| |
| 0 | Introduction p. 13
|
| 1 | Scope p. 14
|
| 2 | References p. 14
|
| 3 | Definitions and abbreviations p. 18
| 3.1 | Definitions p. 18
|
| 3.2 | Abbreviations p. 20
|
|
| 4 | General p. 22
| 4.0 | Introduction |R12| p. 22
|
| 4.1 | Basic principles for the handover interface p. 23
|
| 4.2 | Legal requirements p. 23
|
| 4.3 | Functional requirements p. 23
|
| 4.4 | Overview of handover interface p. 23
| 4.4.0 | Introduction |R12| p. 23
|
| 4.4.1 | Handover interface port 2 (HI2) p. 24
|
| 4.4.2 | Handover interface port 3 (HI3) p. 25
|
|
| 4.5 | HI2: Interface port for intercept related information p. 25
| 4.5.0 | General |R12| p. 25
|
| 4.5.1 | Data transmission protocols p. 25
|
| 4.5.2 | Application for IRI (HI2 information) p. 26
|
| 4.5.3 | Types of IRI records p. 26
|
|
| 4.6 | Reliability |R12| p. 27
|
|
| 5 | Circuit-switch domain p. 27
| 5.0 | General |R12| p. 27
|
| 5.1 | Specific identifiers for LI |R6| p. 27
| 5.1.0 | Introduction |R12| p. 27
|
| 5.1.1 | Lawful Interception IDentifier (LIID) p. 27
|
| 5.1.2 | Communication IDentifier (CID) p. 28
| 5.1.2.0 | General |R12| p. 28
|
| 5.1.2.1 | Network Identifier (NID) p. 28
|
| 5.1.2.2 | Communication Identity Number (CIN) - optional p. 28
|
|
| 5.1.3 | CC link identifier (CCLID) p. 29
|
| 5.1.4 | Correlation of CC and IRI p. 29
|
| 5.1.5 | Usage of Identifiers p. 29
|
|
| 5.2 | HI2: interface port for IRI |R6| p. 30
| 5.2.1 | Definition of Intercept Related Information p. 30
|
| 5.2.2 | Structure of IRI records p. 30
| 5.2.2.0 | General |R12| p. 30
|
| 5.2.2.1 | Control Information for HI2 p. 31
|
| 5.2.2.2 | Basic call information p. 31
|
| 5.2.2.3 | Information on supplementary services, related to a call in progress p. 32
|
| 5.2.2.4 | Information on non-call related supplementary services p. 32
|
|
| 5.2.3 | Delivery of IRI p. 32
|
|
| 5.3 | HI3: interface port for Content of Communication |R6| p. 37
| 5.3.0 | General |R12| p. 37
|
| 5.3.1 | CS-based Delivery of Content of Communication p. 37
|
| 5.3.2 | Control information for Content of Communication p. 38
|
| 5.3.3 | Security requirements at the interface port of HI3 p. 39
|
|
| 5.4 | LI procedures for supplementary services |R6| p. 40
| 5.4.1 | General p. 40
|
| 5.4.2 | CC link Impact p. 43
|
| 5.4.3 | IRI Impact, General Principle for Sending IRI records p. 43
|
| 5.4.4 | Multi party calls - general principles, options A, B p. 43
| 5.4.4.0 | General |R12| p. 43
|
| 5.4.4.1 | CC links for active and non-active calls (option A) p. 43
|
| 5.4.4.2 | Reuse of CC links for active calls (option B) p. 44
|
|
| 5.4.5 | Subscriber Controlled Input (SCI): Activation / Deactivation / Interrogation of Services p. 45
|
|
| 5.5 | Detailed procedures for supplementary services |R6| p. 45
| 5.5.1 | Advice of Charge services (AOC) p. 45
|
| 5.5.2 | Call Waiting (CW) p. 45
| 5.5.2.1 | Call Waiting at target: CC links p. 45
|
| 5.5.2.2 | Call Waiting: IRI records p. 45
|
|
| 5.5.3 | Call Hold/Retrieve p. 45
| 5.5.3.1 | CC links for active and non-active calls (option A) p. 45
