Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   Next

TS 33.106 (SA3)
3G Security –
Lawful Interception Requirements

3GPP‑Page   ETSI‑search   full‑ToC    
use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.1.0 (PDF)  2018/06  26 p.
V14.1.0  2017/06  27 p.
V13.4.0  2016/06  25 p.
V12.6.0  2015/06  20 p.
V11.2.0  2015/06  19 p.
V10.1.0  2015/06  16 p.
V9.0.0  2009/12  13 p.
V8.1.0  2008/03  13 p.
V7.0.1  2006/01  13 p.
V6.1.0  2004/06  13 p.
V5.1.0  2002/09  13 p.
V4.0.0  2001/04  12 p.
V3.1.0  1999/12  12 p.


Rapporteur:  Mr. Jaspers, Koen
See also:

This 3GPP specification is replaced by TS 33.126 from Rel‑15 onwards and should only be used as a historical reference to pre Rel‑15 LI requirements.
Laws of individual nations and regional institutions (e.g. European Union), and sometimes licensing and operating conditions define a need to intercept telecommunications traffic and related information in modern telecommunications systems. It has to be noted that lawful interception shall always be done in accordance with the applicable national or regional laws and technical regulations.

This TS describes the service requirements from a Law Enforcement point of view only. The aim of this document is to define an interception system for 3GPP networks that supports a number of regional interception regulations, but these regulations are not repeated here as they vary. Regional interception requirements shall rely on this specification to derive such information as they require.

These interception requirements shall be used to derive specific network requirements.

full Table of Contents for  TS 33.106  Word version:   15.1.0

 

Here   Top

 

1  Scope [R3]Word-p. 5
2  References [R3]
3  Definitions and abbreviations [R3]Word-p. 6
4  Relationship to regional requirements [R3]Word-p. 8
5  Requirements [R3]
5.1  Description of requirements
5.2  Normal operationWord-p. 11
5.3  Exceptional procedures
5.4  Interworking considerations
5.5  Charging aspectsWord-p. 14
5.6  Minimum service requirements
5.7  LI Requirements for encrypted services [R10]
5.8  Lawful Interception for Customized Alerting Tone (CAT) [R10]Word-p. 15
5.9  Lawful Interception for Customized Ringing Signal (CRS) [R10]
5.10  Lawful Interception for Home Node B and Home enhanced Node B (H(e)NB) [R10]Word-p. 16
5.11  Location information [R11]Word-p. 17
5.12  LI requirements for IMS VoIP Service [R11]Word-p. 18
5.13  Delivery requirements for messaging [R12]
5.14  LI requirements for management of IMS supplementary services settings [R12]
5.15  LI requirements for IMS Video Service [R14]
5.16  LI requirements for IMS based Push-to-Talk [R14]
6  Handover interface requirements [R3]Word-p. 19
A  Bibliography [R11]Word-p. 20
B (Normative)  Lawful access usage of Location Services (LCS) [R13]
C  Change historyWord-p. 22

Up   Top