lawful interception and data retention
Skip this Video
Download Presentation
Lawful Interception and Data Retention

Loading in 2 Seconds...

play fullscreen
1 / 12

Lawful Interception and Data Retention - PowerPoint PPT Presentation

  • Uploaded on

Global Standards Collaboration (GSC) 14. Lawful Interception and Data Retention. Presenter: Mike Sharpe , VP ETSI ESP Source: Peter van der Arend , Chairman TC LI. Highlight of Current Activities (1). Producing ETSI reports and specifications On Lawful Interception and Data Retention

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about ' Lawful Interception and Data Retention ' - karlyn

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
lawful interception and data retention

Global Standards Collaboration (GSC) 14

Lawful Interception and Data Retention

Presenter: Mike Sharpe , VP ETSI ESP

Source: Peter van der Arend, Chairman TC LI


Highlight of Current Activities (1)

  • Producing ETSI reports and specifications
    • On Lawful Interception and Data Retention
    • Mainly on the Handover Interface
    • Dynamic triggering CC interception and CCTF standardisation (started in 2009)
      • CCTF: Content of Communication Triggering Function
  • Promoting globally ETSI Lawful Interception and Data Retention standards amongst operators, national bodies, etc.

Highlight of Current Activities (2)

  • Relationships with other bodies
    • Internal to ETSI (3GPP, other ETSI TCs)
    • External to ETSI (SDOs, EU/EC expert group on Data Retention, LEAs, …)
  • Participation in main international conferences
    • Chairman’s and Experts’ regular presentations at ISS World conference: Dubai, Singapore, Washington, Prague
    • LI workshops in : Seoul, Brisbane, Johannesburg, Jakarta, Athens, …
    • Liaison with organisations outside Europe for participating in ETSI LI

Strategic Direction

  • Globalization aspect
    • Global promotion of ETSI LI and DR among operators, manufacturers, regulators, national bodies, …
    • Participate in main international events, conferences, workshops, …
  • Acquisition of new ETSI Members, also outside Europe
    • Growing interest, especially South America, Asia, Oceania
  • Keep a close eye on any initiatives outside ETSI
    • Current or potential on LI and DR


  • Full alignment with LI standardisation in the USA
    • This proved to be not possible despite efforts

Next Steps/Actions

  • Progress work on Dynamic Triggering CC Interception
    • ETSI Specification(s) will consider both single operator and multiple operators scenarios (next step: international scenario)
    • Needs to be secured to prevent misuse of the triggering function and/or eavesdropping
    • Cross domain issue: nodes initiating and receiving triggering commands are in different security/trust domains
  • Keep developing Lawful Interception and Data Retention standards
    • Capture requirements of “Authorised Organisations”
    • Translate them into technical requirements
    • Produce standards compliant with national and international laws
    • Maintain as necessary the suite of published standards

Major deliverables

Lawful Interception CS

  • TS 101 671 v3.4.1 (2009-01)// ES 201 671 v3.1.1 (2007-05) Handover Interface for the Lawful Interception of Telecommunications Traffic (step 3)
    • Periodically TS 101 671 is published as ES 201 671A reference to the latest version of the TS reflects the latest stable content from ETSI/TC LI
  • This follows steps 1 and 2:
    • TS 101 331 v1.2.1 (2006-06) Requirements of Law Enforcement Agencies (step1)
    • ES 201 158 v1.2.1 (2002-04)Requirements for Network Functions (step 2)

Major deliverables

Lawful Interception IP

  • TS 102 232-1 to TS 102 232-7 (multipart)Handover Interface and Service-Specific Details (SSD) for IP delivery
    • part 1: v2.4.1 (2008-07) Handover Specification for IP Delivery
    • part 2: v2.3.1 (2007-11) SSDs for E-mail services
    • part 3: v2.2.1 (2009-01) SSDs for Internet access services
    • part 4: v2.1.1 (2006-12) SSDs for Layer 2 services
    • part 5: v2.3.1 (2008-04) SSDs for IP Multimedia Services
    • part 6: v2.3.1 (2008-08) SSDs for PSTN/ISDN services
    • part 7: v2.1.1 (2008-03) SSDs for Mobile Services


SSDforInternet Access Services

SSDforIP MultimediaServices



SSDforLayer 2Services


E-mail Services

part 06

part 02

part 07

part 04

part 05

part 03

SSD -> Service-Specific Details on top

Generic Headers

Handover manager

Delivery session

Transport layer

Network layer



Delivery network

TS 102 232 part 01

TS 102 232 IP HO Family


Major deliverables Data Retention

  • TS 102 656 v1.2.1 (2008-12) Requirements of Law Enforcement Agencies for handling Retained Data
  • TS 102 657 v1.2.1 (2009-06)Handover Interface for the request and delivery of Retained Data
  • TR 102 661 v1.1.1 (2008-11) Security framework in Lawful Interception and Retained Data environment

Communication Service Provider

Handover Interface HI-A

Data Collection Function


Issuing Authority


Network elements

Handover Interface HI-B


Data storeManagementFunction

transmission RD material

Functional Model Data Retention handover



HI-A: various kinds of administrative, request and response information from/to the Issuing Authority and the responsible organization at the CSP for RD matters.

HI-B: retained data information from the CSP to the Receiving Authority

HI-A and HI-B may be crossing borders between countries: subject to corresponding national law and/or international agreements.