The present document describes the data content of a Lawful Interception interface in a TETRA system. It provides the requirements and specification of the interface within a TETRA system for the purpose of providing data to Law Enforcement Agencies (LEAs) in the area of Lawful Interception (LI) of communications. The present document describes the internal LI interface of a TETRA network, and does not specify the means by which data is delivered to the LEA or to its designated Law Enforcement Monitoring Facility (LEMF). However the internal LI interface is defined in such a way that data may be carried transparently on most networks.

Prizemni snopovni radio (TETRA) – Varnost – Zakonito prestrezanje (LI)

General Information

Status
Published
Publication Date
31-May-2006
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Jun-2006
Due Date
01-Jun-2006
Completion Date
01-Jun-2006

Buy Standard

Standard
SIST EN 301 040 V2.1.1:2006
English language
43 pages
sale - 10%
Preview
sale - 10%
Preview

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN 301 040 V2.1.1:2006
01-junij-2006
Prizemni snopovni radio (TETRA) – Varnost – Zakonito prestrezanje (LI)
Terrestrial Trunked Radio (TETRA); Security; Lawful Interception (LI) interface
Ta slovenski standard je istoveten z: EN 301 040 Version 2.1.1
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
SIST EN 301 040 V2.1.1:2006 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 301 040 V2.1.1:2006
---------------------- Page: 2 ----------------------
SIST EN 301 040 V2.1.1:2006
ETSI EN 301 040 V2.1.1 (2006-03)
European Standard (Telecommunications series)
Terrestrial Trunked Radio (TETRA);
Security;
Lawful Interception (LI) interface
---------------------- Page: 3 ----------------------
SIST EN 301 040 V2.1.1:2006
2 ETSI EN 301 040 V2.1.1 (2006-03)
Reference
REN/TETRA-06132
Keywords
data, security, TETRA, voice
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org

The present document may be made available in more than one electronic version or in print. In any case of existing or

perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).

In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive

within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

http://portal.etsi.org/tb/status/status.asp

If you find errors in the present document, please send your comment to one of the following services:

http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2006.
All rights reserved.
TM TM TM

DECT , PLUGTESTS and UMTS are Trade Marks of ETSI registered for the benefit of its Members.

TIPHON and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.

3GPP is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.

ETSI
---------------------- Page: 4 ----------------------
SIST EN 301 040 V2.1.1:2006
3 ETSI EN 301 040 V2.1.1 (2006-03)
Contents

Intellectual Property Rights................................................................................................................................5

Foreword.............................................................................................................................................................5

Introduction ........................................................................................................................................................5

1 Scope........................................................................................................................................................6

2 References................................................................................................................................................7

3 Definitions and abbreviations...................................................................................................................8

3.1 Definitions..........................................................................................................................................................8

3.2 Abbreviations...................................................................................................................................................10

4 User (LEA) requirements - the administrative interface ........................................................................11

4.1 Non-disclosure .................................................................................................................................................11

4.2 Identification of the identity to be intercepted..................................................................................................11

4.3 Result of interception .......................................................................................................................................12

4.3.1 Network validity of result of interception...................................................................................................12

4.3.2 Identification of result of interception ........................................................................................................12

4.3.3 Format of result of interception ..................................................................................................................12

4.3.4 Content of result of interception .................................................................................................................12

4.3.5 Auditing of interception facilities ...............................................................................................................13

4.4 Location information........................................................................................................................................13

4.5 Time constraints...............................................................................................................................................14

4.6 Service transparency.........................................................................................................................................14

4.7 LI interface instances........................................................................................................................................14

4.8 LI interface events............................................................................................................................................14

5 Description of internal TETRA LI interface ..........................................................................................15

5.1 Stage 1 description of TETRA LI technical interface ......................................................................................15

5.1.1 Description..................................................................................................................................................15

5.1.2 Procedures...................................................................................................................................................15

5.1.2.1 Provision/withdrawal............................................................................................................................15

5.1.2.2 Normal procedures................................................................................................................................15

5.1.2.2.1 Activation/deactivation/registration................................................................................................15

5.1.2.2.2 Invocation and operation .................................................................................................................15

5.1.2.2.3 Interrogation....................................................................................................................................15

5.1.3 Interaction with TETRA supplementary services .......................................................................................15

5.1.4 Interaction with other supplementary services............................................................................................15

5.2 Stage 2 description of TETRA LI technical interface ......................................................................................16

5.2.1 Functional model........................................................................................................................................16

5.2.2 Information flow sequences........................................................................................................................16

5.2.2.1 LEA control interactions and information flows...................................................................................17

