1、 ETSI TS 187 005 V3.1.1 (2012-06) Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Lawful Interception; Stage 1 and Stage 2 definition Technical Specification ETSI ETSI TS 187 005 V3.1.1 (2012-06)2Reference RTS/TISPAN-07045-NGN-R3 Keywords IP, la
2、wful interception, security, telephony ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individu
3、al copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document F
4、ormat (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the curren
5、t status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced
6、 except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2012. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of
7、its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 187 005 V3.1.1 (2012-06)3Contents Intellectual Property Rights 5g3Fore
8、word . 5g3Introduction 5g31 Scope 6g32 References 6g32.1 Normative references . 6g32.2 Informative references 7g33 Definitions and abbreviations . 8g33.1 Definitions 8g33.2 Abbreviations . 9g34 Interception in the NGN . 10g34.0 Structure of analysis . 10g34.0.1 Review of stage 1 requirements 10g34.0
9、.1.1 Provision/withdrawal 10g34.0.1.2 Activation/deactivation . 10g34.0.1.3 Invocation and operation . 10g34.0.1.4 Interrogation 11g34.0.1.5 Interaction with other services 11g34.1 LI architecture model . 11g34.2 LI reference model . 11g34.2.1 Features of NGN LI Administration function . 14g34.2.2 L
10、I in multiple CSP domains 14g34.3 Result of interception . 15g35A Stage 2 description of NGN LI . 16g35A.1 Information flow sequences . 16g35A.1.1 LEA control interactions and information flows 16g35A.1.1.1 LI_ACTIVATE_req 17g35A.1.1.2 LI_ACTIVATE_conf 17g35A.1.1.3 LI_MODIFY_req 17g35A.1.1.4 LI_MODI
11、FY_conf 18g35A.1.1.5 LI_STATUS_ind . 18g35A.1.1.6 LI_ACTIVATE_ASSOCIATE_ind 19g35A.1.2 Target signalling and traffic interactions and information flows 20g35A.1.2.1 TARGET_ACTIVITY_MONITOR_ind. 21g35A.1.2.1.1 Relation to Handover . 21g35A.1.2.2 T_TRAFFIC_ind . 21g35A.1.2.2.1 Relation to Handover . 2
12、1g35A.1.2.3 CP_TRAFFIC_ind 22g35A.1.2.3.1 Relation to Handover . 22g35A.1.2.4 TARGET_COMMS_MONITOR_ind. 22g35A.1.2.4.1 Relation to Handover . 22g35A.2 Data provision and encoding 23g35A.2.1 Identification of result of interception (Correlation and interception instance identifier). 23g35A.2.2 Provis
13、ion of identities/addresses . 23g35A.2.3 Provision of details of services used and their associated parameters 23g35A.2.4 Provision of those signals emitted by the target invoking additional or modified services 23g35A.2.5 Provision of time-stamps for identifying the beginning, end and duration of t
14、he connection 24g35A.2.6 Provision of actual source, destination and intermediate public IDs in case of communication diversion . 24g35A.2.7 Provision of location information . 24g35 Interception in NGN subsystems 25g35.0 Allocation of LI-FEs to NGN-FEs . 25g3ETSI ETSI TS 187 005 V3.1.1 (2012-06)45.
15、1 Architecture for interception of PES 25g35.2 Architecture for interception of IMS 26g35.3 Intercept Related Information (PoI IRI-IIF) . 26g35.4 Content of Communication (PoI CC-IIF) . 27g36 Identification of target of interception 27g36.1 ISDN/PSTN services 27g36.2 IMS services . 28g36.3 Identific
16、ation of target when identity protection is enabled . 28g37 Security considerations. 28g3Annex A: Void 29g3Annex B: Void 30g3Annex C: Void 31g3Annex D: Void 32g3Annex E (informative): ISDN/PSTN LI reference configurations . 33g3Annex F (informative): Selection of handover interface. 36g3Annex G (inf
17、ormative): Bibliography . 38g3G.1 ETSI Specifications 38g3G.2 3GPP specifications 38g3G.3 ITU-T specifications. 39g3G.4 IETF specifications. 39g3G.5 ISO specifications 39g3G.6 ANSI specifications 39g3Annex H (informative): Change history . 40g3History 41g3ETSI ETSI TS 187 005 V3.1.1 (2012-06)5Intell
18、ectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Right
19、s (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has b
20、een carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI
21、Technical Committee Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN). Introduction The NGN is required to operate within a regulated environment and to comply to the privacy directive EC/2002/58 i.1 which identifies in articles 5(2), and 15(1) the fra
22、mework and obligation for CSPs to provide facilities for Lawful Interception and Data Retention. These obligations are further extended by the European Union Council Resolution COM 96/C329/01 15 along with the International User Requirement (IUR) 16, stating the obligations on member states to provi
23、de facilities for LI. These documents and the requirements in them are respected in a balanced way in the present document. ETSI ETSI TS 187 005 V3.1.1 (2012-06)61 Scope The present document specifies the stage 2 model for Lawful Interception (LI) of TISPAN NGN services as specified by TR 180 001 i.
