M00043999
New product
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - DEFINITION OF USER REQUIREMENTS FOR LAWFUL INTERCEPTION OF TELECOMMUNICATIONS
European Telecommunications Standards Institute
In stock
Warning: Last items in stock!
Availability date: 11/06/2021
Foreword
1 Scope
2 References
3 Abbreviations and Definitions
3.1 Abbreviations
3.2 Definitions
4 General Introduction
5 Architecture
6 User (LEA) requirements
6.1 General requirements
6.2 Result of interception
6.3 Location information
6.4 Time constraints
6.5 Non disclosure
6.6 Information transmission and information protection
requirements
6.7 Internal security
6.8 Unchanged state of service, etc.
6.9 Technical handover interfaces and format requirements
6.10 Independence of the network operator or service provider
6.11 Temporary obstacles to transmission
6.12 Identification of the identity to be intercepted
6.13 Multiple interception measures
Annex A: Explanatory diagrams
A.1 General network arrangements
A.2 Service provider
A.3 Home country service from a foreign territory
A.4 Identification of a target service
Annex B: Draft requirements for interception across national
frontiers
History
Gives guidance for ETSI bodies in the area of co-operation by network operators/service providers with the lawful interception of telecommunications.
Published | |
Document Type | Standard |
Status | Current |
Publisher | European Telecommunications Standards Institute |
Pages | |
ISBN | |
Committee | NA |