3 Definitions and abbreviations

33.1083G Security3GPPHandover interface for Lawful Interception (LI)Release 17TS

3.1 Definitions

For the purposes of the present document, the terms and definitions given in TR 21.905 [38] and the following apply.

access provider: access provider provides a user of some network with access from the user’s terminal to that network.

NOTE 1: This definition applies specifically for the present document. In a particular case, the access provider and network operator may be a common commercial entity.

(to) buffer: temporary storing of information in case the necessary telecommunication connection to transport information to the LEMF is temporarily unavailable.

communication: Information transfer according to agreed conventions.

content of communication: information exchanged between two or more users of a telecommunications service, excluding intercept related information. This includes information which may, as part of some telecommunications service, be stored by one user for subsequent retrieval by another.

handover interface: physical and logical interface across which the interception measures are requested from network operator / access provider / service provider, and the results of interception are delivered from a network operator / access provider / service provider to a law enforcement monitoring facility.

identity: technical label which may represent the origin or destination of any telecommunications traffic, as a rule clearly identified by a physical telecommunications identity number (such as a telephone number) or the logical or virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case basis.

interception: action (based on the law), performed by a network operator / access provider / service provider, of making available certain information and providing that information to a law enforcement monitoring facility.

NOTE 2: In the present document the term interception is not used to describe the action of observing communications by a law enforcement agency.

interception configuration information: information related to the configuration of interception.

interception interface: physical and logical locations within the network operator’s / access provider’s / service provider’s telecommunications facilities where access to the content of communication and intercept related information is provided. The interception interface is not necessarily a single, fixed point.

interception measure: technical measure which facilitates the interception of telecommunications traffic pursuant to the relevant national laws and regulations.

intercept related information: collection of information or data associated with telecommunication services involving the target identity, specifically communication associated information or data (e.g. unsuccessful communication attempts), service associated information or data and location information.

internal intercepting function: point within a network or network element at which the content of communication and the intercept related information are made available.

internal network interface: network’s internal interface between the Internal Intercepting Function and a mediation device.

invocation and operation: describes the action and conditions under which the service is brought into operation; in the case of a lawful interception this may only be on a particular communication. It should be noted that when lawful interception is activated, it shall be invoked on all communications (Invocation takes place either subsequent to or simultaneously with activation.). Operation is the procedure which occurs once a service has been invoked.

NOTE 3: The definition is based on ITU‑T Recommendation X.882 [8], but has been adapted for the special application of lawful interception, instead of supplementary services.

law enforcement agency: organization authorized by a lawful authorization based on a national law to request interception measures and to receive the results of telecommunications interceptions.

law enforcement monitoring facility: law enforcement facility designated as the transmission destination for the results of interception relating to a particular target.

lawful authorization: permission granted to a LEA under certain conditions to intercept specified telecommunications and requiring co-operation from a network operator / access provider / service provider. Typically this refers to a warrant or order issued by a lawfully authorized body.

lawful interception: see interception.

lawful interception identifier: identifier for a particular interception.

Location Dependent Interception: is interception of a target mobile within a network service area that is restricted to one or several Interception Areas (IA).

location information: information relating to the geographic, physical or logical location of an identity relating to an target.

mediation device: equipment, which realizes the mediation function.

mediation function: mechanism which passes information between a network operator, an access provider or service provider and a handover interface, and information between the internal network interface and the handover interface.

network element: component of the network structure, such as a local exchange, higher order switch or service control processor.

network element identifier: uniquely identifies the relevant network element carrying out the lawful interception.

network identifier: internationally unique identifier that includes a unique identification of the network operator, access provider, or service provider and, optionally, the network element identifier.

network operator: operator of a public telecommunications infrastructure which permits the conveyance of signals between defined network termination points by wire, by microwave, by optical means or by other electromagnetic means.

precision: the number of digits with which a numerical value is expressed, e.g. the number of decimal digits or bits. Note: precision should not be confused with accuracy, which is a difference between a measured/recorded numerical value and the respective value in the standard reference system.

quality of service: quality specification of a telecommunications channel, system, virtual channel, computer-telecommunications session, etc. Quality of service may be measured, for example, in terms of signal-to-noise ratio, bit error rate, message throughput rate or call blocking probability.

reliability: probability that a system or service will perform in a satisfactory manner for a given period of time when used under specific operating conditions.

result of interception: information relating to a target service, including the content of communication and intercept related information, which is passed by a network operator, an access provider or a service provider to a law enforcement agency. Intercept related information shall be provided whether or not call activity is taking place.

service information: information used by the telecommunications infrastructure in the establishment and operation of a network related service or services. The information may be established by a network operator, an access provider, a service provider or a network user.

service provider: natural or legal person providing one or more public telecommunications services whose provision consists wholly or partly in the transmission and routing of signals on a telecommunications network. A service provider needs not necessarily run his own network.

