Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • PDF
    • Immediate download
    • $29.43 $28.62
      you save $0.81
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $29.43 $28.62
      you save $0.81
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

The present document provides a high-level informative overview and principles regarding implementation of LI for telecommunications. Details about these principles is covered in other documents that address specific technologies and network types.

The following areas are covered here:
  • A general discussion about the role and position of Lawful Interception related to public communication services.
  • Origin of LI requirements - overview of characteristics of national legislation and regulations as well as international cooperation on LI.
  • A high-level description of LI related to an abstract model of communications systems (service/control/connectivity layers).
  • Discussion of interception at access service level versus application service.
  • Discussion of interception of IN services.
  • Overview of issues regarding interception of IP traffic.
  • Description of internal interfaces and internal network units involved in LI processing.
  • Description of handover interfaces and interface protocols with some practical hints regarding implementation choices.
  • Discussion about security issues, related to the standard threat model described in ETR 332 [4].
 

Document History

  1. ETSI TR 101 943

    👀 currently
    viewing


    Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture

    • Most Recent
  2. ETSI TR 101 943


    Telecommunications security; Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture

    • Historical Version