3GPP TS 33.108
3GPP TS 33.108
3GPP TS 33.108
3GPP TS 33.108
The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP.
The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.
This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this
Specification.
Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.
Release 12
Keywords
LTE, UMTS, Security, LI, Architecture
3GPP
Postal address
3GPP support office address
650 Route des Lucioles - Sophia Antipolis
Valbonne - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Internet
http://www.3gpp.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
2013, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TTA, TTC).
All rights reserved.
UMTS is a Trade Mark of ETSI registered for the benefit of its members
3GPP is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners
GSM and the GSM logo are registered and owned by the GSM Association
3GPP
Release 12
Contents
Foreword..........................................................................................................................................................
Introduction......................................................................................................................................................
1
Scope....................................................................................................................................................
References............................................................................................................................................
3.1
3.2
4
4.1
4.2
4.3
4.4
4.4.1
4.4.2
4.5
4.5.1
4.5.2
4.5.3
5
5.1
5.1.1
5.1.2
5.1.2.1
5.1.2.2
5.1.3
5.1.4
5.1.5
5.2
5.2.1
5.2.2
5.2.2.1
5.2.2.2
5.2.2.3
5.2.2.4
5.2.3
5.3
5.3.1
5.3.2
5.3.3
5.3.3.1
5.3.3.2
5.3.3.3
5.4
5.4.1
5.4.2
5.4.3
5.4.4
5.4.4.1
5.4.4.2
5.4.5
5.5
5.5.1
5.5.2
Definitions.........................................................................................................................................................
Abbreviations.....................................................................................................................................................
General.................................................................................................................................................
Basic principles for the handover interface.......................................................................................................
Legal requirements............................................................................................................................................
Functional requirements....................................................................................................................................
Overview of handover interface........................................................................................................................
Handover interface port 2 (HI2)...................................................................................................................
Handover interface port 3 (HI3)...................................................................................................................
HI2: Interface port for intercept related information.........................................................................................
Data transmission protocols.........................................................................................................................
Application for IRI (HI2 information).........................................................................................................
Types of IRI records.....................................................................................................................................
Circuit-switch domain..........................................................................................................................
Specific identifiers for LI...................................................................................................................................
Lawful Interception IDentifier (LIID).........................................................................................................
Communication IDentifier (CID).................................................................................................................
Network Identifier (NID).......................................................................................................................
Communication Identity Number (CIN) optional...............................................................................
CC link identifier (CCLID)..........................................................................................................................
Correlation of CC and IRI............................................................................................................................
Usage of Identifiers......................................................................................................................................
HI2: interface port for IRI.................................................................................................................................
Definition of Intercept Related Information................................................................................................
Structure of IRI records................................................................................................................................
Control Information for HI2...................................................................................................................
Basic call information............................................................................................................................
Information on supplementary services, related to a call in progress....................................................
Information on non-call related supplementary services.......................................................................
Delivery of IRI.............................................................................................................................................
HI3: interface port for Content of Communication...........................................................................................
Delivery of Content of Communication.......................................................................................................
Control information for Content of Communication...................................................................................
Security requirements at the interface port of HI3.......................................................................................
LI access verification.............................................................................................................................
Access protection...................................................................................................................................
Authentication........................................................................................................................................
LI procedures for supplementary services.........................................................................................................
General.........................................................................................................................................................
CC link Impact.............................................................................................................................................
IRI Impact, General Principle for Sending IRI records...............................................................................
Multi party calls general principles, options A, B.....................................................................................
CC links for active and non-active calls (option A)...............................................................................
Reuse of CC links for active calls (option B).........................................................................................
Subscriber Controlled Input (SCI): Activation / Deactivation / Interrogation of Services..........................
Detailed procedures for supplementary services...............................................................................................
Advice of Charge services (AOC)...............................................................................................................
Call Waiting (CW).......................................................................................................................................
3GPP
Release 12
5.5.2.1
Call Waiting at target: CC links..............................................................................................................
5.5.2.2
Call Waiting: IRI records........................................................................................................................
5.5.2.2.1
Target is served user.........................................................................................................................
5.5.2.2.2
Other party is served user.................................................................................................................
5.5.3
Call Hold/Retrieve.......................................................................................................................................
5.5.3.1
CC links for active and non-active calls (option A)...............................................................................
5.5.3.2
Reuse of CC links for active calls (option B).........................................................................................
5.5.3.3
IRI records..............................................................................................................................................
5.5.3.3.1
Invocation of Call Hold or Retrieve by target..................................................................................
5.5.3.3.2
Invocation of Call Hold or Retrieve by other parties.......................................................................
5.5.4
Explicit Call Transfer (ECT)........................................................................................................................
5.5.4.1
Explicit Call Transfer, CC link...............................................................................................................
5.5.4.2
Explicit Call Transfer, IRI records.........................................................................................................
5.5.5
Calling Line Identification Presentation (CLIP) (IRI Records)...................................................................
5.5.5.1
Call originated by target (target is served user)......................................................................................
5.5.5.2
Call terminated at target (other party is served user).............................................................................
5.5.6
Calling Line Identification Restriction (CLIR)............................................................................................
5.5.7
COnnected Line identification Presentation (COLP)..................................................................................
5.5.7.1
Call terminated at target (target is served user)......................................................................................
5.5.7.2
Call originated by target (other party is served user).............................................................................
5.5.8
COnnected Line identification Restriction (COLR)....................................................................................
5.5.9
Closed User Group (CUG)...........................................................................................................................
5.5.10
Completion of Call to Busy Subscriber (CCBS).........................................................................................
5.5.11
Multi ParTY call (MPTY)............................................................................................................................
5.5.11.2
IRI records..............................................................................................................................................
5.5.12
DIVersion Services (DIV)............................................................................................................................
5.5.12.1
Call Diversion by Target........................................................................................................................
5.5.12.1.1
Call Diversion by Target, CC links...................................................................................................
5.5.12.1.2
Call Diversion by Target, IRI records...............................................................................................
5.5.12.2
Forwarded Call Terminated at Target.....................................................................................................
5.5.12.3
Call from Target Forwarded...................................................................................................................
5.5.13
Variants of call diversion services................................................................................................................
5.5.14
SUBaddressing (SUB).................................................................................................................................
5.5.15
User-to-User Signalling (UUS)....................................................................................................................
5.5.16
Incoming Call Barring (ICB).......................................................................................................................
5.5.17
Outgoing Call Barring (OCB)......................................................................................................................
5.5.18
Tones, Announcements................................................................................................................................
5.6
Functional architecture......................................................................................................................................
6
6.1
6.1.1
6.1.2
6.1.3
6.2
6.2.1
6.2.2
6.2.3
6.3
6.4
6.5
6.5.1
6.5.1.1
6.5.1.2
6.5.1.3
6.5.1.4
6.6
6.7
7
7.1
7.1.1
Multi-media domain.............................................................................................................................
Identifiers...........................................................................................................................................................
Lawful interception identifier......................................................................................................................
3GPP
Release 12
7.1.2
7.1.3
7.2
7.2.1
7.2.2
7.2.3
7.3
7.4
7.5
7.5.1
7.6
8
8.1
8.1.1
8.1.2
8.1.3
8.1.4
8.2
8.2.1
8.2.2
8.2.3
8.3
8.4
8.5
8.5.1
8.5.1.1
8.5.1.2
8.5.1.3
8.5.1.4
8.6
9
9.1
9.1.1
9.1.2
9.1.3
9.1.4
9.2
9.2.1
9.2.2
9.2.3
9.3
9.4
9.5
9.5.1
9.5.1.1
9.5.1.2
9.5.1.3
9.5.1.4
9.6
10
10.1
10.1.1
10.1.2
10.1.3
10.2
10.2.1
10.2.2
10.2.3
10.3
10.4
Network identifier........................................................................................................................................
Correlation number......................................................................................................................................
Performance, reliability, and quality..................................................................................................................
Timing..........................................................................................................................................................
Quality..........................................................................................................................................................
Reliability.....................................................................................................................................................
Security aspects.................................................................................................................................................
Quantitative aspects...........................................................................................................................................
IRI for IMS........................................................................................................................................................
Events and information................................................................................................................................
Correlation indications of IMS IRI with GSN CC at the LEMF.......................................................................
3GPP
Release 12
10.5
10.5.1
10.5.1.1
10.5.1.2
10.5.1.3
10.5.1.4
10.6
10.7
11
11.1
11.1.1
11.1.2
11.1.3
11.1.4
11.2
11.2.1
11.2.2
11.2.3
11.3
11.4
11.5
11.5.1
11.5.1.1
11.5.1.2
11.5.1.3
11.5.1.4
11.5.1.5
11.6
Identifiers.........................................................................................................................................................
Overview....................................................................................................................................................
Lawful interception identifier....................................................................................................................
Network identifier......................................................................................................................................
Correlation number....................................................................................................................................
Performance, reliability, and quality................................................................................................................
Timing........................................................................................................................................................
Quality........................................................................................................................................................
Reliability...................................................................................................................................................
Security aspects...............................................................................................................................................
Quantitative aspects.........................................................................................................................................
IRI for IMS Conference Services....................................................................................................................
Events and information..............................................................................................................................
Overview..............................................................................................................................................
BEGIN record information...................................................................................................................
CONTINUE record information..........................................................................................................
END record information.......................................................................................................................
REPORT record information................................................................................................................
CC for IMS Conference Services....................................................................................................................
Annex A (normative):
A.1
ROSE..................................................................................................................................................
A.1.1
Architecture.....................................................................................................................................................
A.1.2
ASE_HI procedures.........................................................................................................................................
A.1.2.1
Sending part...............................................................................................................................................
A.1.2.2
Receiving part............................................................................................................................................
A.1.2.3
Data link management................................................................................................................................
A.1.2.3.1
Data link establishment........................................................................................................................
A.1.2.3.2
Data link release...................................................................................................................................
A.1.2.4
Handling of unrecognized fields and parameters.......................................................................................
A.2
A.2.1
A.2.2
A.2.3
A.2.4
A.2.5
A.2.6
FTP.....................................................................................................................................................
Introduction......................................................................................................................................................
Usage of the FTP.............................................................................................................................................
Profiles (informative).................................................................................................................................
File content.................................................................................................................................................
Exceptional procedures..............................................................................................................................
Other considerations..................................................................................................................................
Annex B (normative):
B.1
Syntax definitions...............................................................................................................................
B.2
B.3
B.3a
B.4
3GPP
Release 12
B.5
B.6
B.7
B.8
B.9
Annex C (normative):
C.1
C.1.1
C.1.2
C.1.3
C.1.4
C.1.5
C.2
Introduction.....................................................................................................................................................
Definition of ULIC header version 0...............................................................................................................
Definition of ULIC header version 1...............................................................................................................
Exceptional procedure.....................................................................................................................................
Other considerations........................................................................................................................................
FTP.....................................................................................................................................................
C.2.1
C.2.2
C.2.3
C.2.4
C.2.4.1
C.2.4.2
C.2.5
C.2.6
Introduction.....................................................................................................................................................
Usage of the FTP.............................................................................................................................................
Exceptional procedures....................................................................................................................................
CC contents for FTP........................................................................................................................................
Fields..........................................................................................................................................................
Information element syntax.......................................................................................................................
Other considerations........................................................................................................................................
Profiles (informative)......................................................................................................................................
Annex D (informative):
Annex E (informative):
Bibliography................................................................................................
Annex F (informative):
Annex G (informative):
G.1
G.2
G.2.1
TPKT/TCP/IP..................................................................................................................................................
G.2.1.1
Introduction................................................................................................................................................
G.2.1.2
Normal Procedures.....................................................................................................................................
G.2.1.2.1
Usage of TCP/IP when MF initiates TCP Connections........................................................................
G.2.1.2.2
Use of TPKT........................................................................................................................................
G.2.1.2.3
Sending of LI messages........................................................................................................................
G.2.1.3
ASN.1 for HI2 Mediation Function Messages..........................................................................................
G.2.1.4
Error Procedures........................................................................................................................................
G.2.1.5
Security Considerations.............................................................................................................................
G.3
G.3.1
Use of TCP/IP..................................................................................................................................................
G.3.1.1
Normal Procedures.....................................................................................................................................
G.3.1.1.1
Usage of TCP/IP when MF initiates TCP Connections........................................................................
G.3.1.1.2
Use of TPKT........................................................................................................................................
G.3.1.1.3
Sending of Content of Communication Messages...............................................................................
G.3.1.2
ASN.1 for HI3 Mediation Function Messages..........................................................................................
G.3.1.3
Error Procedures........................................................................................................................................
G.3.1.4
Security Considerations.............................................................................................................................
3GPP
Release 12
G.4
Annex H (normative):
Annex J (normative):
J.1
J.2
J.2.1
J.2.2
J.2.3
J.2.3.1
J.2.3.2
J.2.4
J.2.4.1
J.2.4.2
J.2.5
Introduction.....................................................................................................................................................
Subaddress options..........................................................................................................................................
Subaddress coding...........................................................................................................................................
BCD Values................................................................................................................................................
Field order and layout................................................................................................................................
Field coding.....................................................................................................................................................
Direction.....................................................................................................................................................
Coding of the Calling Party Number.........................................................................................................
Length of fields................................................................................................................................................
Annex K (informative):
Change history............................................................................................
3GPP
Release 12
Foreword
This Technical Specification has been produced by the 3rd Generation Partnership Project (3GPP).
The contents of the present document are subject to continuing work within the TSG and may change following formal
TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an
identifying change of release date and an increase in version number as follows:
Version x.y.z
where:
x the first digit:
1 presented to TSG for information;
2 presented to TSG for approval;
3 or greater indicates TSG approved document under change control.
y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections,
updates, etc.
z the third digit is incremented when editorial only changes have been incorporated in the document.
Introduction
This Technical Specification has been produced by 3GPP TSG SA to allow for the standardization in the area of lawful
interception of telecommunications. This document addresses the handover interfaces for lawful interception of PacketData Services, Circuit Switched Services, Multimedia Services within the Universal Mobile Telecommunication System
(UMTS) and Evolved Packet System (EPS). The specification defines the handover interfaces for delivery of lawful
interception Intercept Related Information (IRI) and Content of Communication (CC) to the Law Enforcement
Monitoring Facility.
Laws of individual nations and regional institutions (e.g. European Union), and sometimes licensing and operating
conditions define a need to intercept telecommunications traffic and related information in modern telecommunications
systems. It has to be noted that lawful interception shall always be done in accordance with the applicable national or
regional laws and technical regulations. Nothing in this specification, including the definitions, is intended to supplant
national law.
This specification should be used in conjunction with TS 33.106 [18] and TS 33.107 [19] in the same release. This
specification may also be used with earlier releases of 33.106 [18] and 33.107 [19], as well as for earlier releases of
UMTS and GPRS.
3GPP
Release 12
10
Scope
This specification addresses the handover interfaces for Lawful Interception (LI) of Packet-Data Services, Circuit
Switched Services, Multimedia Services within the UMTS network and Evolved Packet System (EPS). The handover
interface in this context includes the delivery of Intercept Related Information (HI2) and Content of Communication
(HI3) to the Law Enforcement Monitoring Facility.
References
The following documents contain provisions which, through reference in this text, constitute provisions of the present
document.
References are either specific (identified by date of publication, edition number, version number, etc.) or
non-specific.
For a specific reference, subsequent revisions do not apply.
For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including
a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same
Release as the present document.
[1]
ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[2]
ETSI ES 201 158: "Telecommunications security; Lawful Interception (LI); Requirements for
network functions".
[3]
ETSI ETR 330: "Security Techniques Advisory Group (STAG); A guide to legislative and
regulatory environment".
[4]
3GPP TS 29.002: "3rd Generation Partnership Project; Technical Specification Group Core
Network; Mobile Application Part (MAP) specification".
[5A]
ITU-T Recommendation X.680: "Abstract Syntax Notation One (ASN.1): Specification of Basic
Notation".
[5B]
ITU-T Recommendation X.681: "Abstract Syntax Notation One (ASN.1): Information Object
Specification".
[5C]
[5D]
[6]
ITU-T Recommendation X.690: "ASN.1 encoding rules: Specification of Basic Encoding Rules
(BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)".
NOTE 1: It is recommended that for [5A], [5B], [5C], [5D] and [6] the 2002 specific versions should be used.
[7]
[8]
ITU-T Recommendation X.882: "Information technology - Remote Operations: OSI realizations Remote Operations Service Element (ROSE) protocol specification ".
NOTE 2: It is recommended that for [8] the 1994 specific versions should be used.
[9]
3GPP TS 24.008: "3GPP Technical Specification Group Core Network; Mobile radio interface
Layer 3 specification, Core network protocol; Stage 3".
[10] - [12]
Void.
3GPP
Release 12
11
[13]
[14]
3GPP TS 32.215: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; Telecommunication Management; Charging Management; Charging data
description for the Packet Switched (PS) domain)".
[15]
[16]
[17]
3GPP TS 29.060: "3rd Generation Partnership Project; Technical Specification Group Core
Network; General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn
and Gp interface".
[18]
3GPP TS 33.106: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; 3G Security; Lawful Interception Requirements".
[19]
3GPP TS 33.107: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; 3G Security; Lawful interception architecture and functions".
[20]
3GPP TS 23.107: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; Quality of Service QoS concepts and architecture".
[21] [22]
Void.
[23]
[24]
ETSI TS 101 671: "Handover Interface for the lawful interception of telecommunications traffic".
[25]
3GPP TS 23.003: "3rd Generation Partnership Project; Technical Specification Group Core
Network; Numbering, addressing, and identification".
[26]
[27]
[28]
[29]
ITU-T Recommendation Q.763: "Signalling System No. 7 - ISDN User Part formats and codes".
[30]
ETSI EN 300 356 (all parts): "Integrated Services Digital Network (ISDN); Signalling System
No.7; ISDN User Part (ISUP) version 3 for the international interface".
[31]
ETSI EN 300 403-1 (V1.3.2): "Integrated Services Digital Network (ISDN); Digital Subscriber
Signalling System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call
control; Part 1: Protocol specification [ITU-T Recommendation Q.931 (1993), modified]".
NOTE 3: Reference [31] is specific, because ASN.1 parameter "release-Reason-Of-Intercepted-Call" has the
following comment: "Release cause coded in [31] format". In case later version than the given one
indicated for ISDN specification ETSI EN 300 403-1 has modified format of the "release cause", keeping
the reference version specific allows to take proper actions in later versions of this specification.
[32] - [33]
Void
[34]
ITU-T Recommendation Q.931: "ISDN user-network interface layer 3 specification for basic call
control".
[35]
Void.
[36]
[37]
3GPP TS 23.032: "3rd Generation Partnership Project; Technical Specification Group Core
Network; Universal Geographical Area Description (GAD)".
[38]
3GPP TR 21.905: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; Vocabulary for 3GPP Specifications".
3GPP
Release 12
12
[39]
ISO 3166-1: "Codes for the representation of names of countries and their subdivisions Part 1: Country codes".
[40]
3GPP TS 23.228: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; IP Multimedia Subsystem (IMS); Stage 2".
[41]
3GPP TS 29.234: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals: 3GPP System to Wireless Local Area Network (WLAN) interworking;
Stage 3".
[42]
3GPP TS 23.060: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; General Packet Radio Service (GPRS); Service description".
[43]
3GPP TS 23.234: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; 3GPP system to Wireless Local Area Network (WLAN) Interworking; System
Description".
[44]
3GPP TS 23.401: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal
Terrestrial Radio Access Network (E-UTRAN) access.
[45]
3GPP TS 23.402: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; Architecture enhancements for non-3GPP accesses".
[46]
3GPP TS 29.274: "3GPP Evolved Packet System (EPS); Evolved General Packet Radio Access
(GPRS) Tunneling Protocol for Control Plane (GTPv2-C); Stage 3".
[47]
3GPP TS 24.301: "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage
3".
[48]
3GPP TS 29.275: "Proxy Mobile IPv6 (PMIPv6) based Mobility and Tunneling protocols; Stage
3".
[49]
3GPP TS 24.303: "Mobility management based on Dual-Stack Mobile IPv6; Stage 3".
[50]
(void)
[51]
(void)
[52]
3GPP TS 24.147: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Conferencing Using the IP Multimedia (IM) Core Network (CN)
subsystem 3GPP Stage 3".
[53]
3GPP TS 29.273: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Evolved Packet System (EPS); 3GPP EPS AAA interfaces".
[54]
3GPP TS 33.328: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; IP Multimedia Subsystem (IMS) media plane security".
[55]
ATIS-0700005 "Lawfully Authorized Electronic Surveillance (LAES) for 3GPP IMS-based VoIP
and other Multimedia Services".
[56]
3GPP TS 29.212: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Policy and Charging Control(PCC); Reference points".
[57]
Void.
[58]
[59]
3GPP TS 29.272: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Evolved Packet System (EPS); Mobility Management Entity (MME) and
Serving GPRS Support Node (SGSN) related interfaces based on Diameter protocol".
[60]
3GPP TS 33.310: "3rd Generation Partnership Project; Technical Specification Group Services and
System Aspects; Network Domain Security (NDS); Authentication Framework (AF)".
3GPP
Release 12
13
[61]
[62]
3GPP TS 25.413: "UTRAN Iu interface Radio Access Network Application Part (RANAP)
signalling".
[63]
3GPP TS 29.279: "Mobile IPv4 (MIPv4) based mobility protocols; Stage 3".
[64]
3GPP TS 29.118: "Mobility Management Entity (MME) Visitor Location Register (VLR) SGs
interface specification"
[65]
[66]
3.1 Definitions
For the purposes of the present document, the terms and definitions given in TR 21.905 [38] and the following apply.
access provider: access provider provides a user of some network with access from the user's terminal to that network.
NOTE 1: This definition applies specifically for the present document. In a particular case, the access provider and
network operator may be a common commercial entity.
(to) buffer: temporary storing of information in case the necessary telecommunication connection to transport
information to the LEMF is temporarily unavailable.
communication: Information transfer according to agreed conventions.
content of communication: information exchanged between two or more users of a telecommunications service,
excluding intercept related information. This includes information which may, as part of some telecommunications
service, be stored by one user for subsequent retrieval by another.
handover interface: physical and logical interface across which the interception measures are requested from network
operator / access provider / service provider, and the results of interception are delivered from a network operator /
access provider / service provider to a law enforcement monitoring facility.
identity: technical label which may represent the origin or destination of any telecommunications traffic, as a rule
clearly identified by a physical telecommunications identity number (such as a telephone number) or the logical or
virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical
access on a case-by-case basis.
interception: action (based on the law), performed by a network operator / access provider / service provider, of
making available certain information and providing that information to a law enforcement monitoring facility.
NOTE 2:
In the present document the term interception is not used to describe the action of observing communications by a
law enforcement agency.
3GPP
Release 12
14
intercept related information: collection of information or data associated with telecommunication services involving
the target identity, specifically communication associated information or data (e.g. unsuccessful communication
attempts), service associated information or data and location information.
interception subject: person or persons, specified in a lawful authorization, whose telecommunications are to be
intercepted.
internal intercepting function: point within a network or network element at which the content of communication and
the intercept related information are made available.
internal network interface: network's internal interface between the Internal Intercepting Function and a mediation
device.
invocation and operation: describes the action and conditions under which the service is brought into operation; in the
case of a lawful interception this may only be on a particular communication. It should be noted that when lawful
interception is activated, it shall be invoked on all communications (Invocation takes place either subsequent to or
simultaneously with activation.). Operation is the procedure which occurs once a service has been invoked.
NOTE 3: The definition is based on ITU-T Recommendation X.882 [8], but has been adapted for the special
application of lawful interception, instead of supplementary services.
law enforcement agency: organization authorized by a lawful authorization based on a national law to request
interception measures and to receive the results of telecommunications interceptions.
law enforcement monitoring facility: law enforcement facility designated as the transmission destination for the
results of interception relating to a particular interception subject.
lawful authorization: permission granted to a LEA under certain conditions to intercept specified telecommunications
and requiring co-operation from a network operator / access provider / service provider. Typically this refers to a
warrant or order issued by a lawfully authorized body.
lawful interception: see interception.
lawful interception identifier: identifier for a particular interception.
Location Dependent Interception: is interception of a target mobile within a network service area that is restricted to
one or several Interception Areas (IA).
location information: information relating to the geographic, physical or logical location of an identity relating to an
interception subject.
mediation device: equipment, which realizes the mediation function.
mediation function: mechanism which passes information between a network operator, an access provider or service
provider and a handover interface, and information between the internal network interface and the handover interface.
network element: component of the network structure, such as a local exchange, higher order switch or service control
processor.
network element identifier: uniquely identifies the relevant network element carrying out the lawful interception.
network identifier: internationally unique identifier that includes a unique identification of the network operator,
access provider, or service provider and, optionally, the network element identifier.
network operator: operator of a public telecommunications infrastructure which permits the conveyance of signals
between defined network termination points by wire, by microwave, by optical means or by other electromagnetic
means.
precision: the number of digits with which a numerical value is expressed, e.g., the number of decimal digits or bits.
Note: precision should not be confused with accuracy, which is a difference between a measured/recorded numerical
value and the respective value in the standard reference system.
quality of service: quality specification of a telecommunications channel, system, virtual channel, computertelecommunications session, etc. Quality of service may be measured, for example, in terms of signal-to-noise ratio, bit
error rate, message throughput rate or call blocking probability.
3GPP
Release 12
15
reliability: probability that a system or service will perform in a satisfactory manner for a given period of time when
used under specific operating conditions.
result of interception: information relating to a target service, including the content of communication and intercept
related information, which is passed by a network operator, an access provider or a service provider to a law
enforcement agency. Intercept related information shall be provided whether or not call activity is taking place.
service information: information used by the telecommunications infrastructure in the establishment and operation of a
network related service or services. The information may be established by a network operator, an access provider, a
service provider or a network user.
service provider: natural or legal person providing one or more public telecommunications services whose provision
consists wholly or partly in the transmission and routing of signals on a telecommunications network. A service
provider needs not necessarily run his own network.
SMS: Short Message Service gives the ability to send character messages to phones. SMS messages can be MO (mobile
originate) or MT(mobile terminate).
target identity: technical identity (e.g. the interception's subject directory number), which uniquely identifies a target
of interception. One target may have one or several target identities.
target service: telecommunications service associated with an interception subject and usually specified in a lawful
authorization for interception.
NOTE 4:
There may be more than one target service associated with a single interception subject .
telecommunications: any transfer of signs, signals, writing images, sounds, data or intelligence of any nature
transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photo-optical system.
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 [38] and the following apply:
AN
ASN.1
ASE
BER
CC
CSCF
DF
DSMIP
EPS
e-PDG
E-UTRAN
FTP
GGSN
GLIC
GPRS
GSM
GSN
GTP
HA
HI
HI1
HI2
HI3
HLC
HSS
IA
IA5
IAP
ICI
IE
Access Network
Abstract Syntax Notation, Version 1
Application Service Element
Basic Encoding Rules
Content of Communication
Call Session Control Function
Delivery Function
Dual Stack MIP
Evolved Packet System
Evolved PDG
Evolved UTRAN
File Transfer Protocol
Gateway GPRS Support Node
GPRS LI Correlation
General Packet Radio Service
Global System for Mobile communications
GPRS Support Node (SGSN or GGSN)
GPRS Tunnelling Protocol
Home Agent
Handover Interface
Handover Interface Port 1 (for Administrative Information)
Handover Interface Port 2 (for Intercept Related Information)
Handover Interface Port 3 (for Content of Communication)
High Layer Compatibility
Home Subscriber Server
Interception Area
International Alphabet No. 5
Interception Access Point
Interception Configuration Information
Information Element
3GPP
Release 12
IIF
IMEI
IMS
IMSI
INI
IP
IP-CAN
IPS
IRI
LEA
LEMF
LI
LIID
LLC
LSB
MAP
ME
MF
MIP
MME
MS
MSB
MSISDN
MSN
NEID
NID
NO
OA&M
P-CSCF
PDG
PDN
PDN-GW
PDP
PLMN
PMIP
PSTN
ROSE
Rx
S-CSCF
SGSN
SDP
SIP
SMAF
SMF
SMS
SP
S-GW
TAU
TCP
TI
TLS
TP
T-PDU
Tx
UI
UMTS
URI
URL
UTRAN
VPN
16
3GPP
Release 12
17
General
The present document focuses on the handover interface related to the provision of information related to LI between a
network operator, access provider and/or service provider and a Law Enforcement Agency (LEA).
national requirements;
national law;
As a consequence, the present document shall define, in addition to mandatory requirements, which are always
applicable, supplementary options, in order to take into account the various influences listed above. See also
ETSI TS 101 331 [1] and ETSI ETR 330 [3].
3GPP
Release 12
18
3GPP
Release 12
19
The IRI records shall contain information available from normal provider (NO/AN/SP) operating procedures. In
addition the IRI records shall include information for identification and control purposes as specifically required by the
HI2 port.
The IIF is not required to make any attempt to request explicitly extra information which has not already been supplied
by a signalling system.
The present document specifies the use of the two possible methods for delivery: ROSE or FTP on the application layer
and the BER on the presentation layer. The lower layers for data communication may be chosen in agreement with the
operator (NO/AN/SP) and the LEA.
The delivery to the LEMF should use the internet protocol stack.
3GPP
Release 12
20
2) IRI-END record
3) IRI-CONTINUE record
4) IRI-REPORT record
For information related to an existing communication case, the record types 1 to 3 shall be used. They form an IRI
transaction for each communication case or communication attempt, which corresponds directly to the communication
phase (set-up, active or release).
For packet oriented data services, the first event of a communication attempt shall be the PDP context activation or a
similar event and an IRI-BEGIN record shall be issued. The end of the communication attempt shall be the PDP context
deactivation and an IRI-END record shall be issued. While a PDP context is active, IRI-CONTINUE records shall be
used for CC relevant IRI data records, IRI-REPORT records otherwise.
Record type 4 is used for non-communication related subscriber action, like subscriber controlled input (SCI) for
service activation. For simple cases, it can also be applicable for reporting unsuccessful communication attempts. It can
also be applicable to report some subscriber actions which may trigger communication attempts or modifications of an
existing communication, when the communication attempt or the change of the existing communication itself is
reported separately.
For the IMS domain the IRI record types are used in a different way than described in this clause. Details on the IRI
type usage in the IMS domain are defined in clause 7.5.
The record type is an explicit part of the record. The 4 record types are defined independently of target communication
events. The actual indication of one or several communication events, which caused the generation of an IRI record, is
part of further parameters within the record's information content. Consequently, the record types of the IRI transactions
are not related to specific messages of the signalling protocols of a communication case, and are therefore independent
of future enhancements of the intercepted services, of network specific features, etc. Any transport level information
(i.e. higher-level services) on the target communication-state or other target communication related information is
contained within the information content of the IRI records.
For packet oriented data services, if LI is being activated during an already established PDP context or similar, an IRIBEGIN record will mark the start of the interception. If LI is being deactivated during an established PDP context or
similar, no IRI-END record will be transmitted. The end of interception can be communicated to the LEA by other
means (e.g. HI1).
3GPP
Release 12
21
Circuit-switch domain
NOTE 1: For all non CC related records like SMS, SCI etc. no correlation to a CC could be made.
The CID distinguishes between the different activities of the target identity. It is also used for correlation between IRI
records and CC connections. It is used at the interface ports HI2 and HI3.
The Communication IDentifier is specified in the clauses below. For ASN.1 coding details, see annex B.
5.1.2.1
The Network IDentifier is a mandatory parameter; it should be internationally unique. It consists of one or both of the
following two identifiers.
-
3GPP
Release 12
22
an X.25 address;
an IP address.
5.1.2.2
This parameter is mandatory for IRI in case of reporting events for connection-oriented types of communication (e.g.
circuit switched calls).
The communication identity number is a temporary identifier of an intercepted communication, relating to a specific
target identity.