|
| 5.5.3.2 | Reuse of CC links for active calls (option B) p. 45
|
| 5.5.3.3 | IRI records p. 46
| 5.5.3.3.1 | Invocation of Call Hold or Retrieve by target p. 46
|
| 5.5.3.3.2 | Invocation of Call Hold or Retrieve by other parties p. 46
|
|
|
| 5.5.4 | Explicit Call Transfer (ECT) p. 46
| 5.5.4.1 | Explicit Call Transfer, CC link p. 46
|
| 5.5.4.2 | Explicit Call Transfer, IRI records p. 46
|
|
| 5.5.5 | Calling Line Identification Presentation (CLIP) (IRI Records) p. 46
| 5.5.5.1 | Call originated by target (target is served user) p. 46
|
| 5.5.5.2 | Call terminated at target (other party is served user) p. 46
|
|
| 5.5.6 | Calling Line Identification Restriction (CLIR) p. 46
|
| 5.5.7 | COnnected Line identification Presentation (COLP) p. 47
| 5.5.7.1 | Call terminated at target (target is served user) p. 47
|
| 5.5.7.2 | Call originated by target (other party is served user) p. 47
|
|
| 5.5.8 | COnnected Line identification Restriction (COLR) p. 47
|
| 5.5.9 | Closed User Group (CUG) p. 47
|
| 5.5.10 | Completion of Call to Busy Subscriber (CCBS) p. 47
|
| 5.5.11 | Multi ParTY call (MPTY) p. 47
|
| 5.5.12 | DIVersion Services (DIV) p. 47
| 5.5.12.0 | General |R12| p. 47
|
| 5.5.12.1 | Call Diversion by Target p. 48
| 5.5.12.1.1 | Call Diversion by Target, CC links p. 48
|
| 5.5.12.1.2 | Call Diversion by Target, IRI records p. 48
|
|
| 5.5.12.2 | Forwarded Call Terminated at Target p. 48
|
| 5.5.12.3 | Call from Target Forwarded p. 48
|
|
| 5.5.13 | Variants of call diversion services p. 48
|
| 5.5.14 | SUBaddressing (SUB) p. 49
|
| 5.5.15 | User-to-User Signalling (UUS) p. 49
|
| 5.5.16 | Incoming Call Barring (ICB) p. 49
|
| 5.5.17 | Outgoing Call Barring (OCB) p. 49
|
| 5.5.18 | Tones, Announcements p. 49
|
|
| 5.6 | Functional architecture |R6| p. 49
|
| 5.7 | IP-based handover interface for CC |R13| p. 50
| 5.7.1 | General p. 50
|
| 5.7.2 | Identifiers p. 51
|
| 5.7.3 | Voice Content Direction p. 52
|
| 5.7.4 | Payload Description p. 52
|
| 5.7.5 | Sequence Number p. 52
|
|
|
| 6 | Packet data domain p. 53
| 6.1 | Identifiers p. 53
| 6.1.0 | Introduction |R12| p. 53
|
| 6.1.1 | Lawful interception identifier p. 53
|
| 6.1.2 | Network identifier p. 53
|
| 6.1.3 | Correlation number p. 53
|
|
| 6.2 | Timing and quality p. 54
|
| 6.3 | Security aspects p. 54
|
| 6.4 | Quantitative aspects p. 54
|
| 6.5 | IRI for packet domain p. 55
| 6.5.0 | Introduction |R12| p. 55
|
| 6.5.1 | Events and information p. 61
| 6.5.1.0 | General |R12| p. 61
|
| 6.5.1.1 | REPORT record information p. 61
|
| 6.5.1.2 | BEGIN record information p. 70
|
| 6.5.1.3 | CONTINUE record information p. 72
|
| 6.5.1.4 | END record information p. 74
|
|
|
| 6.6 | IRI reporting for packet domain at GGSN p. 75
|
| 6.7 | Content of communication interception for packet domain at GGSN p. 75
|
|
| 7 | Multi-media domain p. 76
| 7.0 | Introduction |R12| p. 76
|
| 7.1 | Identifiers p. 77
| 7.1.0 | General |R12| p. 77
|
| 7.1.1 | Lawful Interception Identifier (LIID) p. 77
|
| 7.1.2 | Network identifier p. 78
