1、ETSI TR I O1 51 4 V8.0.0 (2001-05) Technical Report Digital cellular telecommunications system (Phase 2+); Lawful Interception requirements for GSM (GSM 01.33 version 8.0.0 Release 1999) GSM 01.33 version 8.0.0 Release 1999 2 ETSI TR 101 514V8.0.0 (2001-05) Reference RTWSMG-1 O01 33Q8 Keywords Digit
2、al cellular telecommunications system, Global System for Mobile communications (GSM) ETSI 650 Route des Lucioles F-O6921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 O0 Fax: +33 4 93 65 47 16 Siret No 348 623 562 O0017 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de
3、Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: htt!x/w.ettlsi. orq The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions,
4、 the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revisi
5、on or change of status. Information on the current status of this and other ETSI documents is available at If you find errors in the present document, send your comment to: ed itoretsi .fr Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and
6、the foregoing restriction extend to reproduction in all media. O European Telecommunications Standards Institute 2001. All rights reserved. ETSI GSM 01.33 version 8.0.0 Release 1999 3 ETSI TR 101 514V8.0.0 (2001-05) Contents Intellectual Property Rights 4 Foreword 4 1 2 3 3.1 3.2 4 4.1 4.2 5 5.1 5.2
7、 5.3 6 6.1 6.2 6.2.1 6.2.2 7 7.1 7.2 7.3 7.3.1 7.3.2 7.4 7.4.1 7.5 Scope 5 References 5 Definitions and abbreviations 5 Definitions 5 Abbreviations 6 Telecom interception requirements . 6 General technical requirements for legal interception in GSM/PCN networks 7 Background . 6 Background technical
8、requirements . 6 General principles . 8 Capability . 8 Operation 8 Intercept request, set-up details for target (Xi) . 8 Output (from PLMN to RF) . 8 X2, “Network related data“ . 8 X3, “Product“ (when requested) . 9 Intercept Request Function (Xi) 9 Interception output, “Product“ and “Network relate
9、d data“ . 9 Summary of information passed over the X-interface 8 Interception mechanisms . 9 Delivery mechanisms 10 Network related data (see clause 6.2.1) . 10 Product 10 Administration mechanism 10 Security . 10 Merging and processing of “Product“ and “Network related data“ 10 Annex A: Diagram of
10、an example interception technical implementation . 11 Annex B: GPRS and Lawful Interception . 12 B.l Introduction 12 B.l.l Overview 12 B.1.2 Scope 12 B.2 Target Identity 12 Summary of Information Passed over the X-interface 12 Intercept Request, Set-up Details for Target (Xi) . 12 Output (from PLMN
11、to Requesting Function) 13 X3, “Product“ (when requested) . 13 B.3 B.3.1 B.3.2 B.3.2.1 B.3.2.2 X2, “Network related data“ . 13 Annex C: Status of Technical Report GSM 01.33 . 14 History . 15 ETSI GSM 01.33 version 8.0.0 Release 1999 4 ETSI TR 101 514V8.0.0 (2001-05) Intellectual Property Rights IPRs
12、 essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR O00 3 14: “Intellectual Property Rights (IPRs); Essential, orpot
13、entially Essential, IPRs notjed to ETSI in respect OfETSIstandards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (htt:/!wvw.etsi ordj r). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No
14、guarantee can be given as to the existence of other IPRs not referenced in ETSI SR O00 3 14 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Special Mobile
15、 Group (SMG). The contents of the present document may be subject to continuing work within SMG and may change following formal SMG approval. Should SMG modi6 the contents of the present document it will then be re-submitted for formal approval procedures by ETSI with an identifiing change of releas
16、e date and an increase in version number as follows: Version 8.x.y where: 8 indicates GSM Release 1999 of Phase 2+ y the third digit is incremented when editorial only changes have been incorporated in the specification; x the second digit is incremented for all other types of changes, i.e. technica
17、l enhancements, corrections, updates, etc. ETSI GSM 01.33 version 8.0.0 Release 1999 5 ETSI TR 101 514V8.0.0 (2001-05) 1 Scope The present document describes the interface requirements of a mechanism which will deliver intercept from GSM mobile stations, including both speech and data product. The s
