tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TS 33.107 (SA3)
3G Security – Lawful Interception architecture and functions

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.2.0    2017/06    340 p.
(P) V13.6.0    2017/03    294 p.
(P) V12.13.0    2015/12    237 p.
(P) V11.6.0    2015/12    140 p.
(P) V10.5.0    2015/12    137 p.
(P) V9.4.0    2011/04    132 p.
(P) V8.12.0    2011/04    131 p.
(P) V7.7.0    2007/10    89 p.
(P) V6.6.0    2005/12    76 p.
(P) V5.6.0    2003/09    70 p.
(P) V4.3.0    2002/03    57 p.
(P) V3.5.0    2002/03    57 p.

Rapporteur:  Mr. Jaspers, Koen
See also:  LI-related TS/TR    

This document describes in general the architecture and functions for lawful interception. Laws of individual nations and regional institutions (e.g. European Union), and sometimes licensing and operating conditions define a need to intercept telecommunications traffic and related information in modern telecommunications systems. It has to be noted that lawful interception shall always be done in accordance with the applicable national or regional laws and technical regulations.

This TS describes the architecture and functional requirements within a Third Generation Mobile Communication System (3GMS) and the Evolved Packet System (EPS).

The specification shows the service requirements from a Law Enforcement point of view only. The aim of this document is to define a 3GMS and EPS interception system that supports a number of regional interception regulations, but these regulations are not repeated here as they vary. Regional interception requirements shall be met in using specific (regional) mediation functions allowing only required information to be transported.


Here          Top          None          None          Next
part:    1     2     3     4     5     6     7     8     9



1   Scope [R3]   PDF-p. 15
2   References [R3]
3   Definitions, symbols and abbreviations [R3]   PDF-p. 18
4   Functional architecture [R3]   PDF-p. 21
5   Activation, deactivation and interrogation [R3]   PDF-p. 28
6   Invocation of Lawful Interception (LI) for Circuit Switched (CS) services [R3]   PDF-p. 36

Up          Top          ToC