This document was discussed at the Police Cooperation Working Party at a two day meeting on 3-4 September 1998. Its purpose was to radically alter the "Requirements" adopted by the EU in January 1995 to include the interception of the internet (including e-mails) and of the new generation of satellite-based telecommunications. This initiative was generated from outside the EU by working groups in which member states were represented like ILETS (International Law Enforcement Seminar). It provides the rationale for the proposal still on the table (ENFOPOL 19).
Support our work: become a Friend of Statewatch from as little as £1/€1 per month.
TEXT
EUROPEAN UNION, THE COUNCIL
3 September 1998
10951/98
LIMITE
ENFOPOL 98
NOTE
from: Austrian Presidency
to: Police Cooperation Working Party
No. prev. doc.: OJ C 329, 4 November 1996, p.1, 10102/98 ENFOPOL 87
Subject: Interception of telecommunications Council Draft Resolution in relation to new technologies
Preliminary remark:
For the expert meeting of the Working Party "Police Co-operation" on 3/4 September 1998 the delegations will receive the draft of a Council Resolution on interception of telecommunications concerning explanatory memoranda, supplementary requirements and definitions in relation to new technologies, such as S-PCS, Internet, provision of subscriber related and call associated data, cryptography and security measures at network operators/service providers, the individual text passages having been drafted by the technical expert groups ILET, STC and IUR.
DRAFT
COUNCIL RESOLUTION
of 00.00.0000
on the Lawful Interception of Telecommunications
in relation to New Technologies
THE COUNCIL OF THE EUROPEAN UNION
(PREAMBLE)
HAS ADOPTED THIS RESOLUTION:
ANNEX
REGARDING NEW TECHNOLOGIES
to the Council Resolution of 17 January 1995 on the lawful interception of telecommunications (96C 329/01) published in the Official Journal of the European Communities.
Part 1: Explanatory Memoranda
Introduction regarding S-PCS:
The purpose of this explanatory memorandum is to provide an assessment of applicability of law enforcement requirements to mobile satellite services (MSS). Specifically, for each of the requirements, an assessment of technical and jurisdiction issues is provided. The technical issues relate to capability and capacity of an intercept solution in an MSS network. The jurisdictional issues relate to the national policy issues that may impact the ability of law enforcement when dealing with a multinational MSS service provider.
These services are comprised of various operational architectures including voice, data and paging services. Operational scenarios include mobile-to-mobile (satellite); mobile-to-mobile (terrestrial); mobile (satellite or terrestrial)-to-public switch telephone network (PSTN); and PSTN-to-mobile (satellite or terrestrial). The interception of such satellite services is subject to the national laws of the requesting law enforcement agency as well as the gateway host country.
Introduction regarding the INTERNET:
The International Requirements for Interception were developed by law enforcement agencies to express their common requirements for the guidance of the telecommunications industry. These Requirements (Version 1.0) were adopted by the Council resolution of 17 January 1995 on the lawful interception of telecommunications and published in the Official Journal of the European Communities No. C329, 4 November 1996, p1. The governments of the United States of America, Canada and Australia have formally agreed to take the Requirements into account in national policies and to recommend that they be used as a basis for discussion with the telecommunications industry, standards bodies and others.
The Requirements document contains all of the requirements of the agencies but experience has shown that further explanation is needed in some cases and that their application to new and emerging technologies also needs to be clarified.
To ensure that the International Requirements for Interception continue to serve the purpose for which they were intended, Explanatory Memoranda expand and clarify the basic document in a manner agreed by the law enforcement agencies as expressing their common requirement.
Scope
General
This Explanatory Memorandum relates to the requirements of law enforcement agencies for the interception of public IP-based (Internet) services.
Applicable Services
Examples of Internet services to which this Memorandum applies include but are not limited to:
Dial - in services
* Services connected by HFC cable
* Services supplied by satellite
* Directly connected services, e.g. LANs connected via a router
Explanation with regard to S-PCS:
The terrestrial network architecture for an MSS network is very similar to that of cellular or PCS networks. The MSS networks employ similar concepts of mobility as in the IS-41 or GSM-based terrestrial wireless networks. Data services may have a different architecture without such components.
Terrestrial gateway stations are a common and easy location for intercept solutions for accessing telecommunications and call associated data, but mobile-to-mobile communications may allow mobiles to communicate with each other without inclusion of terrestrial gateway stations, thereby necessitating additional complexity to the intercept solution.
The number for target service used by the interception subject may be either part of existing country codes or a separate country code for an MSS provider.
Capacity in most MSS networks is limited to the amount of frequency bandwidth and/or satellite power available within the satellite constellation. The intercept requirement will impact MSS network capacity for mobile-to-mobile calls that would typically not require a link to a terrestrial gateway.