18、tage 1 description of Lawful Interception will be specified in GSM 02.33. The stage 2 description of Lawful Interception will be specified in GSM 03.33. 2 Re fe re nces The following documents contain provisions which, through reference in this text, constitute provisions of the present document. Re
19、ferences are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. For a specific reference, subsequent revisions do not apply. 0 For a non-specific reference, the latest version applies. For this Release 1999 document, references to GSM documents
20、 are for Release 1999 versions (version 8.x.y). il GSM O 1.04: “Digital cellular telecommunications system (Phase 2+); Abbreviations and acronyms“. GSM MOU Association document SG09, June 1995. The European Union Council Resolution reference: “International Requirements for The Lawful Interception o
21、f Telecommunications“ (January 1995), (JAI-24-Rev 2, 8 197/2/95). Pl 31 41 ITU-T Recommendation G.7 1 1 : “Pulse Code Modulation (PCM) of voice frequencies“. 3 Definitions and abbreviations 3.1 Defi nit ions For the purposes of the present document, the following terms and definitions apply: A-party
22、: originating party number B-Party: called party number C-Party: diverted-to party number Network related data: data associated with a call, excluding the actual product such as speech or data Product: data sent or received by a mobile user such as speech or fax or data RF (Requesting Function): mec
23、hanism owned by an interception authority to set-up and receive the interception product Target: MSISDN (or sometimes IMSI) which is to be made the subject of an interception WAN (Wide Area Network): interconnected LANs providing a computer data network between PLMN elements ETSI GSM 01.33 version 8
24、.0.0 Release 1999 6 ETSI TR 101 514V8.0.0 (2001-05) 3.2 Ab brevi at ions In addition to those mentioned below, abbreviations used in the present document are listed in GSM O 1.04. CGI FTAM GSM HLR IMEI IMSI ISDN LEA MOU MS MSC MSISDN PLMN PSTN RF SMG SMG-SG SMS ss ss7 UD1 WAN MOU- SG Cell Global Ide
25、ntity File Transfer Access and Management Global System for Mobile communications Home Location Register International Mobile station Equipment Identity International Mobile Subscriber Identity Integrated Services Digital Network Law Enforcement Agency Memorandum of Understanding The MOU Security Gr
26、oup Mobile Station Mobile-services Switching Centre Mobile Station International ISDN Number Public Lands Mobile Network Public Switched Telephone Network Requesting Function Special Mobile Group The ETSI TC SMG Security Group Short Message Service Supplementary Service Signalling System No. 7 Unres
27、tricted Digital Interface (64 kbit/s ISDN data) Wide Area Network 4 Telecom interception requirements 4.1 Background Previous MOU-SG specification SG09 has defined the interception of GSM in general terms. This report will define the X-interface to the Public Lands Mobile Network (PLMN) to support i
28、nterception. 4.2 Backg rou nd tech n ical req u i rem en ts The present document describes the interface to the PLMN, defined as the X-interface. The interface is illustrated in figure 1. The X-interface is between the Requesting Function (RF) and the PLMN. It is divided into three logical parts. 1)
29、 The X1-interface is used to present commands to the PLMN, from an administration centre. This interface is part of the switch management capability, usually over an X.25 interface or Wide Area Network (WAN). 2) The X2-interface receives “Network related data“ from the Mobile-services Switching Cent
30、re (MSC), in switch management or file output format, probably over an X.25 network or WAN. Alternatively, it may be sent in combination with the ISDN product in the X3-interface described below. 3) The X3-interface receives “Product“ (mobile users speech and data) from the MSC. It is contained with
31、in one or more 64 kbit/s channels. The objective of the X-interface is to allow a standard to be created so that a PLMN consisting of MSCs from different manufacturers may be combined. Although the X1-interface commands may be slightly different for each manufacturer, it should be possible to create
32、 a single intelligent system to manage the interface at a low cost, capable of managing all different manufacturers implementations. Similarly, the outputs defined in the X2 and X3 parts of the X-interface should be capable of processing by the same “Requesting Function“. ETSI GSM 01.33 version 8.0.
