Tech-invite  3GPPspecsRELsGlossariesSIP

Top   in Index   Prev   Next

TS 33.128SA3
Protocol and Procedures for Lawful Interception

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.2.0 (Wzip)2020/03  66 p.
V15.4.0 (PDF)2020/03  69 p.

WI Acronym:  LI15
Rapporteur:  Mr. Rao, Nagaraja

The present document specifies the protocols and procedures required to perform Lawful Interception within a 3GPP network. The present document addresses both internal interfaces used internally with a 3GPP network and external handover interfaces used to handover intercepted communications to law enforcement.
The present document describes the detailed targeting of communications in each point of interception within a 3GPP network and the information that a point of interception needs to be able to capture. Furthermore, the detailed data formats for both the internal and external interfaces are also defined.
National regulations determine the applicable set of information that needs to be handed over or excluded from handover to law enforcement for a given 3GPP operator service.

full Table of Contents for  TS 33.128  Word version:   16.1.0

Here   Top
1  ScopeWord-p. 7
2  References
3  Definitions, symbols and abbreviationsWord-p. 8
4  GeneralWord-p. 9
5  Transport and Communications ProtocolUp
6  Network Layer Based InterceptionWord-p. 15
6.1  Introduction
6.2  5G
6.2.1  GeneralUp
6.2.2  LI at AMF
6.2.3  LI for SMF/UPF
6.2.4  LI at UDM for 5GWord-p. 33
6.2.5  LI at SMSF
6.2.6  LI support at NRF
6.3  4G
6.4  3G
7  Service Layer Based Interception
A (Normative)  Structure of both the Internal and External InterfacesWord-p. 41
B (Normative)  LI NotificationWord-p. 58
C (Normative)  XSD Schema for LI_X1 extensionsWord-p. 59
D  Drafting GuidanceWord-p. 63
Z  Change historyWord-p. 66

Up   Top