ISO/TR 11766:2010
(Main)Intelligent transport systems — Communications access for land mobiles (CALM) — Security considerations for lawful interception
Intelligent transport systems — Communications access for land mobiles (CALM) — Security considerations for lawful interception
ISO/TR 11766:2010 reviews the ITS landscape and the provisions of lawful interception to ITS deployments. In particular it considers the CALM environment and the services offered in the IPv6 domain served by CALM and ITS in general.
Systèmes intelligents de transport — Accès aux communications des services mobiles terrestres (CALM) — Considérations de sécurité pour interception licite
General Information
Standards Content (Sample)
TECHNICAL ISO/TR
REPORT 11766
First edition
2010-04-15
Intelligent transport systems —
Communications access for land mobiles
(CALM) — Security considerations for
lawful interception
Systèmes intelligents de transport — Accès aux communications des
services mobiles terrestres (CALM) — Considérations de sécurité pour
interception licite
Reference number
ISO/TR 11766:2010(E)
©
ISO 2010
---------------------- Page: 1 ----------------------
ISO/TR 11766:2010(E)
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
COPYRIGHT PROTECTED DOCUMENT
© ISO 2010
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2010 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/TR 11766:2010(E)
Contents Page
Foreword .iv
1 Scope.1
2 Conformance .1
3 Normative references.1
4 Terms and definitions .1
5 Abbreviated terms .1
6 Overview.2
6.1 General requirement .2
6.2 Handover domain capabilities in CALM/ITS .3
6.3 Interception domain capabilities in CALM/ITS .4
7 Stage 1 description of the LI interception facility .7
7.1 General .7
7.2 Description.7
7.3 Procedures.8
7.4 Interaction with other services .8
8 Stage 2 description of the LI interception facility .8
Annex A (informative) LI requirement for EU/EFTA.10
Annex B (informative) LI requirement for the United States of America (USA).11
Annex C (informative) LI requirement for Australia.12
Bibliography.13
© ISO 2010 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/TR 11766:2010(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In exceptional circumstances, when a technical committee has collected data of a different kind from that
which is normally published as an International Standard (“state of the art”, for example), it may decide by a
simple majority vote of its participating members to publish a Technical Report. A Technical Report is entirely
informative in nature and does not have to be reviewed until the data it provides are considered to be no
longer valid or useful.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/TR 11766 was prepared by Technical Committee ISO/TC 204, Intelligent transport systems.
iv © ISO 2010 – All rights reserved
---------------------- Page: 4 ----------------------
TECHNICAL REPORT ISO/TR 11766:2010(E)
Intelligent transport systems — Communications access for
land mobiles (CALM) — Security considerations for lawful
interception
1 Scope
This Technical Report reviews the ITS landscape and the provisions of lawful interception to ITS deployments.
In particular it considers the CALM environment and the services offered in the IPv6 domain served by CALM
and ITS in general.
2 Conformance
There are no conformance requirements. This clause is included to provide numerical consistency between
this Technical Report and other CALM International Standards.
3 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO 21217, Intelligent transport systems — Communications access for land mobiles (CALM) — Architecture
ETSI ES 201 671, Telecommunications security — Lawful Interception (LI) — Handover interface for the
lawful interception of telecommunications traffic
ETSI TS 101 331, Telecommunications security — Lawful Interception (LI) — Requirements of Law
Enforcement Agencies
4 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO 21217 and ETSI ES 201 671 apply.
5 Abbreviated terms
CSP communication service provider
ECN electronic communication network
ECS electronic communication service
ITS intelligent transport systems
© ISO 2010 – All rights reserved 1
---------------------- Page: 5 ----------------------
ISO/TR 11766:2010(E)
1)
IUR International User Requirement
LEA law enforcement agency
LEMF law enforcement monitoring facility
LI lawful interception
MF mediation function
OSS operations support system
PoI point of interception
6 Overview
6.1 General requirement
A lawful interception (LI) capability is required to support the activities of LEAs. The requirements for LI have
been developed by LEAs in the IUR and published for the specific needs of telecommunications providers in
ETSI TS 101 331. The obligation to support and provide LI facilities applies to any CSP operating either an
ECN or an ECS. This Technical Report identifies the consequences for standardization of the provision of LI
for CALM-based ITS.
The core requirements in regional regulation that enforce LI are given in Annexes A to C, where the main
impact is as follows.
⎯ A CSP should provide mechanisms to ensure the interception and handover of signalling of specific users,
if required to by a lawful authority.
⎯ A CSP should provide mechanisms to ensure the interception and handover of the content of
communication of specific users, if required to by a lawful authority.
The structure of a CSP is outlined in Figure 1, where providers of ECNs and ECSs are shown as specialisms
of the generic CSP.
1) The IUR is provided as an annex to Reference [11].
2 © ISO 2010 – All rights reserved
---------------------- Page: 6 ----------------------
ISO/TR 11766:2010(E)
Figure 1 — Structure of CSP relationship to ECN and ECS
6.2 Handover domain capabilities in CALM/ITS
The CALM-based ITS network should interface to the LEA and its associated LEMF using the capabilities
defined in
⎯ ETSI ES 201 671 (where handover is provisioned over ISDN networks), or
[4]
⎯ ETSI TS 102 232-1 [where handover is provisioned over packet switched (IP) networks],
or using any appropriate handover interface defined by the LEA.
© ISO 2010 – All rights reserved 3
---------------------- Page: 7 ----------------------
ISO/TR 11766:2010(E)
6.3 Interception domain capabilities in CALM/ITS
6.3.1 General
The general architecture for the interception domain (which covers both CALM and ITS) is defined in
[1]
ETSI ES 201 158 and the generic reference model for the interception domain is defined in
[3]
ETSI TR 102 528 .
The internal intercept functions
⎯ intercept related information internal intercept function (IRI-IIF),
⎯ content of communication internal intercept function (CC-IIF), and
⎯ content of communication trigger function (CCTF),
and the internal interfaces
⎯ INI1, INI2, INI3,
⎯ content of communication trigger interface (CCTI), and
⎯ content of communication control interface (CCCI)
are also adopted for CALM and ITS (see Figure 2).
Figure 2 — Reference model for LI based on ETSI TR 102 528
4 © ISO 2010 – All rights reserved
---------------------- Page: 8 ----------------------
ISO/TR 11766:2010(E)
The reference model describes the following functions and interfaces.
⎯ IRI-IIF generates signalling intercept material.
⎯ CC-IIF generates content intercept material.
⎯ CCTF controls the CC-IIF.
⎯ Internal interface INI1 carries provisioning information from the lawful interception administration function
(AF) to the internal intercept functions (IIF).
⎯ Internal interface INI2 carries intercept related information (IRI) from the IRI-IIF to the MF.
⎯ Internal interface INI3 carries content of communication (CC) information from the CC-IIF to the MF.
⎯ CCTI carries trigger information from the IRI-IIF to the CCTF.
⎯ CCCI carries controls information from the CCTF to the CC-IIF.
The model for LI is given as a UML class model in Figure 3.
Figure 3 — UML class model of interception
© ISO 2010 – All rights reserved 5
---------------------- Page: 9 ----------------------
ISO/TR 11766:2010(E)
The key concepts shown in the model are as follows.
a) The “target” is a system user with the specialization that he is subject to interception.
b) The “point of interception” (PoI) is a specialization of a system functional entity (FE) that is also found in
an FE (e.g. the PoI may be found in a call processing FE).
The data model for LI is given in Figu
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.