33、0 Release 1999 7 ETSI TR 101 514V8.0.0 (2001-05) 5 General technical requirements for legal interception in GSM/PCN networks Figure 1 shows the general system for interception. Technical interception is implemented within a PLMN by special functionality on network elements; primarily the MSCs/VLRs a
34、nd Home Location Registers (HLRs). Use of the function and delivery of the “Product“ from the target is defined by the X-interface. X-Interface REQUESTING Administration TARGET / MSISDN TECHNICAL INTERCEPTION INTERFACE NOTES: 1: Paper or direct request 2: Electronic request 3a and 3b: 4a and 4b: XI
35、= Interface 2 X2 = Interface 3a X3 = Interface 4a “Network related data“ltems 3 roamers from other PLMNs may also be targets; mobile originating, mobile terminating and diversion or multiparty calls will be capable of interception; 5.3 O perat ion The interception function shall not alter the operat
36、ion of a targets service or provide indication to any party involved in the call. Output product should be in “clear“ form - no GSM radio interface or PLMN generated radio interface encoding or encryption is present (the PLMN cannot remove subscriber encryption). The service should not alter the sta
37、ndard functions of GSM network elements. The “Product“ and the “Network related data“ shall be delivered as near as possible to the time the call is made. 6 Summary of information passed over the X-interface 6.1 Intercept request, Set-up details for target (XI) Data to be stored for target mobile st
38、ation: - - - Type of output: MSISDN, or optionally the International Mobile Subscriber Identity (IMSI); Connection address for the Requesting Function (RF); - “Product“ or “Network related data“ or both. 6.2 Output (from PLMN to RF) 6.2.1 X2, “Network related data“ - - - - A-party number, B-party nu
39、mber. - - Start time of call. Unique reference number for MSC call event. MSISDN, (and optionally IMSI, International Mobile station Equipment Identity (IMEI). Type of call (i.e. originating or terminating). C-party (diversion or multiparty numbers). ETSI GSM 01.33 version 8.0.0 Release 1999 9 ETSI
40、TR 101 514V8.0.0 (2001-05) - Finish time of call (or call duration). - - - NOTE 1 : The above list is a guide to the information which may be provided by the MSC, but not all the items will Location information (Cell Global Identity (CGI). Teleservice or bearer service used, Supplementary Service (S
41、S) used. Call completion message (giving call release reason). be available for every call type. NOTE 2: Connected party numbers (A-, B- and C-party) may only be available for calls completely contained within ISDN based networks. NOTE 3: Appropriate “Network related data“ should also be output from
42、 the MSC for unsuccessful call attempts. 6.2.2 X3, “Product“ (when requested) - NOTE: - “Product“: speech, user data, fax, or Short Message Service (SMS). SMS text may be forwarded to the RF by means of the X2-interface mechanism. Unique reference number for MSC call event. 7 Interception mechanisms
43、 7.1 Intercept Request Function (XI ) The following basic target admmistration functions are to be supported: ADD - - - - flag a target by MSISDN, or optionally IMSI; X2 delivery address, e.g. X.25 or WAN address; X3 “Product“ delivery address, E. 164 address; select “Network related data“ alone, or
44、 “Network related data“ and “Product“ REMOVE - de-flag a target. SHOW - list one or more targeted MSISDNs. 7.2 Interception output, “Product“ and “Network related data“ The “Product“ of the target and connected parties will be additionally connected to an output port of the MSC (for example by means
45、 of a three party bridge) which routes the “Product“ to an RF, possibly via an optional mediation device. The mediation device provides interface conversion (if necessary) between the PLMN X2- and X3-interfaces and the RF. Different RFs may require the same information. The mediation device may simu
46、ltaneously provide multiple output of “Product“ and “Network related data“ regarding one MSISDN to more than one RF. No information should be passed to the RF about which other RFs are using the information. Some types of call may require multiple links to the RF, for example Unrestricted Digital In
47、terface (UDI) data services, and optionally in-band data (3,l kHz) services. ETSI GSM 01.33 version 8.0.0 Release 1999 10 ETSI TR 101 514V8.0.0 (2001-05) 7.3 Delivery mechanisms 7.3.1 Network related data (see clause 6.2.1) There are two mechanisms proposed for delivery of “Network related data“; th
48、ese are: - - ISDN user to user signalling; or MSC/HLR file format output, (via an X.25 network using File Transfer Access and Management (FTAM), or WAN). 7.3.2 Product The “Product“ should be passed in ISDN format: i.e. for voice according to ITU-T Recommendation G.711, A-law encoding in one or more
49、 64 kbit/s channels. For UD1 data the output is transparently transmitted in two 64 kbit/s channels. “Product“ (speech and data) should be routed to the RF by E. 164 address. SMS product, exceptionally, will probably be transported according to the mechanism selected for “Network related data“. 7.4 Ad m i n ist rat i on m echa n ism A secure means of administrating the service by the PLMN operator and/or requesting function is necessary. This mechanism should provide for the addition and removal of subscribers from the marked list by authorised personnel, and a show mark