Lawful Interception

Introduction

As a legally sanctioned official access to private communications, Lawful Interception (LI) is a security process in which a service provider or network operator collects and provides law enforcement officials with intercepted communications of private individuals or organizations.

LI implementation is required by the European Union International User Requirements 19951 which allows for LI to prevent crime, including fraud and terrorism.

The ETSI specifications are now in use globally in a large number of countries that require the Lawful Interception of telecommunications, and well as the Retained Data (RD) functionality.

1. Official Journal C 329, 04/11/1996 p. 0001 - 0006 Council Resolution of 17 January 1995 on the lawful interception of telecommunications.

Our Role & Activities

Our Technical Committee Lawful Interception (LI) covers the whole spectrum of interception aspects working closely with other ETSI committees and with the 3rd Generation Partnership Project (3GPPTM).

At the core of an ALL IP NGN network is the IP Multimedia Subsystem (IMS) which provides an access independent platform for a variety of access technologies. IMS is being developed in 3GPPs Service and System Aspects Group, with the handover interface for lawful interception being developed in TC LI.

In 2006 the terms of reference of LI were extended to include work on Retained Data (RD) and the committee published specifications on requirements and on the Retained Data Handover Interface.

TC LI regularly updates its suite of standards by adding needed functionalities to the LI and RD specifications.

In recent years work has been extended to ensure that the LI and RD functions are performed in the context of cloud services and Network Functions Virtualization (NFV).

Standards

The following is a list of the 20 latest published ETSI standards on lawful interception.

A full list of related standards in the public domain is accessible via the ETSI standards search. Via this interface you can also subscribe for alerts on updates of ETSI standards.

For work in progress see the ETSI Work Programme on the Portal.

Standard No. Standard title.
TS 103 120 Lawful Interception (LI); Interface for warrant information
TR 101 567 Lawful Interception (LI); Cloud/Virtual Services for Lawful Interception (LI) and Retained Data (RD)
TS 102 657 Lawful Interception (LI); Retained data handling; Handover interface for the request and delivery of retained data
TS 102 232-1 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery
TS 101 671 Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic
TR 102 503 Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and Retained data handling Specifications
TS 102 232-5 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services
TS 103 280 Lawful Interception (LI); Dictionary for common parameters
TS 102 232-2 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services
TS 102 656 Lawful Interception (LI); Retained Data; Requirements of Law Enforcement Agencies for handling Retained Data
TS 102 232-4 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services
TS 102 232-6 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services
TR 102 519 Lawful Interception (LI); Lawful Interception of public Wireless LAN Internet Access
TS 101 158 Telecommunications security; Lawful Interception (LI); Requirements for network functions
TS 101 331 Lawful Interception (LI); Requirements of Law Enforcement Agencies
TS 102 232-3 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific details for internet access services
TS 102 232-7 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services
TR 103 690 Lawful Interception (LI); eWarrant Interface
TR 103 657 Lawful Interception (LI); Retained data handling; System Architecture and Internal Interfaces
TR 102 661 Lawful Interception (LI); Security framework in Lawful Interception and Retained Data environment