The Communication Identity Number (CIN) identifies uniquely an intercepted communications session within the
relevant network element. All the results of interception within a single communications session must have the same
CIN. If a single interception subject has two or more communications sessions through the same operator, and through
the same network element then the CIN for each session shall be different.
NOTE:
If two or more target identities, related either to an unique interception subject or to different interception
subjects, are involved in the same communication the same CIN value may be assigned by the relevant
network element to the communication sessions of the different target identities.
3GPP
Release 12
23
X in tables 5.1 and 5.2: Identifier used within parameters of the interface.
Table 5.1: Usage of identifiers, IRI and CC transmitted; options A, B (see clause 5.4.4)
Identifier
LIID
NID
CIN
CCLID
NOTE 1: The CIN of the 1st call for which this CC link has been set-up.
NOTE 2: The CCLID may be omitted, see clause 5.1.3.
3GPP
Release 12
24
5.2.2.1
The main purpose of this information is the unique identification of records related to a target identity, including their
unique mapping to the links carrying the Content of Communication. In general, parameters of this category are
mandatory, i.e. they have to be provided in any record.
The following items are identified (in brackets: ASN.1 name and reference to the ASN.1 definition or clause B.3a):
1) Record type (IRIContent, see clause B.3a)
IRI-BEGIN, IRI-CONTINUE, IRI-END, IRI-REPORT-record types.
2) Version indication (iRIversion, see clause B.3a)
Identification of the particular version of the HI2 interface specification.
3) Communication Identifier (CommunicationIdentifier, see clauses 5.1.2 and B.3a).
4) Lawful Interception Identifier (LawfulInterceptionIdentifier, see clauses 5.1.1 and B.3a).
5) Date & time (TimeStamp, see clause B.3a)
Date & time of record trigger condition.
The parameter shall have the capability to indicate whether the time information is given as Local time without
time zone, or as UTC. Normally, the operator (NO/AN/SP) shall define these options.
6) CC Link Identifier (CC-Link-Identifier, see clause 5.1.3 for definition and clause B.3a for ASN.1 definition).
Table 5.3 summarizes the items of HI2 control information. It is mandatory information, except the CID - it may be
omitted for non-call related IRI records - and the CCLID. Their format and coding definition is LI specific, i.e. not
based on other signalling standards.
Table 5.3: Parameters for LI control information in IRI records (HI2 interface port)
IRI parameters: LI control information
IRI parameter name
ASN.1 name (used in annex B)
Type of record
IRIContent
Version indication
iRIversion
Lawful Interception IDentifier (LIID)
LawfulInterceptionIdentifier
Communication IDentifier (CID)
CommunicationIdentifier
- Communication Identity Number (CIN)
- Network IDentifier (NID)
Date & time
TimeStamp
CC Link IDentifier (CCLID) (only used in case of
CC-Link-Identifier
option B)
3GPP
Release 12
5.2.2.2
25
This clause defines parameters within IRI records for basic calls, i.e. calls, for which during their progress no
supplementary services have been invoked. In general, the parameters are related to either the originating or terminating
party of a call; consequently, ASN.1 containers are defined for the originating/terminating types of parties, which allow
to include the relevant, party-related information. The structure of these containers and the representation of individual
items are defined in clause B.3a.
NOTE:
A third type of party information is defined for the forwarded-to-party (see clause 5.2.2.3 on calls with
supplementary services being invoked).
The items below are to be included, when they become available for the first time during a call in progress. If the same
item appears identically several times during a call, it needs only to be transmitted once, e.g. in an IRI-BEGIN record.
The ASN.1 name of the respective parameters, as defined in clause B.3a, is indicated in brackets.
1) Direction of call (intercepted-Call-Direct)
Indication, whether the target identity is originating or terminating Party.
2) Address of originating and terminating parties (CallingPartyNumber or CalledPartyNumber)
If e.g. in case of call originated by the target at transmission of the IRI-BEGIN record only a partial terminating
address is available, it shall be transmitted, the complete address shall follow, when available.
3) Basic Service, LLC (Services-Information)
Parameters as received from signalling protocol (e.g. BC, HLC, TMR, LLC).
4) Cause (ISUP-parameters or DSS1-parameters-codeset-0)
Reason for release of intercepted call. Cause value as received from signalling protocol. It is transmitted with the
ASN.1 container of the party, which initiated the release; in case of a network-initiated release, it may be either
one.
5) Additional network parameters
e.g. location information (Location).
Parameters defined within table 5.5 shall be used for existing services, in the given 3GPP format. National extensions
may be possible using the ASN.1 parameter National-Parameters.
5.2.2.3
The general principle is to transmit service related information within IRI records, when the corresponding
event/information, which needs to be conveyed to the LEMF, is received from the signalling protocol. Where possible,
the coding of the related information shall use the same formats as defined by standard signalling protocols.
The selection, which types of events or information elements are relevant for transmission to the LEAs is conforming to
the requirements defined in ETSI TS 101 331 [1] and ETSI ES 201 158 [2].
A dedicated ASN.1 parameter is defined for supplementary services related to forwarding or re-routing calls
(forwarded-to-Party information), due to the major relevance of these kinds of services with respect to LI. For the
various cases of forwarded calls, the information related to forwarding is included in the
originatingParty/terminatingParty/forwarded-to-Party information:
1) If a call to the target has been previously forwarded, available parameters relating to the redirecting party(ies) are
encapsulated within the originatingPartyInformation parameter.
2) If the call is forwarded at the target's access (conditional or unconditional forwarding towards the
forwarded-to-party), the parameters which are related to the redirecting party (target) are encapsulated within the
terminatingPartyInformation parameter.
3) All parameters related to the forwarded-to-party or beyond the forwarded-to-party are encapsulated within the
forwarded-to-Party ASN1 coded parameter. In addition, this parameter includes the
supplementary-Services-Information, containing the forwarded-to address, and the redirection information
parameter, with the reason of the call forwarding, the number of redirection, etc.).
For the detailed specification of supplementary services related procedures see clause 5.4.
3GPP
Release 12
26
Parameters defined within table 5.4 shall be used for existing services, in the given format. National extensions may be
possible using the ASN.1 parameter National-Parameters.
5.2.2.4
The general principle is to transmit non-call related service information as received from the signalling protocol.
A typical user action to be reported is Subscriber Controlled Input (SCI).
For the detailed specification of the related procedures see clause 5.4.
A set of information is used to generate the records. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in 3G MSC server or 3G GMSC server or DF2/MF, if this is
necessary in a specific country. The following table gives the mapping between information received per event and
information sent in records.
3GPP
Release 12
27
ASN.1 parameter
PartyInformation/msISDN
PartyInformation/imsi
PartyInformation/imei
Umts-CS-Event. In case this parameter is not
sent over the HI2 interface, the presence of
other parameterson HI2 indicates the event
type (e.g. sMS or sciData parameter
presence)
timestamp
3GPP
Release 12
28
Correlation of HI3 information to the other HI port's information, using the supplementary service user-to-user
signalling 1 implicit (UUS1).
The bearer capability used for the CC links is 64 kbit/s unrestricted digital information; this type guarantees that the
information is passed transparently to the LEMF. No specific HLC parameter value is required.
The CC communication channel is a one-way connection, from the operator's (NO/AN/SP) IIF to the LEMF, the
opposite direction is not switched through in the switching node of the target.
The scenario for delivery of the Content of Communication is as follows:
1) At call attempt initiation, for one 64 kbit/s bi-directional target call, two ISDN delivery calls are established from
the MF to the LEMF. One call offers the Content of Communication towards the target identity (CC Rx
call/channel), the other call offers the Content of Communication from the target identity (CC Tx call/channel).
See figure 5.1.
2) During the establishment of each of these calls, appropriate checks are made (see clause 5.3.3).
3) The MF passes during call set up, within the signalling protocol elements of the CC link the LIID and the CID to
the LEMF. The LEMF uses this information to identify the target identity and to correlate between the IRI and
CC.
4) At the end of a call attempt, each delivery call associated with that call attempt shall be released by the MF.
3GPP
Release 12
29
o ther pa rty
P
Target
T
IIF
MF
Tx
b eare r chan nel,
sign allin g chann el
Rx
bearer channel,
signalling chann el
LE M F
Figure 5.1: Content of Communication transmission from MF to LEMF
UUS1-parameter
UUS1-parameter
UUS1-parameter
UUS1-parameter
10
Information
See clause 5.3.3
Lawful Interception IDentifier (LIID);
see clause 5.1
Communication IDentifier (CID), see
clause 5.1
CC Link IDentifier (CCLID), if
required; see clause 5.1
Direction indication
(communication from/towards
target/combined (mono))
Bearer capability of target call
Purpose
LEMF can check identity of origin of
call.
Identifier, identifying target identity
Identifier, identifying specific call of
target identity
Identifier, used for correlation CC
link-IRI records
Signal from (Tx)/towards (Rx) target
identity or combined
3GPP
Release 12
30
Parameters 2, 3 and 4 are also present in the IRI records, for correlation with the CC links. Parameter 5 indicates in case
of separate transmission of each communication direction, which part is carried by a CC link. Parameter 6, the basic
service of the target call, can be used by the LEMF for processing of the CC signal, e.g. to apply compression methods
for speech signals, in order to save storage space. Parameter 7 contains the CUG of the LEA. It is optionally used at set
up the CC link to the LEA. Parameter 8, the basic service of the CC link, is set to "64 kbit/s unrestricted": All
information of the Rx, Tx channels can be transmitted fully transparently to the LEA. The setting of the ISDN user part
indicator guarantees, that the services supporting the LI CC link delivery are available for the complete CC link
connection.
The MF uses en-bloc dialling, i.e. there exists only one message in forward direction to the LEA.
NOTE:
The LEMF should at reception of the set up message not use the alerting state, it should connect
immediately, to minimize time delay until switching through the CC links. Not all networks will support
such a transition. Exceptionally, it may be necessary to send an alerting message before the connected
message.
The maximum length of the user information parameter can be more than the minimum length of 35 octets (national
option, see ITU-T Recommendation Q.763 [29]), i.e. the network transmitting the CC links shall support the standard
maximum size of 131 octets for the UUS1 parameter.
The User-to-User service 1 parameter cannot be discarded by the ETSI ISUP procedures: the only reason, which would
allow the ISUP procedures to discard it would be, if the maximum length of the message carrying UUS1 would be
exceeded. With the specified amount of services used for the CC links, this cannot happen.
The signalling messages of the two CC channels (stereo mode) carry the same parameter values, except for the direction
indication.
See clause J.1 for the ASN.1 definition of the UUS1 LI specific content of the UUS1 parameter.
5.3.3.1
LI access verification
The supplementary service CLIP shall be used to check for the correct origin of the delivery call.
NOTE:
When using CLIP, the supplementary service CLIR must not be used.
The supplementary service COLP shall be used to ensure that only the intended terminal on the LEA's side accepts
incoming calls from the Handover Interface (HI).
To ensure access verification the following two checks shall be performed:
-
check of COnnected-Line identification Presentation (COLP) at the Handover Interface (HI) (due to the fact that
the connected number will not always be transported by the networks involved, there shall be the possibility for
deactivating the COLP check for a given interception measure. In addition, the COLP check shall accept two
different numbers as correct numbers, i.e. the user provided number and the network provided number. Usually,
the user provided number contains a DDI extension).
3GPP
Release 12
5.3.3.2
31
Access protection
In order to prevent faulty connections to the LEA, the CC links may be set up as CUG calls.
In this case, the following settings of the CUG parameters should be used:
-
Incoming Access:
Outgoing Access:
no;
yes.
5.3.3.3
not allowed;
not allowed;
Authentication
In addition to the minimum access verification mechanisms described above, optional authentication mechanisms
according to the standard series ISO 9798 "Information technology - Entity authentication - parts 1 to 5" may be used.
These mechanisms shall only be used in addition to the access verification and protection mechanisms.
The procedures for CC links, depending on the call scenario of the target.
Related to the IRI records, the point in time of sending and supplementary service specific information.
The specifications for supplementary services interactions are kept as far as possible independent of the details of the
used signalling protocols; service related events are therefore described in more general terms, rather than using
protocol dependent messages or parameters.
3GPP
Release 12
32
Interactions with services of the same family, like call diversion services, are commonly specified, if the individual
services behaviour is identical, with respect to LI.
With respect to the IRI records, clause 5.5 specifies typical cases; the general rules for data which shall be included in
IRI records are defined in clause 5.2, specifically in clause 5.4.3.
Services, which are not part of table 5.7, do not require the generation of LI information: No CC links are generated or
modified, and no specific information on the service is present in the IRI records. That is, these services have "no
impact" on LI, no special functions for LI are required. However, within the IIF, functions may be required to realize the
principle, that the service behaviour shall not be influenced by LI.
"No impact" is not automatically applicable for new services. Each new service has to be checked for its impact on LI.
The present document does not intend to give a complete description of all possible cases and access types of
interactions with supplementary services.
3GPP
Release 12
33
Table 5.7: Supplementary Services with impact on LI CC links or IRI records content;
see also clause 5.5
Suppl. Service
Call Waiting
Abbr.
CW
Call Hold
HOLD
Call Retrieve
Explicit Call
Transfer
Subaddressing
Calling Line
Identification
Presentation
Calling Line
Identification
Restriction
Connected Line
Identification
Presentation
Connected Line
Identification
Restriction
Closed User
Group
Multi Party
Conference
CLIP
No impact on CC links
CLIR
No impact on CC links
COLP
No impact on CC links
COLR
No impact on CC links
CUG
No impact on CC links
MPTY
Call Forwarding
Unconditional;
see note
CFU
Call Forwarding
No Reply;
see note
Call Forwarding
Not Reachable;
see note
Call Forwarding
Busy; see note
CFNRy
Call Deflection
User-to-User
Signalling 1, 2, 3
CD
UUS
CFNRc
CFB
sum signal
CC links depending on option A/B
One CC link for each call, which is
forwarded by the target
Forwarding by other parties:
no impact
Fallback procedure FB
No impact on CC links
(not a supplementary service)
NOTE:
Other variants of Call Forwarding, like Forwarding to fixed numbers, to information services, etc. are
assumed to be covered by the listed services.
3GPP
Release 12
34
for the related service CC links shall be set up, in addition to the CC links for a basic call;
already existing calls are impacted, for example by disconnecting their information flow.
The CC link impact relates always to actions of a target being the served user. Services invoked by other parties have no
CC link impact.
5.4.4.1
For each call, active or not, separate CC links shall be provided. This guarantees, that:
-
changes in the call configuration of the target are reflected immediately, with no delay, at the LEMF;
3GPP
Release 12
35
It is a network option, whether the communication direction of a non-active call, which still carries a signal from the
other party, is switched through to the LEMF, or switched off.
other parties
P1 on hold
on hold
P2 on hold
Target
T
P3 active
IIF
MF
LEMF
Figure 5.2: CC link option A (example for call hold supplementary service)
5.4.4.2
CC links are only used for calls active in their communication phase. Changes in the call configuration may not be
reflected at the LEMF immediately, because switching in the IIF/MF is required, and the signal from the held party is
not available.
Each time, another target call leg uses an existing CC link, an IRI-CONTINUE record with the correct CID and CCLID
shall be sent.
NOTE:
Even when option B is used, more than one CC link may be required simultaneously.
other parties
P1 on hold
P2 on hold
P3 active
on hold
Target
T
IIF
MF
LEMF
Figure 5.3: CC link option B (example for call hold supplementary service)
3GPP
Release 12
36
In case of option A "CC links for all calls", a CC link is set up for the waiting call, using the standard procedures for
terminating calls. In case of option B "CC links for active calls", no CC link is set up for the waiting call, it is treated
like a held call.
With respect to CC links, the same configurations as for Call Hold apply.
Procedure, when the target accepts the waiting call: see retrieve of a held call (see clause 5.5.3).
5.5.2.2
5.5.2.2.1
If Call Waiting is invoked at the target access by another (calling) party: the IRI-BEGIN record or a following
IRI-CONTINUE record for the waiting call shall contain the LI specific parameter call waiting indication.
5.5.2.2.2
If Call Waiting is invoked at the other (called) party's access: if a CW notification is received by the target's switching
node, it shall be included in an IRI-CONTINUE record; it may be a separate record, or the next record of the basic call
sequence.
If an active call is put on hold, its CC links shall stay intact; as an option, the signal from the held party is not switched
through to the LEMF.
If the target sets up a new call, while one call is on hold, this call is treated like a normal originating call, i.e. a new LI
configuration (CC links, IRI records) is established.
5.5.3.2
If an active call is put on hold, its CC links shall not immediately be disconnected; as an option, the signal from the held
party is not switched through to the LEMF.
3GPP
Release 12
37
If the target sets up a new call, or retrieves a previously held call, while one target call, which still owns CC links, is on
hold, these CC links shall be used for the signals of the new active call.
5.5.3.3
5.5.3.3.1
IRI records
Invocation of Call Hold or Retrieve by target
An IRI-CONTINUE record with the LI specific parameter hold indication or retrieve indication, respectively, shall be
sent.
5.5.3.3.2
An IRI-CONTINUE record with a call hold or retrieve notification shall be sent if it has been received by the signalling
protocol entity of the target call.
During the preparation phase of a transfer, the procedures for Call Hold/Retrieve are applicable.
If the served (transferring) user is the target, its original call is released. This terminates also the CC link, and causes an
IRI-END record to be sent.
After transfer, two options exist:
1) For the transferred call, CC links (and IRI records) shall be generated, in principle like for a forwarded call
(similar to procedures in clause 5.5.12.1.1, case b));
2) The transferred call shall not be intercepted.
5.5.4.2
In addition to the basic or hold/retrieve/waiting call related records and parameters, during the reconfiguration of the
call, ECT-specific information at the target's access is sent to the LEMF within IRI-CONTINUE records.
When the target leaves the call after transfer, an IRI-END record is sent, and the LI transaction is terminated. Options
for the new call, after transfer: see clause 5.5.4.1.
The standard CLI parameter of an originating target is included as a supplementary service parameter in the IRI records.
5.5.5.2
The CLI sent from the other party is included in the IRI-BEGIN record (originating-Party information), irrespective of
a restriction indication. An eventually received second number (case two number delivery option) is included in the IRI
record as supplementary services information (Generic Number parameter).
3GPP
Release 12
38
A connected number parameter received from the target shall be included in an IRI record (terminating-Party
information).
5.5.7.2
If available, a connected number parameter as received from the other (terminating) party shall be included in an IRI
record (terminating-Party information). Any additional number, e.g. a Generic Number, shall also be included in the IRI
record.
5.5.11.2
IRI records
For the events indicating the start and the end of the MPTY conference, IRI records are generated.
3GPP
Release 12
5.5.12.1
5.5.12.1.1
39
In order to handle call diversion services by applying, as far as possible, common procedures, the following two cases
are differentiated:
a) Call Forwarding Unconditional (CFU), Call Forwarding Busy (NDUB):
In these cases, forwarding is determined, before seizing the target access. CC links are set up, immediately, for
the forwarded call.
Other variants of Call Forwarding with immediate forwarding, i.e. without first seizing the target access, are
handled in the same way (e.g. unconditional Selective Call Forwarding).
b) Call Forwarding No Reply, Call Forwarding Busy (UDUB), Call Deflection:
Initially, the target call is set up, and the call is intercepted like a basic call.
When forwarding takes place (e.g. after expiry of the CFNR timer), the original call is released; this may cause
also a release of the CC links. In such case two optional IRI record handling may apply:
1) For the original call an IRI-END record is sent. For the forwarded call a new set up procedure, including new LI
transaction may take place with new set of IRI records (starting with IRI-BEGIN record sent to the LEA).
2) For the forwarded call the IRI-CONTINUE record is generated and sent to a LEA, indicating the CFNR
invocation.
Other variants of Call Forwarding with forwarding after first seizing the target access, are handled in the same way.
In case of multiple forwarding, one call may be intercepted several times, if several parties are targets. Considering the
maximum number of diversions for one call of 5 (3GPP recommended limit), one call can be intercepted 7 times, from
the same or different LEAs. In principle, these procedures are independent of each other.
5.5.12.1.2
See clause 5.2.2.3, case 2, related to the target's information, and case 3, related to the forwarded-to-party information.
As above for the CC links, the diversion types a) and b1, 2) are differentiated: For case a) and b2) diversions, the IRI is
part of one transaction, IRI-BEGIN, -CONTINUE, -END, for case b1) diversions, a first transaction informs about the
call section, until diversion is invoked (corresponding to a basic, prematurely released call), a second transaction
informs about the call section, when diversion is invoked (corresponding to case a).
5.5.12.2
The CC link is handled in the standard way. The IRI-BEGIN record contains the available call diversion information,
see clause 5.2.2.3 case 1.
5.5.12.3
The CC link is handled in the standard way. The IRI-BEGIN and possibly IRI-CONTINUE records contain the
available call diversion related information, see clause 5.2.2.3 case 3.
3GPP
Release 12
40
3GPP
Release 12
41
IIF
HI1
NWO/AP/SvPs
administration
center
MSC/
VLR
ADMF
LEA
X1 interface
HI2
IRI MF
DF2
X2 interface
HI3
CC MF
DF3
GMSC
X3 interface
6.1 Identifiers
Specific identifiers are necessary to identify a target for interception uniquely and to correlate between the data, which
is conveyed over the different handover interfaces (HI2 and HI3). The identifiers are defined in the subsections below.
For the delivery of CC and IRI the SGSN or GGSN provide correlation numbers and target identities to the HI2 and
HI3. The correlation number is unique per PDP context and is used to correlate CC with IRI and the different IRI's of
one PDP context. When the SGSN connects an UE to a S-GW through the S4 interface ([42], see also NOTE) for a
specific communication, the SGSN is not required to provide CC, IRIs for the PDP context associated with CC and
correlation for that communication.
NOTE: The S4 is an intra-PLMN reference point between the SGSN and the S-GW.
3GPP
Release 12
42
As an example, in the UMTS system, the Correlation Number may be the combination of GGSN address and charging
ID.
NOTE:
The Correlation Number is at a minimum unique for each concurrent communication (e.g. PDP context)
of a subject within a lawful authorization.
3GPP
Release 12
43
Each IRI data record shall be sent by the delivery function to the LEMF over the HI2 within seconds of the
detection of the triggering event by the IAP at least 95% of the time.
Each IRI data record shall contain a time-stamp, based on the intercepting nodes clock that is generated
following the detection of the IRI triggering event. The timestamp precision should be at least 1 second
(ETSI TS 101 671 [24]). Defining the required precision of an IRI timestamp however is subject to national
requirements.
6.2.2 Quality
The quality of service associated with the result of interception should be (at least) equal to the quality of service of the
original content of communication. This may be derived from the QoS class used for the original intercepted session,
TS 23.107 [20]. However, when TCP is used as an OSI layer 4 protocol across the HI3, real time delivery of the result
of the interception cannot be guaranteed. The QoS used from the operator (NO/AN/SP) to the LEMF is determined by
what operators (NO?AN?SP) and law enforcement agree upon.
6.2.3 Reliability
The reliability associated with the result of interception should be (at least) equal to the reliability of the original content
of communication. This may be derived from the QoS class used for the original intercepted session, TS 23.107 [20].
Reliability from the operator (NO/AN/SP) to the LEMF is determined by what operators (NO/AN/SP) and law
enforcement agree upon.
The ability to access and monitor all simultaneous communications originated, received, or redirected by the
interception subject;
The ability for multiple LEAs (up to five) to monitor, simultaneously, the same interception subject while
maintaining unobtrusiveness, including between agencies;
The ability of the network to simultaneously support a number of separate (i.e. multiple interception subjects)
legally authorized interceptions within its service area(s), including different levels of authorization for each
interception, including between agencies (i.e. IRI only, or IRI and communication content).
3GPP
Release 12
44
GPRS detach
gPRSEvent
gPRSCorrelationNumber
A set of information is used to generate the records. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in the GSN or DF2 MF, if this is necessary in a specific country. The
following table gives the mapping between information received per event and information sent in records.
3GPP
Release 12
45
3GPP
Release 12
parameter
observed MSISDN
observed IMSI
observed IMEI
observed PDP
address
event type
event date
event time
access point name
PDP type
initiator
correlation number
lawful interception
identifier
location information
SMS
failed context
activation reason
failed attach reason
service center
address
umts QOS
context deactivation
reason
network identifier
iP assignment
SMS originating
address
SMS terminating
address
SMS initiator
serving SGSN
number
serving SGSN
address
NSAPI
46
description
Target Identifier with the MSISDN of the target
subscriber (monitored subscriber).
Target Identifier with the IMSI of the target subscriber
(monitored subscriber).
Target Identifier with the IMEI of the target subscriber
(monitored subscriber)
PDP address(es) used by the target. In case of IPv4v6
two addresses may be carried.
Description which type of event is delivered: PDP
Context Activation, PDP Context Deactivation,GPRS
Attach, etc.
Date of the event generation in the xGSN
Time of the event generation in the xGSN
The Access Point Name contains a logical name (see
3GPP TS 23.060 [---TBD---])
This field describes the PDP type as defined in 3GPP
TS 29.060 [17], TS 24.008 [9], TS 29.002 [4]
This field indicates whether the PDP context activation,
deactivation, or modification is MS directed or network
initiated.
Unique number for each PDP context delivered to the
LEMF, to help the LEA, to have a correlation between
each PDP Context and the IRI.
Unique number for each lawful authorization.
locationOfTheTarget
DataNodeAddress
sms-initiator
servingSGSN-Number
servingSGSN-Address
servingS4-SGSN-address
3GPP
partyInformation (party-identity)
partyInformation (party-identity)
partyInformation
(services-data-information)
gPRSevent
Timestamp
partyInformation
(services-data-information)
partyInformation
(services-data-information)
initiator
gPRSCorrelationNumber
lawfulInterceptionIdentifier
sMS
gPRSOperationErrorCode
gPRSOperationErrorCode
serviceCenterAddress
qOS
gPRSOperationErrorCode
networkIdentifier
iP-assignment
DataNodeAddress
nSAPI
Release 12
NOTE:
47
conditional (C)
- required in situations where a condition is met (the condition is given in the Description), or
optional (O)
The information to be carried by each parameter is identified. Both optional and conditional parameters are considered
to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion takes precedence over Stage 3
syntax.
6.5.1.1
The REPORT record is used to report non-communication related subscriber actions (events) and for reporting
unsuccessful packet-mode communication attempts.
The REPORT record shall be triggered when:
-
the intercept subject's mobile station performs a GPRS attach procedure (successful or unsuccessful);
the intercept subject's mobile station is unsuccessful at performing a PDP context activation procedure;
the intercept subject's mobile station performs a cell, routing area, or combined cell and routing area update;
the interception is activated after intercept subject's mobile station has successfully performed GPRS attach
procedure;
optionally when the intercept subject's mobile station leaves the old SGSN;
optionally when the intercept subject's mobile station enters or leaves IA;
the intercept subject's mobile station sends an SMS-Mobile Originated (MO) communication. Dependent on
national requirements, the triggering event shall occur either when the 3G SGSN receives the SMS from the
target MS or, when the 3G SGSN receives notification that the SMS-Centre successfully received the SMS;
national regulations may mandate that a REPORT record shall be triggered when the 3G SGSN receives an
SMS-MO communication from the intercept subject's mobile station;
the intercept subject's mobile station receives a SMS Mobile-Terminated (MT) communication. Dependent on
national requirements, the triggering event shall occur either when the 3G SGSN receives the SMS from the
SMS-Centre or, when the 3G SGSN receives notification that the target MS successfully received the SMS;
national regulations may mandate that a REPORT record shall be triggered when the 3G SGSN receives an
SMS-MT communication from the SMS-Centre destined for the intercept subject's mobile station;
3GPP
Release 12
48
as a national option, a mobile terminal is authorized for service with another network operator or service
provider.
Table 6.3: GPRS Attach REPORT Record
Parameter
observed MSISDN
observed IMSI
observed IMEI
event type
event date
event time
network identifier
lawful intercept identifier
location information
failed attach reason
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's MS.
Provide information about the reason for failed attach attempts of the
target subscriber.
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's MS.
3GPP
Release 12
49
MOC
Description/Conditions
iP assignment
event type
event date
event time
access point name
C
M
PDP type
initiator
network identifier
lawful intercept identifier
location information
M
M
MOC
Description/Conditions
event type
event date
event time
network identifier
lawful intercept identifier
location information
C
M
M
M
C
ldi event
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's MS. This parameter, in case of inter-SGSN RAU,
will be sent only by the new SGSN.
Provide (only by the old SGSN), when authorized and if available, to
identify the old location information for the intercept subject's MS.
Provide, when authorized, to indicate whether the intercept subject is
entering or leaving the interception area (only applicable for location
dependant interception).
observed IMSI
observed IMEI
Location Information Update REPORT Record shall be sent in the following cases:
-
when the intercept subject's mobile station moves to the new SGSN;
optionally when the intercept subject's mobile station leaves the old SGSN;
3GPP
Release 12
50
MOC
Description/Conditions
C
M
M
M
O
Shall be provided.
Shall be provided.
Provide to identify the originating and destination address of the
SMS message
Provide, when authorized, to identify location information for the
intercept subject's MS.
Provide, when authorized, to deliver SMS content, including header
which is sent with the SMS-service.
Provide to identify the address of the relevant SMS-C server. If SMS
content is provided, this parameter is optional.
Indicates whether the SMS is MO, MT, or Undefined.
SMS
SMS initiator
MOC
C
Description/Conditions
Provide at least one and others when available.
C
M
M
M
C
C
C
Table 6.9: Start Of Interception with mobile station attached REPORT Record
Parameter
observed MSISDN
observed IMSI
observed IMEI
event type
event date
event time
network identifier
lawful intercept identifier
location information
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's MS.
Start Of Interception with mobile station attached REPORT Record shall be sent in the following case:
-
the interception is activated any time after intercept subject's mobile station has successfully performed GPRS
attach procedure.
6.5.1.2
The BEGIN record is used to convey the first event of packet-data communication interception.
The BEGIN record shall be triggered when:
-
3GPP
Release 12
51
the interception of a subject's communications is started and at least one PDP context is active. If more than one
PDP context is active, a BEGIN record shall be generated for each PDP context that is active;
during the inter-SGSN RAU, when the target has at least one PDP context active and the PLNM has changed;
the target entered an interception area and has at least one PDP context active.
Table 6.10: PDP Context Activation (successful) BEGIN Record
Parameter
observed MSISDN
observed IMSI
observed IMEI
observed PDP address
MOC
Description/Conditions
iP assignment
event type
event date
event time
access point name
C
M
PDP type
initiator
network identifier
correlation number
M
C
M
C
umts QOS
NSAPI
C
O
3GPP
Release 12
52
Table 6.11: Start Of Interception (with PDP Context Active) BEGIN Record
Parameter
observed MSISDN
observed IMSI
observed IMEI
observed PDP address
MOC
C
event type
event date
event time
access point name
C
M
PDP type
initiator
network identifier
correlation number
M
C
umts QOS
NSAPI
C
O
6.5.1.3
Description/Conditions
The CONTINUE record is used to convey events during an active packet-data communication PDP Context.
The CONTINUE record shall be triggered when:
-
during the inter-SGSN RAU, when target has got at least one PDP context active, the PLMN does not change
and the triggering event information is available at the DF/MF.
In order to enable the LEMF to correlate the information on HI3, a new correlation number shall not be generated
within a CONTINUE record.
3GPP
Release 12
53
MOC
Description/Conditions
event type
event date
event time
access point name
C
M
PDP type
initiator
network identifier
correlation number
M
C
M
C
umts QOS
NSAPI
C
O
3GPP
Release 12
54
Table 6.13: Start Of Interception (with PDP Context Active) CONTINUE Record (optional)
Parameter
observed MSISDN
observed IMSI
observed IMEI
observed PDP address
MOC
C
event type
event date
event time
access point name
C
M
PDP type
network identifier
correlation number
M
C
M
C
umts QOS
NSAPI
C
O
6.5.1.4
Description/Conditions
The END record is used to convey the last event of packet-data communication.
