Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 33.106 (SA3)
3G Security –
Lawful Interception Requirements

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.1.0 (PDF)  2018/06  26 p.
V14.1.0  2017/06  27 p.
V13.4.0  2016/06  25 p.
V12.6.0  2015/06  20 p.
V11.2.0  2015/06  19 p.
V10.1.0  2015/06  16 p.
V9.0.0  2009/12  13 p.
V8.1.0  2008/03  13 p.
V7.0.1  2006/01  13 p.
V6.1.0  2004/06  13 p.
V5.1.0  2002/09  13 p.
V4.0.0  2001/04  12 p.
V3.1.0  1999/12  12 p.

Rapporteur:  Mr. Jaspers, Koen

This 3GPP specification is replaced by TS 33.126 from Rel‑15 onwards and should only be used as a historical reference to pre Rel‑15 LI requirements.
Laws of individual nations and regional institutions (e.g. European Union), and sometimes licensing and operating conditions define a need to intercept telecommunications traffic and related information in modern telecommunications systems. It has to be noted that lawful interception shall always be done in accordance with the applicable national or regional laws and technical regulations.
This TS describes the service requirements from a Law Enforcement point of view only. The aim of this document is to define an interception system for 3GPP networks that supports a number of regional interception regulations, but these regulations are not repeated here as they vary. Regional interception requirements shall rely on this specification to derive such information as they require.
These interception requirements shall be used to derive specific network requirements.

full Table of Contents for  TS 33.106  Word version:   15.1.0

 

Here   Top

 

1  ScopeWord-p. 5
2  References
3  Definitions and abbreviationsWord-p. 6
4  Relationship to regional requirementsWord-p. 8
5  Requirements
5.1  Description of requirements
5.2  Normal operationWord-p. 11
5.3  Exceptional procedures
5.4  Interworking considerations
5.5  Charging aspectsWord-p. 14
5.6  Minimum service requirements
5.7  LI Requirements for encrypted services [R10]
5.8  Lawful Interception for Customized Alerting Tone (CAT) [R10]Word-p. 15
5.9  Lawful Interception for Customized Ringing Signal (CRS) [R10]
5.10  Lawful Interception for Home Node B and Home enhanced Node B (H(e)NB) [R10]Word-p. 16
5.11  Location information [R11]Word-p. 17
5.12  LI requirements for IMS VoIP Service [R11]Word-p. 18
5.13  Delivery requirements for messaging [R12]
5.14  LI requirements for management of IMS supplementary services settings [R12]
5.15  LI requirements for IMS Video Service [R14]
5.16  LI requirements for IMS based Push-to-Talk [R14]
6  Handover interface requirementsWord-p. 19
A  Bibliography [R11]Word-p. 20
B (Normative)  Lawful access usage of Location Services (LCS) [R13]
C  Change historyWord-p. 22

Up   Top