The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and
ETSI TS 101 671 [1].

Zakonito prestrezanje (LI) - Izročilna specifikacija in storitveno specifične podrobnosti (SSD) za IP-dostavo - 5. del: Storitveno specifične podrobnosti za multimedijske storitve IP

Ta dokument določa prestrezanje IP multimedijskih storitev na podlagi protokola SIP, protokola RTP in protokola MSRP ter IP multimedijskih storitev, kot je opisano v priporočilih ITU-T H.323 [6] in H.248 [7]. Ta dokument je skladen z definicijo izročilne specifikacije, kot je opisano v dokumentu ETSI TS 102 232-1 [2].
Ta dokument ne razveljavlja ali nadomešča nobene specifikacije ali zahteve v dokumentih 3GPP TS 33.108 [9] in ETSI TS 101 671 [1].

General Information

Status
Published
Publication Date
06-Jan-2016
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
05-Nov-2015
Due Date
10-Jan-2016
Completion Date
07-Jan-2016

Buy Standard

Technical specification
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
English language
27 pages
sale - 10%
Preview
sale - 10%
Preview

Standards Content (sample)

SLOVENSKI STANDARD
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
01-februar-2016
=DNRQLWRSUHVWUH]DQMH /, ,]URþLOQDVSHFLILNDFLMDLQVWRULWYHQRVSHFLILþQH
SRGUREQRVWL 66' ]D,3GRVWDYRGHO6WRULWYHQRVSHFLILþQHSRGUREQRVWL]D
PXOWLPHGLMVNHVWRULWYH,3

Lawful Interception (LI);Handover Interface and Service-Specific Details (SSD) for IP

delivery;Part 5: Service-specific details for IP Multimedia Services
Ta slovenski standard je istoveten z: ETSI TS 102 232-5 V3.5.1 (2015-10)
ICS:
35.020 Informacijska tehnika in Information technology (IT) in
tehnologija na splošno general
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016 en,fr,de

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
---------------------- Page: 2 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
ETSI TS 102 232-5 V3.5.1 (2015-10)
TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 5: Service-specific details for IP Multimedia Services
---------------------- Page: 3 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
2 ETSI TS 102 232-5 V3.5.1 (2015-10)
Reference
RTS/LI-00129-5
Keywords
IMS, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the

print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

http://portal.etsi.org/tb/status/status.asp

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying

and microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2015.
All rights reserved.
TM TM TM

DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.

3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and

of the 3GPP Organizational Partners.

GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.

ETSI
---------------------- Page: 4 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
3 ETSI TS 102 232-5 V3.5.1 (2015-10)
Contents

Intellectual Property Rights ................................................................................................................................ 5

Foreword ............................................................................................................................................................. 5

Modal verbs terminology .................................................................................................................................... 5

Introduction ........................................................................................................................................................ 5

1 Scope ........................................................................................................................................................ 6

2 References ................................................................................................................................................ 6

2.1 Normative references ......................................................................................................................................... 6

2.2 Informative references ........................................................................................................................................ 7

3 Definitions and abbreviations ................................................................................................................... 7

3.1 Definitions .......................................................................................................................................................... 7

3.2 Abbreviations ..................................................................................................................................................... 7

4 General ..................................................................................................................................................... 8

4.1 Reference Model for Lawful Interception .......................................................................................................... 8

4.2 Reference system model ................................................................................................................................... 10

4.2.1 Network layer Interception ......................................................................................................................... 10

4.2.2 Service layer Interception ........................................................................................................................... 11

4.3 General Requirements ...................................................................................................................................... 11

5 Interception of IP Multimedia services .................................................................................................. 12

5.1 Identification of target of interception .............................................................................................................. 12

5.1.1 SIP Target Identification ............................................................................................................................. 12

5.1.2 H.323 Target Identification ......................................................................................................................... 12

5.2 Interception of signalling .................................................................................................................................. 12