The END record shall be triggered when:
-
3GPP
Release 12
55
MOC
Description/Conditions
event type
event date
event time
access point name
C
M
PDP type
initiator
network identifier
correlation number
M
C
M
C
C
O
Multi-media domain
This clause deals with IRI reporting in the IMS. IRI reporting in multi-media domain specified in this clause does not
depend on the IP-Connectivity Access Network IP-CAN TS 23.228 [40] used to transport the CC. When the IP-CAN is
the UMTS PS domain, annexes C and G apply for CC interception at the SGSN/GGSN.
3GPP
Release 12
56
According to TS 33.107 [19], interception shall be supported in S-CSCF and optionally P-CSCF where the S-CSCF and
the P-CSCF are in the same network. For roaming scenarios where the P-CSCF is in the Visited Network, interception
at the P-CSCF is mandatory. For the identification of the intercepted traffic only the SIP-URL and TEL-URL are
available. In the intercepting nodes (CSCF's) the relevant SIP-Messages are duplicated and forwarded to the MF HI2.
For clarification see following Figure 7.1. If P-CSCF and S-CSCF are in the same network and LI is provided at both PCSCF and S-CSCF, the events are sent twice to the LEMF.
GGSN
P-CSCF
S-CSCF
IRI
CC
DF3
DF2
MF HI3
MF HI2
HI 2
HI3
LEMF
7.1 Identifiers
Specific identifiers are necessary to identify a target for interception uniquely and to correlate between the data, which
is conveyed over the different handover interfaces (HI2 and HI3). The identifiers are defined in the subsections below.
For the delivery of CC and IRI the SGSN, GGSN and CSCF's provide correlation numbers and target identities to the
HI2 and HI3. The correlation number provided in the PS domain (SGSN, GGSN) is unique per PDP context and is used
to correlate CC with IRI and the different IRI's of one PDP context.
Interception is performed on an IMS identifier(s) associated with the intercept subject including identifiers such as
SIP-URL and Tel-URL, ETSI EN 300 356 [30].
3GPP
Release 12
57
The authorized operator (NO/AN/SP) shall either enter, based on an agreement with each LEA, a unique LIID for each
target identity of the interception subject or a single LIID for multiple target identities all pertaining to the same
interception subject.
Note that, in order to simplify the use of the LIID at LEMF for the purpose of correlating IMS signalling with GSN CC,
the use of a single LIID in association with potentially numerous IMS identities (SIP and TEL URIs) is recommended.
If more than one LEA intercepts the same target identity, there shall be unique LIIDs assigned relating to each LEA.
In case the LIID of a given target has different values in the GSN and in the CSCF, it is up to the LEMF to recover the
association between the two LIIDs.
As an example, in the UMTS system, the Correlation Number may be the combination of GGSN address and charging
ID.
NOTE 1: It is an implementation matter how CSCF generates Correlation number value. However, in this release
CSCF should use gPRSCorrelationNumber ASN.1 parameter as a container.
If two PDP contexts are used for the communication (one for signalling and one for bearer) also two correlation
numbers may be delivered via the CSCFs.
Different identifiers may be used for correlating target's various SIP messages such as:
-
LIID;
NOTE 2: The implementation dependent number may be e.g. a 'Call-id'. However, when CSCF acts as a back-toback user agent CSCF can have different 'Call-id' values for different legs of signalling. Therefore some
other number would be needed in such a case.
NOTE 3: The LIID may be used to associate SIP messages with respective GSN IRI records. In case the target has
a single SIP session active, the LIID is sufficient to correlate IMS IRI records with GSN IRI records. In
case the target has multiple SIP sessions active, a combination of the LIID and an implementation
dependent number may be used to correlate the IMS IRI records with the GSN IRI records.
In case the LIID of a given target has different values in the GSN and in the CSCF, it is up to the LEMF to recover the
association between the two LIIDs.
SIP correlation number is used to correlate events of one specific SIP session.
3GPP
Release 12
58
Each IRI data record shall be sent by the delivery function to the LEMF over the HI2 within seconds of the
detection of the triggering event by the IAP at least 95% of the time.
Each IRI data record shall contain a time-stamp, based on the intercepting nodes clock that is generated
following the detection of the IRI triggering event. Subject to national requirements, IMS specific IRI timestamp
should have higher precision than 1 second.
7.2.2 Quality
QoS is not applicable to SIP signalling and hence not to IMS specific IRI records.
NOTE:
The QoS class in PS domain is defined only for user plane data (CC); refer to subclause 6.2.2.
7.2.3 Reliability
The reliability associated with the result of interception should be (at least) equal to the reliability of the original SIP
signalling. Reliability from the operator (NO/AN/SP) to the LEMF is determined by what operators (NO/AN/SP) and
law enforcement agree upon.
The ability to access and monitor all simultaneous communications originated, received, or redirected by the
interception subject;
The ability for multiple LEAs (up to five) to monitor, simultaneously, the same interception subject while
maintaining unobtrusiveness, including between agencies;
The ability of the network to simultaneously support a number of separate (i.e. multiple interception subjects)
legally authorized interceptions within its service area(s), including different levels of authorization for each
interception, including between agencies (i.e. IRI only, or IRI and communication content when SIP message
also contains content).
3GPP
Release 12
59
A set of information is used to generate the record. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in the CSCF or DF2 MF, if new IEs are available and if this is
necessary in a specific country. The following table gives the mapping between information received per event and
information sent in records.
Once IRI only interception is underway, LEMF receives IMS specific IRI only (SIP IRI) from CSCF. LEMF does not
receive CC, and therefore it is not possible to correlate IMS specific IRI with CC.
Once IRI and CC interception is underway, LEMF receives IMS specific IRI both from a GSN and from a CSCF.
LEMF receives SIP messages also from a GSN within CC.
In certain cases, however, SIP messages may be encrypted between UE and CSCF. In these cases LEMF needs to
receive unencrypted SIP messages in IMS specific IRI provided from CSCF.
In some cases the CC is encrypted according to one of the IMS media security solutions specified in 3GPP TS 33.328
[54]. In these cases the LEMF receives encrypted CC and decrypts it based on the decryption information received over
the HI2 interface.
NOTE 1: Delivery of decrypted CC in the above scenario is FFS.
NOTE 1a: GSN has no possibility to decrypt SIP messages based on the IMS security architecture.
NOTE 2: Security mechanisms for protecting delivery of key material over the HI2 in line with 3GPP TS 33.328
[54] are FFS.
3GPP
Release 12
60
Table 7.2: Mapping between IMS Events Information and IRI Information
Parameter
Observed SIP URI
Observed TEL URL
Event type
Event date
Event time
Network identifier
Correlation number
Correlation
Description
Observed SIP URI
Observed TEL URL
IMS Event
It indicates whether the IRI contains an unfiltered SIP
message, a filtered SIP message or the media
decryption keys.
Date of the event generation in the CSCF
Time of the event generation in the CSCF
Unique number of the intercepting CSCF
Unique number for each PDP context delivered to the
LEMF, to help the LEA, to have a correlation between
each PDP Context and the IRI. Parameter of Rel. 5 and
on
Correlation number; unique number for each PDP
context delivered to the LEMF, to help the LEA, to have
a correlation between each PDP Context and the IRI.
ASN.1 as: iri-to-CC
timeStamp
networkIdentifier
gPRSCorrelationNumber
correlation
Lawful interception
identifier
SIP message
Media-decryptionInfo
sIPMessage
mediaDecryption-info
Contain for each key the follow
triplet:
cCCSID,
cCDecKey,
cCSalt (optionally)
sipMessageHeaderOffer
SDP offer
SDP offer used for the establishment of the IMS session sdpOffer
(NOTE 4).
SDP answer used for the establishment of the IMS
sdpAnswer
session (NOTE 4).
SDP answer
sipMessageHeaderAnswer
NOTE 1: LIID parameter must be present in each record sent to the LEMF.
NOTE 2: Details for the parameter SIP message. If the warrant requires only signaling information, specific content
in the parameter 'SIP message' like IMS (Immediate Messaging) has to be deleted/filtered. It should be
noted that SDP content within SIP messages is reported even for warrants requiring only IRI.
3GPP
Release 12
61
NOTE 3: In case of IMS event reporting, the gPRSCorrelationNumber HI2 ASN.1 parameter, which is also used in
the IRIs coming from PS nodes, is used as container.
NOTE 4: This parameter is applicable only in case of start of interception for an already established IMS session.
conditional (C)
- required in situations where a condition is met (the condition is given in the Description), or
optional (O)
The information to be carried by each parameter is identified. Both optional and conditional parameters are considered
to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion takes precedence over Stage 3
syntax.
Table 7.3: SIP-Message REPORT Record
Parameter
observed SIP-URI
observed TEL-URL
event type
event date
event time
network identifier
lawful intercept identifier
correlation number
Correlation
SIP message
MOC
C
C
M
M
M
M
O
O
M
Description/Conditions
SIP URI of the interception target (if available).
TEL URL of the interception target (if available).
Provide IMS event type.
Provide the date and time the event is detected.
Shall be provided.
Shall be provided.
If available and not included in the SIP-message.
If applicable for this communication
The relevant SIP message or SIP message header.
If transfer of ticket related information, as specified in 3GPP TS 33.328 [54], is detected by the MF/DF via an
intercepted SIP messages analysis during an IMS session, the DF/MF, after extracting and collecting the exchanged
tickets and getting the corresponding decryption keys info from the KMS, as specified in 3GPP TS 33.107 [19], shall
send a Media Decryption key available IRI REPORT to the LEMF containg the information needed to decrypted the
media:
3GPP
Release 12
62
MOC
C
C
M
M
M
M
C
C
mediaDecryption-info.
CCKeyInfo.cCDecKey
mediaDecryption-info.
CCKeyInfo.cCSalt
Description/Conditions
SIP URI of the interception target (if available).
TEL URL of the interception target (if available).
Decryption Keys Available
Provide the date and time the event is detected.
Shall be provided.
Shall be provided.
Provided if available
Provided if available
Uniquely map the session key to the SRTP streams to
decrypt.
There could be several SRTP streams (audio, video, etc.)
with different decryption keys and salt for a media session.
The field reports the value from the CS_ID field in the ticket
exchange headers as defined in RFC draft-mattssonmikey-ticket.
Present if available.
If Start of interception for an already established IMS session event is detected by the MF/DF, the DF/MF shall send a
Start of Interception for already established IMS Session IRI REPORT to the LEMF containing the parameters listed in
table 7.5:
Table 7.5: Start of interception for already established IMS session REPORT Record
Parameter
observed SIP-URI
observed TEL-URL
event type
event date
event time
Network identifier
lawful intercept identifier
correlation number
Correlation
Sip message header offer
Sip message header answer
SDP offer
SDP answer
MOC
C
C
M
M
M
M
C
C
C
C
C
C
Description/Conditions
SIP URI of the interception target (if available).
TEL URL of the interception target (if available).
Start of interception for already established IMS session
Provide the date and time the event is detected.
Shall be provided.
Shall be provided.
Provided if available
Provided if available
Provided if available
Provided if available
Provided if available
Provided if available
3GPP
Release 12
63
8.1 Identifiers
8.1.1 Overview
Specific identifiers are necessary to identify a target for interception uniquely and to correlate between the data, which
is conveyed over the different handover interfaces (HI2 and HI3). The identifiers are defined in the subsections below.
For the delivery of CC and IRI the PDG or AAA server provide correlation numbers and target identities to the HI2 and
HI3. The correlation number is unique per I-WLAN tunnel and is used to correlate CC with IRI and the different IRI's
of one I-WLAN tunnel.
correlate different IRI records within one I-WLAN tunnel (for both PDG and AAA server).
NOTE:
The Correlation Number is at a minimum unique for each concurrent communication (e.g. I-WLAN
tunnel) in a specific node (e.g., AAA server or PDG) of an intercept subject within a lawful authorization.
3GPP
Release 12
64
Each IRI data record shall be sent by the delivery function to the LEMF over the HI2 within seconds of the
detection of the triggering event by the IAP at least 95% of the time.
Each IRI data record shall contain a time-stamp, based on the intercepting node's clock that is generated
following the detection of the IRI triggering event.
8.2.2 Quality
The quality of service associated with the result of interception should be (at least) equal to the quality of service of the
original content of communication. This may be derived from the QoS class used for the original intercepted session,
TS 23.107 [20]. However, when TCP is used as an OSI layer 4 protocol across the HI3, real time delivery of the result
of the interception cannot be guaranteed. The QoS used from the operator (NO/AN/SP) to the LEMF is determined by
what operators (NO/AN/SP) and law enforcement agree upon.
8.2.3 Reliability
The reliability associated with the result of interception should be (at least) equal to the reliability of the original content
of communication. This may be derived from the QoS class used for the original intercepted session, TS 23.107 [20].
Reliability from the operator (NO/AN/SP) to the LEMF is determined by what operators (NO/AN/SP) and law
enforcement agree upon.
The ability to access and monitor all simultaneous communications originated, received, or redirected by the
interception subject;
The ability for multiple LEAs (up to five) to monitor, simultaneously, the same interception subject while
maintaining unobtrusiveness, including between agencies;
The ability of the network to simultaneously support a number of separate (i.e. multiple interception subjects)
legally authorized interceptions within its service area(s), including different levels of authorization for each
interception, including between agencies (i.e. IRI only, or IRI and communication content).
3GPP
Release 12
65
A set of information is used to generate the records. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in the ICE or DF2 MF, if this is necessary in a specific country. The
following table gives the mapping between information received per event and information sent in records.
For the event Start of intercept with I-WLAN Communication Active reported from a AAA server, this event is
reported using a:
REPORT record to provide an indication that I-WLAN Access Initiation event has already occurred, but
there are no tunnels established yet.
BEGIN record to provide an indication that one or more I-WLAN Tunnels are already established.
3GPP
Release 12
66
event date
event time
WLAN access point
name
initiator
correlation number
lawful interception
identifier
WLAN UE Local IP
address
WLAN UE MAC
address
WLAN Remote IP
address
network identifier
WLAN Operator
name
WLAN Location
Name
WLAN Location
Information
NAS IP/IPv6 address
description
Target Identifier with the MSISDN of the target
subscriber (monitored subscriber).
Target Identifier with the IMSI of the target subscriber
(monitored subscriber).
Target Identifier with the NAI of the target subscriber
(monitored subscriber).
Description which type of event is delivered: I-WLAN
Access Initiation, I-WLAN Access Termination, I-WLAN
Tunnel Establishment, I-WLAN Tunnel Disconnect, Start
of Intercept with I-WLAN Communication Active, etc.
Date of the event generation in the PDG or AAA server.
Time of the event generation in the PDG or AAA server.
The WLAN Access Point Name contains a logical name
of the access point (see 3GPP TS 23.060 [---TBD---])
This field indicates whether the event being reported is
the result of an MS directed action or network initiated
action when either one can initiate the action.
Unique number for each I-WLAN tunnel delivered to the
LEMF, to help the LEA, to have a correlation between
each I-WLAN tunnel and the IRI.
Unique number for each lawful authorization.
partyInformation
(services-data-information)
i-WLANInformation
(wLANMACAddress)
partyInformation
(services-data-information)
visited PLMN ID
3GPP
partyInformation (partyIdentity)
partyInformation (partyIdentity)
i-WLANevent
timestamp
partyInformation
(services-Data-Information)
initiator
correlationNumber
lawfulInterceptionIdentifier
networkIdentifier
i-WLANInformation
(wLANOperatorName)
i-WLANInformation
(wLANLocationName)
i-WLANInformation
(wLANLocationInformation)
i-WLANInformation
(nasIPIPv6Address)
visitedPLMNID
i-WLANInformation
(sessionAliveTimer)
i-WLANOperationErrorCode
i-WLANOperationErrorCode
i-WLANOperationErrorCode
i-WLANOperationErrorCode
nSAPI
Release 12
NOTE:
67
Overview
This clause describes the information sent from the Delivery Function (DF) to the Law Enforcement Monitoring
Facility (LEMF) to support Lawful Interception (LI). The information is described as records and information carried
by a record. This focus is on describing the information being transferred to the LEMF.
The IRI events and data are encoded into records as defined in the Table 8.1 Mapping between I-WLAN Events and
HI2 records type and Annex B.7 Intercept related information (HI2). IRI is described in terms of a 'causing event' and
information associated with that event. Within each IRI record there is a set of events and associated information
elements to support the particular service.
The communication events described in Table 8.1: Mapping between I-WLAN Events and HI2 record type and
Table 8.2: Mapping between Events information and IRI information convey the basic information for reporting the
disposition of a communication. This clause describes those events and supporting information.
Each record described in this clause consists of a set of parameters. Each parameter is either:
mandatory (M)
conditional (C)
- required in situations where a condition is met (the condition is given in the Description), or
optional (O)
The information to be carried by each parameter is identified. Both optional and conditional parameters are considered
to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion takes precedence over Stage 3
syntax.
8.5.1.2
The REPORT record is used to report non-communication related subscriber actions (events) and for reporting
unsuccessful packet-mode communication attempts.
The REPORT record shall be triggered when:
-
the intercept subject's WLAN UE performs a (successful or unsuccessful) I-WLAN access initiation procedure
(triggered by AAA server);
the intercept subjects WLAN UE performs a (successful or unsuccessful) re-authentication (triggered by AAA
server);
the intercept subject's WLAN UE performs a I-WLAN access termination detach procedure (triggered by AAA
server);
the intercept subject's WLAN UE is unsuccessful at performing a I-WLAN tunnel establishment procedure
(triggered by AAA server or PDG);
the interception of a subject's communications is started and the WLAN UE has already successfully performed
a I-WLAN access initiation procedure (triggered by AAA server), but there are no tunnels established.
3GPP
Release 12
68
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when available, to identify the WLAN operator serving the
intercept subject.
Provide, when available, to identify the name of the WLAN location
serving the intercept subject.
Provide, when available, to identify the location information of the
WLAN serving the intercept subject.
Provide, when available, to identify the address of the NAS serving the
intercept subject.
Provide, when available, to identify the MAC address of the intercept
subject in the WLAN serving the intercept subject.
Provide, when available, to identiy the visited PLMN that will either
terminate or tunnel the subject's communications to the Home PLMN.
Provide, when available, to identify the expected maximum duration of
the I-WLAN Access being initiated.
Provide information about the reason for failed access initiation
attempts of the target subscriber.
visited PLMN ID
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when available, to identify the WLAN operator serving the
intercept subject.
Provide, when available, to identify the name of the WLAN location
serving the intercept subject.
Provide, when authorized, to identify the location information of the
WLAN serving the intercept subject.
Provide, when available, to identify the address of the NAS serving the
intercept subject.
Provide, when available, to identify the MAC address of the intercept
subject in the WLAN serving the intercept subject.
Provide information about the reason for termination of I-WLAN access
of the target subscriber.
3GPP
Release 12
69
MOC
Description/Conditions
C
M
network identifier
lawful intercept identifier
WLAN UE Local IP address
M
M
C
Table 8.6: I-WLAN Tunnel Establishment (unsuccessful) REPORT Record AAA Server
Parameter
observed MSISDN
observed IMSI
observed NAI
event type
event date
event time
WLAN access point name
network identifier
lawful intercept identifier
failed I-WLAN tunnel
establishment reason
visited PLMN ID
MOC
Description/Conditions
C
M
M
M
C
C
3GPP
Release 12
70
Table 8.7: Start of Intercept With I-WLAN Communication Active REPORT Record AAA Server
Parameter
observed MSISDN
observed IMSI
observed NAI
event type
MOC
C
event date
event time
network identifier
lawful intercept identifier
WLAN Operator Name
visited PLMN ID
8.5.1.3
Description/Conditions
M
M
C
Shall be provided.
Shall be provided.
Provide, when available, to identify the WLAN operator serving the
intercept subject.
Provide, when available, to identify the name of the WLAN location
serving the intercept subject.
Provide, when available, to identify the location information of the
WLAN serving the intercept subject.
Provide, when available, to identify the address of the NAS serving the
intercept subject.
Provide, when available, to identify the MAC address of the intercept
subject in the WLAN serving the intercept subject.
Provide, when available, to identiy the visited PLMN that will either
terminate or tunnel the subject's communications to the Home PLMN.
Provide, when available, to identify the expected maximum duration of
the I-WLAN Access being initiated.
The BEGIN record is used to convey the first event of I-WLAN interworking communication interception.
The BEGIN record shall be triggered when:
-
the interception of a subject's communications is started and at least one I-WLAN tunnel is established. If more
than one I-WLAN tunnel is established, a BEGIN record shall be generated for each I-WLAN tunnel that is
established (triggered by AAA server or PDG).
Table 8.8: I-WLAN Tunnel Establishment (successful) BEGIN Record - PDG
Parameter
observed MSISDN
observed IMSI
observed NAI
event type
event date
event time
WLAN access point name
MOC
Description/Conditions
C
M
network identifier
WLAN local IP address
M
M
correlation number
M
O
3GPP
Release 12
71
Table 8.9: I-WLAN Tunnel Establishment (successful) BEGIN Record AAA Server
Parameter
observed MSISDN
observed IMSI
observed NAI
event type
event date
event time
WLAN access point name
network identifier
correlation number
lawful intercept identifier
visited PLMN ID
MOC
Description/Conditions
C
M
M
C
M
C
Table 8.10: Start Of Interception (with I-WLAN Tunnel Established) BEGIN Record - PDG
Parameter
observed MSISDN
observed IMSI
observed IMEI
event type
MOC
C
C
event date
event time
WLAN access point name
network identifier
WLAN local IP address
M
M
correlation number
M
O
Description/Conditions
Provide at least one and others when available.
Provide Start Of Interception With I-WLAN Communication Active
event type.
Provide the date and time the event is detected.
Provide to identify the packet data network to which the intercept
subject requested to be connected when the intercept subject's WLAN
UE is successful at performing a I-WLAN tunnel establishment
procedure.
Shall be provided.
Provide to identify the IP address associated with the intercept subject
in the WLAN.
Provide to identify the IP address associated with the intercept subject
in the network being accessed by the intercept subject for the I-WLAN
tunnel.
Provide to allow correlation of CC and IRI and the correlation of IRI
records.
Shall be provided.
Provided for additional information.
3GPP
Release 12
72
Table 8.11: Start Of Interception (with I-WLAN Tunnel Established) BEGIN Record AAA Server
Parameter
observed MSISDN
observed IMSI
observed IMEI
event type
MOC
C
C
event date
event time
WLAN access point name
network identifier
correlation number
lawful intercept identifier
visited PLMN ID
WLAN Operator Name
M
C
M
C
C
8.5.1.4
Description/Conditions
Provide at least one and others when available.
Provide Start Of Interception With I-WLAN Communication Active
event type.
Provide the date and time the event is detected.
Provide to identify the packet data network to which the intercept
subject requested to be connected when the intercept subject's WLAN
UE is successful at performing a I-WLAN tunnel establishment
procedure.
Shall be provided.
Provide to allow correlation of IRI records.
Shall be provided.
Provide to identify the visited PLMN, if available.
Provide, when available (at the time of event generation), to identify
the WLAN operator serving the intercept subject.
Provide, when available (at the time of event generation), to identify
the name of the WLAN location serving the intercept subject.
Provide, when available (at the time of event generation), to identify
the location information of the WLAN serving the intercept subject.
Provide, when available (at the time of event generation), to identify
the address of the NAS serving the intercept subject.
Provide, when available (at the time of event generation), to identify
the MAC address of the intercept subject in the WLAN serving the
intercept subject.
Provide, when available (at the time of event generation), to identify
the expected maximum duration of the I-WLAN Access being initiated.
The END record is used to convey the last event of packet-data communication.
The END record shall be triggered when:
-
I-WLAN tunnel disconnect occurs (triggered by the AAA server or the PDG).
Table 8.12: I-WLAN Tunnel Disconnect END Record - PDG
Parameter
observed MSISDN
observed IMSI
observed NAI
event type
event date
event time
WLAN access point name
MOC
Description/Conditions
C
M
initiator
network identifier
WLAN local IP address
M
M
correlation number
M
O
3GPP
Release 12
73
MOC
Description/Conditions
C
M
initiator
network identifier
correlation number
lawful intercept identifier
M
C
M
3GPP
Release 12
74
9.1 Identifiers
9.1.1 Overview
Specific identifiers are necessary to identify a target for interception uniquely and to correlate between the data, which
is conveyed over the different handover interface (HI2). The identifiers are defined in the subsections below.
The MBMS LI solution in this section provides an IRI solution for MBMS only. CC interception is provided by
transport bearer level interception functionality e.g. GSNs. The Correlation Number is unique per subject MBMS
service and MBMS session and is used to correlate different IRI records within one MBMS service and MBMS session.
Correlate different IRI records within one MBMS service and MBMS session.
3GPP
Release 12
75
NOTE: Correlation only applies to MBMS service usage. Correlation of subscription management events is not
required and the ASN.1 subscription event records in Annex B.8 do not provide support for correlation numbers.
Such Subscription management report record events are asynchronous, can occur at any time and are likely to occur
infrequently.
Each IRI data record shall be sent by the delivery function to the LEMF over the HI2 within seconds of the
detection of the triggering event by the IAP at least 95% of the time.
Each IRI data record shall contain a time-stamp, based on the intercepting node's clock that is generated
following the detection of the IRI triggering event.
9.2.2 Quality
The quality of service associated with the result of interception should be (at least) equal to the quality of service of the
original MBMS service.
9.2.3 Reliability
The reliability associated with the result of interception should be (at least) equal to the reliability of the original content
of communication. This may be derived from the QoS class used for the original intercepted session, TS 23.107 [20].
Reliability from the operator (NO/AN/SP) to the LEMF is determined by what operators (NO/AN/SP) and law
enforcement agree upon.
The ability to access and monitor all simultaneous communications originated, received, or redirected by the
interception subject;
The ability for multiple LEAs (up to five) to monitor, simultaneously, the same interception subject while
maintaining unobtrusiveness, including between agencies;
The ability of the network to simultaneously support a number of separate (i.e. multiple interception subjects)
legally authorized interceptions within its service area(s), including different levels of authorization for each
interception, including between agencies (i.e. IRI only, or IRI and communication content).
3GPP
Release 12
76
A set of information is used to generate the records. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in the ICE or DF2 MF, if this is necessary in a specific country. The
following table gives the mapping between information received per event and information sent in records.
NOTE: Support for MBMS over IMS is For Further Study. As a minimum, IMPU and IMPI reporting support will
be required.
3GPP
Release 12
77
event date
event time
BM-SC Identifier
initiator
correlation number
lawful interception
identifier
MBMS Subscribed
Service
MBMS Service
Joining Time
MBMS Service
Subscription List
Visited PLMN ID
APN
Multicast/Broadcast
Mode
IP IP/IPv6 multicast
address(multicast
mode only)
List of Downstream
Nodes
MBMS Service
Leaving Reason
MBMS Service
Subscription
Terminated Reason
NOTE:
Description
Target Identifier with the IMSI of the target subscriber
(monitored subscriber).
Description which type of event is delivered MBMS
Service Joining, MBMS Service Leaving, MBMS
Subscription Activation, MBMS Subscription
Modification, MBMS Subscription Termination, Start of
intercept with MBMS Service Active etc.
Date of the event generation in the BM-SC server.
Time of the event generation in the BM-SC server.
Name or Identifier of BM-SC
Timestamp
Timestamp
mbmsInformation
(mbmsBmscName)
Initiator
3GPP
mbmsInformation
(mbmsNodeList)
mbmsInformation
(mbmsLeavingReason)
mbmsInformation
(mbmsSubsTermReason)
Release 12
78
Overview
This clause describes the information sent from the Delivery Function (DF) to the Law Enforcement Monitoring
Facility (LEMF) to support Lawful Interception (LI). The information is described as records and information carried
by a record. This focus is on describing the information being transferred to the LEMF.
The IRI events and data are encoded into records as defined in the Table 9.1 Mapping between MBMS Events and HI2
records type and Annex B.8 Intercept related information (HI2). IRI is described in terms of a 'causing event' and
information associated with that event. Within each IRI record there is a set of events and associated information
elements to support the particular service.
The communication events described in Table 9.1: Mapping between MBMS Events and HI2 record type and
Table 9.2: Mapping between Events information and IRI information convey the basic information for reporting the
disposition of a communication. This clause describes those events and supporting information.
Each record described in this clause consists of a set of parameters. Each parameter is either:
mandatory (M)
conditional (C)
- required in situations where a condition is met (the condition is given in the Description), or
optional (O)
The information to be carried by each parameter is identified. Both optional and conditional parameters are considered
to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion takes precedence over Stage 3
syntax.
9.5.1.2
The REPORT record is used to report non-communication related subscriber actions (events) and for reporting
unsuccessful packet-mode communication attempts.
The REPORT record shall be triggered when:
-
the intercept subject's MBMS UE or interception subject via an off-line means (eg via internet or customer
service centre) performs MBMS Subscription Activation. See Table 9.3
the intercept subject's MBMS UE or interception subject via an off-line means (eg via internet or customer
service centre) performs MBMS Subscription Modification. See Table 9.4
the intercept subject's MBMS UE or interception subject via an off-line means (eg via internet or customer
service centre) performs MBMS Subscription Termination. See Table 9.5
Table 9.3 MBMS Subscription Activation REPORT Record
Parameter
Observed IMSI
Event Type
Event Time
Event Date
Lawful Interception Identifier
MBMS Subscribed Service
Network Element Identifier
Initiator
IP/IPv6 Address
MOC
M
M
M
M
M
M
M
M
C
Visited PLMN ID
Description/Conditions
Shall be provided.
Provide MBMS Service Joining event type
Provide the time the event is detected.
Provide the date the event is detected.
Shall be provided
Shall be provided.
Shall be provided.
Shall be provided.
Provide IP or IPv6 address of the subscriber if available where target
subscriber has directly accessed the BM-SC Server to Activate their
subscription and not via offline method (eg customer services).
Provide PLMN ID of a visited network used by the target subscriber in
the case of non Home network access to BM-SC server.
Provided for additional information
3GPP
Release 12
79
MOC
M
M
M
M
M
M
M
M
C
Visited PLMN ID
Description/Conditions
Shall be provided.
Provide MBMS Service Joining event type
Provide the time the event is detected.
Provide the date the event is detected.
Shall be provided
Shall be provided.
Shall be provided.
Shall be provided.
Provide IP or IPv6 address of the subscriber if available where target
subscriber has directly accessed the BM-SC Server to Activate their
subscription and not via offline method (eg customer services).
Provide PLMN ID of a visited network used by the target subscriber in
the case of non Home network access to BM-SC server.
Provided for additional information
9.5.1.3
MOC
M
M
M
M
M
M
M
M
C
Description/Conditions
Shall be provided.
Provide MBMS Service Joining event type
Provide the time the event is detected.
Provide the date the event is detected.
Shall be provided
Shall be provided.
Shall be provided.
Shall be provided.
Provide IP or IPv6 address of the subscriber if available where target
subscriber has directly accessed the BM-SC Server to Activate their
subscription and not via offline method (eg customer services).
Provide PLMN ID of a visited network used by the target subscriber in
the case of non Home network access to BM-SC server.
Provided for additional information
Shall be provided.
The BEGIN record is used to convey the first event of MBMS service interception.
The BEGIN record shall be triggered when:
-
the intercept subject's MBMS UE successfully joins an MBMS service (MBMS Service Joining). See Table 9.6
interception is activated for the intercept subject but the MBMS UE has successfully joined an MBMS service
prior to the start of interception (Start of intercept with MBMS Service Active). See Table 9.7
3GPP
Release 12
80
MOC
M
M
M
M
M
M
M
M
M
M
C
Visited PLMN ID
Multicast/Broadcast Mode
APN
List of Downstream Nodes
MBMS Service Subscription
List
M
C
C
O
Description/Conditions
Shall be provided.