Most MSS providers are planning their network architecture based on technical and cost issues. The current proposed architectures accommodate some of these issues by serving multiple nations from a single terrestrial gateway. This raises several national policy and sovereignty issues for nations involved.
Accessing information for subscribers or from gateways associated with other nations may be subject to sovereignty issues regarding each involved nation.
Interception orders from one nation may have to be transferred to another nation for the service provider to activate intercepts.
Explanation with regard to the INTERNET:
The term "telecommunications" is defined in the glossary of the International Requirements. In the Internet context, telecommunications to and from the target service (see below) means all IP datagrams transmitted to and from the target host plus e-mail deposited in an e-mail server for later collection by the interception subject. It also includes telecommunications between the interception subject and the Internet Service provider for purpose such as changing password.
The identifier for an Internet service which is a target service will usually be the means by which the service is known to the service provider and used to authenticate (and possibly to bill) a person attempting to use the service and/or the means by which traffic is directed to the service. Examples of service identifiers are:
IP address (for services with a fixed IP address)
Account number
- Logon id/password
- PIN number
- E-Mail address
Call associated data refers to the signalling information contained within the IP datagrams and also where appropriate, to the calling line identifier of the telephone service used by the interception subject to connect to the Internet provider. Call associated data is discussed in more detail later in this Memorandum.
1.1. Law enforcement agencies require access to all interception subjects operating temporarily or permanently within a telecommunications system (Requirements Item 1.1. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
Separated or partitioned gateways may physically or logically separate subscriber profile data and channel resources by service provider or nation, thereby creating a barrier to law enforcement access to a subscriber's or user's profile data, call associated data and telecommunications.
The definition of a "telecommunication system" may have a major impact for an MSS provider. For some MSS providers, the system covers the entire globe. A telecommunications system's access by Law enforcement may need to be limited to a nation. If the MSS is an international service provider, international law may become applicable making acquisition of a subscriber's or user's communications possible.
Explanation with regard to the INTERNET:
An interception subject is considered to be operating permanently within a network if the host has a permanent physical connection to the Internet Service provider. This is analogous to a wireline telephone service.
Access is also required when an interception subject has personal or terminal mobility as is the case for dial-in access. This is analogous to a roaming mobile telephone service. Access is required whenever the interception subject is connected to the Internet.
It should be noted that national laws may restrict the conditions under which an interception order is valid. In some cases for example, it may not be lawful to intercept a service if the interception subject or the point-of-presence is outside the jurisdiction of the interception order.
1.2. Law enforcement agencies require access in cases where the interception subject may be using features to divert calls to other telecommunications services or terminal equipment, including calls that traverse more than one network operator/service provider before completing (Requirements Item 1.2. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
Any impacts associated with supplementary services used within cellular, PCS, and wireline networks such as advanced calling features, voice mail, etc. also will be relevant to MSS due to similarities in terrestrial infrastructure.
There is a distinction between inter-network and intra-network traffic.
Explanation with regard to the INTERNET:
In the circuit-switched environment, this requirement relates to call directed towards the target service. In the Internet environment it relates to sessions that are not initiated by the target service (usually e-mail directed towards the target service). In these cases, access is required to all telecommunications, even when they are diverted to another destination as, for example, when e-mail is redirected.
1.3 Law enforcement agencies require that the telecommunications to and from a target service be provided to the exclusion of any telecommunications that do not fall within the scope of the interception authorization (Requirements Item 1.3 - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
Explanation with regard to the INTERNET:
For both circuit-switched and packet-switched services, this requirement means that law enforcement agencies require the network operator/service provider to extract interception product from a composite or multiplexed stream before providing it to the law enforcement agency.
1.4 Law enforcement agencies require access to call associated data such as (Requirements Item 1.4 - OJ 96/C 329/01):
1.4.1 Signalling of access ready status (Requirements Item 1.4.1. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
Physically separated or logically partitioned gateways may separate subscriber profile data by service provider or nation, which may be different from the service provider or nation served with a request for an intercept from law enforcement. This separation may create an obstacle to Law enforcement's access to a subscriber's or user's profile data.
Law enforcement requires this data during the initial and all subsequent registrations of the mobile to the network.
Explanation with regard to the INTERNET:
Requirement 1.4.1. describes the signalling information required by law enforcement agencies in regard to circuit-switched services.
In the Internet context, this specific requirement is irrelevant as the signalling information is contained within the header of the IP datagrams.
1.4.2 Called party number for outgoing connections even if there is no successful connection established (Requirements Item 1.4.2. - OJ 96/C 329/01)
Explanation with regard to S-PCS
If a mobile is in a nation temporarily, this information may not be available for unsuccessful connections.
Physically separated or logically partitioned gateways may separate subscriber profile data by service provider or nation, which may be different from the service provider or nation served with a request for an intercept from law enforcement. This separation may create an obstacle to Law enforcement's access to a subscriber's call associated data.
It is essential that this information be available to law enforcement.
