ETSI ETR 331-1996 Security Techniques Advisory Group (STAG) Definition of User Requirements for Lawful Interception of Telecommunications Requirements of the Law Enforcement Agenci_1.pdf
《ETSI ETR 331-1996 Security Techniques Advisory Group (STAG) Definition of User Requirements for Lawful Interception of Telecommunications Requirements of the Law Enforcement Agenci_1.pdf》由会员分享,可在线阅读,更多相关《ETSI ETR 331-1996 Security Techniques Advisory Group (STAG) Definition of User Requirements for Lawful Interception of Telecommunications Requirements of the Law Enforcement Agenci_1.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、- ETSI 1 ECHNICAL REPORT ETR 331 December 1996 Source: ETSI TC-STAG Reference: DTWNA-00231 O ICs: 33.020 Key words: Security Security Techniques Advisory Group (STAG); Definition of user requirements for lawful interception of telecommunications; Requirements of the law enforcement agencies ETSI Eur
2、opean Telecommunications Standards Institute ETSI Secretariat Postal address: F-O6921 Sophia Antipolis CEDEX - FRANCE Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE X.400: c=fr, a=atlas, p=etsi, s=secretariat - internet: secretariatQetsi.fr Tel.: +33 4 92 94 42 O0 - Fa
3、x: +33 4 93 65 47 16 Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. 6 European Telecommunications Standards Institute 1996. All rights reserved. STD*ETSI ETR 331-ENGL 177b
4、3400855 OLbOOBO 40T M Page 2 ETR 331 : December 1996 Whilst every care has been taken in the preparation and publication of this document, errors in content, typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to “ETSI Editing and Committee Support Dept.
5、“ at the address shown on the title page. STD.ETSI ETR 331-ENGL L77b 3q00855 LbOO1 3qb Page 3 ETR 331 : December 1996 Contents Foreword . 5 Scope 7 References 7 Abbreviations and Definitions 7 3.1 Abbreviations . 7 3.2 Definitions 7 General Introduction 9 Architecture . 10 User (LEA) requirements 10
6、 6.2 Result of interception . 11 6.3 Location information 12 6.4 Time constraints 12 6.5 Non disclosure . 12 6.5.1 6.5.2 Manufacturers . 13 6.6 Information transmission and information protection requirements . 13 6.7 Internal security 13 6.8 Unchanged state of service. etc 14 6.9 Technical handover
7、 interfaces and format requirements 14 6.10 6.1 1 6.12 6.1 3 6.1 General requirements 11 Network operator/service provider 12 Independence of the network operator or service provider . 15 Temporary obstacles to transmission 15 Multiple interception measures 16 Identification of the identity to be in
8、tercepted . 15 Annex A: A.l A.2 Service providers . 17 A.3 Home country service from a foreign territory . 18 A.4 Identification of a target service . 20 Annex B: History 22 Explanatory diagrams . 17 General network arrangements . 17 Draft requirements for interception across national frontiers 21 S
9、TD-ETSI ETR 331-ENGL L99b 3q00855 O1b0082 282 Page 4 ETR 331 : December 1996 I Blank page STD-ETSI ETR 331-ENGL L77b w 3400855 OLb0083 117 Page 5 ETR 331 : December 1996 Foreword This ETSI Technical Report (ETR) has been produced by the Security Techniques Advisory Group (STAG) of the European Telec
10、ommunications Standards Institute (ETSI) in view of the growing need of standardization in the area of lawful interception of telecommunications. This ETR describes in general the user requirements regarding to an irterception handover interface which, in a !ater stage, will be translated into the t
11、echnical design of this interface in the form of an European Telecommunication Standard (ETS). Page 6 ETR 331 : December 1996 Blank page STD*ETSI ETR 331-ENGL 177b m 3400855 O1b0085 T7L m Page 7 ETR 331 : December 1996 1 Scope This ETSI Technical Report (ETR) provides guidance for ETSI bodies in the
12、 area of co-operation by network operatordservice providers with the lawful interception of telecommunications. It provides a set of requirements relating to handover interfaces for the interception by law enforcement and state security agencies. Requirements with regard to telecommunications servic
13、es provided from areas outside nztional frontiers are not fully developed yet and therefore only some preliminary requirements have been annexed for information. This ETR describes the requirements from an Law Enforcement Agencys (LEAS) point of view only. Pending national legislation not all requir
14、ements need necessarily be applicable in one individual nation. These requirements will be used to derive specific network requirements and furthermore to standardize handover i nterfaces. 2 References For the purposes of this ETR, the following references apply: ETR 330: “Security Techniques Adviso
15、ry Group (STAG); A guide to legislation, recommendations this is done in several steps. Step 1 Step 1 is the definition of user requirements with the LEAS being the users and therefore will be done in close co-operation with the law enforcement and state security agencies. An ETSI STAG ad hoc group
16、on legal interception has produced this ETR being part of step 1. Step 2 In a further step the network requirements will be derived from the step 1 document. This may be done with assistance from (S)TCs concerned. This step is the Stage 1 description of the lawful interception handover interface(s).
17、 The aim is to establish one set of harmonized network requirements. This step will also be done by STAG, but in close co-operation with (S)TCs concerned. It is planned to publish the results as an ETS. Step 3 This step encompasses the Stage 2 and Stage 3 descriptions of the interface). It will lead
18、 to one (or more) concrete models, supporting the abstract model for specific products and services. The number of handover interface(s) should be limited. This work should be carried out by (S)TC Security or Plenary Groups concerned rather than by STAG. The definition of a handover interface for th
19、e delivery of the results of lawful interception should allow the technical facilities to be provided: - with reliability; - with accuracy; - at low cost; - with minimum disruption; - most speedily; in a secure manner; - as part of business as usual. STD-ETSI ETR 331-ENGL 177b 3400855 0160088 7T0 Pa
20、ge 10 ETR 331 : December 1996 5 Architecture This clause provides some high level explanatory information on possible examples of handover interfaces and their relation to the abstract handover interface (see figure 1). The interface would take a two layer form: - - an abstract model of the handover
21、 and the administration of lawful interception; a minimum set of concrete interfaces which support the abstract model for specific products and services, or combinations, such as: 64 kbit digital bearers (speech, digital data, etc.); low bit-rate bearers; Switched Multimegabit Data Service (SMDS) be
22、arers (very high bit-rate); Asynchronous Transfer Mode (ATM) (whole families of bit rates); point-to-point calls; broadcast calls; store-and-forward services; etc. Such a form allows rapid development of the enhancements required as networks and their associated services grow and evolve. All network
23、s will use the same abstract model, but the concrete interfaces will be enhanced to cope with new networks features, such as the use of Intelligent Network (IN) Intelligent Peripherals (IPS). POTS handover handover interface CAMEL: POTS Plain Ordinary Telephone Service Customized Applications for Mo
24、bile networks Enhanced Logic Figure 1 : Relationship of possible handover interfaces 6 User (LEA) requirements This clause presents the user requirements related to the lawful interception of telecommunications with the LEA being the user. The relevant terms are defined in subclause 3.2. These user
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIETR3311996SECURITYTECHNIQUESADVISORYGROUPSTAGDEFINITIONOFUSERREQUIREMENTSFORLAWFULINTERCEPTIONOFTELECOMMUNICATIONSREQUIREMENTSOFTHELAWENFORCEMENTAGENCI_1PDF

链接地址:http://www.mydoc123.com/p-731791.html