SMS: Short Message Service gives the ability to send character messages to phones. SMS messages can be MO (mobile originate) or MT(mobile terminate).

target identity: technical identity (e.g. the interception’s target directory number), which uniquely identifies a target. One target may have one or several target identities.

target service: telecommunications service associated with an target and usually specified in a lawful authorization for interception.

NOTE 4: There may be more than one target service associated with a single target.

telecommunications: any transfer of signs, signals, writing images, sounds, data or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photo-optical system.

3.2 Abbreviations

For the purposes of the present document, the abbreviations given in TR 21.905 [38] and the following apply:

A-MSISDN Additional MSISDN

AN Access Network

ASE Application Service Element

ASN.1 Abstract Syntax Notation, Version 1

BER Basic Encoding Rules

CC Content of Communication

CSCF Call Session Control Function

DF Delivery Function

DSMIP Dual Stack MIP

e-PDG Evolved PDG

EPS Evolved Packet System

E-UTRAN Evolved UTRAN

FTP File Transfer Protocol

GGSN Gateway GPRS Support Node

GPRS General Packet Radio Service

GSM Global System for Mobile communications

GSN GPRS Support Node (SGSN or GGSN)

GTP GPRS Tunnelling Protocol

HA Home Agent

HI Handover Interface

HI1 Handover Interface Port 1 (for Administrative Information)

HI2 Handover Interface Port 2 (for Intercept Related Information)

HI3 Handover Interface Port 3 (for Content of Communication)

HLC High Layer Compatibility

HSS Home Subscriber Server

IA Interception Area

IA5 International Alphabet No. 5

IAP Interception Access Point

IBCF Interconnecting Border Control Function

ICI Interception Configuration Information

IE Information Element

IIF Internal Interception Function

IMEI International Mobile station Equipment Identity

IM-MGW IMS Media Gateway

IMS IP Multimedia Core Network Subsystem

IMS-AGW IMS Acess Gateway

IMSI International Mobile Subscriber Identity

INI Internal network interface

IP Internet Protocol

IP-CAN IP-Connectivity Access Network

IPS Internet Protocol Stack

IRI Intercept Related Information

ITOT ISO Transport Service on top of TCP

LALS Lawful Access Location Services

LCS Location Services

LEA Law Enforcement Agency

LEMF Law Enforcement Monitoring Facility

LI Lawful Interception

LIID Lawful Interception Identifier

LLC Lower layer compatibility

LSB Least significant bit

MAP Mobile Application Part

MCPTT Mission Critical Push To Talk

ME Mobile Entity

MF Mediation Function

MGCF Media Gateway Control Function

MIP Mobile IP

MME Mobility Management Entity

MS Mobile Station

MSB Most significant bit

MSISDN Mobile Subscriber ISDN Number

MSN Multiple Subscriber Number

NEID Network Element Identifier

NID Network Identifier

NIDD Non-IP Data Delivery

NO Network Operator

OA&M Operation, Administration & Maintenance

P‑CSCF Proxy Call Session Control Function

PDG Packet Data Gateway

PDN Packet Data Network

PDN-GW PDN Gateway

PDP Packet Data Protocol

PLMN Public land mobile network

PMIP Proxy Mobile IP

POC Push to talk Over Cellular

PSTN Public Switched Telephone Network

PTC Push to Talk over Cellular (Encompasses POC and MCPTT services)

Rx Receive direction

S‑CSCF Serving Call Session Control Function

SCEF Service Capability Exposure Function

SDP Session Description Protocol

SGSN Serving GPRS Support Node

S-GW Serving Gateway

SIP Session Initiation Protocol

SMAF Service Management Agent Function

SMF Service Management Function

SMS Short Message Service

SP Service Provider

TAU Tracking Area Update

TCP Transmission Control Protocol

TI Target identity

TLS Transport Layer Security

TP Terminal Portability

T-PDU tunneled PDU

TPKT Transport Packet

TrGW Transit Gateway

TWAN Trusted WLAN Access Network

Tx Transmit direction

UI User Interaction

ULIC UMTS LI Correlation

UMTS Universal Mobile Telecommunication System

URI Universal Resource Identifier

URL Universal Resource Locator

UTRAN Universal Terrestrial Radio Access Network

VPN Virtual Private Network

WAF WebRTC Authorisation Function

WebRTC Web Real Time Communications

WIC WebRTC IMS Client

WWSF WebRTC Web Server Function