Provide MBMS Service Joining event type
Provide the time the event is detected.
Provide the date the event is detected.
Shall be provided.
Shall be provided
Shall be provided.
Provide time at which target subscriber joined the MBMS service, or
will join the service.
Shall be provided.
Shall be provided.
Provide IP or IPv6 address of the subscriber if available for multicast
services only.
Provide PLMN ID of a visited network used by the target subscriber in
the case of non Home network access to MBMS service.
Shall be provided.
Provide for PS domain access to MBMS.
Provide in the case of a multicast service, if available.
Provided for additional information
Table 9.7: Start of intercept with MBMS Service Active BEGIN Record
Parameter
Observed IMSI
Event Type
Event Time
Event Date
Correlation Number
Lawful Interception Identifier
MBMS Subscribed Service
MBMS Service Joining Time
Network Element Identifier
Initiator
IP/IPv6 Multicast Address
MOC
M
M
M
M
M
M
M
M
M
M
C
Visited PLMN ID
Multicast/Broadcast Mode
APN
List of Downstream Nodes
MBMS Service Subscription
List
M
C
C
O
9.5.1.4
Description/Conditions
Shall be provided.
Provide MBMS Service Joining event type
Provide the time the event is detected.
Provide the date the event is detected.
Shall be provided.
Shall be provided
Shall be provided.
Provide time at which target subscriber joined the MBMS service.
Shall be provided.
Shall be provided.
Provide IP or IPv6 address of the subscriber if available for multicast
services only.
Provide PLMN ID of a visited network used by the target subscriber in
the case of non Home network access to MBMS service.
Shall be provided.
Provide for PS domain access to MBMS.
Provide in the case of a multicast service, if available.
Provided for additional information
The END record is used to convey the last event of packet-data communication.
The END record shall be triggered when:
-
the intercept subject's MBMS UE successfully leaves an MBMS service or the MBMS service is terminated by
the BM_SC (MBMS Service Leaving). See Table 9.8
3GPP
Release 12
81
MOC
M
M
M
M
M
M
M
M
M
C
C
Description/Conditions
Shall be provided.
Provide MBMS Service Joining event type
Provide the time the event is detected.
Provide the date the event is detected.
Shall be provided.
Shall be provided
Shall be provided.
Shall be provided.
Shall be provided.
Shall be provided.
Provide PLMN ID of a visited network used by the target subscriber in
the case of non Home network access to MBMS service.
Provided for additional information
Shall be provided.
3GPP
Release 12
10
82
This chapter specifies requirements for the handover interface in the Evolved Packet System ([42], [44], [45]).
In case the SGSN is used in the EPS and interworks with a S-GW by using S4/S12 interfaces, the SGSN and the HSS
are subjected to the requirements applicable to these nodes for PS interception, as specified throughout this document.
In case of untrusted non-3GPP IP access, the e-PDG and AAA server are subjected to all the requirements specified in
this document for PDG and AAA server for the case of I-WLAN interworking.
When a PDN-GW provides a Gn/Gp interface for interworking with a SGSN, from LI perspective the PDN-GW acts as
a GGSN towards the involved SGSN. In this case, in addition to the requirements specified in this chapter, all the
requirements specified in this document for PS interception applicable the GGSN are applicable also to the PDN-GW.
PDP contexts/EPS bearer modification signalling detected by the PDN-GW during a handover between different
accesses involving a Gn/Gp interface (i.e. from E-UTRAN to 2G/3G and vice versa) is reported inside the IRI BEGINEND transaction. The same correlation number shall be used before and after the handover during the same IRI
transaction. After the handover, the events sent by the PDN-GW shall be mapped into IRIs according to the
requirements for the new access.
10.1 Identifiers
Specific identifiers are necessary to identify a target for interception uniquely and to correlate between the data, which
is conveyed over the different handover interfaces (HI2 and HI3). The identifiers are defined in the subsections below.
For the delivery of CC and IRI the S-GW or PDN-GW provide correlation numbers and target identities to the HI2 and
HI3. The correlation number is unique per EPS bearer/tunnel and is used to correlate CC with IRI and the different IRI's
of one EPS bearer/tunnel.
NOTE: When different protocols (i.e. GTP and PMIP) are used in the networks, different values for the correlation
number can be generated by different nodes for the same communication.
3GPP
Release 12
83
NOTE:
The Correlation Number is at a minimum unique for each concurrent communication (e.g. EPS
bearer/tunnel) of a subject within a lawful authorization. However when different protocols (i.e. GTP and
PMIP) are used in the networks, different values for the correlation number can be generated by different
nodes for the same communication.
In case of handover between different accesses involving a Gn/Gp interface (i.e. from E-UTRAN to 2G/3G and vice
versa), the same correlation number for the PDP context/bearer shall be used before and after the handover during the
same IRI transaction.
Each IRI data record shall be sent by the delivery function to the LEMF over the HI2 within seconds of the
detection of the triggering event by the IAP at least 95% of the time.
Each IRI data record shall contain a time-stamp, based on the intercepting nodes clock that is generated
following the detection of the IRI triggering event. The timestamp precision should be at least 1 second
(ETSI TS 101 671 [24]). Defining the required precision of an IRI timestamp however is subject to national
requirements.
10.2.2 Quality
The quality of service associated with the result of interception should be (at least) equal to the quality of service of the
original content of communication. This may be derived from the QoS class used for the original intercepted session.
However, when TCP is used as an OSI layer 4 protocol across the HI3, real time delivery of the result of the
interception cannot be guaranteed. The QoS used from the operator (NO/AN/SP) to the LEMF is determined by what
operators (NO/AN/SP) and law enforcement agree upon.
10.2.3 Reliability
The reliability associated with the result of interception should be (at least) equal to the reliability of the original content
of communication. This may be derived from the QoS class used for the original intercepted session.
Reliability from the operator (NO/AN/SP) to the LEMF is determined by what operators (NO/AN/SP) and law
enforcement agree upon.
3GPP
Release 12
84
The ability to access and monitor all simultaneous communications originated, received, or redirected by the
interception subject;
The ability for multiple LEAs (up to five) to monitor, simultaneously, the same interception subject while
maintaining unobtrusiveness, including between agencies;
The ability of the network to simultaneously support a number of separate (i.e. multiple interception subjects)
legally authorized interceptions within its service area(s), including different levels of authorization for each
interception, including between agencies (i.e. IRI only, or IRI and communication content).
3GPP
Release 12
85
Table 10.5.1: Mapping between EPS Events and HI2 records type
Event
E-UTRAN attach
E-UTRAN detach
Bearer activation (successful)
Bearer modification
UE Requested bearer resource modification
Bearer activation (unsuccessful)
Start of interception with active bearer
Bearer deactivation
UE requested PDN connectivity
UE requested PDN disconnection
Tracking Area update
Serving Evolved Packet System
PMIP attach/tunnel activation (successful)
PMIP attach/tunnel activation (unsuccessful)
PMIP session modification
PMIP detach/tunnel deactivation
Start of interception with active PMIP tunnel
PMIP PDN-GW initiated PDN disconnection
MIP registration/tunnel activation (successful)
MIP registration/tunnel activation (unsuccessful)
MIP deregistration/tunnel deactivation
Start of interception with active MIP tunnel
DSMIP registration/tunnel activation (successful)
DSMIP registration/tunnel activation (unsuccessful)
DSMIP session modification
DSMIP deregistration/tunnel deactivation
Start of interception with active DSMIP tunnel
DSMIP HA Switch
PMIP Resource Allocation Deactivation
MIP Resource Allocation Deactivation
Start of interception with E-UTRAN attached UE
A set of information is used to generate the records. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in the network nodes or DF2 MF, if this is necessary in a specific
country. The following table gives the mapping between information received per event and information sent in records.
3GPP
Release 12
86
3GPP
Release 12
parameter
observed MSISDN
observed IMSI
observed ME Id
observed MN NAI
event type
event date
event time
access point name
APN-AMBR
PDN type
PDN address
allocation
Protocol
Configuration
Options
Attach type
RAT type
initiator
Handover indication
Procedure
Transaction Identifier
EPS bearer identity
Bearer activation/
deactivation type
Linked EPS bearer
identity
Switch off indicator
Detach type
Traffic Flow Template
(TFT)
Traffic Aggregate
Description (TAD)
correlation number
lawful interception
identifier
location information
Old location
information
Failure reason
failed bearer
activation reason
failed attach reason
Session modification
failure reason
EPS bearer QOS
87
description
Target Identifier with the MSISDN of the target
subscriber (monitored subscriber).
Target Identifier with the IMSI of the target subscriber
(monitored subscriber).
Target Identifier with the ME Id of the target subscriber
(monitored subscriber)
Target Identifier with the NAI of the target subscriber
Description which type of event is delivered
Date of the event generation in the node
Time of the event generation in the node
When provided by the MME, the parameter carries the
Access Point Name provided by the UE. When provided
by the S-GW/PDN-GW, it is the APN used for the PDN
connection
Contains the Aggregate Maximum Bit Rate for the APN
Indicated the used IP version (IPv4, IPv6, IPv4/IPv6)
Provides the IP version (IPv4, IPv6, IPv4/IPv6) and the
IP address(es) allocated for the UE.
Are used to transfer parameters between the UE and
the PDN-GW (e.g. address allocation preference by
DHCP)
Indicates the type of attach and may carry indication of
handover in case of mobility with non-3GPP access.
Radio Access Type
This field indicates whether the procedure is UE or
network initiated.
Provides information that the procedure is triggered as
part of a handover
Identifies a set of messages belonging to the same
procedure; the parameter is dynamically allocated by
the UE
Identifies an EPS bearer for one UE accessing via EUTRAN. It is allocated by the MME.
Indicates the type of bearer being activated/deactivated,
i.e. default or dedicated.
Indicates, in case of dedicated bearer, the EPS bearer
identity of the default bearer.
Indicates whether a detach procedure is due to a switch
off situation or not.
Parameter sent by the network to the UE to indicate the
type of detach.
Collection of all packet filters associated with the EPS
bearer.
Consists of the description of the packet filter(s) for the
traffic flow aggregate.
Unique number for each target connection delivered to
the LEMF, to help the LEA, to have a correlation
between each target connection and the IRI.
Unique number for each lawful authorization.
ePSlocationOfTheTarget
3GPP
partyInformation (party-identity)
partyInformation (party-identity)
partyInformation (party-identity)
ePSevent
Timestamp
aPN
aPN-AMBR
pDNAddressAllocation
pDNAddressAllocation
protConfigOptions
attachType
rATType
initiator
handoverIndication,
extendedHandoverIndication
procedureTransactionId
ePSBearerIdentity
bearerActivationType,
bearerDeactivationType
linkedEPSBearerId
detachType
detachType
tFT
trafficAggregateDescription
ePSCorrelationNumber
lawfulInterceptionIdentifier
ePSlocationOfTheTarget
failedTAUReason
failedBearerActivationReason
failedEUTRANAttachreason, status,
code (depending on the protocol)
status
ePSBearerqOS
Release 12
88
bearer deactivation
reason
network identifier
Failed Bearer
Modification reason
Lifetime
Access technology
type
UE address info
Additional
parameters
serving MME
address
Revocation trigger
Home Address
Home Agent Address
Requested IPv6
Home Prefix
Care of Address
HSS/AAA address
Target PDN-GW
address
Foreign domain
address
Visited network
identifier
DHCP v4 Address
Allocation Indication
Serving Network
Request type
Failed reason
NOTE:
bearerDeactivationCause
lifetime
iPv6HomeNetworkPrefix,
iPv4HomeAddress,
iPv6careOfAddress, iPv4careOf
Address
protConfigurationOption
networkIdentifier
failedBearerModReason
accessTechnologyType
servingMME-Address
revocationTrigger
homeAddress
homeAgentAddress
requestedIPv6HomePrefix
careOfAddress
visitedNetworkId
hSS-AAA-address
targetPDN-GW-Address
foreignDomainAddress
dHCPv4AddressAllocationInd
servingNetwork
requestType
uEReqPDNConnFailReason
conditional (C)
- required in situations where a condition is met (the condition is given in the Description), or
3GPP
Release 12
optional (O)
89
The information to be carried by each parameter is identified. Both optional and conditional parameters are considered
to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion takes precedence over Stage 3
syntax.
10.5.1.1
The REPORT record is used to report non-communication related subscriber actions (events) and for reporting
unsuccessful packet-mode communication attempts. In addition, this record is also used to report some subscriber
actions which may trigger communication attempts or modifications of an existing communication, when the
communication attempt or the change of the existing communication itself is reported separately.
The REPORT record shall be triggered when:
-
the intercept subjects UE is ordered by the network to perform an home agent switch;
as a national option, a mobile terminal is authorized for service with another network operator or service
provider;
the interception of a subject is started with E-UTRAN attaced target. If there are more than one PDN connections
then a REPORT record is generated per PDN connection.
3GPP
Release 12
90
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's UE.
Provide information about the reason for failed attach attempt of the
target subscriber.
Indicated the used IP version (IPv4, IPv6, IPv4/IPv6), including
possible reason for modification by the network
Provides the Access Point Name
Provides information sent from the UE to the network
PDN Type
APN
Protocol Configuration
Options
Attach type
EPS bearer identity
C
C
C
C
MOC
Description/Conditions
C
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's MS.
Provided to indicate whether the detach is UE or network initiated
Provided to indicate whether the detach is due to a switch off
Sent by the network to the UE to indicate the type of detach
C
C
C
3GPP
Release 12
91
MOC
Description/Conditions
C
C
M
Provides the PDN type and PDN address(es) used by the network.
Provide EPS Bearer Activation event type.
Provide the date and time the event is detected.
RAT type
initiator
C
C
network identifier
lawful intercept identifier
location information
M
M
C
C
Procedure transaction
identifier
Linked EPS bearer identity
Handover indication
MOC
Description/Conditions
C
M
M
M
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's UE.
Provide information about the reason for failed UE requested bearer
resource modification.
Provide to identify the QOS parameters.
Used to associate the UE requested bearer resource modification to
other messages related to the procedure.
Provides the EPS bearer id of the associated default bearer.
Provides the EPS bearer id of the bearer which the request refers to.
Description of the packet filter(s) for the traffic flow aggregate
Provide information about the protocol configuration options requested
by the UE.
C
C
C
C
C
C
C
C
3GPP
Release 12
92
MOC
Description/Conditions
event type
event date
event time
network identifier
lawful intercept identifier
location information
C
M
M
M
C
Failure reason
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's MS. This parameter, in case of inter-MME TAU, will
be sent only by the new MME.
Provide (only by the old MME), when authorized and if available, to
identify the old location information for the intercept subject's MS.
Provide, in unsuccessful case, the reason for the failure or rejection of
the TAU.
observed ME Id
In case of inter-MME TAU, Tracking Area Update REPORT Record shall be sent in the following cases:
-
MOC
Description/Conditions
C
M
Request type
PDN type
network identifier
lawful intercept identifier
location information
C
C
M
M
failed reason
Protocol configuration options
C
C
3GPP
Release 12
93
MOC
Description/Conditions
C
M
M
M
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's UE.
The identity of the default EPS bearer associated with the PDN
connection being disconnected.
C
C
MOC
Description/Conditions
C
M
M
M
C
C
C
Shall be provided.
Shall be provided.
The requested lifetime for the tunnel
Provide the radio access type
Provide information about the reason for failed attach/tunnel activation
attempt of the target subscriber.
Provide information that the procedure is triggered as part of the
handover
Provide the Access Point Name
Includes one or more addresses allocated to the UE
Provide additional parameters sent by the UE.
Provide to identify the serving network the UE is attached to in case of
E-UTRAN access and PMIP based S5/S8 interfaces.
Indicates that DHCPv4 is to be used to allocate the IPv4 address to
the UE in case of E-UTRAN access and PMIP based S5/S8 interfaces
Provide, when authorized, to identify location information for the
intercepted subjects UE.
Handover indicator
APN
UE address info
Additional parameters
Serving Network
C
C
C
C
C
C
MOC
Description/Conditions
C
M
M
M
C
C
Shall be provided.
Shall be provided.
The requested lifetime for the tunnel
Provide information about the reason for failed registration/tunnel
activation attempt of the target subscriber.
Provide the UE Home IP Address
The local IP address provided by the access network
Provide the Home Agent address
C
C
C
3GPP
Release 12
94
MOC
Description/Conditions
C
M
M
M
C
C
Shall be provided.
Shall be provided.
The requested lifetime for the tunnel.
Provide information about the reason for failed registration/tunnel
activation attempt of the target subscriber.
Provide the UE IPv6 Home Prefix.
Provide the assigned home address.
Provides the Access Point Name.
The local IP address provided by the access network.
C
C
C
C
MOC
Description/Conditions
C
M
M
M
C
M
Shall be provided.
Shall be provided.
Provide the address of the HSS/AAA triggering the procedure
Provide the address of the new PDN-GW
MOC
C
Description/Conditions
Provide at least one and others when available.
C
M
M
M
C
3GPP
Release 12
95
MOC
C
C
M
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's UE.
Provide to identify the packet data network to which the attempt to
connect was made; this information may be provided by the UE (valid
only for default bearer activation).
Provide to describe the IP version requested by the target UE.
The identity of the default EPS bearer
Shall be provided.
PDN type
EPS bearer identity
lawful intercept identifier
C
C
M
10.5.1.2
Description/Conditions
The BEGIN record is used to convey the first event of EPS communication interception.
The BEGIN record shall be triggered in the following cases:
-
the interception of a subject's communications is started and at least one EPS bearer or tunnel is active. In this
case, some of the parameters, available at EPS bearer or tunnel activation may be not available any longer at the
node. It is not required to store these parameters at the node to be used just in case of LI activation at later stage.
If more than one EPS bearer or tunnel is active, a BEGIN record shall be generated for each EPS bearer or tunnel
that is active;
during the S-GW relocation, when there is a change in the PLMN or when the information about the change in
the PLMN is not available at the DF/MF;
the target entered an interception area and has at least one EPS bearer/tunnel active (FFS).
3GPP
Release 12
96
Table 10.5.1.2.1: Bearer Activation (successful) and Start of Interception with active bearer BEGIN
Record
Parameter
observed MSISDN
observed IMSI
observed ME Id
event type
MOC
Description/Conditions
event date
event time
access point name
C
C
network identifier
lawful intercept identifier
location information
M
M
C
C
Procedure transaction
identifier
EPS bearer id
Linked EPS bearer identity
Handover indication
RAT type
Correlation number
C
C
3GPP
Release 12
97
Table 10.5.1.2.2: PMIP Attach/tunnel activation (successful) and Start of Interception with active PMIP
tunnel BEGIN Record
Parameter
observed MN NAI
observed MSISDN
Observed ME Id
observed IMSI
event type
MOC
Description/Conditions
event date
event time
lawful intercept identifier
network identifier
Lifetime
Access technology type
M
M
C
C
Shall be provided.
Shall be provided.
The lifetime for the tunnel
Provide the radio access type
Handover indicator
APN
UE address info
Correlation number
C
C
C
Serving Network
Table 10.5.1.2.3: MIP registration/tunnel activation (successful) and Start of Interception with active
MIP tunnel BEGIN Record
Parameter
observed MN NAI
observed IMSI
event type
MOC
Description/Conditions
event date
event time
lawful intercept identifier
network identifier
Lifetime
Home Address
Care of address
Home Agent Address
Correlation number
APN
M
M
C
C
C
C
C
Shall be provided.
Shall be provided.
The lifetime for the tunnel.
Provide the UE Home IP Address.
The IP address provided by the access network.
Provide the Home Agent address
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provides the Access Point Name
3GPP
Release 12
98
Table 10.5.1.2.4: DSMIP registration/tunnel activation (successful) and Start of Interception with
active DSMIP tunnel BEGIN Record
Parameter
observed MN NAI
observed IMSI
event type
event date
event time
lawful intercept identifier
network identifier
lifetime
Requested IPv6 Home Prefix
Home address
APN
Care of address
Correlation number
10.5.1.3
MOC
Description/Conditions
M
M
M
C
C
C
C
C
C
Shall be provided.
Shall be provided.
The lifetime for the tunnel
Provide the UE IPv6 Home Prefix
Provide the assigned home address
Provides the Access Point Name
The IP address provided by the access network
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
The CONTINUE record is used to convey events during an active EPS bearer/tunnel.
The CONTINUE record shall be triggered in the following cases:
-
during the S-GW relocation, when target has got at least one EPS bearer/tunnel active, the PLMN does not
change and the triggering event information is available at the DF/MF.
NOTE: This scenario does not apply to DSMIP and MIP protocol cases.
In order to enable the LEMF to correlate the information on HI3, a new correlation number shall not be generated
within a CONTINUE record.
3GPP
Release 12
99
MOC
Description/Conditions
C
M
Provide to indicate whether the EPS bearer modification is networkinitiated, intercept-subject-initiated, or not available.
Shall be provided.
Shall be provided.
Provide, when authorized, to identify location information for the
intercept subject's UE.
Provide to identify the QOS parameters.
The Aggregate Maximum Bit Rate for the APN.
Used to associate the EPS bearer modification to other messages
triggering the procedure.
Provides the EPS bearer id allocated by the network.
The TFT associated to the EPS bearer modification;
The Radio Access Type used by the target subscriber.
The Aggregate Maximum Bit Rate foreseen for the APN.
Provide information that the procedure is triggered as part of a
handover.
Provide to uniquely identify the EPS bearer delivered to the LEMF and
to correlate IRI records with CC.
Provide information about the reason for failed bearer modification
network identifier
lawful intercept identifier
location information
M
M
C
C
C
Correlation number
C
C
C
C
C
MOC
Description/Conditions
C
M
C
M
M
C
C
C
C
Procedure transaction
identifier
EPS bearer id
Linked EPS bearer identity
Handover indication
RAT type
Correlation number
C
C
3GPP
Release 12
100
Table 10.5.1.3.3: Start of Interception with active PMIP tunnel CONTINUE Record
Parameter
observed MN NAI
observed MSISDN
observed ME Id
observed IMSI
event type
event date
event time
lawful intercept identifier
network identifier
Lifetime
Access technology type
Handover indicator
MOC
Description/Conditions
C
M
M
M
C
C
C
Shall be provided.
Shall be provided.
The lifetime for the tunnel
Provide the radio access type
Provide information that the procedure is triggered as part of the
handover
Provides the Access Point Name
Includes one or more addresses allocated to the UE
Provide additional parameters sent by the UE.
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provide to identify the serving network the UE is attached to in case of
E-UTRAN access and PMIP based S5/S8 interfaces.
Provide, when authorized, to identify location information for the
intercepted subjects UE.
APN
UE address info
Additional parameters
Correlation number
C
C
C
C
Serving Network
Location information
MOC
Description/Conditions
C
M
M
M
C
C
C
Shall be provided.
Shall be provided.
The lifetime for the tunnel
Provide the radio access type
Provide information that the procedure is triggered as part of the
handover
Provides the Access Point Name
Includes one or more addresses allocated to the UE
Provide additional parameters sent by the UE.
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provide to identify the serving network the UE is attached to
Indicates that DHCPv4 is to be used to allocate the IPv4 address to
the UE
Provide, when authorized, to identify location information for the
intercepted subjects UE.
APN
UE address info
Additional parameters
Correlation number
C
C
C
C
Serving Network
DHCPv4 Address Allocation
Indication
Location information
C
C
C
3GPP
Release 12
101
10.5.1.4
MOC
Description/Conditions
C
M
M
M
C
C
C
C
C
C
Shall be provided.
Shall be provided.
The lifetime for the tunnel
Provide the UE IPv6 Home Prefix
Provide the assigned home address
Provides the Access Point Name
The IP address provided by the access network
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provides the reason for failure
The END record is used to convey the last event of EPS communication.
The END record shall be triggered in the following cases:
-
Tunnel deactivation;
Parameter
observed MSISDN
observed IMSI
observed ME Id
event type
event date
event time
initiator
MOC
Description/Conditions
C
M
network identifier
correlation number
M
C
M
C
C
C
O
C
3GPP
Release 12
102
MOC
Description/Conditions
C
M
M
M
C
C
Shall be provided.
Shall be provided.
The access point name
Provide to indicate whether the tunnel deactivation is network-initiated,
intercept-subject-initiated
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provide, when authorized, to identify location information for the
intercepted subjects UE.
Correlation number
Location information
MOC
Description/Conditions
C
M
M
M
C
C
C
C
Shall be provided.
Shall be provided.
Provide the Home Agent address
Provide the UE Home IP Address
The local IP address provided by the access network.
Provide to indicate whether the tunnel deactivation is network-initiated,
intercept-subject-initiated
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
MOC
Description/Conditions
C
M
M
M
C
C
C
Shall be provided.
Shall be provided.
Provide the IPv6 home address
The IP address provided by the access network
Provide to indicate whether the tunnel deactivation is network-initiated,
intercept-subject-initiated
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
3GPP
Release 12
103
MOC
Description/Conditions
C
M
M
M
C
C
Shall be provided.
Shall be provided.
Provide the cause for the revocation procedure
Includes one or more addresses allocated to the UE (i.e. UE PMIP
tunnel information)
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provide, when authorized, to identify location information for the
intercepted subjects UE.
Correlation number
Location information
MOC
Description/Conditions
C
M
M
M
C
C
C
Shall be provided.
Shall be provided.
Provide the cause for the revocation procedure
Provide the PDN address(es) for which the disconnection is done
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
Provide, when authorized, to identify location information for the
intercepted subjects UE.
MOC
Description/Conditions
C
M
M
M
C
C
C
C
Shall be provided.
Shall be provided.
Provide the cause for the revocation procedure
Provide the UE Home IP Address
The relevant IP address in the foreign domain.
Provide to uniquely identify tunnel delivered to the LEMF and to
correlate IRI records with CC.
3GPP
Release 12
104
As a national option, in the case where the PDN-GW is reporting IRI for an intercept subject, the intercept subject is
handed off to another S-GW and the same PDN-GW continues to handle the content of communications subject to
roaming agreements, the PDN-GW shall continue to report the IRIs.
3GPP
Release 12
11
105
11.1 Identifiers
11.1.1 Overview
Specific identifiers are necessary to identify a target for interception uniquely and to correlate between the data, which
is conveyed over the different handover interfaces (HI2 and HI3). The identifiers are defined in the subsections below.
For the delivery of CC, the MRFP provides correlation numbers and target identities to the HI3. The AS/MRFC reports
the IRI associated with the conference services.
For the delivery of CC and IRI, the AS/MRFC/MRFP provides correlation numbers and target identities to the HI2 and
HI3. For a given target the correlation number is unique per conference session.
NOTE:
If two or more target identities are involved in the same conference session the same Correlation Number
may be assigned by the relevant network element to the communication sessions of the different target
identities.
3GPP
Release 12
106
NOTE:
The Correlation Number is at a minimum unique for each concurrent communication of a target within a
lawful authorization.
Each IRI data record shall be sent by the delivery function to the LEMF over the HI2 within seconds of the
detection of the triggering event by the IAP at least 95% of the time.
Each IRI data record shall contain a time-stamp, based on the intercepting node's clock that is generated
following the detection of the IRI triggering event.
11.2.2 Quality
The quality of service associated with the result of interception should be (at least) equal to the highest quality of
service of the original content of communication for all participants. This may be derived from the QoS class used for
the original intercepted session, TS 23.107 [20]. However, when TCP is used as an OSI layer 4 protocol across the HI3,
real time delivery of the result of the interception cannot be guaranteed. The QoS used from the operator (NO/AN/SP)
to the LEMF is determined by what operators (NO/AN/SP) and law enforcement agree upon.
11.2.3 Reliability
The reliability associated with the result of interception should be (at least) equal to the reliability of the original content
of communication and the original signalling. This may be derived from the QoS class used for the original intercepted
session, TS 23.107 [20].
Reliability from the operator (NO/AN/SP) to the LEMF is determined by what operators (NO/AN/SP) and law
enforcement agree upon.
The ability to access and monitor all simultaneous communications originated, received, or redirected by the
interception subject;
3GPP
Release 12
107
The ability for multiple LEAs (up to five) to monitor, simultaneously, the same interception subject while
maintaining unobtrusiveness, including between agencies;
The ability of the network to simultaneously support a number of separate (i.e. multiple interception subjects)
legally authorized interceptions within its service area(s), including different levels of authorization for each
interception (i.e. IRI only, or IRI and communication content), including between agencies.
At a conference creation, when the target successfully provisions or requests that a conference is created;
2.
At the start of a conference, when the first party is joined to the conference; the conference may be provisioned
or requested by the target or the conference is the target of interception;
3. At the end of a conference, when the last party on the conference leaves or the conference is terminated by the
conference server; the conference may be provisioned or requested by the target or the conference is the target of
interception;
4. At certain times when relevant information are available.
The IRI may be subdivided into the following categories:
1. Control information for HI2 (e.g. correlation information);
2. Basic data communication information, for standard data transmission between two parties.
The events defined in TS 33.107 [19] are used to generate records for the delivery via HI2.
There are multiple different event types received at DF2 level. According to each event, a Record is sent to the LEMF if
this is required. The following table gives the mapping between event type received at DF2 level and record type sent to
the LEMF.
Table 11.1: Mapping between IMS Conference Service Events and HI2 records type
Event
Start of Conference (successful)
Start of Intercept with Conference Active
Conference Service Party Join
Conference Service Party Leave
Conference Service Bearer Modify
Conference Service End (unsuccessful)
Conference Service End (successful)
Start of Conference (unsuccessful)
Conference Service Creation
Conference Service Update
A set of information is used to generate the records. The records used transmit the information from mediation function
to LEMF. This set of information can be extended in the ICE or DF2 MF, if this is necessary in a specific country. The
following table gives the mapping between information received per event and information sent in records.
3GPP
Release 12
108
description
Identity of the party modifying or attempting to modify a
media bearer
Provides a reason for why the conference ended.
A URI associated with the conference being monitored.
confCorrelation
confEventFailureReason
confEventInitiator
potConfEndInfo (timestamp)
3GPP
confEndReason
confID
timestamp
confEvent
confEventFailureReason
confEventFailureReason
confEventFailureReason
confEventFailureReason
confControllerID (partyIdentity)
joinPartyID (partyIdentity)
confPartyInformation
(supportedmedia)
leavePartyID (partyIdentity)
confPartyInformation (partyIdentity)
listOfPotConferees (partyIdentity)
listOfWaitConferees (partyIdentity)
mediaModification
networkIdentifer
partyInformation (partyIdentity)
partyInformation (partyIdentity)
partyInformation (partyIdentity)
reason
confPartyInformation (partyIdentity)
potConfStartInfo (timestamp)
RecurrenceInfo
confPartyInformation
(supportedmedia)
tempConfID
Release 12
NOTE 1:
NOTE 2:
109
In most cases, either the IMPU or IMPI may be available, but not necessarily both.
LIID parameter must be present in each record sent to the LEMF.
Overview
This clause describes the information sent from the Delivery Function (DF) to the Law Enforcement Monitoring
Facility (LEMF) to support Lawful Interception (LI). The information is described as records and information carried
by a record. This focus is on describing the information being transferred to the LEMF.
The IRI events and data are encoded into records as defined in the Table 11.1 Mapping between Conference Service
Events and HI2 records type and Annex B.11 Intercept related information (HI2). IRI is described in terms of a 'causing
event' and information associated with that event. Within each IRI record there is a set of events and associated
information elements to support the particular service.
The communication events described in Table 11.1: Mapping between Conference Service Events and HI2 record type
and Table 11.2: Mapping between Events information and IRI information convey the basic information for reporting
the disposition of a communication. This clause describes those events and supporting information.
Each record described in this clause consists of a set of parameters. Each parameter is either:
mandatory (M)
conditional (C)
- required in situations where a condition is met (the condition is given in the Description), or
optional (O)
The information to be carried by each parameter is identified. Both optional and conditional parameters are considered
to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion takes precedence over Stage 3
syntax.