5.2.1 Provisioning of the SIP IRI IIF ................................................................................................................... 12

5.2.2 Provisioning of the H.323 IRI IIF ............................................................................................................... 12

5.2.3 Location information .................................................................................................................................. 13

5.3 Assigning a value to the Communication Identity Number ............................................................................. 13

5.3.1 Assigning a CIN value to SIP related IRI ................................................................................................... 13

5.3.2 Assigning a CIN value to H.323 related IRI ............................................................................................... 13

5.4 Events and IRI record types ............................................................................................................................. 13

5.5 Interception of Content of Communication ...................................................................................................... 14

5.6 Direction for IMS IRI for Signalling Messages ............................................................................................... 14

5.7 Direction for IMS sessions ............................................................................................................................... 15

5.7.1 Direction for SIP sessions ........................................................................................................................... 15

5.7.2 Direction for H.323 sessions ....................................................................................................................... 15

6 Handover Interface ................................................................................................................................. 15

6.1 Intercepted Related Information ....................................................................................................................... 15

6.2 Correlation of IRI and CC ................................................................................................................................ 15

7 ASN.1 specification for IRI and CC....................................................................................................... 15

Annex A (informative): Interception using H.248 ............................................................................... 19

A.1 Purpose of this annex ............................................................................................................................. 19

A.2 Notes on interception using H.248 ......................................................................................................... 19

A.2.1 Target identification (see also clause 5.1) ........................................................................................................ 19

A.2.2 Provisioning of the H.248 IRI IIF (see also clause 5.2) ................................................................................... 20

A.3 Problems in H.248 interception .............................................................................................................. 20

A.3.1 Missing information in H.248 signalling .......................................................................................................... 20

A.3.2 Missing call content.......................................................................................................................................... 21

Annex B (normative): Minimum set of functional attributes to be provided ................................. 22

B.1 General requirements ............................................................................................................................. 22

ETSI
---------------------- Page: 5 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
4 ETSI TS 102 232-5 V3.5.1 (2015-10)

B.2 Result of interception ............................................................................................................................. 22

B.3 Location information .............................................................................................................................. 23

B.4 Time constraints ..................................................................................................................................... 23

B.5 Technical handover interfaces and format requirements ........................................................................ 24

Annex C (informative): Change request history .................................................................................. 25

History .............................................................................................................................................................. 27

ETSI
---------------------- Page: 6 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
5 ETSI TS 102 232-5 V3.5.1 (2015-10)
Intellectual Property Rights

IPRs essential or potentially essential to the present document may have been declared to ETSI. The information

pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found

in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in

respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web

server (http://ipr.etsi.org).

Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee

can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web

server) which are, or may be, or may become, essential to the present document.
Foreword

This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).

The present document is part 5 of a multi-part deliverable. Full details of the entire series can be found in part 1 [2].

The ASN.1 module is also available as an electronic attachment to the original document from the ETSI site (see

clause 7 for details).
Modal verbs terminology

In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and

"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of

provisions).

"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.

Introduction

The present document focuses on Lawful Interception of IP Multimedia Services. It is to be used in conjunction with

ETSI TS 102 232-1 [2], in which the handling of the intercepted information is described.

ETSI
---------------------- Page: 7 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
6 ETSI TS 102 232-5 V3.5.1 (2015-10)
1 Scope

The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session

Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP

MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].

The present document is consistent with the definition of the Handover Interface, as described in ETSI

TS 102 232-1 [2].

The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and

ETSI TS 101 671 [1].
2 References
2.1 Normative references

References are either specific (identified by date of publication and/or edition number or version number) or

non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the

reference document (including any amendments) applies.

Referenced documents which are not found to be publicly available in the expected location might be found at

http://docbox.etsi.org/Reference.

NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee

their long term validity.

The following referenced documents are necessary for the application of the present document.

[1] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of

telecommunications traffic".

NOTE: Periodically TS 101 671 is published as ES 201 671. A reference to the latest version of the TS as above

reflects the latest stable content from ETSI/TC LI.