5.2.2.1.1 LI_ACTIVATE_req........................................................................................................................17

5.2.2.1.2 LI_ACTIVATE_conf......................................................................................................................18

5.2.2.1.3 LI_MODIFY_req............................................................................................................................18

5.2.2.1.4 LI_MODIFY_conf..........................................................................................................................18

5.2.2.1.5 LI_STATUS_ind.............................................................................................................................19

5.2.2.2 Target signalling and traffic interactions and information flows ..........................................................19

5.2.2.2.1 TARGET_ACTIVITY_MONITOR_ind.........................................................................................20

5.2.2.2.2 TARGET_COMMS_MONITOR_ind.............................................................................................20

5.2.2.2.3 T_TRAFFIC_ind.............................................................................................................................21

5.2.2.2.4 CT_TRAFFIC_ind..........................................................................................................................21

6 Data provision and encoding..................................................................................................................21

6.1 Identification of result of interception (tLIInstanceid) .....................................................................................21

6.2 Provision of identities.......................................................................................................................................22

6.2.1 Target..........................................................................................................................................................22

6.2.2 Co-target.....................................................................................................................................................22

ETSI
---------------------- Page: 5 ----------------------
SIST EN 301 040 V2.1.1:2006
4 ETSI EN 301 040 V2.1.1 (2006-03)

6.3 Provision of details of services used and their associated parameters..............................................................23

6.3.1 Circuit mode services (U-plane) .................................................................................................................23

6.3.2 Data services (C-plane)...............................................................................................................................23

6.3.2.1 Short data (unacknowledged)................................................................................................................23

6.3.2.2 Short data (acknowledged)....................................................................................................................24

6.3.2.3 Specific Connectionless Network Service (SCLNS) ............................................................................24

6.3.2.4 Connection Oriented Network Service (CONS) ...................................................................................24

6.3.2.5 Internet Protocol....................................................................................................................................24

6.4 Provision of those signals emitted by the target invoking additional or modified services..............................25

6.4.1 Authentication.............................................................................................................................................25

6.4.2 OTAR.........................................................................................................................................................25

6.4.3 Enable/Disable............................................................................................................................................25

6.4.4 Registration.................................................................................................................................................26

6.4.5 Migration....................................................................................................................................................26

6.4.6 Roaming......................................................................................................................................................26

6.4.7 Supplementary services..............................................................................................................................26

6.5 Provision of time-stamps for identifying the beginning, end and duration of the connection..........................26

6.6 Provision of actual destination and intermediate directory numbers if call has been diverted.........................27

6.7 Provision of the U-plane content of the communication from and to the target...............................................27

6.8 Provision of location information.....................................................................................................................27

6.8.1 Mobile users of TETRA .............................................................................................................................27

6.8.2 Fixed line users of TETRA.........................................................................................................................28

Annex A (informative): Explanatory diagrams ...................................................................................29

A.1 General network arrangements...............................................................................................................29

A.2 Service providers....................................................................................................................................30

A.3 Service across multiple SwMIs ..............................................................................................................31

A.4 Service across international borders.......................................................................................................32

Annex B (informative): Void .................................................................................................................33

Annex C (informative): Example encoding of target behaviour ........................................................34

C.1 Call setup from target to TETRA co-target............................................................................................34

C.2 Target registration..................................................................................................................................34

Annex D (informative): Void .................................................................................................................36

Annex E (normative): ASN.1 Data definitions ..................................................................................37

Annex F (informative): Bibliography...................................................................................................41

History ..............................................................................................................................................................43

ETSI
---------------------- Page: 6 ----------------------
SIST EN 301 040 V2.1.1:2006
5 ETSI EN 301 040 V2.1.1 (2006-03)
Intellectual Property Rights

IPRs essential or potentially essential to the present document may have been declared to ETSI. The information

pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found

in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in

respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web

server (http://webapp.etsi.org/IPR/home.asp).

Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee

can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web

server) which are, or may be, or may become, essential to the present document.
Foreword

This European Standard (Telecommunications series) has been produced by ETSI Technical Committee Terrestrial

Trunked Radio (TETRA).

The 06132v203_C01__ASN1.asn file is contained in archive en_301040v020101p0.zip which accompanies the present

document.
National transposition dates
Date of adoption of this EN: 24 February 2006
Date of latest announcement of this EN (doa): 31 May 2006
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 30 November 2006
Date of withdrawal of any conflicting National Standard (dow): 30 November 2006
Introduction

This update to the present document has been prepared to address the following issues:

• ASN.1 definition corrections.
• ASN.1 provision as deliverable based module.
• Closer alignment to handover capabilities described in ES 201 671 [8].
• Refinement of the Internal management interface.
• Renaming of internal interfaces to align with ES 201 158 [9].
• Deletion of SDL as there is no real added value in the model.