|
| 7.1.3 | Correlation number p. 78
|
|
| 7.2 | Timing and quality p. 79
|
| 7.3 | Security aspects |R7| p. 79
|
| 7.4 | Quantitative aspects |R7| p. 79
|
| 7.5 | IRI for IMS |R7| p. 80
| 7.5.0 | Introduction |R12| p. 80
|
| 7.5.1 | Events and information p. 84
|
|
| 7.6 | Correlation indications of IMS IRI with GSN CC at the LEMF |R7| p. 88
|
| 7.7 | Void p. …
|
|
| 8 | 3GPP WLAN Interworking |R7| p. 88
| 8.0 | General |R12| p. 88
|
| 8.1 | Identifiers p. 88
| 8.1.1 | Overview p. 88
|
| 8.1.2 | Lawful interception identifier p. 88
|
| 8.1.3 | Network identifier p. 89
|
| 8.1.4 | Correlation number p. 89
|
|
| 8.2 | Timing and quality p. 89
|
| 8.3 | Security aspects p. 90
|
| 8.4 | Quantitative aspects p. 90
|
| 8.5 | IRI for I-WLAN p. 90
| 8.5.0 | Introduction |R12| p. 90
|
| 8.5.1 | Events and information p. 94
|
|
| 8.6 | CC for I-WLAN p. 102
|
|
| 9 | Interception of Multimedia Broadcast/MultiCast Service (MBMS) |R8| p. 102
| 9.1 | Identifiers p. 102
| 9.1.1 | Overview p. 102
|
| 9.1.2 | Lawful interception identifier p. 102
|
| 9.1.3 | Network identifier p. 103
|
| 9.1.4 | Correlation number p. 103
|
|
| 9.2 | Timing and quality p. 103
|
| 9.3 | Security aspects p. 103
|
| 9.4 | Quantitative aspects p. 104
|
| 9.5 | IRI for MBMS p. 104
| 9.5.0 | General |R9| p. 104
|
| 9.5.1 | Events and information p. 106
|
|
| 9.6 | CC for MBMS p. 109
|
|
| 10 | Evolved Packet System (EPS) |R8| p. 109
| 10.0 | Introduction |R12| p. 109
|
| 10.1 | Identifiers p. 110
| 10.1.0 | Introduction |R12| p. 110
|
| 10.1.1 | Lawful interception identifier p. 110
|
| 10.1.2 | Network identifier p. 110
|
| 10.1.3 | Correlation number p. 111
|
|
| 10.2 | Timing and quality p. 111
|
| 10.3 | Security aspects p. 111
|
| 10.4 | Quantitative aspects p. 112
|
| 10.5 | IRI for evolved packet domain p. 112
| 10.5.0 | Introduction |R12| p. 112
|
| 10.5.1 | Events and information p. 118
|
|
| 10.6 | IRI reporting for evolved packet domain at PDN-GW p. 142
|
| 10.7 | Content of communication interception for evolved packet domain at PDN-GW p. 142
|
|
| 11 | 3GPP IMS Conference Services |R8| p. 143
| 11.1 | Identifiers p. 143
| 11.1.1 | Overview p. 143
|
| 11.1.2 | Lawful interception identifier p. 143
|
| 11.1.3 | Network identifier p. 143
|
| 11.1.4 | Correlation number p. 144
|
|
| 11.2 | Timing and quality p. 144
|
| 11.3 | Security aspects p. 144
|
| 11.4 | Quantitative aspects p. 144
|
| 11.5 | IRI for IMS Conference Services p. 145
| 11.5.0 | Introduction |R9| p. 145
|
| 11.5.1 | Events and information p. 148
|
|
| 11.6 | CC for IMS Conference Services p. 154
|
|
| 12 | 3GPP IMS-based VoIP Services |R12| p. 155
| 12.1 | Identifiers p. 155
| 12.1.1 | Overview p. 155
|
| 12.1.2 | Lawful Interception Identifier p. 155
|
| 12.1.3 | Network Identifier p. 155
|
| 12.1.4 | Correlation Number p. 155
|
|
| 12.2 | Timing and quality p. 156
|
| 12.3 | Security aspects p. 156
|
| 12.4 | Quantitative aspects p. 156
|
| 12.5 | IRI for IMS-based VoIP p. 156
|
| 12.6 | CC for IMS-based VoIP p. 156
|