24、3. The requirement for provision of lawful interception for all Communication Service Providers (CSP) is described in TS 101 331 3 and the present document gives the stage 1 and stage 2 definition for provision of an interception capability in for the NGN as specified by TISPAN. The provisions in th
25、e present document apply only when the target of interception is an NGN user identified as specified in TS 184 002 7, and when the network supplying services on behalf of the CSP is an NGN as specified by TISPAN in TR 180 001 i.3 and where the NGN architecture is as specified in ES 282 001 1. The pr
26、esent document takes account of the requirement to support dynamic triggering of interception. A guide to the application of the handover specifications is given in informative annexes. NOTE 1: Handover aspects are not specified in the present document but are described in TS 133 108 9, TS 101 671 2
27、 and TS 102 232-1 4, TS 102 232-5 5, and TS 102 232-6 6. NOTE 2: The present document assumes that the LEA/LEMF receiving intercept related information records from the NGN is able to decode NGN signalling streams and thus there is no definition in the present document of how to present NGN data in
28、non-NGN formats. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any
29、amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity.
30、 2.1 Normative references The following referenced documents are necessary for the application of the present document. 1 ETSI ES 282 001: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Functional Architecture“. 2 ETSI TS 101 671: “Lawful Inte
31、rception (LI); Handover interface for the lawful interception of telecommunications traffic“. 3 ETSI TS 101 331: “Lawful Interception (LI); Requirements of Law Enforcement Agencies“. 4 ETSI TS 102 232-1: “ Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP deliver
32、y; Part 1: Handover specification for IP delivery“. 5 ETSI TS 102 232-5: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services“. 6 ETSI TS 102 232-6: “Lawful Interception (LI); Handover Interface
33、and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services“. 7 ETSI TS 184 002: “Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Identifiers (IDs) for NGN“. ETSI ETSI TS 187 005 V3.1.1 (2012-06)78 ETS
34、I TS 133 107: “Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Lawful interception architecture and functions (3GPP TS 33.107)“. 9 ETSI TS 133 108: “Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Handover interface for Lawful Interception (LI) (3GPP TS 33.1
35、08)“. 10 ETSI ES 282 002: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); PSTN/ISDN Emulation Sub-system (PES); Functional architecture“. 11 ETSI ES 282 007: “Telecommunications and Internet converged Services and Protocols for Advanced Networking
36、(TISPAN); IP Multimedia Subsystem (IMS); Functional architecture“. 12 ETSI TS 182 012: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); IMS-based PSTN/ISDN Emulation Sub-system (PES); Functional architecture“. 13 ITU-T Recommendation I.130: “Method
37、for the characterization of telecommunication services supported by an ISDN and network capabilities of an ISDN“. 14 ETSI ES 201 158: “Telecommunications security; Lawful Interception (LI); Requirements for network functions“. 15 European Union Council Resolution COM 96/C329/01 of 17 January 1995 on
38、 the Lawful Interception of Telecommunications. 16 International User Requirement (IUR). NOTE: The IUR was provided as an annex to 15. 17 ETSI TS 133 210: “Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Network Domain Secur
39、ity (NDS); IP network layer security (3GPP TS 33.210)“. 18 ETSI TS 181 005: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Service and Capability Requirements“. 19 ETSI TS 187 016: “Telecommunications and Internet converged Services and Protocols
40、for Advanced Networking (TISPAN); NGN Security; Identity Protection (Protection Profile)“. 20 ETSI TS 102 232-2: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services“. 21 ETSI TS 102 232-3: “Lawful I
41、nterception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific details for internet access services“. 22 ETSI TS 102 232-4: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific de
42、tails for Layer 2 services“. 23 ETSI TS 102 232-7: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services“. 2.2 Informative references The following referenced documents are not necessary for the applicat
43、ion of the present document but they assist the user with regard to a particular subject area. i.1 Directive 2002/58/EC of the European Parliament and of the council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Dire
44、ctive on privacy and electronic communications). i.2 Void. i.3 ETSI TR 180 001: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Release 1; Release definition“. ETSI ETSI TS 187 005 V3.1.1 (2012-06)8i.4 ETSI TR 102 528: “Lawful Interception (LI)
45、; Interception domain Architecture for IP networks“. i.5 Void. i.6 ETSI TR 102 661: “Lawful Interception (LI); Security framework in Lawful Interception and Retained Data environment“. i.7 Directive 2002/21/EC of the European Parliament and of the council of 7 March 2002 on a common regulatory frame
46、work for electronic communications networks and services (Framework Directive). 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in TS 101 671 2 and the following apply: Content of Communication (CC): information exchanged betw
47、een two or more users of a telecommunications service, excluding intercept related information NOTE: This includes information which may, as part of some telecommunications service, be stored by one user for subsequent retrieval by another. corresponding party: correspondent of the target Handover I
48、nterface (HI): physical and logical interface across which the interception measures are requested from Communications Service Provider (CSP), and the results of interception are delivered from a CSP to a law enforcement monitoring facility interception: action (based on the law), performed by a CSP
49、, of making available certain information and providing that information to a law enforcement monitoring facility interception interface: physical and logical locations within the CSP telecommunications facilities where access to the content of communication and intercept related information is provided NOTE: The interception interface is not necessarily a single, fixed point. Intercept Related Information (IRI): collection of information or data associated with telecommunication service