TR 101 944 : 1.1.2
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); ISSUES ON IP INTERCEPTION
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Education on LI for IP Data ("clarity of thinking")
4.1 Searching for Clarity
4.2 The Core Problem: Identifying the Correct IP
Packets to Intercept
4.3 Is There a Solution to Lawful Interception of
IP-Traffic?
4.4 Are There Parallels in Support of Interception
Dichotomy?
4.5 What then is the Role of ETSI TC SEC (WG LI) in
Regard to Monitoring IP Traffic?
5 Basic Data Model
5.1 The Basic Diagram
5.2 Who Owns Which Element
5.3 Who Has What Responsibility
5.4 Network Addressable Points
5.5 Format of Interception
5.6 Considerations
6 Implementation Architecture for LI of Internet
Communication
6.1 General
6.2 Dial Up Connections
6.3 Permanent Connection Models
6.4 General Notes About Delivery Considerations
6.5 3rd Generation Mobile Technologies
7 Security Aspects
7.1 Handover
7.2 Target Information
8 Notes About HI3 for Packet Oriented Content
8.1 Introduction
8.2 General Requirements for the Packet HI3
Delivery
8.3 Discussed Mechanism
Annex A (informative): Bibliography
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.