| 12.7 | VoLTE Roaming |R14| p. 157
|
| 12.8 | Roaming Constraints to IMS VoIP/VoLTE LI |R14| p. 159
|
|
| 13 | Interception of Proximity Services (ProSe) |R12| p. 159
| 13.1 | General p. 159
| 13.1.1 | Identifiers p. 159
|
| 13.1.2 | Timing and quality p. 160
|
| 13.1.3 | Security aspects p. 160
|
| 13.1.4 | Quantitative aspects p. 160
|
|
| 13.2 | ProSe Direct Discovery p. 160
|
| 13.3 | ProSe Remote UE communications |R13| p. 163
|
|
| 14 | Invocation of Lawful Interception (LI) for Group Communications System Enablers (GCSE) |R12| p. 170
| 14.1 | Background p. 170
| 14.1.1 | Interception at GCS AS versus other nodes p. 170
|
|
| 14.2 | GCS AS in Intercepting Operator's Network p. 170
| 14.2.1 | General p. 170
|
| 14.2.2 | Identifiers p. 170
|
| 14.2.3 | Timing and quality p. 171
|
| 14.2.4 | Security Aspects p. 171
|
| 14.2.5 | Quantitative Aspects p. 172
|
| 14.2.6 | IRI for GCSE based Communications p. 172
|
| 14.2.7 | CC for GCSE based Communications p. 179
|
|
| 14.3 | GCS AS Outside Intercepting Operator Network p. 179
|
|
| 15 | Interception of Messaging Services |R13| p. 180
|
| 16 | Cell Site Reporting |R15| p. 200
| 16.1 | Overview p. 200
|
| 16.2 | LI_CELL_INFO Interface p. 201
|
| 16.3 | Cell Site Reporting in IRI event p. 201
|
| 16.4 | Cell Site Report p. 202
|
|
| 17 | Interception of PTC |R15| p. 202
| 17.1 | Capabilities when the PTC service is supported by a CSP p. 202
| 17.1.0 | Introduction p. 202
|
| 17.1.1 | Lawful interception identifier p. 202
|
| 17.1.2 | Network identifier p. 203
|
| 17.1.3 | PTC IRI Events p. 203
|
| 17.1.4 | CC for PTC-based VoIP p. 203
|
| 17.1.5 | IRI for PTC based Communications p. 204
|
|
| 17.2 | PTC Event Records p. 207
| 17.2.0 | Introduction p. 207
|
| 17.2.1 | PTC Registration p. 207
|
| 17.2.2 | PTC Start of Interception p. 207
|
| 17.2.3 | PTC Serving System p. 208
|
| 17.2.4 | PTC Session Initiation p. 209
|
| 17.2.5 | PTC Session Abandon End Record p. 210
|
| 17.2.6 | PTC Session Start Continue Record p. 211
|
| 17.2.7 | PTC Session End Record p. 212
|
| 17.2.8 | PTC Instant Personal Alert p. 212
|
| 17.2.9 | PTC Party Join p. 213
|
| 17.2.10 | PTC Party Drop p. 214
|
| 17.2.11 | PTC Party Hold-Retrieve Record p. 215
|
| 17.2.12 | PTC Media Modification p. 216
|
| 17.2.13 | PTC Group Advertisement p. 217
|
| 17.2.14 | PTC Floor Control p. 217
|
| 17.2.15 | PTC Target Presence p. 220
|
| 17.2.16 | PTC Associate Presence p. 220
|
| 17.2.17 | PTC List Management Events p. 220
|
| 17.2.18 | PTC Access Policy p. 222
|
| 17.2.19 | PTC Media Type Notification p. 223
|
| 17.2.20 | PTC Pre-established Session Record p. 224
|
|
| 17.3 | PTC Group Calls p. 225
| 17.3.1 | Introduction p. 225
|
| 17.3.2 | Group Call Request p. 225
|
| 17.3.3 | Group Call Cancel p. 226
|
| 17.3.4 | Group Call Response p. 227
|
| 17.3.5 | PTC Group Interrogate p. 228
|
| 17.3.6 | MCPTT Imminent Peril Group Call p. 229
|
|
|
| 18 | PTC Encryption |R15| p. 230
|
| A | (Normative) HI2 delivery mechanisms and procedures p. 232
| A.0 | Introduction |R12| p. 232