[2] ETSI TS 102 232-1: "Lawful Interception (LI); Handover Interface and Service-Specific Details

(SSD) for IP delivery; Part 1: Handover specification for IP delivery".

[3] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One

(ASN.1): Specification of basic notation".
[4] IETF RFC 3261: "SIP: Session Initiation Protocol".
[5] IETF RFC 3550: "RTP: A Transport Protocol for Real-Time Applications".

[6] Recommendation ITU-T H.323: "Packet-based multimedia communications systems".

[7] Recommendation ITU-T H.248: "Gateway control protocol".

NOTE: H.248 was renumbered when revised on 2002-03-29. H.248 main body, Annexes A to E and Appendix I

were included in H.248.1. Subsequent annexes were sequentially numbered in the series, e.g. H.248

Annex F became H.248.2.
[8] Void.

[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; 3G security;

Handover interface for Lawful Interception (LI) (3GPP TS 33.108 Release 9)".

[10] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".

[11] ATIS-PP-1000678.2006: "Lawfully Authorized Electronic Surveillance (LAES) for Voice over

Packet Technologies in Wireline Telecommunications Networks", Version 2 (Revision of

T1.678-2004).
ETSI
---------------------- Page: 8 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
7 ETSI TS 102 232-5 V3.5.1 (2015-10)

[12] Recommendation ITU-T H.225.0: "Call signalling protocols and media stream packetization for

packet-based multimedia communication systems".

[13] Recommendation ITU-T H.245: "Control protocol for multimedia communication".

[14] Void.
[15] IETF RFC 4975: "The Message Session Relay Protocol (MSRP)".

[16] Recommendation ITU-T T.38: "Procedures for real-time Group 3 facsimile communication over

IP networks".
2.2 Informative references

References are either specific (identified by date of publication and/or edition number or version number) or

non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the

reference document (including any amendments) applies.

NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee

their long term validity.

The following referenced documents are not necessary for the application of the present document but they assist the

user with regard to a particular subject area.

[i.1] ETSI TR 102 528: "Lawful Interception (LI); Interception domain Architecture for IP networks".

[i.2] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and

Retained data handling Specifications".
3 Definitions and abbreviations
3.1 Definitions

For the purposes of the present document, the terms and definitions given in ETSI TS 101 671 [1], ETSI

TS 102 232-1 [2] and the following apply:
context: logical collection of H.248 terminations

IP MultiMedia service: multimedia service that utilizes the Internet Protocol (IP) for the transport of data

MultiMedia (MM): use of computers to present text, graphics, video, animation, and sound in an integrated way

MultiMedia service: communication service that offers Multimedia communication to end-users

termination: entity in H.248 that acts as a source or sink of media

NOTE: Terminations may be physical, such as a given channel on a TDM line, or ephemeral, such as an IP

endpoint.

TSAP identifier: piece of information used to multiplex several transport connections of the same type on a single

H.323 entity with all transport connections sharing the same Network Address (e.g. the port number in a TCP/UDP/IP

environment)

NOTE: Transport layer Service Access Point (TSAP) identifiers may be (pre)assigned statically by some

international authority or may be allocated dynamically during the setup of a call. Dynamically assigned

TSAP identifiers are of transient nature, i.e. their values are only valid for the duration of a single call.