11.5.1.2
The BEGIN record is used to convey the first event of conference service communication interception.
The BEGIN record shall be triggered when:
-
a target provisioned or requested conference is started (i.e., when the first party is joined to the conference, or
when the first party accesses the conference but must wait for a conference host/owner/chairman to join);
a conference that is the target of interception is started (i.e., when the first party is joined to the conference, or
when the first party accesses the conference but must wait for a conference host/owner/chairman to join);
3GPP
Release 12
110
MOC
list of conferees
list of waiting conferees
supported bearers
conference URI
temporary conference URI
NOTE:
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide, when available, the party identities that are invited or
permitted to join the conference.
Provide at least one when available; provide the party identities on the
current conference and/or party identitites of those who have accessed
the conference. See Note
For each conferee, provide all bearers that are actively supported in
this conference
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
C
C
List of Waiting Conferees is only reported if the conference service allows party members to access a
conference but they do not receive conference media.
Table 11.4: Start of Intercept with Conference Active BEGIN Record
Parameter
observed IMPU
observed IMPI
event type
MOC
C
M
event date
event time
network identifier
lawful intercept identifier
correleation number
list of conferees
supported bearers
M
M
conference URI
temporary conference URI
11.5.1.3
M
M
M
Description/Conditions
Provide at least one and others when available.
Provide Conference event type (i.e., Intercept Start with Active
Conference).
Provide the date and time the event is detected.
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the party identities on the current conference.
For each conferee, provide all bearers that are actively supported in
this conference
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
The CONTINUE record is used to convey the events during an active conference.
The CONTINUE record shall be triggered when:
-
a party successfully joins the targets conference or a conference that is the target of interception;
a party unsuccessfully attempts to join the targets conference or a conference that is the target of interception;
a party successfully leaves (e.g., normal disconnection or involuntary termination/removal) a targets conference
or a conference that is a target of interception;
a party unsucessfully attempts to drop another party from the targets conference or a conference that is the target
of interception;
a party successfully modifies (e.g., adds, removes, changes) media in the conference;
a party unsuccessfully manages modifies (e.g., adds, removes, changes) media in the conference;
3GPP
Release 12
111
there was an unsuccessful attempt to terminate a conference that is the target of interception.
In order to enable the LEMF to correlate the information on HI3, a new correlation number shall not be generated
within a CONTINUE record.
NOTE: Reporting of participant signalling to manage conference features (e.g., (un)mute) is for further study.
Table 11.5: Conference Service Party Join (successful) CONTINUE Record
Parameter
observed IMPU
observed IMPI
event type
event date
event time
network identifier
lawful intercept identifier
correlation number
join party ID
initiator (of party join request)
conference URI
temporary conference URI
join party supported bearers
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the identity of the party joining the conference.
Provide if different from join party ID.
Provide at least one and others when available; provide the URI
associated with the conference under surveillance.
Provide all bearers that the party joining the conference supports.
M
C
C
M
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the identity of the party attempting to join the conference.
Provide if different from join party ID.
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide information about the reason the attempted party join failed.
M
C
C
M
3GPP
Release 12
112
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the identity of the party leaving the conference or the identity
of the party dropped from the conference
Provide if different from leave party ID
leave party ID
supported bearers
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide information about the cause of the party leave (e.g., party
hang up, party drop, or removed by conference controller)
Provide all bearers that the party leaving the conference supported.
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the identity of the party attempting to leave the conference or
the identity of the party that was requested to be dropped from the
conference.
Provide if different from leave party ID.
leave party ID
C
C
M
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide information about the reason the conference party leave or
dropped failed.
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the identity of the party modifying a bearer.
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide information about bearer modification (i.e., add, remove,
change) and value of media.
Provide the party identities of those conferees affected by the bearer
modification.
bearer modify ID
conference URI
temporary conference URI
media modification
M
C
3GPP
Release 12
113
MOC
Description/Conditions
C
M
M
network identifier
lawful intercept identifier
correlation number
M
M
M
bearer modify ID
conference URI
temporary conference URI
media modification
M
C
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide the identity of the party who attempted the action
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide information about the attempt to modify a bearer (i.e., add,
remove, change) and value of media.
Provide information about the reason for failed bearer modification.
11.5.1.4
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide information on the initiator of the conference end (e.g,, target,
network, conferee).
Provide at least one and others when available; provide the URI
associated with the conference under surveillance.
Provide information about the reason for the failed conference end.
M
C
M
The END record is used to convey the last event of a conference service communication.
The END record shall be triggered when:
-
3GPP
Release 12
114
11.5.1.5
MOC
Description/Conditions
C
M
M
M
M
M
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide information on the initiator of the conference end (e.g,, target,
network, conferee).
Provide at least one and others when available; provide the URI
associated with the conference under surveillance.
Provide information about the reason for the conference end (e.g.,
expiration of time limit; party termination command, last user left
conference).
M
C
M
The REPORT record is used to report non-communication related subscriber actions (events) and for reporting
creations and updates of provisioned (e.g., future) conferences.
The REPORT record shall be triggered when:
-
a target successfully provisions or requests that a conference be updated (e.g., modify or delete);
a target provisioned or requested conference fails to start (e.g., no parties join the conference);
a conference that is the target of interception fails to start (e.g., no parties join the conference).
Table 11.13: Conference Service Start (Unsuccessful) REPORT Record
Parameter
observed IMPU
observed IMPI
event type
event date
event time
network identifier
lawful intercept identifier
correlation
MOC
conference URI
temporary conference URI
failed conference start reason
Description/Conditions
C
M
M
M
M
C
Shall be provided.
Shall be provided.
Provide to allow correlation of CC and IRI and correlation of IRI
records.
Provide, when available, the party identities that are invited or
permitted to join the conference.
Provide, when available, the known party identities of those parties
awaiting to join the conference.
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide information about the reason for a failure of a conference start.
3GPP
Release 12
115
MOC
Description/Conditions
M
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when available, the identities to be invited to or allowed to join
the provisioned (i.e., future) conference.
Provide at least one and others when available; provide the URI
associated with the conference under surveillance
Provide, when available, the date and start time of the conference that
is being created. This is statically provisioned information and is not
correlated to the timestamp requirements for LI
Provide, when available, the date and end time of the conference that
is being created. This is statically provisioned information and is not
correlated to the timestamp requirements for LI
Provide, when available, information concerning the frequency or
pattern of recurrence of the created conference. Will be NULL if a
single instance of a conference is created.
Provide, when available, identity(ies) of parties that have control
privileges on the conference.
conference URI
temporary conference URI
potential conference start
date and time
recurrence information
identity(ies) of conference
controller
MOC
Description/Conditions
M
M
M
M
C
Shall be provided.
Shall be provided.
Provide, when available, the identities to be invited to or allowed to join
the provisioned (i.e., future) conference.
Provide at least one and others when available; provide the URI
associated with the conference under surveillance.
Provide, when available, the date and/or start time of the conference
that is being created. This is statically provisioned information and is
not correlated to the timestamp requirements for LI.
Provide, when available, the date and/or end time of the conference
that is being created. This is statically provisioned information and is
not correlated to the timestamp requirements for LI.
Provide, when available, information concerning the frequency or
pattern of recurrence of the created conference. Will be NULL if a
single instance of a conference is created.
Provide, when available, identity(ies) of parties that have control
privileges on the conference.
conference URI
temporary conference URI
potential conference start
date and time
recurrence information
identity(ies) of conference
controller
3GPP
Release 12
116
Annex A (normative):
HI2 delivery mechanisms and procedures
There are two possible methods for delivery of IRI to the LEMF standardized in this document:
a) ROSE
b) FTP
A.1
ROSE
A.1.1 Architecture
LI_Application
ASE_HI :
Application Service Element for
the Handover Interface
Session
Transport
Network
Data
Physical
3GPP
Release 12
117
If the data link toward the peer entity address is active, the ASE_HI, from the nature of the data provided,
encapsulates this data in the relevant RO-Invoke operation.
If the data link toward the peer entity address isn't active, the ASE_HI reports the data link unavailability to the
LI Application.
NOTE:
Until the data link is established according to A.1.2.3.1, the request of the LI_Application cannot be
successfully processed by ASE_HI.
Depending on the natures of the data provided by the LI_Application, the ASE_HI encapsulates this data within the
relevant ROSE operation:
-
IRI: in this case the data provided by the application are encoded within the class 2 RO-Invoke operation
Umts_Sending_of_IRI.
The following section has been included only for backward compatibility reasons towards earlier versions of
ETSI TS 101 671 [24]:
-
User packet data transfer (used for data, which can be exchanged via ISUP/DSS1/MAP signalling: e.g. UUS,
SMS): in this case the data provided by the application are encoded:
-
either within the class 2 RO-Invoke operation "Circuit-Call-related-services" in case of data associated to a
circuit call (e.g. for UUS 1 to 3). The ASN.1 format is described in clause B.5 (HI3 interface);
or within the class 2 RO-Invoke operation "No-Circuit-Call-related-services" in case of data not associated
with a circuit call (e.g. for SMS). The ASN.1 format is described in clause B.5 (HI3 interface).
Depending on the class of the operation, the ASE-HI may have to wait for an answer. In this case a timer, depending on
the operation, is started on the sending of the operation and stopped on the receipt of an answer (RO_Result, RO_Error,
RO_Reject).
On timeout of the timer, the ASE_HI indicates to the LI_Application that no answer has been received. It is under the
LI_Application responsibility to send again the data or to inform the administrator of the problem.
On receipt of an answer component (after verification that the component isn't erroneous), the ASE_HI stop the relevant
timer and acts depending on the type of component:
-
On receipt of a RO_Result, the ASE_HI provide the relevant LI_Application an indication that the data has been
received by the peer LI-application and the possible parameters contained in the RO_Result.
On receipt of a RO_Error, the ASE_HI provide the relevant LI_Application an indication that the data hasn't
been received by the peer LI-application and the possible "Error cause". The error causes are defined for each
operation in the relevant ASN1 script. It is under the LI_Application responsibility to generate or not an alarm
message toward an operator or administrator.
On receipt of a RO_Reject_U/P, the ASE_HI provide the relevant LI_Application an indication that the data
hasn't been received by the peer LI-application and the "Problem cause". The "problem causes" are defined in
ITU-T Recommendations X.880 [7] to X.882 [8]. It is under the LI_Application responsibility to send again the
data or to inform the operator/administrator of the error.
On receipt of an erroneous component, the ASE_HI acts as described in ITU-T Recommendations X.880 [7] to
X.882 [8].
3GPP
Release 12
118
When receiving operations from the peer entity, the ASE_HI verifies the syntax of the component and transmits
the parameters to the LI-Application. If no error/problem is detected, in accordance with the
ITU-T Recommendations X.880 [7] to X.882 [8] standard result (only Class2 operation are defined), the
ASE_HI sends back a RO_Result which coding is determined by the relevant operation ASN1 script. The
different operations which can be received are:
In case of error, the ASE_HI acts depending on the reason of the error or problem:
-
In accordance with the rules defined by ITU-T Recommendations X.880 [7] to X.882 [8], an RO_Error is sent in
the case of an unsuccessful operation at the application level. The Error cause provided is one among those
defined by the ASN1 script of the relevant operation;
In accordance with the rules defined in ITU-T Recommendations X.880 [7] to X.882 [8], an RO_Reject_U/P is
sent in the case of an erroneous component. On receipt of an erroneous component, the ASE_HI acts as
described in ITU-T Recommendations X.880 [7] to X.882 [8].
A.1.2.3.1
Depending on a per destination address configuration data, the data link establishment may be requested either by the
LEMF LI_Application or by the MF LI_Application.
To request the establishment of a data link toward a peer entity, the LI_Application provides, among others, the
destination address of the peer entity (implicitly, this address defined the protocol layers immediately under the
ASE_HI: TCP/IP, X25, ). On receipt of this request, the ASE_HI request the establishment of the data link with
respect of the rules of the under layers protocol.
As soon as the data link is established, the requesting LI_Application initiates an authentication procedure:
-
the origin LI_Application requests the ASE_HI to send the class 2 RO-Invoke operation "Sending_of_Password"
which includes the "origin password" provided by the LI_Application;
the peer LI-Application, on receipt of the "origin password" and after acceptance, requests to its ASE_HI to send
back a RO-Result. In addition, this destination application requests the ASE_HI to send the class 2 RO-Invoke
operation "Sending-of-Password" which includes the "destination password" provided by the LI_Application;
the origin LI-Application, on receipt of the "destination password" and after acceptance, requests to its ASE_HI
to send back a RO-Result. This application is allowed to send data;
In case of erroneous password, the data link is immediately released and an "password error indication" is sent toward
the operator.
Optionally a Data link test procedure may be used to verify periodically the data link:
-
When no data have been exchanged during a network dependent period of time toward an address, (may vary
from 1 to 30 minutes) the LI_Application requests the ASE_HI to send the class 2 RO-Invoke operation
Data-Link-Test;
The peer LI-Application, on receipt of this operation , requests to it's ASE_HI to send back a RO-Result;
3GPP
Release 12
If no Result is received or if a Reject/Error message is received, the LI_Aplication requests the ASE_LI to
release the data link and send an error message toward the operator.
A.1.2.3.2
-
119
The End of the connection toward the peer LI_Application is under the responsibility of the LI_Application. E.g.
the End of the connection may be requested in the following cases:
-
When all the data (IRI, ) has been sent. To prevent unnecessary release, the datalink may be released only
when no LI_Application data have been exchanged during a network dependent period of time;
The data link is established when a call is intercepted and released when the intercepted call is released (and
all the relevant data have been sent);
To end the connection an LI_Application requests the ASE_HI to send the class 2 RO-Invoke operation "EndOf-Connection".
The peer LI-Application, on receipt of this operation , requests to it's ASE_HI to send back a RO_Result.
On receipt of the Result the LI_Application requests the ASE_LI to release the data link.
If no Result is received after a network dependent period of time, or if a Reject/Error message is received, the
LI_Application requests the ASE_LI to release the data link and to send an error message toward the
operator/administrator.
A.2
FTP
A.2.1 Introduction
At HI2 interface FTP is used over internet protocol stack for the delivery of the IRI. The FTP is defined in
IETF STD 9 [13]. The IP is defined in IETF STD0005 [15]. The TCP is defined in IETF STD0007 [16].
FTP supports reliable delivery of data. The data may be temporarily buffered in the mediation function (MF) in case of
link failure. FTP is independent of the payload data it carries.
Every file shall contain only complete IRI records. The single IRI record shall not be divided into several files.
There are two possible ways as to how the interception data may be sent from the MF to the LEMF. One way is to
produce files that contain interception data only for one observed target (see: "File naming method A)"). The other way
is to multiplex all the intercepted data that MF receives to the same sequence of general purpose interception files sent
by the MF (see: "File naming method B)").
3GPP
Release 12
120
File naming:
The names for the files transferred to a LEA are formed according to one of the 2 available formats, depending on the
delivery file strategy chosen (e.g. due to national convention or operator preference).
Either each file contains data of only one observed target (as in method A) or several targets' data is put to files common
to all observed target traffic through MF (as in method B).
The maximum set of allowed characters in interception file names are "a""z", "A""Z", "-", "_", ".", and decimals
"0""9".
File naming method A):
<LIID>_<seq>.<ext>
LIID =
seq =
ext =
This alternative A is used when each target's IRI is gathered per observed target to dedicated delivery files. This method
provides the result of interception in a very refined form to the LEAs, but requires somewhat more resources in the MF
than alternative B. With this method, the data sorting and interpretation tasks of the LEMF are considerably easier to
facilitate in near real time than in alternative B.
File naming method B):
The other choice is to use monolithic fixed format file names (with no trailing file type part in the file name):
<filenamestring> (e.g. ABXY00041014084400001)
where:
ABXY = Source node identifier part, used for all files by the mobile network operator "AB" from this MF node
named "XY".
00 =
year 2000
04 =
month April
10=
day 10
14 =
hour
08 =
minutes
44 =
seconds
0000 =
extension
ext =
file type. The type "1" is reserved for IRI data files and type "8" is reserved for national use.
(Codings "2" = CC(MO), "4" = CC(MT), "6" = CC(MO&MT) are reserved for HI3).
3GPP
Release 12
121
This alternative B is used when several targets' intercepted data is gathered to common delivery files. This method does
not provide the result of interception in as refined form to the LEAs as the alternative A, but it is faster in performance
for the MF point of view. With this method, the MF does not need to keep many files open like in alternative A.
This set of commands opens an FTP connection to a LEA site, logs in with a given account (auto-login is disabled),
transfers a list of files in binary mode, and checks the transfer status in a simplified way.
Brief descriptions for the FTP commands used in the example:
user <user-name> <password>
cd <remote-directory>
lcd <directory>
bin
mput <local-files>
Expand wild cards in the list of local files given as arguments and do a put
for each file in the resulting list. Store each local file on the remote
machine.
Print a list of the files in a directory on the remote machine. Send the
output to local-file.
close
Terminate the FTP session with the remote server, and return to the
command interpreter. Any defined macros are erased.
contains the FTP command options, e.g. "-i -n -V -p" which equals to 'interactive prompting off',
'auto-login disabled', 'verbose mode disabled', and 'passive mode enabled'. (These are dependent
on the used ftp- version.)
<destaddr>
3GPP
Release 12
122
<leauser>
<leapasswd>
<destpath>
<srcpath>
<files>
<lastfile>
<checkfile>
is a (local) file to be checked upon transfer completion; if it exists then the transfer is considered
successful.
The FTP application should to do the following things if the checkfile is not found:
-
raise 'file transfer failure' error condition (i.e. send alarm to the corresponding LEA).
the data can be buffered for a time that the buffer size allows. If that would finally be exhausted, DF would start
dropping the corresponding target's data until the transfer failure is fixed.
the transmission of the failed files is retried until the transfer eventually succeeds. Then the DF would again start
collecting the data.
upon successful file transfer the sent files are deleted from the DF.
The FTP server at LEMF shall not allow anonymous login of an FTP client.
It is required that FTP implementation guarantees that LEMF will start processing data only after data transfer is
complete.
The following implementation example addresses a particular issue of FTP implementation. It is important however to
highlight that there are multiple ways of addressing the problem in question, and therefore the given example does not
in any way suggest being the default one.
MF sends data with a filename, which indicates that the file is temporary. Once data transfer is complete, MF
renames temporary file into ordinary one (as defined in C.2.2).
The procedure for renaming filename should be as follow:
1) open FTP channel (if not already open) from MF to LEMF;
2) sends data to LEMF using command "put" with temporary filename;
3) after MF finished to send the file, renaming it as ordinary one with command "ren".
Brief descriptions for the FTP commands used in the example:
ren <from-name> <to-name>
renaming filename from-name to to-name.
IftheftpclientwanttosendfiletoLEMFusingthecommand"mput"(e.g.MFstoredmanyIRIfilesandwant
tosendalltogetherwithonecommand),everyfilenametransferredsuccessfullymustberenamedeachafter
command"mput"ended.
3GPP
Release 12
123
In case the transit network or receiving end system (LEMF) is down for a reasonably short time period, the local
buffering at the MF will be sufficient as a delivery reliability backup procedure.
In case the transit network or receiving end system (LEMF) is down for a very long period, the local buffering at the
MF may have to be terminated. Then the following intercepted data coming from the intercepting nodes to the MF
would be discarded, until the transit network or LEMF is up and running again.
stream
non-print
file-structure
binary
The FTP client (=user -FTP process at the MF) uses e.g. the default standard FTP ports 20 (for data connection) and 21
(for control connection), 'passive' mode is supported. The data transfer process listens to the data port for a connection
from a server-FTP process.
For the file transfer from the MF to the LEMF(s) e.g. the following data transfer parameters are provided for the FTP
client (at the MF):
-
interception file type, "1" (this is needed only if the file naming method A is used).
LEMF may use various kind directory structures for the reception of interception files. It is strongly recommended that
at the LEMF machine the structure and access and modification rights of the storage directories are adjusted to prevent
unwanted directory operations by a FTP client.
Timing considerations for the HI2 FTP transmission
The MF and LEMF sides control the timers to ensure reliable, near-real time data transfer. The transmission related
timers are defined within the lower layers of the used protocol and are out of scope of this document.
The following timers may be used within the LI application:
Table A.2: Timing considerations
Name
T1 inactivity timer
Controlled by
LEMF
Units
Seconds
Milliseconds
Description
Triggered by no activity within the FTP session (no new files).
The FTP session is torn down when the T1 expires. To send
another file the new connection will be established. The timer
avoids the FTP session overflow at the LEMF side.
Forces the file to be transmitted to the LEMF (even if the size
limit has not been reached yet in case of volume trigger
active). If the timer is set to 0 the only trigger to send the file is
the file size parameter (See C.2.2).
3GPP
Release 12
124
Annex B (normative):
Structure of data at the handover interface
This annex specifies the coding details at the handover interface HI for all data, which may be sent from the operator's
(NO/AN/SP) equipment to the LEMF, across HI.
At the HI2 and HI3 handover interface ports, the following data may be present:
-
The detailed coding specification for these types of information is contained in this annex, including sufficient details
for a consistent implementation in the operator's (NO/AN/SP) equipment and the LEMF.
It must be noticed some data are ROSE specific and have no meaning when FTP is used. Those specificities are
described at the beginning of each sub-annex.
B.1
Syntax definitions
The transferred information and messages are encoded to be binary compatible with [5] (Abstract Syntax Notation One
(ASN.1)) and [6] (Basic Encoding Rules (BER)).
These recommendations use precise definitions of the words type, class, value, and parameter. Those definitions are
paraphrased below for clarity.
A type, in the context of the abstract syntax or transfer syntax, is a set of all possible values. For example, an INTEGER
is a type for all negative and positive integers.
A class, in the context of the abstract syntax or transfer syntax, is a one of four possible domains for uniquely defining a
type. The classes defined by ASN.1 and BER are: UNIVERSAL, APPLICATION, CONTEXT, and PRIVATE.
The UNIVERSAL class is reserved for international standards such as [5] and [6]. Most parameter type identifiers in
the HI ROSE operations are encoded as CONTEXT specific class. Users of the protocol may extend the syntax with
PRIVATE class parameters without conflict with the present document, but risk conflict with other users' extensions.
APPLICATION class parameters are reserved for future extensions.
A value is a particular instance of a type. For example, five (5) is a possible value of the type INTEGER.
A parameter in the present document is a particular instance of the transfer syntax to transport a value consisting of a
tag to identify the parameter type, a length to specify the number of octets in the value, and the value.
In the BER a tag (a particular type and class identifier) may either be a primitive or a constructor. A primitive is a predefined type (of class UNIVERSAL) and a constructor consists of other types (primitives or other constructors). A
constructor type may either be IMPLICIT or EXPLICIT. An IMPLICIT type is encoded with the constructor identifier
alone. Both ends of a communication must understand the underlying structure of the IMPLICIT types. EXPLICIT
types are encoded with the identifiers of all the contained types. For example, an IMPLICIT Number of type INTEGER
would be tagged only with the Number tag, where an EXPLICIT number of type INTEGER would have the INTEGER
tag within the Number tag. The present document uses IMPLICIT tagging for more compact message encoding.
For the coding of the value part of each parameter the general rule is to use a widely use a standardized format when it
exists (ISUP, DSS1, MAP, ).
As a large part of the information exchanged between the user's may be transmitted within ISUP/DSS1 signalling, the
using of the coding defined for this signalling guarantee the integrity of the information provided to the LEMF and the
evolution of the interface. For example if new values are used within existing ISUP parameters, this new values shall be
transmitted transparently toward the LEMF.
3GPP
Release 12
125
For the ASN.1 parameters of the type 'OCTET STRING', the ordering of the individual halfoctets of each octet shall be
such that the most significant nibble is put into bitposition 5 - 8 and the least significant nibble into bitposition 1 - 4.
This general rule shall not apply when parameter formats are imported from other standards, e.g. an E.164 number
coded according to ISUP, ITU-T Recommendation Q.763 [29]. In this case the ordering of the nibbles shall be
according to that standard and not be changed.
B.2
identified-organization(4)
etsi(0)
securityDomain(2)
lawfulIntercept(2)
hi3conf(11)
hi2conf(10)
hi3eps(9)
hi2eps(8)
fraud(1)
hi2mbms(7)
threeGPP (4)
hi2wlan(6)
hi1(0)
hi2(1)
hi3(2)
him(3)
him(5)
hi3CS(4)
hi2(1)
hi3(2)
hi2CS(3)
B.3
Declaration of ROSE operation umts-sending-of-IRI is ROSE delivery mechanism specific. When using FTP delivery
mechanism, data UmtsIRIsContent must be considered.
3GPP
Release 12
126
UmtsIRIContent
::= CHOICE
{
iRI-Begin-record
[1]
iRI-End-record
[2]
iRI-Continue-record
[3]
iRI-Report-record
[4]
}
3GPP
Release 12
unknown-version
missing-parameter
unknown-parameter-value
unknown-parameter
127
ERROR
ERROR
ERROR
ERROR
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
3GPP
Release 12
128
iMSevent
sIPMessage
servingSGSN-number
servingSGSN-address
...,
-- Tag
[33] was taken into use by ETSI module in TS 101 671v2.13.1
ldiEvent
[34] LDIevent OPTIONAL,
correlation
[35] CorrelationValues OPTIONAL,
mediaDecryption-info
[36] MediaDecryption-info OPTIONAL,
servingS4-SGSN-address [37] OCTET STRING OPTIONAL,
-- Diameter Origin-Host and Origin-Realm of the S4-SGSN based on the TS 29.272 [59].
-- Only the data fields from the Diameter AVPs are provided concatenated
-- with a semicolon to populate this field.
sipMessageHeaderOffer
[38] OCTET STRING OPTIONAL,
sipMessageHeaderAnswer [39] OCTET STRING OPTIONAL,
sdpOffer
[40] OCTET STRING OPTIONAL,
sdpAnswer
[41] OCTET STRING OPTIONAL,
national-HI2-ASN1parameters [255]
National-HI2-ASN1parameters OPTIONAL
}
-- Parameters having the same tag numbers must be identical in Rel-5 and onwards modules
-- PARAMETERS FORMATS
PartyInformation
::= SEQUENCE
{
party-Qualifier
[0] ENUMERATED
{
gPRS-Target(3),
...
},
partyIdentity
[1] SEQUENCE
{
imei
[1] OCTET STRING (SIZE (8)) OPTIONAL,
-- See MAP format [4]
imsi
msISDN
[6] OCTET STRING (SIZE (1..9)) OPTIONAL,
-- MSISDN of the target, encoded in the same format as the AddressString
-- parameters defined in MAP format document TS 29.002 [4]
e164-Format
[7] OCTET STRING
(SIZE (1 .. 25)) OPTIONAL,
-- E164 address of the node in international format. Coded in the same format as
-- the calling party number parameter of the ISUP (parameter part:[29])
sip-uri
-- See [26]
...,
tel-url
-- See [36]
OPTIONAL,
OPTIONAL
},
services-Data-Information
[4] Services-Data-Information OPTIONAL,
-- This parameter is used to transmit all the information concerning the
-- complementary information associated to the basic data call
...
}
Location
::= SEQUENCE
{
e164-Number
[1] OCTET STRING (SIZE (1..25)) OPTIONAL,
-- Coded in the same format as the ISUP location number (parameter
-- field) of the ISUP (see EN 300 356 [30]).
globalCellID
[2] GlobalCellID
OPTIONAL,
--see MAP format (see [4])
rAI
[4] Rai
OPTIONAL,
-- the Routeing Area Identifier in the current SGSN is coded in accordance with the
-- 10.5.5.15 of document [9] without the Routing Area Identification IEI
-- (only the last 6 octets are used)
gsmLocation
[5] GSMLocation OPTIONAL,
3GPP
Release 12
129
umtsLocation
[6] UMTSLocation OPTIONAL,
sAI
[7] Sai OPTIONAL,
-- format: PLMN-ID 3 octets (no. 1 3)
-LAC
2 octets (no. 4 5)
-SAC
2 octets (no. 6 7)
-(according to 3GPP TS 25.413 [62])
...,
oldRAI
[8] Rai
OPTIONAL,
-- the Routeing Area Identifier in the old SGSN is coded in accordance with the
-- 10.5.5.15 of document [9] without the Routing Area Identification IEI
-- (only the last 6 octets are used).
tAI
[9] OCTET STRING (SIZE (6)) OPTIONAL,
-- The TAI is coded according to the TS 29.118 [64] without the TAI IEI.
-- The tAI parameter is applicable only to the CS traffic cases where
-- the available location information is the one received from the the MME.
eCGI
[10] OCTET STRING (SIZE (8)) OPTIONAL
-- the ECGI is coded according to the TS 29.118 [64] without the ECGI IEI.
-- The eCGI parameter is applicable only to the CS traffic cases where
-- the available location information is the one received from the the MME.
}
GlobalCellID
Rai
Sai
GSMLocation
::= CHOICE
{
geoCoordinates [1] SEQUENCE
{
latitude
[1] PrintableString (SIZE(7..10)),
-- format :
XDDMMSS.SS
longitude
[2] PrintableString (SIZE(8..11)),
-- format :
XDDDMMSS.SS
mapDatum
[3] MapDatum DEFAULT wGS84,
...,
azimuth
[4] INTEGER (0..359) OPTIONAL
-- The azimuth is the bearing, relative to true north.
},
-- format :
XDDDMMSS.SS
-X
: N(orth), S(outh), E(ast), W(est)
-DD or DDD
: degrees (numeric characters)
-MM
: minutes (numeric characters)
-SS.SS
: seconds, the second part (.SS) is optionnal
-- Example :
-latitude short form
N502312
-longitude long form
E1122312.18
utmCoordinates [2] SEQUENCE
{
utm-East
[1] PrintableString (SIZE(10)),
utm-North
[2] PrintableString (SIZE(7)),
-- example utm-East
32U0439955
-utm-North
5540736
mapDatum
[3] MapDatum DEFAULT wGS84,
...,
azimuth
[4] INTEGER (0..359) OPTIONAL
-- The azimuth is the bearing, relative to true north.
},
utmRefCoordinates
[3] SEQUENCE
{
utmref-string
PrintableString (SIZE(13)),
mapDatum
MapDatum DEFAULT wGS84,
...
},
-- example 32UPU91294045
wGS84Coordinates
[4] OCTET STRING
-- format is as defined in [37].
}
MapDatum ::= ENUMERATED
{
wGS84,
wGS72,
eD50,
-- European Datum 50
...
3GPP
Release 12
130
}
UMTSLocation ::= CHOICE {
point
pointWithUnCertainty
polygon
}
[1] GA-Point,
[2] GA-PointWithUnCertainty,
[3] GA-Polygon
GeographicalCoordinates,
GA-PointWithUnCertainty ::=SEQUENCE {
geographicalCoordinates
GeographicalCoordinates,
uncertaintyCode
INTEGER (0..127)
}
maxNrOfPoints
INTEGER ::= 15
SMS
{
yes
no
undefined
...
} OPTIONAL,
content
(0),
(1),
(2),
[4] OCTET STRING (SIZE (1 .. 270)) OPTIONAL,
-- Encoded in the format defined for the SMS mobile
...
}
}
GPRSCorrelationNumber ::= OCTET STRING (SIZE(8..20))
CorrelationValues ::= CHOICE {
iri-to-CC
[0]
iri-to-iri [1]
both-IRI-CC [2]
3GPP
Release 12
131
(1),
(2),
(4),
(5),
(6),
(10),
(11),
(13),
(14),
(15)
3GPP
Release 12
132
(1),
(2),
3GPP
Release 12
133
::= CHOICE
UmtsCS-IRIContent,
UmtsCS-IRISequence
3GPP
Release 12
134
UmtsCS-IRISequence
::= SEQUENCE OF UmtsCS-IRIContent
-- Aggregation of UmtsCS-IRIContent is an optional feature.