|
| A.1 | Void p. …
|
| A.2 | FTP p. 232
| A.2.1 | Introduction p. 232
|
| A.2.2 | Usage of the FTP p. 232
|
| A.2.3 | Profiles (informative) p. 233
|
| A.2.4 | File content p. 235
|
| A.2.5 | Exceptional procedures p. 235
|
| A.2.6 | Other considerations p. 236
|
|
| A.3 | ETSI TS 102 232-1 and ETSI TS 102 232-7 |R16| p. 237
| A.3.1 | General p. 237
|
| A.3.2 | Usage for realising HI2 p. 237
|
| A.3.3 | Usage of IPPR mechanism |R19| p. 237
|
|
|
| B | (Normative) Structure of data at the handover interface p. 238
| B.0 | Introduction |R12| p. 238
|
| B.1 | Syntax definitions p. 238
|
| B.2 | 3GPP object tree p. 239
|
| B.3 | Intercept related information (HI2 PS and IMS) p. 240
|
| B.3a | Interception related information (HI2 CS) |R6| p. 240
|
| B.4 | Contents of communication (HI3 PS) p. 240
|
| B.5 | Void p. …
|
| B.6 | User data packet transfer (HI3 CS) |R6| p. 240
|
| B.7 | Intercept related information (and I-WLAN) |R7| p. 240
|
| B.8 | Intercept related information (MBMS) |R8| p. 240
|
| B.9 | Intercept related information (HI2 SAE/EPS and IMS) |R8| p. 240
|
| B.10 | Contents of communication (HI3 EPS) |R8| p. 240
|
| B.11 | IMS Conference Services ASN.1 |R8| p. 241
| B.11.1 | Intercept related information (Conference Services) p. 241
|
| B.11.2 | Contents of communication (HI3 IMS Conferencing) p. 241
|
|
| B.12 | Contents of Communication (HI3 IMS-based VoIP) |R12| p. 241
|
| B.13 | Intercept related information for ProSe |R12| p. 241
|
| B.14 | GCSE Services ASN.1 |R12| p. 241
| B.14.1 | Intercept related information (GCSE Services) p. 241
|
| B.14.2 | Contents of communication (HI3 GCSE Group Communications) p. 241
|
|
| B.15 | Intercept related information (HI2 MMS) |R13| p. 241
|
| B.16 | Content information (HI3 MMS) |R14| p. 241
|
| B.17 | IP based handover (HI3) for CS voice content |R14| p. 242
|
|
| C | (Normative) UMTS and EPS HI3 interfaces p. 243
| C.0 | Introduction |R12| p. 243
|
| C.1 | UMTS LI correlation header p. 243
| C.1.1 | Introduction p. 243
|
| C.1.2 | Definition of ULIC header version 0 p. 243
|
| C.1.3 | Definition of ULIC header version 1 p. 245
|
| C.1.4 | Exceptional procedure p. 246
|
| C.1.5 | Other considerations p. 246
|
|
| C.2 | FTP p. 246
| C.2.1 | Introduction p. 246
|
| C.2.2 | Usage of the FTP p. 246
|
| C.2.3 | Exceptional procedures p. 248
|
| C.2.4 | CC contents for FTP p. 248
|
| C.2.5 | Other considerations p. 252
|
| C.2.6 | Profiles (informative) |R7| p. 253
|
|
| C.3 | ETSI TS 102 232-1 and ETSI TS 102 232-7 |R16| p. 254
|
|
| D | LEMF requirements - handling of unrecognised fields and parameters p. 256
|
| E | Bibliography p. 257
|
| F | Correlation indications of IMS IRI with GSN CC at the LEMF |R7| p. 259
|
| G | United States lawful interception p. 260
| G.1 | Delivery methods preferences p. 260
|
| G.2 | HI2 delivery methods p. 260
| G.2.1 | TPKT/TCP/IP p. 260
| G.2.1.1 | Introduction p. 260
|
| G.2.1.2 | Normal Procedures p. 260
|
| G.2.1.3 | ASN.1 for HI2 Mediation Function Messages p. 261
|