3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AF Administration Function
ASN.1 Abstract Syntax Notation One
CC IIF CC Internal Interception Function
ETSI
---------------------- Page: 9 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
8 ETSI TS 102 232-5 V3.5.1 (2015-10)
CC Content of Communication
CCCI Content of Communication Control Interface
CCTF Content of Communication Trigger Function
CCTI Content of Communication Trigger Interface
CID Communication IDentifier
CIN Communication Identity Number
CLI Calling Line Identity
CSP Communications Service Provider (covers all AP/NWO/SvP)
DTMF Dual Tone Multi Frequency
GW GateWay
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
IAP Internet Access Provider
ID IDentity
IF Interception Function
IIF Internal Interception Function
INI Internal Network Interface
IP Internet Protocol
IRI IIF IRI Internal Interception Function
IRI Intercept Related Information
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LI Lawful Interception
LIAF Lawful Interception Administration Function
LIID Lawful Interception IDentifier
MF Mediation Function
MG Media Gateway
MGC Media Gateway Controller
MM MultiMedia
MSRP Message Session Relay Protocol
OID Object IDentifier
PDU Protocol Data Unit
RAS Registration, Administration and Status
RTCP RTP Control Protocol
RTP Realtime Transport Protocol
SDP Session Description Protocol
SIP Session Initiation Protocol
SSD Service-Specific Details
SvP Service Provider
TCP Transmission Control Protocol
TDM Time Division Multiplex
TSAP Transport layer Service Access Point
UDP User Datagram Protocol
UDPTL Facsimile UDP Transport Layer (protocol)
URI Uniform Resource Identifier
URL Uniform Resource Locator
4 General
4.1 Reference Model for Lawful Interception

The present document adopts the generic reference model for the interception domain from ETSI TR 102 528 [i.1], its

internal intercept functions, Intercept Related Information Interception Function (IRI IIF), Content of Communication

Trigger Function (CCTF), and Content of Communication Internal Interception Function (CC IIF), and the Internal

Network Interfaces INI1, INI2, INI3, Content of Communication Trigger Interface (CCTI) and Content of

Communication Control Interface (CCCI) as shown in figure 1.
ETSI
---------------------- Page: 10 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
9 ETSI TS 102 232-5 V3.5.1 (2015-10)
NWO/AP/SP DOMAIN LEA DOMAIN
LEA
HI1
Administration Function (AF)
Administration
Function
INI1b INI1a
INI1c
IRI Internal Intercept
Function
INI2
(IRI IIF)
HI2
Law
Mediation
Enforcement
CCTI Function
Monitoring
CC Trigger
(MF)
Facility
Function
(LEMF)
(CCTF)
CCCI
CC Internal Intercept
Function
HI3
INI3
(CC IIF)
Figure 1: Reference Model for Lawful Interception
The reference model depicts the following functions and interfaces:

• INI1a provisions Intercept Related Information Internal Interception Function (IRI IIF).

• INI1b may (statically) provision Content of Communications Trigger Function (CCTF).

• INI1c provisions the Mediation Function (MF).

• Intercept Related Information Internal Intercept Function (IRI IIF) generates IRI.

• Content of Communication Internal Interception Function (CC IIF) generates CC.
• Content of Communication Trigger Function (CCTF) controls CC IIF.
• Content of Communication Control Interface (CCCI) provisions CC IIF.

• Content of Communication Trigger Interface (CCTI) may trigger CCTF for provisioning of the CC IIF.

• Content of Communication Control Interface (CCCI) may dynamically provision the CC IIF.

• Internal interface INI1 carries provisioning information from LIAF to the Internal Intercept Functions (IIF).

• Internal interface INI2 carries Intercept Related Information (IRI) from IRI IIF to the MF.

• Internal interface INI3 carries Content of Communication (CC) information from CC IIF to the MF.

For an in-depth explanation of the functions and interface, refer to clause 4 of ETSI TR 102 528 [i.1].

ETSI
---------------------- Page: 11 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
10 ETSI TS 102 232-5 V3.5.1 (2015-10)
4.2 Reference system model

The reference system model applied in the present document, as depicted in figure 2, provides a simplified model of a

technology independent, IP MultiMedia (MM) service platform, accessed by multiple different access networks. The

access networks may provide different forms of network access, using different technologies; they all have in common

that they provide IP connectivity among end-users and between end-users and the IP MM services provided by the IP

MM service platform.
Communication Signalling server
services
SvP IP Core network
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network
Figure 2: Reference System Model

Access from the access networks into the IP Core network of the IP MM service provider is assumed to be protected by

some gateway device (e.g. a session border controller, border gateway controller or a firewall/router combination).