-- It may be applied in cases when at a given point in time several IRI records are
-- available for delivery to the same LEA destination.
-- As a general rule, records created at any event shall be sent immediately and shall
-- not held in the DF or MF in order to apply aggregation.
-- When aggregation is not to be applied, UmtsCS-IRIContent needs to be chosen.
UmtsCS-IRIContent
::= CHOICE
{
iRI-Begin-record
[1] IRI-Parameters,
--at least one optional parameter must be included within the iRI-Begin-Record
iRI-End-record
[2] IRI-Parameters,
iRI-Continue-record
[3] IRI-Parameters,
--at least one optional parameter must be included within the iRI-Continue-Record
iRI-Report-record
[4] IRI-Parameters,
--at least one optional parameter must be included within the iRI-Report-Record
...
}
unknown-version
missing-parameter
unknown-parameter-value
unknown-parameter
ERROR
ERROR
ERROR
ERROR
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
::= SEQUENCE
[0] OBJECT IDENTIFIER, -- 3GPP HI2 CS domain
iRIversion
[23] ENUMERATED
{
version1(1),
...,
version2(2),
version3(3),
-- versions 4-7 were ommited to align with UmtsHI2Operations.
lastVersion(8)
} OPTIONAL,
-- Optional parameter "iRIversion" (tag 23) was always redundant in 33.108, because
-- the object identifier "hi2CSDomainId" was introduced into "IRI Parameters" with the
-- initial HI2 CS domain module in 33.108v6.1.0. In order to keep backward compatibility,
-- even when the version of the "hi2CSDomainId" parameter will be incremented it is
-- recommended to always send to LEMF the same: enumeration value "lastVersion(8)".
-- if not present, it means version 1 is handled
lawfulInterceptionIdentifier
[1] LawfulInterceptionIdentifier,
-- This identifier is associated to the target.
communicationIdentifier
[2] CommunicationIdentifier,
-- used to uniquely identify an intercepted call.
timeStamp
[3] TimeStamp,
-- date and time of the event triggering the report.
intercepted-Call-Direct
[4] ENUMERATED
{
not-Available(0),
originating-Target(1),
terminating-Target(2),
...
} OPTIONAL,
intercepted-Call-State
[5] Intercepted-Call-State OPTIONAL,
-- Not required for UMTS. May be included for backwards compatibility to GSM
ringingDuration
[6] OCTET STRING (SIZE (3)) OPTIONAL,
-- Duration in seconds. BCD coded : HHMMSS
3GPP
Release 12
135
-- Not required for UMTS. May be included for backwards compatibility to GSM
conversationDuration
[7] OCTET STRING (SIZE (3)) OPTIONAL,
-- Duration in seconds. BCD coded : HHMMSS
-- Not required for UMTS. May be included for backwards compatibility to GSM
locationOfTheTarget
[8] Location OPTIONAL,
-- location of the target subscriber
partyInformation
[9] SET SIZE (1..10) OF PartyInformation OPTIONAL,
-- This parameter provides the concerned party (Originating, Terminating or forwarded
-- party), the identity(ies) of the party and all the information provided by the party.
callContentLinkInformation
[10] SEQUENCE
{
cCLink1Characteristics
[1] CallContentLinkCharacteristics OPTIONAL,
-- information concerning the Content of Communication Link Tx channel established
-- toward the LEMF (or the sum signal channel, in case of mono mode).
cCLink2Characteristics
[2] CallContentLinkCharacteristics OPTIONAL,
-- information concerning the Content of Communication Link Rx channel established
-- toward the LEMF.
...
} OPTIONAL,
release-Reason-Of-Intercepted-Call [11] OCTET STRING (SIZE (2)) OPTIONAL,
-- Release cause coded in [31] format.
-- This parameter indicates the reason why the
-- intercepted call cannot be established or why the intercepted call has been
-- released after the active phase.
nature-Of-The-intercepted-call
[12] ENUMERATED
{
--Not required for UMTS. May be included for backwards compatibility to GSM
--Nature of the intercepted "call":
gSM-ISDN-PSTN-circuit-call(0),
-- the possible UUS content is sent through the HI2 or HI3 "data" interface
-- the possible call content call is established through the HI3 circuit interface
gSM-SMS-Message(1),
-- the SMS content is sent through the HI2 or HI3 "data" interface
uUS4-Messages(2),
-- the UUS content is sent through the HI2 or HI3 "data" interface
tETRA-circuit-call(3),
-- the possible call content call is established through the HI3 "circuit" interface
-- the possible data are sent through the HI3 "data" interface
teTRA-Packet-Data(4),
-- the data are sent through the HI3 "data" interface
gPRS-Packet-Data(5),
-- the data are sent through the HI3 "data" interface
...
} OPTIONAL,
serviceCenterAddress
[13] PartyInformation OPTIONAL,
-- e.g. in case of SMS message this parameter provides the address of the relevant
-- server within the calling (if server is originating) or called
-- (if server is terminating) party address parameters
sMS
[14] SMS-report OPTIONAL,
-- this parameter provides the SMS content and associated information
cC-Link-Identifier
[15] CC-Link-Identifier OPTIONAL,
-- Depending on a network option, this parameter may be used to identify a CC link
-- in case of multiparty calls.
national-Parameters
[16] National-Parameters OPTIONAL,
...,
umts-Cs-Event
[33] Umts-Cs-Event OPTIONAL,
-- Care should be taken to ensure additional parameter numbering does not conflict with
-- ETSI TS 101 671 or Annex B.3 of this document (PS HI2).
national-HI2-ASN1parameters
[255]
National-HI2-ASN1parameters OPTIONAL
}
Umts-Cs-Event ::= ENUMERATED
{
call-establishment
answer
supplementary-Service
handover
release
sMS
location-update
subscriber-Controlled-Input
...
}
(1),
(2),
(3),
(4),
(5),
(6),
(7),
(8),
END - OF UmtsCS-HI2Operations
3GPP
Release 12
136
DEFINITIONSIMPLICITTAGS::=
BEGIN
IMPORTS
GPRSCorrelationNumber
FROM UmtsHI2Operations
{itu-t(0) identified-organization(4) etsi(0) securityDomain(2) lawfulintercept(2) threeGPP(4)
hi2(1) r7(7) version-2(2)}
-- Imported from TS 33.108v7.2.0
LawfulInterceptionIdentifier,
TimeStamp
FROM HI2Operations
{itu-t(0) identified-organization(4) etsi(0) securityDomain(2) lawfulIntercept(2) hi2(1)
version9(9)}; -- from ETSI HI2Operations TS 101 671v2.13.1
-- Object Identifier Definitions
-- Security DomainId
lawfulInterceptDomainId OBJECT IDENTIFIER ::= {itu-t(0) identified-organization(4) etsi(0)
securityDomain(2) lawfulIntercept(2)}
-- Security Subdomains
threeGPPSUBDomainId OBJECT IDENTIFIER ::= {lawfulInterceptDomainId threeGPP(4)}
hi3DomainId OBJECT IDENTIFIER ::= {threeGPPSUBDomainId hi3(2) r7(7) version-0(0)}
CCPDU ::=SEQUENCE
{
uLICheader
[1]ULICheader,
payload
[2]OCTETSTRING
}
ULICheader::=SEQUENCE
{
hi3DomainId
[0] OBJECTIDENTIFIER,3GPPHI3Domain
version
[1] Version,
lIID
[2]LawfulInterceptionIdentifierOPTIONAL,
correlationNumber
[3] GPRSCorrelationNumber,
timeStamp
[4] TimeStampOPTIONAL,
sequencenumber
[5] INTEGER(0..65535),
tPDUdirection
[6]TPDUdirection,
...,
national-HI3-ASN1parameters
[7] National-HI3-ASN1parameters OPTIONAL,
-- encoded per national requirements
icetype
[8]ICEtypeOPTIONAL
TheICEtypeindicatestheapplicableInterceptingControlElement(seeref[19])inwhich
theTPDUisintercepted.
}
Version ::= ENUMERATED
{
version1(1),
...,
version3(3) ,
-- versions 4-7 were omitted to align with UmtsHI2Operations.
lastVersion(8)
-- Mandatory parameter "version" (tag 1) was always redundant in 33.108, because
-- the object identifier "hi3DomainId" was introduced into "ULIC-headerV in the initial
-- version of 33.108v5.0.0 In order to keep backward compatibility, even when the
-- version of the "hi3DomainId" parameter will be incremented it is recommended to
-- always send to LEMF the same: enumeration value "lastVersion(8)".
}
TPDU-direction ::= ENUMERATED
{
from-target
(1),
to-target
(2),
3GPP
Release 12
137
unknown
(3)
}
National-HI3-ASN1parameters ::= SEQUENCE
{
countryCode
[1] PrintableString (SIZE (2)),
-- Country Code according to ISO 3166-1 [39],
-- the country to which the parameters inserted after the extension marker apply
...
-- In case a given country wants to use additional national parameters according to its law,
-- these national parameters should be defined using the ASN.1 syntax and added after the
-- extension marker (...).
-- It is recommended that "version parameter" and "vendor identification parameter" are
-- included in the national parameters definition. Vendor identifications can be
-- retrieved from IANA web site. It is recommended to avoid
-- using tags from 240 to 255 in a formal type definition.
}
ICE-type ::= ENUMERATED
{
sgsn
(1),
ggsn
(2),
...
}
END-- OF Umts-HI3-PS
B.5
OPERATION,
ERROR
FROM Remote-Operations-Information-Objects
{joint-iso-itu-t (2) remote-operations(4) informationObjects(5) version1(0)}
;
uMTS-sending-of-Password
OPERATION ::=
{
ARGUMENT
UMTS-Password-Name
ERRORS
{ ErrorsHim }
CODE
global:{ himDomainId sending-of-Password (1) version1 (1)}
}
-- Class 2 operation. The timer must be set to a value between 3 s and 240s.
-- The timer default value is 60s.
uMTS-data-Link-Test
OPERATION ::=
{
ERRORS
{ other-failure-causes }
CODE
global:{ himDomainId data-link-test (2) version1 (1)}
}
-- Class 2 operation. The timer must be set to a value between 3s and 240s.
-- The timer default value is 60s.
3GPP
Release 12
138
uMTS-end-Of-Connection
OPERATION ::=
{
ERRORS
{ other-failure-causes }
CODE
global:{ himDomainId end-of-connection (3) version1 (1)}
}
-- Class 2 operation. The timer must be set to a value between 3s and 240s.
-- The timer default value is 60s.
other-failure-causes
missing-parameter
unknown-parameter
erroneous-parameter
ERROR
ERROR
ERROR
ERROR
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
ErrorsHim
ERROR ::=
{
other-failure-causes |
missing-parameter |
unknown-parameter |
erroneous-parameter
}
-- Object Identifier Definitions
-- himDomainId
lawfulInterceptDomainId OBJECT IDENTIFIER ::= {itu-t(0) identified-organization(4) etsi(0)
securityDomain(2) lawfulIntercept(2)}
-- Security Subdomains
threeGPPSUBDomainId OBJECT IDENTIFIER ::= {lawfulInterceptDomainId threeGPP(4)}
himDomainId OBJECT IDENTIFIER ::= {threeGPPSUBDomainId him(5) version2(2)}
UMTS-Password-Name
::= SEQUENCE
{
password
[1] OCTET STRING (SIZE (1..25)),
name
[2] OCTET STRING (SIZE (1..25)),
...
}
-- IA5 string recommended
END - UMTS-HIManagementOperations
B.6
3GPP
Release 12
139
uMTS-no-Circuit-Call-related-Services
OPERATION ::=
{
ARGUMENT
UMTS-Content-Report
ERRORS
{ OperationErrors }
CODE
global:{ hi3CSDomainId no-Circuit-Call-Serv (2) version1 (1)}
}
-- Class 2 operation. The timer must be set to a value between 10s and 120s.
-- The timer default value is 60s.
UMTS-Content-Report
::= SEQUENCE
{
hi3CSDomainId
[0] OBJECT IDENTIFIER OPTIONAL, -- 3GPP HI3 CS Domain.
-- When FTP is used this parametr shall be sent to LEMF.
version
[23] ENUMERATED
{
version1(1),
... ,
-- versions 2-7 were omitted to align with UmtsHI2Operations.
version8(8)
} OPTIONAL,
-- Optional parameter "version" (tag 23) became redundant starting from
-- 33.108v6.8.0, where the object identifier "hi3CSDomainId" was introduced into
-- "UMTS-Content-Report". In order to keep backward compatibility, even when the
-- version of the "hi3CSDomainId" parameter will be incremented it is recommended to
-- always send to LEMF the same: enumeration value "lastVersion(8)".
lawfulInterceptionIdentifier
[6] LawfulInterceptionIdentifier OPTIONAL,
communicationIdentifier
[1] CommunicationIdentifier,
-- Used to uniquely identify an intercepted call: the same as used for the relevant IRI.
-- Called "callIdentifier" in edition 1 ES 201 671.
timeStamp
[2] TimeStamp,
initiator
[3] ENUMERATED
{
originating-party(0),
terminating-party(1),
forwarded-to-party(2),
undefined-party(3),
...
} OPTIONAL,
content
[4] Supplementary-Services OPTIONAL,
-- UUI are encoded in the format defined for the User-to-user information parameter
-- of the ISUP protocol (see EN 300 356 [30]). Only one UUI parameter is sent per message.
sMS-report
[5] SMS-report OPTIONAL,
...
}
3GPP
Release 12
140
END - UMTS-HI3CircuitLIOperations
B.7
Declaration of ROSE operation iwlan-umts-sending-of-IRI is ROSE delivery mechanism specific. When using FTP
delivery mechanism, data IWLANUmtsIRIsContent must be considered.
::= CHOICE
IWLANUmtsIRISequence
-------
IWLANUmtsIRIContent,
IWLANUmtsIRISequence
3GPP
Release 12
141
IWLANUmtsIRIContent
{
iRI-Begin-record
iRI-End-record
iRI-Report-record
::= CHOICE
unknown-version
missing-parameter
unknown-parameter-value
unknown-parameter
ERROR
ERROR
ERROR
ERROR
[1] IRI-Parameters,
[2] IRI-Parameters,
[3] IRI-Parameters,
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
-- PARAMETERS FORMATS
PartyInformation
::= SEQUENCE
{
party-Qualifier
[0] ENUMERATED
{
iWLAN-Target(1),
...
3GPP
Release 12
142
},
partyIdentity
[1] SEQUENCE
{
imsi
[2] OCTET STRING (SIZE (3..8)) OPTIONAL,
-- See MAP format [4] International Mobile
-- Station Identity E.212 number beginning with Mobile Country Code
msISDN
[3] OCTET STRING (SIZE (1..9)) OPTIONAL,
-- MSISDN of the target, encoded in the same format as the AddressString
-- parameters defined in MAP format document TS 29.002 [4]
nai
...
},
services-Data-Information
[2] Services-Data-Information OPTIONAL,
-- This parameter is used to transmit all the information concerning the
-- complementary information associated to the basic data call
...
}
(1),
(2),
(3),
(4),
(5),
3GPP
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
Release 12
143
B.8
3GPP
Release 12
--------
144
MBMSUmtsIRIContent
{
iRI-Begin-record
iRI-End-record
iRI-Report-record
...
}
::= CHOICE
unknown-version
missing-parameter
unknown-parameter-value
unknown-parameter
ERROR
ERROR
ERROR
ERROR
[1] IRI-Parameters,
[2] IRI-Parameters,
[3] IRI-Parameters,
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
IRI-Parameters
::= SEQUENCE
{
hi2mbmsDomainId
[0] OBJECT IDENTIFIER, -- 3GPP HI2 WLAN domain
lawfulInterceptionIdentifier
[2] LawfulInterceptionIdentifier,
-- This identifier is associated to the target.
timeStamp
[3] TimeStamp,
-- date and time of the event triggering the report.
initiator
[4] ENUMERATED
{
not-Available
(0),
originating-Target (1),
-- in case of MBMS, this indicates that the MBMS UE has initiated the MBMS session
-- or initiated the subscription management event.
network-initiated
(2),
-- in case of MBMS, this indicates that the MBMS has initiated the MBMS session.
off-online-action
(3),
-- in case of MBMS, this indicates a subscription management event has occurred as the
-- result of an MBMS operator customer services function or other subscription updates
-- not initiated by the MBMS UE.
...
} OPTIONAL,
partyInformation
[5] SET SIZE (1..10) OF PartyInformation OPTIONAL,
-- This parameter provides the concerned party, the identiy(ies) of the party
-- and all the information provided by the party.
national-Parameters
[6] National-Parameters OPTIONAL,
networkIdentifier
[7] Network-Identifier OPTIONAL,
mBMSevent
[8] MBMSEvent
OPTIONAL,
correlationNumber
[9] CorrelationNumber OPTIONAL,
mbmsInformation
[10] MBMSinformation OPTIONAL,
visitedPLMNID
[11] VisitedPLMNID OPTIONAL,
national-HI2-ASN1parameters [12]
National-HI2-ASN1parameters OPTIONAL,
...
}
3GPP
Release 12
145
-- PARAMETERS FORMATS
PartyInformation
::= SEQUENCE
{
party-Qualifier
[0] ENUMERATED
{
iWLAN-Target(1),
...
},
partyIdentity
[1] SEQUENCE
{
imsi
[1] OCTET STRING (SIZE (3..8)) OPTIONAL,
-- See MAP format [4] International Mobile
-- Station Identity E.212 number beginning with Mobile Country Code
...
},
...
}
(1),
(2),
(3),
(4),
(5),
(6),
...
}
Services-Data-Information ::= SEQUENCE
{
mBMSparameters [1] MBMSparameters OPTIONAL,
...
}
[1] UTF8STRING
[2] UTF8STRING
[3] ENUMERATED
[4] IPAddress
[5] ENUMERATED
[6] ENUMERATED
3GPP
OPTIONAL,
OPTIONAL,
OPTIONAL,
Release 12
146
subscriptionExpired
(1),
...
} OPTIONAL,
mBMSapn
[7] UTF8STRING
OPTIONAL,
-- The Access Point Name (APN) is coded in accordance with
-- 3GPP TS 24.008 [9] without the APN IEI (only the last 100 octets are used).
-- Octets are coded according to 3GPP TS 23.003 [25].
mbmsSerSubscriberList
[8] MBMSSerSubscriberList
OPTIONAL,
mbmsNodeList
[9] MBMSNodeList
OPTIONAL,
...
}
IPAddress
UTF8String
OPTIONAL,
OPTIONAL,
END -- OF MBMSUmtsHI2Operations
B.9
Declaration of ROSE operation umts-sending-of-IRI is ROSE delivery mechanism specific. When using FTP delivery
mechanism, data UmtsIRIsContent must be considered.
3GPP
Release 12
147
::= CHOICE
EpsIRISequence
----------
EpsIRIContent,
EpsIRISequence
EpsIRIContent
::= CHOICE
{
iRI-Begin-record
[1]
iRI-End-record
[2]
iRI-Continue-record
[3]
iRI-Report-record
[4]
3GPP
Release 12
148
}
-- the EpsIRIContent may provide events that correspond to UMTS/GPRS as well.
unknown-version
missing-parameter
unknown-parameter-value
unknown-parameter
ERROR
ERROR
ERROR
ERROR
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
3GPP
Release 12
149
[44]
[45]
[46]
[47]
OCTET
OCTET
OCTET
OCTET
STRING
STRING
STRING
STRING
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
national-HI2-ASN1parameters [255]
National-HI2-ASN1parameters OPTIONAL
}
-- Parameters having the same tag numbers must be identical in Rel-5 and onwards modules
-- PARAMETERS FORMATS
PartyInformation
::= SEQUENCE
{
party-Qualifier
[0] ENUMERATED
{
gPRSorEPS-Target(3),
...
},
partyIdentity
[1] SEQUENCE
{
imei
[1] OCTET STRING (SIZE (8)) OPTIONAL,
-- See MAP format [4]
imsi
msISDN
[6] OCTET STRING (SIZE (1..9)) OPTIONAL,
-- MSISDN of the target, encoded in the same format as the AddressString
-- parameters defined in MAP format document TS 29.002 [4]
e164-Format
[7] OCTET STRING
(SIZE (1 .. 25)) OPTIONAL,
-- E164 address of the node in international format. Coded in the same format as
-- the calling party number parameter of the ISUP (parameter part:[29])
sip-uri
-- See [26]
OPTIONAL,
...,
tel-url
[9] OCTET STRING
OPTIONAL,
-- See [36]
nai
[10] OCTET STRING
OPTIONAL
-- NAI of the target, encoded in the same format as defined by [EPS stage 3 specs]
},
services-Data-Information
[4] Services-Data-Information OPTIONAL,
-- This parameter is used to transmit all the information concerning the
-- complementary information associated to the basic data call
...
}
Location
::= SEQUENCE
{
e164-Number
[1] OCTET STRING (SIZE (1..25)) OPTIONAL,
-- Coded in the same format as the ISUP location number (parameter
3GPP
Release 12
150
GSMLocation
::= CHOICE
{
geoCoordinates [1] SEQUENCE
{
latitude
[1] PrintableString (SIZE(7..10)),
-- format :
XDDMMSS.SS
longitude
[2] PrintableString (SIZE(8..11)),
-- format :
XDDDMMSS.SS
mapDatum
[3] MapDatum DEFAULT wGS84,
...,
azimuth
[4] INTEGER (0..359) OPTIONAL
-- The azimuth is the bearing, relative to true north.
},
-- format :
XDDDMMSS.SS
-X
: N(orth), S(outh), E(ast), W(est)
-DD or DDD
: degrees (numeric characters)
-MM
: minutes (numeric characters)
-SS.SS
: seconds, the second part (.SS) is optionnal
-- Example :
-latitude short form
N502312
-longitude long form
E1122312.18
utmCoordinates [2] SEQUENCE
{
utm-East
[1] PrintableString (SIZE(10)),
utm-North
[2] PrintableString (SIZE(7)),
-- example utm-East
32U0439955
-utm-North
5540736
mapDatum
[3] MapDatum DEFAULT wGS84,
...,
azimuth
[4] INTEGER (0..359) OPTIONAL
-- The azimuth is the bearing, relative to true north.
},
utmRefCoordinates
[3] SEQUENCE
{
utmref-string
PrintableString (SIZE(13)),
mapDatum
MapDatum DEFAULT wGS84,
...
},
-- example 32UPU91294045
wGS84Coordinates
[4] OCTET STRING
-- format is as defined in [37].
}
MapDatum ::= ENUMERATED
{
wGS84,
wGS72,
eD50,
-- European Datum 50
...
3GPP
Release 12
151
}
UMTSLocation ::= CHOICE {
point
pointWithUnCertainty
polygon
}
[1] GA-Point,
[2] GA-PointWithUnCertainty,
[3] GA-Polygon
GeographicalCoordinates,
GA-PointWithUnCertainty ::=SEQUENCE {
geographicalCoordinates
GeographicalCoordinates,
uncertaintyCode
INTEGER (0..127)
}
maxNrOfPoints
INTEGER ::= 15
SMS
{
yes
no
undefined
...
} OPTIONAL,
content
(0),
(1),
(2),
[4] OCTET STRING (SIZE (1 .. 270)) OPTIONAL,
-- Encoded in the format defined for the SMS mobile
...
}
}
EPSCorrelationNumber ::= OCTET STRING
-- In case of PS interception, the size will be in the range (8..20)
CorrelationValues ::= CHOICE {
iri-to-CC
[0]
iri-to-iri [1]
both-IRI-CC [2]
3GPP
Release 12
152
(1),
(2),
(4),
(5),
(6),
(10),
(11),
(13),
(14),
(15),
(16),
(17),
(18),
(19),
(20),
(21),
(22),
(23),
(24),
(25),
(26),
(27),
(28),
(29),
(30),
(31),
(32),
(33),
(34),
(35),
(36),
(37),
(38),
(39),
(40),
(41),
(42)
}
-- see [19]
IMSevent ::= ENUMERATED
{
unfilteredSIPmessage (1),
-- This value indicates to LEMF that the whole SIP message is sent.
...,
sIPheaderOnly (2),
-- If warrant requires only IRI then specific content in a 'sIPMessage'
-- (e.g. 'Message', etc.) has been deleted before sending it to LEMF.
decryptionKeysAvailable (3) ,
-- This value indicates to LEMF that the IRI carries CC decryption keys for the session
-- under interception.
startOfInterceptionForIMSEstablishedSession (4)
-- This value indicates to LEMF that the IRI carries information related to
-- interception started on an already established IMS session.
}
Services-Data-Information ::= SEQUENCE
3GPP
Release 12
153
{
gPRS-parameters [1] GPRS-parameters OPTIONAL,
...
}
GPRS-parameters ::= SEQUENCE
{
pDP-address-allocated-to-the-target
[1] DataNodeAddress OPTIONAL,
aPN
[2] OCTET STRING (SIZE(1..100)) OPTIONAL,
pDP-type
[3] OCTET STRING (SIZE(2)) OPTIONAL,
-- Include either Octets 3 and 4 of the Packet Data Protocol Address information element
-- of 3GPP TS 24.008 [9] or Octets 4 and 5 of the End User Address IE of 3GPP TS 29.060 [17].
-- when PDP-type is IPv4 or IPv6, the IP address is carried by parameter
-- pDP-address-allocated-to-the-target
-- when PDP-type is IPv4v6, the additional IP address is carried by parameter
-- additionalIPaddress
...,
nSAPI
[4] OCTET STRING (SIZE (1)) OPTIONAL,
-- Include either Octet 2 of the NSAPI IE of 3GPP TS 24.008 [9]
-- or Octet 2 of the NSAPI IE of 3GPP TS 29.060 [17].
additionalIPaddress
[5] DataNodeAddress OPTIONAL
}
GPRSOperationErrorCode ::= OCTET STRING
-- The parameter shall carry the GMM cause value or the SM cause value, as defined in the
-- standard [9], without the IEI.
(1),
(2),
3GPP
Release 12
154
servingMMEaddress
[20] OCTET STRING
OPTIONAL,
-- Contains the data fields from the Diameter Origin-Host and Origin-Realm AVPs
-- as received in the HSS from the MME according to the TS 29.272 [59].
-- Only the data fields from the Diameter AVPs are provided concatenated
-- with a semicolon to populate this field.
bearerDeactivationType
[21] TypeOfBearer
OPTIONAL,
bearerDeactivationCause
[22] OCTET STRING (SIZE (1))
OPTIONAL,
ePSlocationOfTheTarget
[23] EPSLocation
OPTIONAL,
-- the use of ePSLocationOfTheTarget is mutually exclusive with the use of locationOfTheTarget
-- ePSlocationOfTheTarget allows using the coding of the paramater according to SAE stage 3.
...,
pDNType
[24]
OCTET STRING (SIZE (1))
OPTIONAL,
-- coded according to TS 24.301 [47]
requestType
[25] OCTET STRING (SIZE (1))
OPTIONAL,
-- coded according to TS 24.301 [47]
uEReqPDNConnFailReason
[26] OCTET STRING (SIZE (1))
OPTIONAL,
-- coded according to TS 24.301 [47]
extendedHandoverIndication
[27] OCTET STRING (SIZE (1))
OPTIONAL
-- This parameter with value 1 indicates handover based on the flags in the TS 29.274 [46].
-- Otherwise set to the value 0.
-- The use of extendedHandoverIndication and handoverIndication parameters is
-- mutually exclusive and depends on the actual ASN.1 encoding method.
} -- All the parameters within EPS-GTPV2-SpecificParameters are coded as the corresponding IEs
-- without the octets containing type and length. Unless differently stated, they are coded
-- according to 3GPP TS 29.274 [46]; in this case the octet containing the instance
-- shall also be not included.
3GPP
Release 12
155
{
lifetime
accessTechnologyType
aPN
iPv6HomeNetworkPrefix
protConfigurationOption
handoverIndication
status
revocationTrigger
iPv4HomeAddress
iPv6careOfAddress
iPv4careOfAddress
...,
servingNetwork
dHCPv4AddressAllocationInd
ePSlocationOfTheTarget
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
INTEGER (0..65535)
OCTET STRING (SIZE
OCTET STRING (SIZE
OCTET STRING (SIZE
OCTET STRING
OCTET STRING (SIZE
INTEGER (0..255)
INTEGER (0..255)
OCTET STRING (SIZE
OCTET STRING
OCTET STRING
(4))
(1..100))
(20))
(4))
(4))
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL
[1]
[2]
INTEGER (0..65535)
OCTET STRING (SIZE (25))
OPTIONAL,
OPTIONAL,
[3]
[4]
[5]
[6]
[7]
[8]
[9]
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
[1]
[2]
[3]
[4]
[5]
[7]
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
OPTIONAL,
3GPP
Release 12
B.10
156
DEFINITIONSIMPLICITTAGS::=
BEGIN
IMPORTS
EPSCorrelationNumber
FROM EpsHI2Operations
{itu-t(0) identified-organization(4) etsi(0) securityDomain(2) lawfulintercept(2) threeGPP(4)
hi2eps(8) r8(8) version-0(0)}
-- Imported from TS 33.108 v.8.6.0
LawfulInterceptionIdentifier,
TimeStamp
FROM HI2Operations
{itu-t(0) identified-organization(4) etsi(0) securityDomain(2) lawfulIntercept(2) hi2(1)
version10(10)}; -- from ETSI HI2Operations TS 101 671 v3.3.1
-- Object Identifier Definitions
-- Security DomainId
lawfulInterceptDomainId OBJECT IDENTIFIER ::= {itu-t(0) identified-organization(4) etsi(0)
securityDomain(2) lawfulIntercept(2)}
-- Security Subdomains
threeGPPSUBDomainId OBJECT IDENTIFIER ::= {lawfulInterceptDomainId threeGPP(4)}
hi3DomainId OBJECT IDENTIFIER ::= {threeGPPSUBDomainId hi3eps(9) r8(8) version-0(0)}
CCPDU ::=SEQUENCE
{
uLICheader
[1]ULICheader,
payload
[2]OCTETSTRING
}
ULICheader::=SEQUENCE
{
hi3DomainId
[0] OBJECTIDENTIFIER,3GPPHI3Domain
lIID
[2]LawfulInterceptionIdentifierOPTIONAL,
correlationNumber
[3] EPSCorrelationNumber,
timeStamp
[4] TimeStampOPTIONAL,
sequencenumber
[5] INTEGER(0..65535),
tPDUdirection
[6]TPDUdirection,
...,
national-HI3-ASN1parameters
[7] National-HI3-ASN1parameters OPTIONAL,
-- encoded per national requirements
icetype
[8]ICEtypeOPTIONAL
TheICEtypeindicatestheapplicableInterceptingControlElement(seeref[19])inwhich
theTPDUisintercepted.
}
3GPP
Release 12
-----
157
}
ICE-type ::= ENUMERATED
{
sgsn
(1),
ggsn
(2),
...,
s-GW
(3),
pDN-GW
(4),
colocated-SAE-GWs (5)
}
END-- OF Eps-HI3-PS
3GPP
Release 12
B.11
158
3GPP
Release 12
ConfIRISequence
159
ERROR
ERROR
ERROR
ERROR
::=
::=
::=
::=
{
{
{
{
CODE
CODE
CODE
CODE
local:0}
local:1}
local:2}
local:3}
-- PARAMETERS FORMATS
3GPP
Release 12
160
(1),
(2),
(3),
(4),
(5),
(6),
(7),
(8),
(9),
(10),
(11),
(12),
(13),
...
}
OPTIONAL,
iMPI
OPTIONAL,
...
}
IMSIdentity ::= SEQUENCE
{
sip-uri
[1] OCTET STRING
-- See [REF 26 of 33.108]
tel-url
[2] OCTET STRING
-- See [REF 36 of 33.108]
OPTIONAL,
OPTIONAL,
...