| G.2.1.4 | Error Procedures p. 261
|
| G.2.1.5 | Security Considerations p. 262
|
|
|
| G.3 | HI3 delivery methods p. 262
| G.3.1 | Use of TCP/IP p. 262
| G.3.1.1 | Normal Procedures p. 262
| G.3.1.1.0 | Introduction |R12| p. 262
|
| G.3.1.1.1 | Usage of TCP/IP when MF/DF initiates TCP Connections p. 262
|
| G.3.1.1.2 | Use of TPKT p. 262
|
| G.3.1.1.3 | Sending of Content of Communication Messages p. 263
|
|
| G.3.1.2 | ASN.1 for HI3 Mediation Function Messages p. 263
|
| G.3.1.3 | Error Procedures p. 263
|
| G.3.1.4 | Security Considerations p. 263
|
|
|
| G.4 | Cross reference of terms between J-STD-025-A and 3GPP p. 264
|
|
| H | (Normative) United States lawful interception p. 265
|
| I | Void p. …
|
| J | (Normative) Definition of the UUS1 content associated and sub-addressing to the CC link |R6| p. 268
| J.0 | Introduction |R12| p. 268
|
| J.1 | Definition of the UUS1 content associated to the CC link p. 268
|
| J.2 | Use of sub-address and calling party number to carry correlation information p. 268
| J.2.1 | Introduction p. 268
|
| J.2.2 | Subaddress options p. 268
|
| J.2.3 | Subaddress coding p. 269
|
| J.2.4 | Field coding p. 272
| J.2.4.0 | Introduction |R12| p. 272
|
| J.2.4.1 | Direction p. 273
|
| J.2.4.2 | Coding of the Calling Party Number p. 273
|
|
| J.2.5 | Length of fields p. 273
|
|
|
| K | (Normative) VoIP HI3 Interface |R12| p. 274
| K.1 | VoIP CC Protocol Data Unit p. 274
|
| K.2 | Definition of VoIP LI Correlation header p. 274
|
| K.3 | Definition of Payload p. 275
|
| K.4 | LEMF Considerations p. 275
|
|
| L | (Normative) Conference HI3 Interface |R12| p. 276
| L.1 | Conf CC Protocol Data Unit p. 276
|
| L.2 | Definition of Conference LI Correlation header p. 276
|
| L.3 | Definition of Payload p. 277
|
| L.4 | LEMF Considerations p. 277
|
|
| M | Generic LI notification (HI1 notification using HI2 method) |R12| p. 278
| M.1 | HI.1 delivery methods preferences: p. 278
|
| M.2 | ASN.1 description of LI management notification operation (HI1 interface) p. 279
|
|
| N | Guidelines on IMS VoIP Correlation Information |R13| p. 280
| N.1 | Introduction p. 280
|
| N.2 | IMS VoIP p. 280
| N.2.0 | General p. 280
|
| N.2.1 | One Correlation Number Value p. 281
|
| N.2.2 | Multiple Correlation Number Values p. 281
|
| N.2.3 | Complex Example - Use of one Correlation Number p. 283
|
| N.2.4 | Complex Example - Use of Multiple Correlation Numbers p. 283
|
|
| N.3 | IMS Conferencing p. 285
| N.3.1 | General p. 285
|
| N.3.2 | Target Initiated AdHoc Conference Call p. 285
|
| N.3.3 | Independent Lawful Interception of IMS-Conferencing, p. 285
| N.3.3.1 | General p. 285
|
| N.3.3.2 | Use of correlationNumber (OCTET STRING) p. 285
|
| N.3.3.3 | Use of imsVoIP (IMS-VoIP-Correlation) p. 286
| N.3.3.3.1 | One Correlation Number Value p. 286
|
| N.3.3.3.2 | Multiple Correlation Number Values p. 286
|
|
|
|
|
| O | Selection of ASN.1 HI2 sub-domain for LALS Reporting |R13| p. 287
|
| P | (Normative) Removal of content from SMS |R17| p. 288
|
| $ | Change history p. 289
|