European Telecommunication Standard (ETS) or Interim European Telecommunication Standard (I-ETS) status. An ETR may be used to publish m
11、aterial which is either of an informative nature, relating to the use or the application of ETSs or I-ETSs, or which is immature and not yet suitable for formal adoption as an ETS or an I-ETS. STD-ETSI ETR 3b3-ENGL 1997 3LiUU855 OL5873Li 22b Page 6 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Bla
12、nk page Page 7 ETR 363 (GSM 10.20 version 5.0.1): January i997 1 Scope This ETSI Technical Report (ETR) describes the interface requirements of a mechanism which will deliver intercept from GSM mobile stations, including both speech and data product. 2 References This ETR incorporates by dated and u
13、ndated reference, provisions from other publications. These normative references are cited at the appropriate places in the text and the publications are listed hereafter. For dated references, subsequent amendments to or revisions of any of these publications apply to this ETR only when incorporate
14、d in it by the amendment or revision. For undated references, the latest edition of the publication referred to applies. GSM O1 .O4 (ETR 100): “Digital cellular telecommunications system (Phase 2); Abbreviations and acronyms“. Pl GSM MOU Association document SG09, June 1995. 31 41 The European Union
15、 Council Resolution reference: “International Requirements for The Lawful Interception of Telecommunications“ (January 1995), (JA1-24-Rev 2, 81 97/2/95). ITU-T Recommendation G.711: “Pulse Code Modulation (PCM) of voice frequencies“. STD-ETSI ETR 3b3-ENGL 1777 M 31iUU855 O15873b UT7 Page 8 ETR 363 (
16、GSM 10.20 version 5.0.1): January 1997 3 Definitions and abbreviations 3.1 Definitions A-party: The originating party number. B-Party: The called party number. C-Party: A diverted-to party number. network related data: Data associated with a call, excluding the actual product such as speech or data.
17、 product: Data sent or received by a mobile user such as speech or fax or data. RF: Requesting Function; mechanism owned by an interception authority to Set-up and receive the interception product. Target: An MSISDN (or sometimes IMSI) which is to be made the subject of an interception. WAN: Wide Ar
18、ea Network, or interconnected LANs providing a computer data network between PLMN elements. 3.2 Abbreviations In addition to those mentioned below, abbreviations used in this report are listed in GSM 01.04. CGI FTAM GSM HLR IMEI IMSI ISDN LEA MOU MS MSC MSISDN PLMN PSTN RF SMG SMG-SG SMS ss ss7 UD1
19、WAN MOU-SG Cell Global Identity File Transfer Access and Management Global System for Mobile communications Home Location Register International Mobile station Equipment Identity International Mobile Subscriber Identity Integrated Services Digital Network Law Enforcement Agency Memorandum of Underst
20、anding The MOU Security Group Mobile Station Mobile-services Switching Centre Mobile Station International ISDN Number Public Lands Mobile Network Public Switched Telephone Network Requesting Function Special Mobile Group The ETSI TC SMG Security Group Short Message Service Supplementary Service Sig
21、nalling System No. 7 Unrestricted Digital Interface (64 kbiffs ISDN data) Wde Area Network STD-ETSI ETR 3b3-ENGL 3777 = 3400855 0358737 T35 Page 9 ETR 363 (GSM 10.20 version 5.0.1): January 1997 4 Telecom interception requirements 4.1 Bac kg round Previous MoU-SG specification SG09 has defined the i
22、nterception of GSM in general terms. This report will define the X-interface to the Public Lands Mobile Network (PLMN) to support interception. 4.2 Background technical requirements This report describes the interface to the PLMN, defined as the X-interface. The interface is illustrated in figure I.
23、 The X-interface is between the Requesting Function (RF) and the PLMN. It is divided into three logical parts: 1) The X1-interface is used to present commands to the PLMN, from an administration centre. This interface is part of the switch management capability, usually over an X.25 interface or WAN
24、. 2) The X2-interface receives “Network Related Data“ from the Mobile-services Switching Centre (MSC), in switch management or file output format, probably over an X.25 network or WAN. Alternatively, it may be sent in combination with the ISDN product in the X3-interface described below. 3) The X3-i
25、nterface receives “Product“ (mobile users speech and data) from the MSC. It is contained within one or more 64 kbitls channels. The objective of the X-interface is to allow a standard to be created so that a PLMN consisting of MSCs from different manufacturers may be combined. Although the X1-interf
26、ace commands may be slightly different for each manufacturer, it should be possible to create a single intelligent system to manage the interface at a low cost, capable of managing all different manufacturers implementations. Similarly, the outputs defined in the X2 and X3 parts of the X-interface s
27、hould be capable of processing by the same “Requesting Function“. STDmETSI ETR 3b3-ENGL 1777 W 3LI00855 0358738 971 Page IO ETR 363 (GSM 10.20 version 5.0.1): January 1997 5 General technical requirements for legal interception in GSMIPCN networks Figure 1 shows the general system for interception.