}
SupportedMedia ::= SEQUENCE
{
confServerSideSDP
[1] OCTET STRING
OPTIONAL,
-- describing Conf Server Side characteristics.
confUserSideSDP
[2] OCTET STRING
OPTIONAL,
-- describing Conf User Side characteristics
...
}
MediaModification ::= ENUMERATED
{
add (1),
remove (2),
change (3),
unknown (4),
...
3GPP
Release 12
161
}
ConfEventFailureReason ::= CHOICE
{
failedConfStartReason
[1] Reason,
failedPartyJoinReason
[2] Reason,
failedPartyLeaveReason
[3] Reason,
failedBearerModifyReason
[4] Reason,
failedConfEndReason
[5] Reason,
...
}
ConfEventInitiator ::= CHOICE
{
confServer
[1] NULL,
confTargetID
[2] PartyIdentity,
confPartyID
[3] PartyIdentity,
...
}
RecurrenceInfo ::= SEQUENCE
{
recurrenceStartDateAndTime
[1] TimeStamp OPTIONAL,
recurrenceEndDateAndTime
[2] TimeStamp OPTIONAL,
recurrencePattern
[3] UTF8String OPTIONAL, -- includes a description of
-- the recurrence pattern, for example, Yearly, on Jan 23 or Weekly, on Monday
...
}
Reason ::= OCTET STRING
END -- OF ConfHI2Operations
DEFINITIONSIMPLICITTAGS::=
BEGIN
IMPORTS
LawfulInterceptionIdentifier,
TimeStamp
FROM HI2Operations
{itu-t(0) identified-organization(4) etsi(0) securityDomain(2) lawfulIntercept(2) hi2(1)
version10(10)}-- from ETSI HI2Operations TS 101 671
ConfCorrelation,
ConfPartyInformation
FROM CONFHI2Operations
{itu-t(0) identified-organization(4) etsi(0) securityDomain(2) lawfulintercept(2)
threeGPP(4) hi2conf(10) r8(8) version-0 (0)};
-- Imported from Conf HI2 Operations part of this standard
-- Object Identifier Definitions
3GPP
Release 12
162
-- Security DomainId
lawfulInterceptDomainId OBJECT IDENTIFIER ::= {itu-t(0) identified-organization(4) etsi(0)
securityDomain(2) lawfulIntercept(2)}
-- Security Subdomains
threeGPPSUBDomainId OBJECT IDENTIFIER ::= {lawfulInterceptDomainId threeGPP(4)}
hi3confDomainId OBJECT IDENTIFIER ::= {threeGPPSUBDomainId hi3conf(11) r11(11) version-0(0)}
ConfCCPDU ::=SEQUENCE
{
confULICheader
[1]ConfULICheader,
payload
[2]OCTETSTRING
}
ConfULICheader::=SEQUENCE
{
hi3DomainId
[0] OBJECTIDENTIFIER,3GPPHI3Domain
lIID
[2]LawfulInterceptionIdentifierOPTIONAL,
correlation
[3] ConfCorrelation,
timeStamp
[4] TimeStampOPTIONAL,
sequencenumber
[5] INTEGER(0..65535),
tPDUdirection
[6]TPDUdirection,
national-HI3-ASN1parameters
[7] National-HI3-ASN1parameters OPTIONAL,
-- encoded per national requirements
mediaID
[9]MediaIDOPTIONAL,
Identifiesthemediabeingexchangedbypartiesontheconference.
...
}
OPTIONAL,
...
}
3GPP
Release 12
163
3GPP
Release 12
164
Annex C (normative):
UMTS and EPS HI3 interfaces
There are two possible methods for delivery of content of communication to the LEMF standardized in this document:
-
FTP
Two versions of ULIC are defined for UMTS PS interception: version 0 and version 1.
ULICv1 shall be supported by the network and, optionally, ULICv0 may be supported by the network. When both are
supported, ULICv1 is the default value.
ULIC version 0 is not specified for EPS.
C.1
C.1.1 Introduction
The header and the payload of the communication between the intercepted subscriber and the other party (later called:
Payload Information Element) is duplicated. A new header (later called: ULIC-Header) is added before it is sent to
LEMF.
Data packets with the ULIC header shall be sent to the LEA via UDP/IP or TCP/IP.
Correlation Number.
Direction.
Sequence Number.
Length.
2
3-4
5-6
7-8
9
10
11
12
13-20
'1'
Spare
'1'
ICE
type
DIR
'0'
3GPP
Release 12
165
Message Type shall be set to 255 (the unique value that is used for T-PDU within GTP TS 29.060 [17]).
Length shall be the length, in octets, of the signalling message excluding the ULIC header. Bit 8 of octet 3 is the
most significant bit and bit 1 of octet 4 is the least significant bit of the length field.
Sequence Number is an increasing sequence number for tunneled T-PDUs. Bit 8 of octet 5 is the most significant
bit and bit 1 of octet 6 is the least significant bit of the sequence number field.
NOTE:
When a handoff occurs between SGSNs, the DF3 serving the LEA may change. If the DF3 serving an
LEA changes as a result of an handoff between SGSNs, contiguous sequencing may not occur as new
sequencing may be initiated at the new DF3. Accordingly, the LEA should not assume that sequencing
shall be contiguous when handoff occurs between SGSNs and the DF3 serving the LEA changes.
Correlation Number consists of two parts: GGSN-ID identifies the GGSN which creates the Charging-ID.
Charging-ID is defined in TS 29.060 [17] and assigned uniquely to each PDP context activation on that GGSN (4
octets).
The correlation number consist of 8 octets. The requirements for this correlation number are similar to that
defined for charging in TS 29.060 [17]. Therefore it is proposed to use the Charging-ID, defined in
TS 29.060 [17] as part of correlation number. The Charging-ID is signalled to the new SGSN in case of SGSNchange so the tunnel identifier could be used "seamlessly" for the HI3 interface.
0
1
2
3
01234567890123456789012345678901
Charging ID
Charging ID
Charging ID
Charging ID
Octet 1
Octet 2
Octet 3
Octet 4
GGSN-ID
Octet 13-16
Octet 17-20
Intercepting Control Element (ICE, see TS 33.107 [19]) type. Indicates whether the T-PDU was intercepted in
the GGSN or in the SGSN:
"0" indicating GGSN; and
"1" indicating SGSN.
This parameter is needed only in case the GGSN and the SGSN use the same Delivery Function/Mediation
Function for the delivery of Content of Communication.
The ULIC header is followed by a subsequent payload information element. Only one payload information element is
allowed in a single ULIC message.
Octets
1 20
21 n
Bits
5
4
3
ULIC-Header
Payload Information Element
6
Figure C.3: ULIC header followed by the subsequent payload Information Element
3GPP
Release 12
166
The payload information element contains the header and the payload of the communication between the intercepted
subscriber and the other party.
correlation number (correlation-Number). As defined in clause 6.1.3 for UMTS PS and clause 10.1.3 for EPS.
sequence number (sequence-number). Sequence Number is an increasing sequence number for tunneled T-PDUs.
Handling of sequence number is application dependent; it is done according to national requirements (e.g. unique
sequence number per PDP-context).
NOTE:
When a handoff occurs between SGSNs or other Core Network nodes, the DF3 serving the LEA may
change. If the DF3 serving an LEA changes as a result of an handoff between SGSNs or other Core
Network nodes, contiguous sequencing may not occur as new sequencing may be initiated at the new
DF3. Accordingly, the LEA should not assume that sequencing shall be contiguous when handoff occurs
between SGSNs or other Core Network nodes and the DF3 serving the LEA changes.
The ULIC header is followed by a subsequent payload information element. Only one payload information element is
allowed in a single ULIC message (see annex B.4 for UMTS PS interception and annex B.10 for EPS interception).
The payload information element contains the header and the payload of the communication between the intercepted
subscriber and the other party.
3GPP
Release 12
167
Collecting and storing of the incoming packets inline with the sequence numbers.
Correlating of CC to IRI with the use of the correlation number in the ULIC header.
C.2
FTP
C.2.1 Introduction
At HI3 interface FTP is used over the internet protocol stack for the delivery of the result of interception. FTP is defined
in IETF STD 9 [13]. The IP is defined in IETF STD0005 [15]. The TCP is defined in IETF STD0007 [16].
FTP supports reliable delivery of data. The data may be temporarily buffered in the sending node (MF) in case of link
failure. FTP is independent of the payload data it carries.
There are two possible ways how the interception data may be sent from the MF to the LEMF. One way is to produce
files that contain interception data only for one observed target (see: "File naming method A)"). The other way is to
multiplex all the intercepted data that MF receives to the same sequence of general purpose interception files sent by the
MF (see: "File naming method B)").
The HI2 and HI3 are logically different interfaces, even though in some installations the HI2 and HI3 packet streams
might also be delivered via a common transmission path from a MF to a LEMF. It is possible to correlate HI2 and HI3
packet streams by having common (referencing) data fields embedded in the IRI and the CC packet streams.
File naming:
The names for the files transferred to a LEA are formed according to one of the 2 available formats, depending on the
delivery file strategy chosen (e.g. due to national convention or operator preference).
Either each file contains data of only one observed target (as in method A) or several targets' data is put to files common
to all observed target traffic through a particular MF node (as in method B).
The maximum set of allowed characters in interception file names are "a""z", "A""Z", "-", "_", ".", and decimals
"0""9".
File naming method A):
<LIID>_<seq>.<ext>
LIID =
seq =
integer ranging between [0..2^64-1], in ASCII form (not exceeding 20 ASCII digits), identifying the
sequence number for file transfer from this node per a specific target.
ext =
ASCII integer ranging between ["1".."8"] (in hex: 31H38H), identifying the file type. The possible file
type codings for intercepted data are shown in table C.1. The types "2", "4", and "6" are reserved for the HI3
3GPP
Release 12
168
interface and type "8" is reserved for data files according to a national requirement by using the same file
naming concept.
Table C.1: Possible file types
File types that the LEA may get
"1" (in binary: 0011 0001)
"2"
"4"
"6"
"7"
"8"
The least significant bit that is '1' in file type 1, is reserved for indicating IRI data and may be used for indicating that
the HI2 and HI3 packet streams are delivered via a common transmission path from a MF to a LEMF.
The bit 2 of the ext tells whether the CC(MO) is included in the intercepted data.
The bit 3 of the ext tells whether the CC(MT) is included in the intercepted data.
The bit 4 of the ext tells whether the intercepted data is according to a national requirement.
Thus, for CC(MO) data, the file type is "2", for CC(MT) data "4", for CC(MO&MT) data "6" and for "national use"
data the file type is "8".
When HI2 and HI3 packet streams are delivered via a common transmission path from a MF to a LEMF, then the file
type is "7", that indicates the presence of both the IRI and the CC(MO&MT) data.
This alternative A is used when each target's intercepted data is gathered per observed target to dedicated delivery files.
This method provides the result of interception in a very refined form to the LEAs, but requires somewhat more
resources in the sending node than alternative B. With this method, the data sorting and interpretation tasks of the
LEMF are considerably easier to facilitate in near real time than in alternative B.
File naming method B):
The other choice is to use monolithic fixed format file names (with no trailing file type part in the file name):
<filenamestring>
(e.g. ABXY00041014084400006)
where:
ABXY =
Source node identifier part, used for all files by the mobile network operator "AB" from this MF
node named "XY".
00 =
04=
10=
14 =
08 =
44=
0000 =
ext =
year 2000
month April
day 10
hour
minutes
seconds
extension
file type. Coding: "2" = CC(MO), "4" = CC(MT), "6" = CC(MO&MT), "8" = national use. The
type "1" is reserved for IRI data files and may be used for indicating that the HI2 and HI3 packet
streams are delivered via a common transmission path from a MF to a LEMF. In such a case, the
file type is "7", that indicates the presence of both the IRI and the CC(MO&MT) data.
This alternative B is used when several targets' intercepted data is gathered to common delivery files. This method does
not provide the result of interception in as refined form to the LEAs as the alternative A, but it is faster in performance
for the MF point of view. With this method, the MF does not need to keep many files open like in alternative A.
3GPP
Release 12
169
In case the transit network or receiving end system (LEMF) is down for a reasonably short time period, the local
buffering at the MF will be sufficient as a delivery reliability backup procedure.
In case the transit network or receiving end system (LEMF) is down for a very long period, the local buffering at the
MF may have to be terminated. Then the following intercepted data coming from the intercepting nodes towards the MF
would be discarded, until the transit network or LEMF is up and running again.
3GPP
Release 12
170
130
Type
2
Length
131
132
133
134
137
141
144
8 or 20
254
1-25
255
1-N
Value
Version = the version number of the format version to be used. This field
has a decimal value, this enables version changes to the format version.
The values are allocated according to national conventions.
HeaderLength = Length of the CC-header up to the start of the payload in
octets.
(This field is optional since it is useful only in such cases that these
information elements would be transferred without a dynamic length
encapsulation that contains all the length information anyway. This field
could be needed in case of e.g. adapting to a local encapsulation
convention.)
PayloadLength = Length of the payload following the CC-header in octets.
(This field is optional since it is useful only in such cases that these
information elements would be transferred without a dynamic length
encapsulation that contains all the length information anyway. This field
could be needed in case of e.g. adapting to a local encapsulation
convention.)
PayloadType = Type of the payload, indicating the type of the CC. Type of
the payload. This field has a decimal value. The possible PDP Type values
can be found in the standards (e.g.3GPP TS 29.060 [17]). The value 255 is
reserved for future PDP Types and means: "Other".
The PDP Type values defined in TS 29.060 [17] are used for the GTPv2
and for the PMIP protocols as well. The PDN Type (GTPv2) or the IPv6
Home network prefix option/IPv4 home address option (PMIP) are mapped
to the PDP Type values based on the IP version information.
PayloadTimeStamp = Payload timestamp according to intercepting node.
(Precision: 1 second, timezone: UTC). Format: Seconds since 1970-01-01
as in e.g. Unix (length: 4 octets).
PayloadDirection = Direction of the payload data. This field has a decimal
value 0 if the payload data is going towards the target (ie. downstream), or
1 if the payload data is being sent from the target (ie. upstream). If this
information is transferred otherwise, e.g. in the protocol header, this field is
not required as mandatory. If the direction information is not available
otherwise, it is mandatory to include it here in the CC header.
CCSeqNumber = Identifies the sequence number of each CC packet
during interception of the target. This field has a 32-bit value.
CorrelationNumber = Identifies an intercepted session of the observed
target. This can be implemented by using e.g. the Charging Id (4 octets,
see [14]) with the (4-octet/16-octet) Ipv4/Ipv6 address of the PDP context
maintaining GGSN node attached after the first 4 octets.
<Possible future parameters are to be allocated between 145 and 250.>
LIID = Field indicating the LIID as defined in this document. This field has a
character string value, e.g. "ABCD123456".
PrivateExtension = An optional field. The optional Private Extension
contains vendor or LEA or operator specific information. It is described in
the document 3GPP TS 29.060 [17].
3GPP
Release 12
171
130
Type
2
Length
131
132
133
134
137
141
144
8 or 20
251
252
253
254
1-25
255
1-N
Value
Version = the version number of the format version to be used. This field
has a decimal value, this enables version changes to the format version.
The values are allocated according to national conventions.
HeaderLength = Length of the CC-header up to the start of the payload in
octets.
(This field is optional since it is useful only in such cases that these
information elements would be transferred without a dynamic length
encapsulation that contains all the length information anyway. This field
could be needed in case of e.g. adapting to a local encapsulation
convention).
PayloadLength = Length of the payload following the CC-header in octets.
(This field is optional since it is useful only in such cases that these
information elements would be transferred without a dynamic length
encapsulation that contains all the length information anyway. This field
could be needed in case of e.g. adapting to a local encapsulation
convention.)
PayloadType = Type of the payload, indicating the type of the CC. Type of
the payload. This field has a decimal value. The possible PDP Type values
can be found in the standards (e.g.3GPP TS 29.060 [17]). The value 255 is
reserved for future PDP Types and means: "Other".
The PDP Type values defined in TS 29.060 [17] are used for the GTPv2
and for the PMIP protocols as well. The PDN Type (GTPv2) or the IPv6
Home network prefix option/IPv4 home address option (PMIP) are mapped
to the PDP Type values based on the IP version information.
PayloadTimeStamp = Payload timestamp according to intercepting node.
(Precision: 1 second, timezone: UTC). Format: Seconds since 1970-01-01
as in e.g. Unix (length: 4 octets).
PayloadDirection = Direction of the payload data. This field has a decimal
value 0 if the payload data is going towards the target (ie. downstream), or
1 if the payload data is being sent from the target (ie. upstream). If this
information is transferred otherwise, e.g. in the protocol header, this field is
not required as mandatory. If the direction information is not available
otherwise, it is mandatory to include it here in the CC header.
CCSeqNumber = Identifies the sequence number of each CC packet
during interception of the target. This field has a 32-bit value.
CorrelationNumber = Identifies an intercepted session of the observed
target. This can be implemented by using e.g. the Charging Id (4 octets,
see [14]) with the (4-octet/16-octet) Ipv4/Ipv6 address of the PDP context
maintaining GGSN node attached after the first 4 octets.
<Possible future parameters are to be allocated between 145 and 250.>
MainElementID = Identifier for the TLV element that encompasses one or
more HeaderElement-PayloadElement pairs for intercepted packets.
HeaderElementID = Identifier for the TLV element that encompasses the
CC-header of a PayloadElement.
PayloadElementID = Identifier for the TLV element that encompasses one
intercepted Payload packet.
LIID = Field indicating the LIID as defined in this document. This field has a
character string value, e.g. "ABCD123456".
PrivateExtension = An optional field. The optional Private Extension
contains vendor or LEA or operator specific information. It is described in
the document 3GPP TS 29.060 [17].
3GPP
Release 12
172
TLV encoding:
Type (2 octets)
Length (2 octets)
(The small "v" refers to the start of a Value field that has inside it a nested structure).
CC Length
CC
(2 octets)
(N octets)
CC Header IE
HeaderElem.ID HeaderLength
(2 octets)
(2 octets)
CC Payload IE
Header Value PayloadElem.ID PayloadLength
(N octets)
Payload Value
(N octets)
(2 octets)
(2 octets)
Version IE
VersionID
Length
Version
(2 octets)
(2 octets)
(2 octets)
PrivateExtension IE
PrivateExt.ID
(2 octets)
Length PrivateExtension
(2 octets)
(N octets)
3GPP
Release 12
173
stream
Format:
non-print
Structure:
file-structure
Type:
binary
The FTP service command to define the file system function at the server side: STORE mode for data transmission.
The FTP client (=user -FTP process at the MF) uses e.g. the default standard FTP ports 20 (for data connection) and 21
(for control connection), 'passive' mode is supported. The data transfer process listens the data port for a connection
from a server-FTP process.
For the file transfer from the MF to the LEMF(s) e.g. the following data transfer parameters are provided for the FTP
client (at the MF):
-
interception file type, e.g. "2" (this is needed only if the file naming method A is used).
LEMF may use various kind directory structures for the reception of interception files. It is strongly recommended that
at the LEMF machine the structure and access and modification rights of the storage directories are adjusted to prevent
unwanted directory operations by a FTP client.
The use of IPSec services for this interface is recommended.
Timing considerations for the FTP transmission
The MF and LEMF sides control the timers to ensure reliable, near-real time data transfer. The transmission related
timers are defined within the lower layers of the used protocol and are out of scope of this document.
The following timers may be used within the LI application:
Table C.4: Timing considerations
Name
T1 inactivity timer
Controlled by
LEMF
Units
Seconds
Milliseconds
Description
Triggered by no activity within the FTP session (no
new files). The FTP session is torn down when the T1
expires. To send another file the new connection will
be established. The timer avoids the FTP session
overflow at the LEMF side.
Forces the file to be transmitted to the LEMF (even if
the size limit has not been reached yet in case of
volume trigger active). If the timer is set to 0 the only
trigger to send the file is the file size parameter (see
C.2.2).
3GPP
Release 12
174
At the LEMF side, FTP server process is run, and at MF, FTP client. No FTP server (which could be accessed from
outside the operator network) shall run in the MF. The FTP client can be implemented in many ways, and here the FTP
usage is presented with an example only. The FTP client can be implemented by a batch file or a file sender program
that uses FTP via an API. The login needs to occur only once per e.g. <destaddr> and <leauser> - pair. Once the login is
done, the files can then be transferred just by repeating "mput" command and checking the transfer status (e.g. from the
API routine return value). To prevent inactivity timer triggering, a dummy command (e.g. "pwd") can be sent every
T seconds (T should be less than L, the actual idle time limit). If the number of FTP connections is wanted to be as
minimized as possible, the FTP file transfer method "B" is to be preferred to the method A (though the method A helps
more the LEMF by pre-sorting the data sent).
Simple example of a batch file extract:
FTP commands usage scenario for transferring a list of files:
To prevent FTP cmd line buffer overflow the best way is to use wildcarded file names, and let the FTP implementation
do the file name expansion (instead of shell). The number of files for one mput is not limited this way:
ftp <flags> <destaddr>
user <leauser> <leapasswd>
cd <destpath>
lcd <srcpath>
bin
mput <files>
nlist <lastfile> <checkfile>
close
EOF
This set of commands opens an FTP connection to a LEA site, logs in with a given account (auto-login is disabled),
transfers a list of files in binary mode, and checks the transfer status in a simplified way.
Brief descriptions for the FTP commands used in the example:
user <user-name> <password>
cd <remote-directory>
lcd <directory>
bin
mput <local-files>
nlist <remote-directory> <local-file>
close
3GPP
Release 12
175
The FTP application should to do the following things if the check file is not found:
-
raise "file transfer failure" error condition (i.e. send alarm to the corresponding LEA);
the data can be buffered for a time that the buffer size allows. If that would finally be exhausted, DF would start
dropping the corresponding target's data until the transfer failure is fixed;
the transmission of the failed files is retried until the transfer eventually succeeds. Then the DF would again start
collecting the data;
upon successful file transfer the sent files are deleted from the DF.
The FTP server at LEMF shall not allow anonymous login of an FTP client.
It is required that FTP implementation guarantees that LEMF will start processing data only after data transfer is
complete.
The following implementation example addresses a particular issue of FTP implementation. It is important however to
highlight that there are multiple ways of addressing the problem in question, and therefore the given example does not
in any way suggest being the default one.
MF sends data with a filename, which indicates that the file is temporary. Once data transfer is complete, MF
renames temporary file into ordinary one (as defined in F.3.2.2).
The procedure for renaming filename should be as follow:
1) open FTP channel (if not already open) from MF to LEMF;
2) sends data to LEMF using command "put" with temporary filename;
3) after MF finished to send the file, renaming it as ordinary one with command "ren".
Brief descriptions for the FTP commands used in the example:
ren <from-name> <to-name>
renaming filename from-name to to-name.
IftheftpclientwanttosendfiletoLEMFusingthecommand"mput"(e.g.MFstoredmanyIRIfilesandwant
tosendalltogetherwithonecommand),everyfilenametransferredsuccessfullymustberenamedeachafter
command"mput"ended.
3GPP
Release 12
176
Annex D (informative):
LEMF requirements - handling of unrecognised fields and
parameters
During decoding of a record at the LEA, the following exceptional situations may occur:
1) Unrecognized parameter: The parameter layout can be recognized, but its name is not recognized:
The parameter shall be ignored, the processing of the record proceeds.
2) The parameter content or value is not recognized or not allowed:
The parameter shall be ignored, the processing of the record proceeds.
3) The record cannot be decoded (e.g. it seems to be corrupted):
The whole record shall be rejected when using ROSE delivery mechanism or ignored.
NOTE:
In cases 2 and 3, the LEMF may wish to raise an alarm to the operator (NO/AN/SP) administration
centre. For case 1, no special error or alarm procedures need be started at the LEA, because the reason
may be the introduction of a new version of the specification in the network, not be an error as such
security aspects.
3GPP
Release 12
177
Annex E (informative):
Bibliography
The following material, though not specifically referenced in the body of the present document (or not publicly
available), gives supporting information.
1.
ITU-T Recommendation X.25: "Interface between Data Terminal Equipment (DTE) and Data
Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and connected to
public data networks by dedicated circuit".
2.
Void.
3.
Void.
4.
EN 300 061-1: "Integrated Services Digital Network (ISDN); Subaddressing (SUB) supplementary
service; Digital Subscriber Signalling System No. one (DSS1) protocol; Part 1: Protocol
specification".
5.
EN 300 097-1 including Amendment 1: "Integrated Services Digital Network (ISDN); Connected
Line Identification Presentation (COLP) supplementary service; Digital Subscriber Signalling
System No. one (DSS1) protocol; Part 1: Protocol specification".
6.
EN 300 098-1: "Integrated Services Digital Network (ISDN); Connected Line Identification
Restriction (COLR) supplementary service; Digital Subscriber Signalling System No. one (DSS1)
protocol; Part 1: Protocol specification".
7.
EN 300 130-1: "Integrated Services Digital Network (ISDN); Malicious Call Identification
(MCID) supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol;
Part 1: Protocol specification".
8.
EN 300 138-1 including Amendment 1: "Integrated Services Digital Network (ISDN); Closed User
Group (CUG) supplementary service; Digital Subscriber Signalling System No. one (DSS1)
protocol; Part 1: Protocol specification".
9.
EN 300 185-1: "Integrated Services Digital Network (ISDN); Conference call, add-on (CONF)
supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol; Part 1:
Protocol specification".
10.
ETS 300 188-1: "Integrated Services Digital Network (ISDN); Three-Party (3PTY) supplementary
service; Digital Subscriber Signalling System No. one (DSS1) protocol; Part 1: Protocol
specification".
11.
EN 300 207-1 (V1.2): "Integrated Services Digital Network (ISDN); Diversion supplementary
services; Digital Subscriber Signalling System No. one (DSS1) protocol; Part 1: Protocol
specification".
12.
EN 300 286-1: "Integrated Services Digital Network (ISDN); User-to-User Signalling (UUS)
supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol; Part 1:
Protocol specification".
13.
EN 300 369-1 (V1.2): "Integrated Services Digital Network (ISDN); Explicit Call Transfer (ECT)
supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol; Part 1:
Protocol specification".
14.
EN 300 196-1 (V1.2): "Integrated Services Digital Network (ISDN); Generic functional protocol
for the support of supplementary services; Digital Subscriber Signalling System No. one (DSS1)
protocol; Part 1: Protocol specification".
15.
ITU-T Recommendation Q.850: "Usage of cause and location in the Digital Subscriber Signalling
System No. 1 and the Signalling System No. 7 ISDN User Part".
3GPP
Release 12
178
16.
ITU-T Recommendation X.881: "Information technology - Remote Operations: OSI realizations Remote Operations Service Element (ROSE) service definition".
17.
Void.
18.
EN 300 122-1: "Integrated Services Digital Network (ISDN); Generic keypad protocol for the
support of supplementary services; Digital Subscriber Signalling System No. one (DSS1) protocol;
Part 1: Protocol specification".
19.
ETS 300 392-1: "Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 1: General
network design".
20.
EN 301 344, GSM 03.60: "Digital cellular telecommunications system (Phase 2+); GPRS Service
description stage 2".
21.
22.
Void.
23.
ETSI TR 101 876 "Telecommunications security; Lawful Interception (LI); Description of GPRS
HI3".
24.
ETSI ES 201 671: "Handover Interface for the lawful interception of telecommunications traffic".
3GPP
Release 12
179
Annex F (informative):
Correlation indications of IMS IRI with GSN CC at the LEMF
This section is informative and provides some guidelines pertaining to correlating IMS IRI with GSN CC at the LEMF.
For IMS-enabled multimedia communication scenarios involving a lawful intercept target, it will be necessary for the
LEMF to be able to correlate the media streams (as provided in the CC intercepted by the GSN) with the specific SIP
signaling (as provided in the IRI intercepted by the CSCFs) used to establish those media streams. The principal reason
for this is that the SDP content within the SIP signaling may provide the information required to even be able to decode
the media streams. In certain cases, for example, the information in the RTP header within the media stream packets
may not be sufficient to be able to determine the specific encoding used. The SDP portion of the SIP signaling would
need to provide this information. Another important reason is that the SIP signaling provides information about the
participants in a SIP session (other than the target) sending and receiving the associated media streams.The LIID
parameter in the IMS IRI and GSN CC can be used to correlating all of the IMS IRI and all of the GSN CC associated
with a particular target. If a single LIID is used in association all of the target's IMS identities (as per a NO/AN/SP
agreement with the LEA), the process of associating the IMS IRI and GSN CC information is fairly straightforward. If,
however, multiple LIIDs are used (e.g. one per IMS identity) then the LEMF needs to be able to associate each of the
LIIDs that may be used for the IMS IRI with the LIID used for the CC.
The SIP messsages provided to the LEMF would contain a number of additional items of information that could be
relevant with respect to supporting correlations of various types. Their potential role in correlating IMS IRI and GSN
CC (or, more specifically, correlating SIP dialogs with media streams) is discussed below:
-
Call-ID, From tag, To tag : These SIP headers would identify different SIP messages belonging to the same
SIP dialog (a call leg between the target user and a peer SIP user). It should be noted that the Call-ID alone is
not sufficient to identify a dialog. Correlating specific SIP dialogs with specific media streams is the principal
objective of this discussion.
P-Charging-Vector (IMS Charging ID): The principal purpose of the IMS Charging ID (ICID) in IMS is to
correlate charging information provided by different network entities for the same call. The ICID could be
useful in correlating SIP messages belonging to the same call, even if their SIP dialog identifiers are modified
(e.g. by a B2BUA application server). It should be noted, however, that the use of the ICID is not necessary for
the purpose of correlating SIP dialogs and the corresponding media streams.
P-Charging-Vector (GPRS Charging ID, GGSN address): GCIDs, along with the GGSN address, may be
used as identifiers of the PDP contexts. These identifiers (one for each PDP context used by the SIP session) are
made available to the P-CSCF and subsequently to the S-CSCF. They could be used to correlate SIP messages
with the PDP context(s) used. For the purpose of correlating SIP dialogs with media streams, this type of
correlation would be useful, although not essential.
SDP Connection addresses and ports: The address and port information within the SDP of the SIP messages need to
be matched with the addresses and ports corresponding to the media streams as provided in the CC reports. This
implies a need to look both at the SDP content of the SIP messages as well as in the packets provided by the GSN. The
set of PDP context identifiers included in the P-Charging-Vector could be used to simplify the search for a match. It
should also be noted that the SDP contained in the SIP message may also include essential information about the
encoding of each of the media streams, without which it may not be possible to decode.
3GPP
Release 12
180
Annex G (informative):
United States lawful interception
G.1 Delivery methods preferences
Law enforcement agencies want reliable delivery of intercepted communications to the LEMF:
-
U.S. Law enforcement prefers that the capability to deliver IRI to the LEMF be provided over the HI2 directly
over TCP (at the transport layer) and the Internet Protocol (IP) (at the network layer).
U.S. Law enforcement prefers that the capability to deliver content of communication to the LEMF be provided
using the GPRS LI Correlation Header over TCP/IP method for delivery.
G.2
G.2.1 TPKT/TCP/IP
G.2.1.1 Introduction
The protocol used by the "LI application" for the encoding of IRI data and the sending of IRI data between the MF and
the LEMF is based on already standardized data transmission protocols. At the HI2 interface, the "LI application"
protocol is used directly over the Transmission Control Protocol (TCP), which uses the Internet Protocol (IP) for the
delivery of the IRI. IP is defined in IETF STD0005 [15]. TCP is defined in IETF STD0007 [16].
TCP/IP supports reliable delivery of data. TCP is independent of the payload data it carries.
G.2.1.2.1
The MF shall initiate TCP connections to the LEMF for LI purposes. Once a TCP connection is established, the MF
shall send the LI application messages defined in section G.2.1.3. The MF shall not receive TCP data.