• Removal of hanging paragraphs from introduction of each clause (compliance with ETSI drafting rules).

In addition every effort has been made to make the terminology consistent with other interception domain

specifications.
ETSI
---------------------- Page: 7 ----------------------
SIST EN 301 040 V2.1.1:2006
6 ETSI EN 301 040 V2.1.1 (2006-03)
1 Scope

The present document describes the data content of a Lawful Interception interface in a TETRA system. It provides the

requirements and specification of the interface within a TETRA system for the purpose of providing data to Law

Enforcement Agencies (LEAs) in the area of Lawful Interception (LI) of communications.

The present document describes the internal LI interface of a TETRA network, and does not specify the means by

which data is delivered to the LEA or to its designated Law Enforcement Monitoring Facility (LEMF). However the

internal LI interface is defined in such a way that data may be carried transparently on most networks.

NOTE 1: In this context "internal" means within the boundary of the TETRA infrastructure. The boundary may

extend in such a manner that the TETRA LI function is remote from other components of the SwMI, or it

may be co-located with other SwMI components.
Figure 1: Model of TETRA interception

The general reference model of figure 1 shows that the overall LI interface lies between the LEMF and the TETRA

infrastructure (SwMI) and is composed of both the Handover Interface (described in ES 201 671 [8] and/or

TS 102 232 [11]) and the internal interception interface. The subject of the present document is the internal LI interface

that lies between the TETRA infrastructure and the mediation function.

The provision of a Lawful Interception interface for TETRA is a national option, however where it is provided it shall

be provided as described in the present document.

The Handover Interface may be the subject of national regulation and therefore the mediation function may be a matter

of national regulation.

The present document describes the data content of the information flows of the intercepted activity from the TETRA

system using ASN.1 but without respect to the encoding rules which are determined by the handover interface adopted.

The present document is structured as follows:
• clause 4 outlines the essential requirements for the TETRA LI interface;
• clause 5 presents the structural and behavioural models of the LI interface;
• clause 6 presents the data model and allocation behaviour in the LI interface.

The present document applies to TETRA services where access to the communication of TETRA Subscriber Identities

(TSIs) is available in a network (Switching and Management Infrastructure (SwMI) or Radio Packet Data Infrastructure

(RPDI)). Whilst this does not prohibit lawful interception of TETRA Direct Mode Operation (DMO) it removes the

liability of network operators and service providers to provide a result of interception when communication does not

make use of their networks.
ETSI
---------------------- Page: 8 ----------------------
SIST EN 301 040 V2.1.1:2006
7 ETSI EN 301 040 V2.1.1 (2006-03)

The present document describes the normal and exceptional operation in each of the three operational phases of T-LI:

1) Setup:

The actions taken within the TETRA network to establish the monitoring of a target and the interception

communications paths for delivery.
2) Monitoring:
The monitoring of target activity and its delivery.
3) Cleardown:

The removal of a monitor facility against a target and the cleardown of the interception communications

paths.

The present document does not describe the means of transporting data from the TETRA network to the LEA, but

describes only the means of capturing and encoding the activities of a target within the TETRA network and delivering

this data to the mediation function.

The present document does not define the operations or technical requirements of the Handover Interface that takes data

from the mediation function to the Law Enforcement Monitoring Facility (LEMF).

The present document does not define the operations or technical requirements of the LEMF.

NOTE 2: The present document presupposes some familiarity with the operation of TETRA systems and of lawful

interception.

NOTE 3: The present document suggests a barrier to external manipulation of the TETRA infrastructure by means

of a mediation function.
2 References

The following documents contain provisions which, through reference in this text, constitute provisions of the present

document.

• References are either specific (identified by date of publication and/or edition number or version number) or

non-specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies.

Referenced documents which are not found to be publicly available in the expected location might be found at

http://docbox.etsi.org/Reference.

[1] European Union Council Resolution COM 96/C329/01 of 17 January 1995 on the Lawful

Interception of Telecommunications.

[2] ETSI TS 101 331: "Telecommunications security; Lawful Interception (LI); Requirements of Law

Enforcement Agencies".

[3] ETSI EN 300 392-1: "Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D);

Part 1: General network design".

[4] ETSI EN 300 392-2: "Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D);

Part 2: Air Interface (AI)".

[5] ETSI EN 300 392-7: "Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D);

Part 7: Security".

