9 March 2001: Updated and revise links to latest draft document.
For additional European and US interception documents:
http://cryptome.org/e-spy-telecom.htm
29 February 2000. Thanks to anonymous.
See also: http://www.etsi.org
1 Scope
The present document is step 3 of a three step approach to describe a generic handover interface for the provision of lawful interception from a Network Operator, an Access Provider or a Service Provider (NWO/AP/SvP) to the Law Enforcement Agencies (LEAs). The provision of lawful interception is a requirement of national law, which is usually mandatory for the operation of any telecommunication service.
Step 1 contains the requirements for lawful interception from a users (LEAs) point of view and is published ref [1].
The technologies covered in this document are:GSM, TETRA, GPRS, ISDN and PSTN.
NOTE: As new networks and/or services are developed, the present document will be expanded as the relevant standards become available.
_____________________
[1] ETR 331: "Security Techniques Advisory Group (STAG); Definition of user requirements for lawful interception of telecommunications; Requirements of the law enforcement agencies". http://cryptome.org/espy/ETR331e01p.pdf[2] ES 201 158: "Telecommunications security; Lawful Interception (LI); Requirements for network functions". http://cryptome.org/espy/ES201-158.pdf
Full 103-page standard:
http://cryptome.org/espy/ES201-671-2-dft13.doc (964KB)http://cryptome.org/espy/ES201-671-2-dft13.zip (Zipped, 270KB)