The "LI application" messages may be sent over a single TCP connection per LEMF. A TCP/IP connection shall be
capable of transporting "LI application" messages for multiple surveillance cases to a single LEA. The MF initiates the
establishment of TCP connections to the LEMF equipment designated by the LEA. Optionally, the MF may use more
than one TCP connection per LEMF for the purpose of delivering "LI application" messages to minimize the effects of
congestion or facility failures. For example, if more than one TCP connection was used "LI application" messages may
be uniformly distributed across the connections. If delays are detected on one TCP connection, the MF could begin to
transmit more messages on the other TCP connections. The number of TCP connections supported to the LEMF shall be
less than or equal to the provisioned maximum number of such connections.
G.2.1.2.2
Use of TPKT
The individual IRI parameters are coded using ASN.1 and the basic encoding rules (BER). The individual IRI
parameters are conveyed to the LEMF in "LI application" messages or IRI data records.
TCP is a stream-based protocol and has no inherent message delineation capability.
3GPP
Release 12
181
Since the upper-layer protocols are not self-describing, ISO Transport Service on top of TCP (ITOT), also referred to as
TPKT, as defined in RFC 1006 [27] and later updated by RFC 2126 [28] is used to encapsulate the "LI application"
messages before handing them off to TCP.
Therefore, TPKT shall be required and used in the transport stack of the IRI delivery interface (i.e. "LI application"
messages/TPKT/TCP/IP). Protocol class 0 defined in RFC 2126 [28] shall be supported.
G.2.1.2.3
Sending of LI messages
After the TCP connection has been established, the MF shall send the "LI application" messages defined in section
G.2.1.3 to the LEMF, when applicable events have been detected and such messages are formulated.
The basic "LI application" message is called LawfulIntercept message. When sending IRI, a LawfulIntercept message
shall be used and the IRI shall be encoded within the IRIContent parameter. Multiple IRIContent parameters may be
included within a single LawfulIntercept message. When sending the optional keep-Alive indication, the
LawfulIntercept shall be coded with the keep-Alive parameter.
In all cases, LawfulIntercept messages are only sent from the MF to the LEMF. All transfer of packets other than those
operationally required to maintain the connection must be from the MF to the LEMF only. At no time may the LEMF
equipment send unsolicited packets from the LEMF equipment to the MF.
If supported, a LawfulIntercept message including a keep-Alive parameter shall be sent when no LawfulIntercept
message has been sent for a configurable amount of time in minutes (e.g. 5 minutes), indicating to the LEMF that the LI
connection is still up. The keep-alive-time parameter shall be settable in increments of 1 minute, from 1 minute up to a
maximum of 5 minutes, with a default value of 5 minutes.
The "LI application" messages shall be encapsulated using TPKT, as defined in section G.2.1.2.2, before sending them
from the MF to the LEMF using TCP/IP.
}
EnvelopedIRIContent ::= SEQUENCE OF UmtsIRIContent
3GPP
Release 12
G.3
182
G.3.1.1.1
The MF shall initiate TCP connections to the LEMF for the purpose of delivering CC. Once a TCP connection is
established, the MF will send CC messages to the LEMF via TCP.
CC messages shall be sent over TCP connections established specifically to deliver CC. A minimum of one TCP
connection shall be established per intercept subject per LEMF to deliver CC associated only with the intercept subject.
The MF initiates the establishment of TCP connections to the LEMF equipment designated by the LEA. Optionally, the
MF may use more than one TCP connection per intercept subject per LEMF for the purpose of delivering CC associated
with the intercept subject to minimize the effects of congestion or facility failures. For example, if more than one TCP
connection is used, CC messages may be uniformly distributed across the connections. If delays are detected on one
TCP connection, the MF could begin to transmit more messages on the other TCP connections. The number of TCP
connections supported to the LEMF per intercept subject shall be less than or equal to the provisioned maximum
number of such connections.
After the TCP connection establishment procedure, the MF shall send the connectionStatus message including the
lawfulInterceptionIdentifier parameter to the LEMF. The delivery of the lawful interception identifier to the LEMF after
the TCP connection establishment procedure will assist the LEMF in correlating the TCP connection, established for
delivering content of communication, with a particular surveillance and the intercept subject.
G.3.1.1.2
Use of TPKT
G.3.1.1.3
After the TCP connection has been established and the connectionStatus message has been sent, the MF shall send the
CC messages (including the GLIC header) defined in Section C.1 using TPKT to the LEMF.
In all cases, CC messages are only sent from the MF to the LEMF. All transfer of packets other than those operationally
required to maintain the connection must be from the MF to the LEMF only. At no time may the LEMF equipment send
unsolicited packets from the LEMF equipment to the MF.
If supported, a connectionStatus message including the keep-Alive parameter shall be sent from the MF to the LEMF
when no CC message has been sent for a configurable amount of time in minutes (e.g. 5 minutes), indicating to the
LEMF that the TCP connection is still up. If a keep-alive capability is supported, a keep-Alive parameter shall be
settable in increments of 1 minute, from 1 minute up to a maximum of 5 minutes, with a default value of 5 minutes.
3GPP
Release 12
183
The CC messages and the connectionStatus message shall be encapsulated using TPKT, as defined in Section G.3.1.1.2,
before sending them from the MF to the LEMF using TCP/IP.
[0] Null,
[1] LawfulInterceptionIdentifier,
G.4
CCC
CDC
CF
DF
IAP
J-STD-025-A
Call Content
Call Content Channel
Call Data Channel
Collection Function
Call-identifying Information
Call-identifying message
Delivery Function
a-interface
b-interface
c-interface
d-interface
e-interface
Intercept Access Point
LAES
LEAF
SPAF
TSP
Intercept subject
Lawful Authorized Electronic Surveillance
CaseIdentity
Law Enforcement Administration Function
Service Provider Administration Function
SystemIdentity
Telecommunication Service Provider
CC
LEMF
IRI
HI
ICE+INE
LI
LIID
ADMF
ADMF
NID
NO/AN/SP
3GPP
Release 12
184
3GPP
Release 12
185
Annex H (normative):
United States lawful interception (PS domain and IMS)
This annex shall apply equally to all 3GPP access types, excluding CS domain (which is not covered by this document).
With respect to the handover interfaces they must be capable of delivering intercepted communications and IRI
information to the government in a format such that they may be transmitted by means of equipment, facilities, or
services procured by the government to a location other than the premises of the carrier.
With respect to location information 'when authorized' means the ability to provide location information on a persurveillance basis.
The delivery methods described in this document are optional methods and no specific method is required in the United
States. For systems deployed in the U.S., only ULIC version 1 shall be used.
The specification of lawful intercept capabilities in this document does not imply that those services supported by these
lawful intercept capabilities are covered by CALEA. Inclusion of a capability in this document does not imply that
capability is required by CALEA. This document is intended to satisfy the requirements of section 107 (a) (2) of the
Communications Assistance for Law Enforcement Act, Pub. L. 103-414 such that a telecommunications carrier,
manufacturer, or support service provider that is in compliance with this document shall have "Safe Harbor".
In the United States surveillance on the GGSN is not required, but is an option that may be negotiated between the
service provider and law enforcement. However, if direct tunnel functionality as defined in TS 23.060 [42] is used in the
network, then GGSN shall perform the interception.
A TSP shall not be responsible for decrypting or decompressing, or ensuring the government's ability to decrypt or
decompress, any communication encrypted or compressed by a subscriber or customer, unless the encryption or
compression was provided by the TSP and the TSP possesses the information necessary to decrypt or decompress the
communication. A TSP that provides the government with information about how to decrypt or decompress a
communication (e.g. identifying the type of compression software used to compress the communication, directing the
government to the appropriate vendor that can provide decryption or decompression equipment, or providing the
encryption key used to encrypt the communication) fully satisfies its obligation under the preceding sentence.
For systems deployed in the U.S, use ATIS-0700005 [55] for the reporting of IRI and CC interception for IMS VoIP and
other Multimedia Services.
For IMS-based VoIP Dialled Digits Reporting (DDR) message definition, see ATIS-0700005 [55]
NOTE 1: The term, Dialed Digit Extraction (DDE), used in [55] is the same as Dialed Digit Reporting (DDR) in
this specification.
NOTE 2: Dialled Digits are keypad digits 0, 1, 2, 3, 4, 5, 6, 7. 8, 9, *, and # entered by the intercept subject.
NOTE 3: DDR does not apply to PS domain and IMS-based multi-media services other than voice.
For systems deployed in the U.S., the network element identifier is required.
For systems deployed in the U.S., the following two records are also required for the packet domain:
1. a REPORT record shall be triggered when the 3G SGSN receives an SMS-MO communication from the
intercept subjects mobile station;
2. a REPORT record shall be triggered when the 3G SGSN receives an SMS-MT communication from the SMSCentre destined for the intercept subjects mobile station.
For systems deployed in the U.S., when a mobile terminal is authorized for service with another network operator or
service provider, or within another service area as defined in J-STD-025- B [65], a Serving System REPORT record or a
Serving Evolved Packet System REPORT Record shall be triggered.
For systems deployed in the U.S., the timestamp reported shall be coded as generalized time and provide either
coordinated universal time or local time with the local time differential from coordinated universal time.
3GPP
Release 12
186
Annex J (normative):
Definition of the UUS1 content associated and subaddressing to the CC link
For North America the use of J-STD-25 A[23] is recommended.
For the transport of the correlation information and the identifiers accompanying the CC-links there are two options:
J.1.Use of the User-to_User Signaling (UUS1) (see clause J.1).
J.2.Use of the sub-address (SUB) and calling party number (see clause J.2).
J.1
3GPP
Release 12
187
J.2
J.2.1 Introduction
Not all ISDN networks fully support the use of the UUS1 service ETSI EN 300 403-1 [31]. Some networks may be
limited to the transfer of only 32 octets of UUS1 user information rather than the 128 required for full support of the
UUS1 service. Some networks may not support UUS1 at all.
This annex describes a procedure to provide correlation information which is appropriate:
1) if a network does not support the delivery of UUS1; or
2) if a network does not support the delivery of 128 octets for UUS1.
If all network involved support the delivery of 128 octets for UUS1 then the procedure (described in this annex) is not
appropriate.
The calling party number, the calling party subaddress (CgP Sub) and the called party subaddress (CdP Sub) are used to
carry correlation information.
Value
user specified
employed for called party subaddress when no national parameters are used
J.2.3.1BCD Values
The values 0-9 shall be BCD coded according to their natural binary values. The hexadecimal value F shall be used as a
field separator. This coding is indicated in table J.2.2.
3GPP
Release 12
188
Bit 4
0
0
0
0
0
0
0
0
1
1
1
BCD representation
Bit 3
Bit 2
Bit 1
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
0
0
0
0
0
1
1
1
1
When items are packed two to an octet, the least significant item shall be coded by mapping bit 4 to bit 8, bit 3 to bit 7,
etc.
Field
Operator-ID
CIN
CCLID
National Parameters
Field
Lawful Interception Identifier (LIID)
Direction
Service Octets
Apart from National Parameters, inclusion and format of which is determined by national regulations, each field noted
above shall be included, whether empty or not. Each of the Operator-ID, CIN, CCLID, LIID and Direction fields shall
end by a field separator.
When sending entity does not have a valid value for either of Operator-ID, CIN, CCLID, LIID or Direction fields, then
the field is considered empty and it shall be represented only by its field separator.
3GPP
Release 12
189
Table J.2.4A: Example of how field separator should be used when field is empty
Bits
7
6
5
4
3
2
1
Called party subaddress identifier
Length of called party subaddress contents
Type of subaddress = user specified,
odd/even indicator
Operator-ID
Operator-ID
Operator-ID
Operator-ID
Field separator
Operator-ID
CCLID
Field separator
CCLID
CCLID
CCLID
CCLID
CCLID
CCLID
Field separator
CCLID
Octets
NOTE:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
(see note)
16
17
18
19
20
21
22
23
The Octets after the final field (CCLID) of the
Called Party Subaddress are reserved for
national use, e.g. for authentication purposes.
The parameters within the Information Elements "Called Party Subaddress" and "Calling Party Subaddress" are
variable. Because of this variable length the parameters may start in different octets in the related Information Element.
i.e. in the Calling Party Subaddress the Direction can be found in octet 17 when the LIID is 25 digits long (table J.2.6).
When the LIID is composed of less than 25 digits, the field separator and direction indicator "moves up" and the rest of
the octets is spare till octet 19. Between the last digit of the LIID and the Direction is always a Field separator (value F).
Also after the "Direction" one Field Separator is given. The last Field separator separates the relevant data from the
spare part. So the location of the TMR and the other service Octets below are fixed within the Subaddress. The total
length of the Calling Party Subaddress is fixed to 23 octets (including the two Mobile service octets) or 21 octets
(without the two Mobile service octets).
The Service Octets as available shall always be mapped into octets 19 to 23 of the Calling Party Subaddress, as
appropriate. If one of the parameters TMR, BC or HLC is not available, the octet shall be filled with "FF" hex.
In relation to Mobile Bearer Service Code and Mobile Teleservice Code, the mapping of the values into octets 22 and
23, respectively, shall be done as follows:
i. if both, Mobile Bearer Service Code and Mobile Teleservice Code are provided by signalling, octets 22 and 23,
shall be present, each containing the mapped value;
ii. if Mobile Bearer Service Code is provided by signalling, and Mobile Teleservice Code is NOT provided by
signalling, octet 22 shall be present containing the mapped value, and octet 23 shall be omitted;
iii. if Mobile Teleservice Code is provided by signalling, and Mobile Bearer Service Code is NOT provided by
signalling, there are two implementation options:
1) neither octet 22 nor octet 23 shall be present;
2) octet 22 shall be filled with "FF" hex and octet 23 shall be present containing the mapped value;
iv. if neither Mobile Teleservice Code nor Mobile Bearer Service Code is provided by signalling, neither octet 22
nor octet 23 shall be present.
3GPP
Release 12
190
As an option the Calling Party Subaddress and Called Party Subaddress may have a variable length. The length is given
in octet 2.
When the LIID is composed of less than 25 digits in the Calling Party Subaddress, the Field separator, Direction
indicator, Field separator and all the Service Octets "moves up".
National Parameters in a variable length Called Party Subaddress may have variable length.
Table J.2.5 represent called party subaddress and table J.2.6 calling party subaddress with the maximum length of the
identifiers.
Table J.2.5: Called Party Subaddress
Bits
7
6
5
4
3
2
1
Called party subaddress identifier
Length of called party subaddress contents
Type of subaddress = user specified,
odd/even indicator
Operator-ID
Operator-ID
Operator-ID
Operator-ID
Field separator
Operator-ID
CIN
CIN
CIN
CIN
CIN
CIN
CIN
CIN
CCLID
Field separator
CCLID
CCLID
CCLID
CCLID
CCLID
CCLID
Field separator
CCLID
see note
Octets
NOTE:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
The Octets after the final field (CCLID) of the
Called Party Subaddress are reserved for
national use, e.g. for authentication purposes.
3GPP
Release 12
191
3GPP
Release 12
192
J.2.4.1Direction
The direction field shall be coded as follows:
Table J.2.7: Direction coding
Indication
Mono mode (combined signal)
(historic)
CC from target
CC to target
Value
0
1
2
Nature of address:
Type of number:
As specified in ITU-T Q.951, EN 300 092 (e.g. unknown, subscriber number, national
number or international number), and Network Operator specific type of access (BRA
or PRA) (in case of DSS1 signalling, see note 2 and 3)
Screening indicator:
Screening indicator:
Presentation indicator:
Presentation allowed
NOTE 1: The relevant national specification of the Signalling System Number 7 may also specify requirements on
the Nature of address for national specific use in national variants of ISUP.
NOTE 2: Usually, the IIF respectively the Mediation Function is connected to the network by links using Signalling
System Number 7 and ISDN User Part (ISUP), whereby the parameters are coded according to
ITU-T Recommendation Q.763 [29]. But in some cases, the IIF respectively the Mediation Function may
be connected via a Basic Rate Access or a Primary Rate Access using D-Channel signalling, whereby the
parameters are coded according to ETSI EN 300 356 [30].
NOTE 3: The network will perform screening, i.e. the number will arrive at the LEMF as "user-provided, verified
and passed" with the appropriate "type of number" indicator. A network provided number shall also be
accepted at the LEMF.
Minimum length
(decimal digits)
2
6
1
2
1
Maximum length
(decimal digits)
5
8
8
25
1
3GPP
Maximum length
(Half-Octets)
5+1
8+1
8+1
25 + 1
1+1
10
I.E.
CdP Sub
CdP Sub
CdP Sub
CgP Sub
CgP Sub
CgP Sub
Release 12
193
Annex K (informative):
Change history
3GPP
Release 12
194
Change history
Date
06-2002
09-2002
12-2002
12-2002
12-2002
TSG #
SP-16
SP-17
SP-18
SP-18
SP-18
12-2002
SP-18
12-2002
03-2003
SP-18
SP-19
03-2003
SP-19
TSG Doc.
SP-020357
SP-020512
SP-020705
SP-020706
SP-020706
SP-020706
SP-020707
SP-030096
CR
001
002
003
005
006
004
008
012
SP-030099
03-2003
03-2003
SP-19
SP-19
SP-030097
03-2003
06-2003
SP-19
SP-20
SP-030149
09-2003
09-2003
09-2003
09-2003
SP-21
SP-21
SP-21
SP-21
SP-030508
SP-030509
SP-030508
09-2003
SP-21
09-2003
09-2003
09-2003
12-2003
12-2003
12-2003
SP-21
SP-21
SP-21
SP-22
SP-22
SP-22
12-2003
SP-22
12-2003
12-2003
SP-22
SP-22
SP-030591
03-2004
03-2004
03-2004
03-2004
SP-23
SP-23
SP-23
SP-23
SP-040155
SP-040156
SP-040157
SP-030098
SP-030221
SP-030508
SP-030508
SP-030508
SP-030508
SP-030482
SP-030592
SP-030593
SP-030594
SP-030594
SP-030595
009
010
014
016
017
019
020
021
022
023
024
026
028
029
030
031
032
033
034
035
036
038
SP-040158
03-2004
03-2004
SP-23
SP-23
SP-040159
03-2004
03-2004
SP-23
SP-23
SP-040161
06-2004
SP-24
06-2004
06-2004
06-2004
SP-24
SP-24
SP-24
SP-040406
SP-040407
09-2004
09-2004
09-2004
09-2004
09-2004
09-2004
09-2004
09-2004
SP-25
SP-25
SP-25
SP-25
SP-25
SP-25
SP-25
SP-25
SP-040616
SP-040616
SP-040616
SP-040616
SP-040616
SP-040685
SP-040616
09-2004
09-2004
12-2004
12-2004
SP-25
SP-25
SP-26
SP-26
SP-040616
SP-040616
SP-040851
SP-040851
SP-040160
SP-040162
SP-040405
SP-040408
SP-040616
039
041
043
044
045
047
048
049
050
051
052
053
054
055
056
057
058
059
061
062
Rev Cat
Subject/Comment
Release 5 draft Approved at TSG SA #16.
F
Corrections to TS 33.108
F
Essential corrections to the Annex C.1 (ULIC)
F
Missing PDP Context Modification event
F
Essential correction to the LI events generated
during RAU, when PDP context is active
F
Changes to TS 33.108 for U.S. LI
Requirements
B
Aggregation of IRI Records
A
Coding of ASN.1 parameters of the type
OCTET STRING
A
Incorrect ASN.1 object tree. Note: This CR is
overridden by CR009 which again replaces
figure B.1. Provided for completeness of CRs
only.
B
CS Section for 33.108
F
Adjustments to the requirements on the
delivery of the intercepted RT data over TCP
A
Correction to implementation of CR 005
1
A
Changes to meet international LI
Requirements
1
D
Correct Abbreviations in TS 33.108
1
A
Syntax error in Annex B.3
1
F
Inconsistency in Annex B.3
1
F
Data Link Establishment and Sending part for
ROSE operation
1
F
Correction on the usage of Lawful Interception
identifiers
1
F
Subscriber controlled input clarification
1
F
Field separator in subaddress
A
Reference errors in Annex G
A
Correction to Annex G on TCP based transport
B
LI Reporting of Dialed Digits
F
CS Section for 33.108 LI Management
Operation
F
CS Section for 33.108 User data packet
transfer
B
Reporting TEL URL
F
Alignment of Lawful Interception identifiers
length to ETSI TS 101 671
F
Corrections to Tables 6.2, 6.7
D
Corrections to Correlation Number
B
Correction to Identifiers
A
Correction on the description of "initiator" in
"PDP Context Modification CONTINUE
Record"
D
Editorial Corrections
A
Implications of R5 onwards QoS parameters
on ASN.1 module in 33.108.
A
Syntax error in Annex B.4
F
Clarification on the use of IRI-END record in
PS interception
F
Correction on interception identities in multimedia domain
A
WGS 84 coordinates length correction
F
CR offering alignment to ETSI TS 101 671
F
Additional text for Definition and Acronym
section
F
Explanation concerning the Sequence Number
B
National ASN.1 parameter
D
Clarifying clause titles
B
Adding azimuth in location
C
Correction of the Subaddressing definitions
1
F
Correction to hi3DomainId definition
D
Correction of wrong use of abbreviations
C
Differences between subaddress sections in
33.108 and ETSI TS 101 671
F
Replace SIP URL with SIP URI
F
Corrections to References
A
Correction to ULIC header
F
Correction on parameter
3GPP
Old
2.0.0
5.0.0
5.1.0
5.1.0
5.1.0
New
5.0.0
5.1.0
5.2.0
5.2.0
5.2.0
5.1.0
5.2.0
6.0.0
5.2.0
6.0.0
6.1.0
6.0.0
6.0.0
6.0.0
6.0.0
6.1.0
6.2.0
6.2.0
6.2.0
6.2.0
6.1.0
6.1.0
6.1.0
6.1.0
6.2.0
6.3.0
6.3.0
6.3.0
6.3.0
6.2.0
6.2.0
6.2.0
6.2.0
6.3.0
6.3.0
6.3.0
6.3.0
6.3.0
6.3.0
6.3.0
6.4.0
6.4.0
6.4.0
6.3.0
6.3.0
6.3.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.4.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.5.0
6.6.0
6.6.0
6.6.0
6.6.0
6.6.0
6.6.0
6.6.0
6.6.0
6.6.0
6.6.0
6.7.0
6.7.0
6.6.0
6.6.0
6.6.0
6.6.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.8.0
6.8.0
WI
Release 12
195
GprsOperationErrorCode
3GPP
Release 12
12-2004
12-2004
12-2004
12-2004
12-2004
12-2004
01-2005
SP-26
SP-26
SP-26
SP-26
SP-26
SP-26
-
01-2005
196
SP-040851
SP-040851
SP-040851
SP-040851
SP-040851
SP-040851
-
063
064
065
066
067
068
-
F
F
B
B
F
C
-
069
070
071
1
-
B
B
073
075
076
0077
0078
0079
0080
0077
0078
0079
0081
1
-
A
A
D
F
B
C
F
F
D
B
A
0082
0083
03-2005
SP-27
SP-050125
2005-06
2005-06
SP-28
SP-28
SP-050259
2005-06
2005-06
2005-06
2005-09
2005-09
2005-09
2005-09
2005-12
2005-12
2005-12
2005-12
SP-28
SP-28
SP-28
SP-29
SP-29
SP-29
SP-29
SP-30
SP-30
SP-30
SP-30
SP-050383
SP-050260
SP-050259
SP-050571
SP-050571
SP-050571
SP-050571
SP-050778
SP-050778
SP-050779
SP-050259
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.7.0
6.8.0
7.2.0
6.8.0
6.8.0
6.8.0
6.8.0
6.8.0
6.8.0
6.8.1
6.8.1
6.8.2
6.8.2
7.0.0
7.0.0
7.0.0
7.0.0
7.0.0
7.1.0
7.1.0
7.1.0
7.1.0
7.2.0
7.2.0
7.2.0
7.2.0
7.0.0
7.1.0
7.1.0
7.1.0
7.1.0
7.1.0
7.2.0
7.2.0
7.2.0
7.2.0
7.3.0
7.3.0
7.3.0
SP-050762
7.3.0
2005-12
SP-30
2006-03
SP-31
2006-03
2006-03
2006-03
2006-03
2006-06
2006-09
2007-03
2007-06
2007-06
SP-31
SP-31
SP-31
SP-31
SP-32
SP-33
SP-35
SP-36
SP-36
SP-050778
SP-060065
SP-060065
SP-060065
SP-060065
SP-060065
SP-060384
SP-060660
SP-070157
SP-070331
0084
0085
0086
0087
0083
0088
0089
0091
0090
1
1
-
F
F
F
B
F
B
F
B
B
SP-070332
2007-06
SP-36
2007-09
2007-09
2007-12
SP-37
SP-37
SP-38
2007-12
2007-12
2008-03
2008-06
2008-12
SP-38
SP-38
SP-39
SP-40
SP-42
2008-12
2008-12
2009-03
2009-03
2009-03
2009-03
2009-03
2009-03
2009-03
SP-42
SP-42
SP-43
SP-43
SP-43
SP-43
SP-43
SP-43
SP-43
SP-070332
SP-070601
SP-070601
SP-070788
SP-070789
SP-070788
SP-080173
SP-080263
SP-080763
SP-080763
SP-080763
SP-090133
SP-090133
SP-090133
SP-090133
SP-090133
SP-090133
SP-090133
0092
0093
0094
0095
B
D
F
0096
0097
0099
0100
1
-
A
C
D
B
F
101
102
103
104
105
106
B
B
F
F
F
F
107
108
109
110
B
B
B
3GPP
7.3.0
7.3.0
7.4.0
7.3.0
7.3.0
7.3.0
7.3.0
7.4.0
7.5.0
7.4.0
7.4.0
7.4.0
7.4.0
7.5.0
7.6.0
7.6.0
7.7.0
7.8.0
7.7.0
7.8.0
SEC-LI
SEC1-LI
SEC1-LI
SEC1-LI
SEC1-LI
SEC1-LI
SEC1-LI
SEC1-LI
SEC1-LI
LI-7A
LI-7A
LI-7A
IMS2
(SEC1LI)
LI-7A
LI-7A
LI-7A
LI-7A
LI-7A
LI-7A
LI-7A
LI-7A
LI-7A
LI-7A
LI8
8.8.0
7.8.0
8.0.0
8.0.0
8.1.0
8.1.0
8.1.0
8.2.0
8.3.0
8.4.0
8.4.0
8.4.0
8.5.0
8.8.0
8.1.0
8.1.0
8.2.0
8.2.0
8.2.0
8.3.0
8.4.0
8.5.0
8.5.0
8.5.0
8.6.0
8.5.0
8.6.0
8.5.0
8.6.0
8.5.0
8.5.0
8.5.0
8.5.0
8.6.0
8.6.0
8.6.0
8.6.0
LI8
LI8
LI8
LI8
LI-7A
LI8
LI8
LI8
LI8
LI8
LI8
LI8
LI8
LI8
LI8
LI8
LI8
LI8
Release 12
197
2009-03
2009-03
SP-43
---
SP-090133
--
111
---
--
F
--
2009-06
SP-44
SP-090272
112
2009-06
SP-44
SP-090272
113
2009-06
SP-44
SP-090272
114
2009-06
SP-44
SP-090272
115
2009-06
SP-44
SP-090272
116
2009-06
SP-44
SP-090272
117
2009-06
2009-06
2009-06
SP-44
SP-44
SP-44
SP-090272
SP-090272
SP-090272
2009-09
SP-45
SP-090522
2009-09
SP-45
SP-090522
2009-09
SP-45
SP-090522
2009-09
SP-45
SP-090522
2009-09
SP-45
SP-090559
2009-12
SP-46
SP-090817
2009-12
SP-46
SP-090818
2009-12
SP-46
SP-090817
2009-12
SP-46
SP-090817
2010-04
SP-47
SP-100104
2010-04
SP-47
SP-100104
2010-06
SP-48
SP-100363
2010-06
SP-48
SP-100253
2010-10
2010-10
2010-10
2010-12
2010-12
SP-49
SP-49
SP-49
SP-50
SP-50
SP-100570
SP-100570
SP-100481
SP-100854
SP-100729
2010-12
SP-50
SP-100729
2010-12
SP-50
SP-100726
2010-12
SP-50
SP-100728
2010-12
SP-50
SP-100726
2010-12
SP-50
SP-100854
2011-03
SP-51
SP-110021
2011-03
SP-51
SP-110023
2011-03
2011-03
SP-51
SP-51
SP-110021
SP-110023
2011-03
SP-51
SP-110023
2011-03
2011-03
SP-51
SP-51
SP-110023
SP-110021
2011-03
SP-51
SP-110023
2011-03
SP-51
SP-110023
2011-06
SP-52
SP-110260
2011-06
SP-52
SP-110425
118
119
120
121
122
123
124
125
F
F
F
F
128
127
132
133
134
136
138
140
141
143
142
146
147
1
-
148
F
F
F
F
A
A
A
A
A
A
A
F
A
A
F
A
B
B
A
152
156
F
A
160
163
167
170
173
178
F
A
B
180
181
176
C
F
A
182
177
B
F
186
187
C
C
3GPP
8.5.0
8.6.0
8.6.0
8.6.0
8.6.1
LI8
-LI8
8.6.0
8.6.0
8.6.0
8.6.0
8.7.0
8.7.0
8.7.0
8.7.0
8.7.0
LI8
LI8
LI8
LI8
8.6.0
LI8
8.6.0
8.6.0
8.6.0
8.7.0
8.7.0
8.7.0
8.7.0
8.7.0
LI8
LI8
LI8
LI8
8.8.0
8.7.0
8.7.0
8.7.0
8.8.0
9.0.0
8.8.0
8.8.0
8.8.0
9.0.0
9.1.0
9.0.0
9.0.0
9.0.0
9.1.0
9.1.0
9.1.0
9.1.0
9.1.0
9.2.0
9.2.0
9.2.0
9.3.0
9.3.0
10.0.0
10.0.0
10.0.0
10.1.0
10.1.0
10.1.0
10.0.0
10.1.0
10.1.0
10.1.0
10.2.0
10.2.0
10.2.0
LI8
LI8
LI8
LI9
LI8
LI9
LI8
LI8
LI8
LI8
LI8
LI10
TEI9
TEI9
LI10
LI8
LI10
LI10
10.1.0
LI7
10.2.0
10.1.0
10.2.0
TEI9
10.1.0
LI7
10.2.0
10.1.0
10.2.0
10.2.0
10.3.0
10.2.0
LI8
LI8
LI10
10.3.0
10.2.0 10.3.0 LI8
10.2.0 10.3.0 LI10
10.2.0
LI10
10.3.0
10.2.0 10.3.0 LI10
10.2.0 10.3.0 LI8
10.2.0
LI10
10.3.0
10.2.0 10.3.0 LI10
10.3.0
LI10
10.4.0
10.4.0 11.0.0 LI11
Release 12
198
2011-09
SP-53
SP-110511
2012-03
SP-55
SP-120034
2012-06
2012-06
2012-06
2012-06
SP-56
SP-56
SP-56
SP-56
SP-120336
SP-120336
SP-120336
SP-120336
2012-06
SP-56
SP-120336
2012-06
SP-56
SP-120336
2012-06
SP-56
SP-120336
2012-06
SP-56
SP-120336
2012-09
SP-57
SP-120627
2012-09
SP-57
2012-09
SP-57
2013-03
SP-59
SP-130034
2013-06
SP-60
188
189
190
B
F
F
191
189
190
191
192
2
1
1
3
F
C
F
F
C
194
195
196
F
C
197
198
SP-120619
201
SP-120617
202
205
206
207
208
C
F
209
210
211
SP-130248
3GPP
11.2.0
11.2.0
11.2.0
11.2.0
11.2.0
11.2.0
11.3.0
11.3.0
11.3.0
11.3.0
11.3.0
LI11
LI11
LI11
LI11
LI11