[6] ISO/IEC 8348: "Information technology - Open Systems Interconnection - Network service

definition".
ETSI
---------------------- Page: 9 ----------------------
SIST EN 301 040 V2.1.1:2006
8 ETSI EN 301 040 V2.1.1 (2006-03)

[7] ISO/IEC 8878 (1992): "Information technology - Telecommunications and information exchange

between systems - Use of X.25 to provide the OSI Connection-mode Network Service".

[8] ETSI ES 201 671: "Telecommunications security; Lawful Interception (LI); Handover interface

for the lawful interception of telecommunications traffic".

[9] ETSI ES 201 158: "Telecommunications security; Lawful Interception (LI); Requirements for

network functions".

[10] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of

telecommunications traffic".

[11] ETSI TS 102 232: "Lawful Interception (LI); Handover specification for IP delivery".

[12] ITU-T Recommendation X.680: "Information technology - Abstract Syntax Notation One

(ASN.1): Specification of basic notation".

[13] ITU-T Recommendation X.690: "Information technology - ASN.1 encoding rules: Specification of

Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding

Rules (DER)".

[14] ITU-R Recommendation TF-460-6: "Standard-frequency and time-signal emissions".

3 Definitions and abbreviations
3.1 Definitions

For the purposes of the present document, the following terms and definitions apply:

call: any connection (fixed or temporary) capable of transferring information between two or more users of a

telecommunication system where at least one of the parties to the call (for the purposes of EN 301 040) is a user of a

TETRA system

content of communication: information exchanged between two or more users of a telecommunications service where

at least one of the users is accessing the service in a TETRA network whilst a call is established, excluding intercept

related information

NOTE 1: This includes information which may, as part of some TETRA service, be stored by one user for

subsequent retrieval by another.

NOTE 2: The user in the above definition may be any addressable entity in the TETRA domain using either a

TSI [3] or some other valid network address (undefined).

Coordinated Universal Time (UTC): time scale maintained by the Bureau International de l'Heure (BIH) that forms

the basis of a coordinated dissemination of standard frequencies and time signals

NOTE: The source of this definition is ITU-R Recommendation TF-460-6 [14]of the Consultative Committee on

International Radio (CCIR). CCIR has also defined the acronym for Coordinated Universal Time as UTC.

co-target: correspondent of the target (i.e. the individual or group address with whom the target is communicating)

identity: technical label which may represent the origin or destination of any TETRA traffic, as a rule clearly identified

by a physical communication identity number (such as a telephone number) or the logical or virtual communication

identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case

basis

intercept related information: collection of information or data associated with TETRA services involving the target,

specifically call associated information or data, service associated information or data (e.g. service profile management

by subscriber) and location information
ETSI
---------------------- Page: 10 ----------------------
SIST EN 301 040 V2.1.1:2006
9 ETSI EN 301 040 V2.1.1 (2006-03)

Interception (OR Lawful Interception): action (based on the law), performed by a network operator/service provider,

of making available certain information and providing that information to an LEMF

NOTE: In the present document the term interception is not used to describe the action of observing

communications by an LEA.

interception interface: physical and logical locations within the network operator's/service provider's TETRA facilities

where access to the content of communication and intercept related information is provided

NOTE: The interception interface is not necessarily a single, fixed point.

interception measure: technical measure which facilitates the interception of TETRA traffic pursuant to the relevant

national laws and regulations

interception subject: person or persons, specified in a lawful authorization, whose communications are to be

intercepted

Law Enforcement Agency (LEA): organization authorized by a lawful authorization based on a national law to

receive the results of communication interceptions

Law Enforcement Monitoring Facility (LEMF): law enforcement facility designated as the transmission destination

for the results of interception relating to a particular interception subject

lawful authorization: permission granted to an LEA under certain conditions to intercept specified communication and

requiring co-operation from a network operator/service provider

NOTE: Typically this refers to a warrant or order issued by a lawfully authorized body.

LI interface: physical and logical interface across which the results of interception are delivered from a network

operator/service provider to a LEMF

NOTE: In TS 101 331 [2] this interface is termed the handover interface. The term handover is used in TETRA

systems to describe the maintenance of a call when the mobile party moves between cells.

location information: information relating to the geographic, physical or logical location of an identity relating to an

interception subject

mediation function: function that lies between the LEA and the TETRA SwMI that translates data from the SwMI for

use by the collection function of the LEA

NOTE: The mediation function may be resident in the TETRA SwMI and is specified by the protocols and data

on the interface to the TETRA SwMI (as defined in the present document) and to the collection function

(as defined by the LEA).
multi-user gateway: reserved address given to a gateway port that is
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.