28、Technical interception is implemented within a PLMN by special functionality on network elements; primarily the MSCsNLRs and Home Location Registers (HLRs). Use of the function and delivery of the product from the target is defined by the X-interface. X-interface REQUESTING TARGET I MSISDN TECHNICAL
29、 INTERCEPTION INTERFACE NOTES: 1 : Paper or direct request 2: Electronic request 3a and 3b: Network related data 4a and 4b: Product, such as speech and mobile data Items 3 - roamers from other PLMNs may also be targets; - mobile originating, mobile terminating, and diversion or multiparty calls will
30、 be capable of interception; - location information. 5.3 Operation The interception function shall not alter the operation of a targets service or provide indication to any party involved in the call. Output product should be in “clear“ form - no GSM radio interface or PLMN generated radio interface
31、 encoding or encryption is present (the PLMN cannot remove subscriber encryption). The service should not alter the standard functions of GSM network elements. The product and network related data shall be delivered as near as possible to the time the call is made. 6 Summary of information passed ov
32、er the X-interface 6.1 Intercept request, Set-up details for target (XI) Data to be stored for target mobile station: - - MSISDN, or optionally the International Mobile Subscriber Identity (IMSI); Connection address for the Requesting Function (RF); - Type of output: - product or network related dat
33、a or both. STD-ETSI ETR 3b3-ENGL 1777 = 3400855 0358740 52T Page 12 ETR 363 (GSM 10.20 version 5.0.1): January 1997 6.2 Output (from PLMN to RF) 6.2.1 X2, network related data unique reference number for MSC call event; MSISDN, (and optionally IMSI, International Mobile station Equipment Identity (I
34、MEI); type of call (.e. originating or terminating); A-party number, B-party number; C-party (diversion or multiparty numbers); start time of call; finish time of call (or call duration); location information (Cell Global Identity (CGI); teleservice or bearer service used, Supplementary Service (SS)
35、 used; call completion message (giving call release reason). NOTE 1: The above list is a guide to the information which may be provided by the MSC, but not all the items will be available for every call type. NOTE2: Connected party numbers (A-, B- and C-party) may only be available for calls complet
36、ely contained within ISDN based networks. NOTE 3: Appropriate network related data should also be output from the MSC for unsuccessful call attempts. 6.2.2 X3, product (when requested) - Product: speech, user data, fax, or Short Message Service (SMS); NOTE: SMS text may be forwarded to the RF by mea
37、ns of the X2-interface mechanism. - Unique reference number for MSC call event. 7 Interception mechanisms 7.1 Intercept Request Function (XI) The following basic target administration functions are to be supported: ADD - - - - flag a target by MSISDN, or optionally IMSI; X2 delivery address, e.g. X.
38、25 or WAN address; X3 product delivery address, E.164 address; select network related data alone, or network related data and product. REMOVE - de-flag a target. SHOW - list one or more targeted MSISDNs. STD-ETSI ETR 3b3-ENGL 1997 3q00855 0158741 Ybb D Page 13 ETR 363 (GSM 10.20 version 5.0.1): Janu
39、ary 1997 7.2 Interception output, product and network related data The product of the target and connected parties will be additionally connected to an output port of the MSC (by means of a three party bridge for example) which routes the product to an RF, possibly via an optional mediation device.
40、The mediation device provides interface conversion (if necessary) between the PLMN X2- and X3-interfaces and the RF. Different RFs may require the same information. The mediation device may simultaneously provide multiple output of product and network related data regarding one MSISDN to more than o
41、ne RF. No information should be passed to the RF about which other RFs are using the information. Some types of call may require multiple links to the RF, for example Unrestricted Digital Interface (UDI) data services, and optionally in-band data (3.1 kHz) services. 7.3 Delivery mechanisms 7.3.1 Net
42、work Related Data (see subclause 6.2.1) There are two mechanisms proposed for delivery of network related data; these are: - - ISDN user to user signalling; or MSCHLR file format output, (via an X.25 network using File Transfer Access and Management (FTAM), or WAN). 7.3.2 Product The product should
43、be passed in ISDN format: .e. for voice according to ITU-T Recommendation G.711, A-law encoding in one or more 64 kbitls channels. For UD1 data the output is transparently transmitted in two 64 kbiffs channels. Product (speech and data) should be routed to the RF by E.164 address. SMS product, excep
44、tionally, will probably be transported according to the mechanism selected for network related data. Page 14 ETR 363 (GSM 10.20 version 5.0.1): January 1997 7.4 Administration mechanism A secure means of administrating the service by the PLMN operator and/or requesting function is necessary. This me
45、chanism should provide for the addition and removal of subscribers from the marked list by authorized personnel, and a show marked MSISDNs command. Access should be policed by appropriate authentication and audit procedures. 7.4.1 Security The intercept function must only be capable of being used by
46、 authorized personnel. Security functions should provide the following capability (to national requirements): - security administration to control nominated user access to the function; - secure data network arrangements between administration centre and MSCIHLR for the intercept function commands;
47、- security mechanisms to control access to the function should be provided at both the administration centre and MSC/HLR elements; - secure network arrangements between MSCIHLR and the RF to ensure that network related data and product only reach the appropriate authorities; - it should not be possi
48、ble for non authorized personnel to read the target list of MSISDNs; - an audit log of use of the intercept function (successful or failed should be maintained, accessible only to authorized users; - no indication whatsoever should be given to any PLMN operative (except authorized personnel) or the
49、target or customer that the intercept function has been invoked on the target. 7.5 Merging and processing of product and network related data This aspect of the service is not addressed by this report. It is a matter of discussion between relevant authorities and the PLMN operator as to responsibilities for the provision of the mediation device, and the means of handling product at the RF. STD-ETSI ETR 3b3-ENGL 1997 m 3400855 0358743 237 m Page 15 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Annex A: Diagram of an example interception technical implementation Law enforce
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1