The IP MM Service platform contains a signalling server that provides session initiation functionality (e.g. a SIP call

manager or an H.323 gatekeeper) among end-users and between end-users and communication services (e.g. unified

messaging, audio or video conference servers).
4.2.1 Network layer Interception

Network Layer interception requires a copy of all signalling information as well as call content exchanged in the

platform to be available at a central point in the infrastructure.
Communication Signalling server
services
IRI
IIF
SvP IP Core network
IIF
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network
Figure 3: Network layer Interception Model
ETSI
---------------------- Page: 12 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
11 ETSI TS 102 232-5 V3.5.1 (2015-10)

This can be achieved by means of span-ports in the layer 2 switching backbone or by means of passive splitters (either

copper or fibre) at strategic points in the SvP's core network. Either way, due to the bandwidth of copied network

traffic, some form of filtering will most likely be required (e.g. by means of a layer 3 switch).

4.2.2 Service layer Interception

Service Layer interception requires LI interfaces and functionality to be available in both the signalling server and the

gateways.
Communication Signalling
IRI
services server
IIF
SvP IP Core network
CC CC CC
GW GW GW
IP MM SvP IIF IIF IIF
IAP / NWO
Access Access Access
network network network
Figure 4: Service layer Interception Model

Typically the IRI IIF in the signalling server is provisioned with the target ID. At detection of a session setup for a

target, the IRI IIF will provide the IRI for the intercepted session and may provide session information to be used for

ad-hoc provisioning of the gateway devices. In some implementations, the gateway devices are also provisioned with

the target ID beforehand and are capable of detecting sessions independent from the signalling server.

4.3 General Requirements
The following requirements regarding the interception of signalling shall apply:

1) Annex B provides the functional description of the minimal set of information that is to be provided to Law

Enforcement for each intercepted communication.

2) The present document supports the interception of communication services defined in the following

IETF/ITU-T standards and recommendations:
- IETF RFC 3261 [4] (SIP);
- IETF RFC 3550 [5] (RTP);
- IETF RFC 4975 [15] (MSRP);
- Recommendation ITU-T H.323 [6];
- Recommendation ITU-T H.225.0 [12];
- Recommendation ITU-T H.245 [13];
- Recommendation ITU-T T.38 [16].

3) Any deviation from the supported IETF and ITU-T specifications identified in item 2, e.g. vendor specific

parameters, shall be agreed in advance between the Communications Service Provider (CSP) and Law

Enforcement Agency (LEA).

4) The present document specifies the handover of intercepted signalling containing all information required in

ETSI TS 101 331 [10] by encapsulating that intercepted signalling.
ETSI
---------------------- Page: 13 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
12 ETSI TS 102 232-5 V3.5.1 (2015-10)

5) IRI that is not part of intercepted signalling shall also be delivered. The format of such information on the

handover interface shall be agreed in advance between the CSP and LEA.

6) As a national option, mapping of the IRI information onto specific messages at the handover interface may be

mandated, e.g. according to the ATIS-PP-1000678 [11] specification.
5 Interception of IP Multimedia services
5.1 Identification of target of interception
5.1.1 SIP Target Identification

The target identity is not a network layer or transport layer address. The target identity shall be an address type that

uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,

such as:
• TEL URI;
• SIP URI;
• E.164 Number.
5.1.2 H.323 Target Identification

The target identity is not a network layer or transport layer address. The target identity shall be an address type that

uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,

such as:
• H.323 URL;
• H.323 ID;
• E.164 Number.
5.2 Interception of signalling
5.2.1 Provisioning of the SIP IRI IIF

SIP messaging IETF RFC 3261 [4] is reported as Intercept Related Information (IRI) for the interception of multi-media

service. All SIP messages executed on behalf of a target subscriber are subject to interception at the IRI Internal

Interception Function
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.