Explanation with regard to the INTERNET:
Requirement 1.4.2. describes the signalling information required by law enforcement agencies in regard to circuit-switched services.
In the Internet context, this specific requirement is irrelevant as the signalling information is contained within the header of the IP datagrams.
1.4.3. Calling party number for incoming connections even if there is no successful connection established (Requirements Item 1.4.3. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
MSSs with intersatellite links can minimize connection charges by routing calls through the intersatellite links to the nearest MSS gateway instead of to the specific intercept-provisioned MSS gateway (if different) for mobile originated calls. For MSSs with gateways serving large areas, least cost routing to a gateway redundant to the subscriber's intercept-provisioned gateway may circumvent intercepts for both internationally and nationally originated calls.
It is essential that this information is available to law enforcement regardless of what gateway is being utilized by the subscriber's or user's service.
Explanation with regard to the INTERNET:
Requirement 1.4.3. describes the signalling information required by law enforcement agencies in regard to circuit-switched services.
In the Internet context, this specific requirement is irrelevant as the signalling information is contained within the header of the IP datagrams.
1.4.4. All signals emitted by the target, including post-connection dialled signals emitted to activate features such as conference calling and call transfer (Requirements Item 1.4.4. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
This includes call origination signalling and post-cut through signalling.
Explanation with regard to the INTERNET:
Requirement 1.4.4. describes the signalling information required by law enforcement agencies in regard to circuit-switched services.
In the Internet context, this specific requirement is irrelevant as the signalling information is contained within the header of the IP datagrams.
1.4.5. Beginning, end and duration of the connection (Requirements Item 1.4.5. -OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
Explanation with regard to the INTERNET:
Requirement 1.4.5. describes the signalling information required by law enforcement agencies in regard to circuit-switched services.
In the Internet context, this specific requirement is irrelevant as the signalling information is contained within the header of the IP datagrams.
1.4.6. Actual destination and intermediate directory numbers if call has been diverted (Requirements Item 1.4.6. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
For calls forwarded over a satellite channel, pared down satellite signalling (due to scarcity of satellite resource) compared to wireline signalling may present a limit to the depth of call associated data that is available for law enforcement.
Protocol translation between national networks may introduce a loss of information.
Explanation with regard to the INTERNET:
Requirement 1.4.6. describes the signalling information required by law enforcement agencies in regard to circuit-switched services.
In the Internet context, this specific requirement are irrelevant as the signalling information is contained within the header of the IP datagrams.
1.5. Law enforcement agencies require information on the most accurate geographical location known to the network for mobile subscribers (Requirements Item 1.5. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
The distance of satellites from earth introduces a high level of granularity for subscriber location compared to terrestrial wireless systems ranging from hundreds of metres to many kilometres.
Because the location capability is not precise, an MSS may be unable to correctly associate an intercept subject that is within several kilometres from different national boarders with the correct nation.
Explanation with regard to the INTERNET:
For dial-in services, law enforcement agencies require the calling line identifier where this is available to the service provider.
1.6. Law enforcement agencies require data on the specific services used by the interception subject and the technical parameters for those types of communication (Requirements Item 1.6. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
For an intercept subject roaming from one nation to another, only a portion of the subscriber profile will be available at the roaming gateway. Law enforcement would need a means of acquiring the remaining information from the home gateway that is in another nation.
Explanation with regard to the INTERNET:
For an Internet service, this includes the means of connection (dial-in, LAN, satellite, cable etc.), the transmission speed in each direction and information relating to e-mail servers used by the interception subject.
Explanation with regard to S-PCS:
The global topology of MSS may add more delay to the delivery of call associated data than terrestrial cellular-type wireless services.
Call content shall be delivered to law enforcement in real-time. Call associated data should be made available within milliseconds of post call event rather than post call completion. 100 milliseconds - 500 milliseconds is the desirable target. It is imperative that the call associated data be available within this short time frame to allow for correlation of call event with call details.
Explanation with regard to the INTERNET
In the Internet context, reference to call associated data is not applicable.
Explanation with regard to S-PCS:
The intercept may be provisioned on an MSS gateway located in any number of nations, various types of transmission facilities or signalling protocols could be used for transfer of intercepted telecommunications and call associated data to law enforcement.
During such transmission or transfer, the intercepted data cannot be altered or corrupted in any way.
There must be co-ordination between the network operator(s) and service provider(s) and between the network operator(s) and services provider(s) and law enforcement.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to the PROVISION OF SUBSCRIBER RELATED DATA AND CALL ASSOCIATED DATA
This requirement includes provision of commonly agreed interfaces that will allow transmission of subscriber details.
3.1 Law enforcement agencies require network operators/service providers to provide call associated data and call content from the target service in a way that allows for the accurate correlation of call associated data with call content (Requirements Item 3.1. - OJ 96/C 329/01)
Explanation with regard to S-PCS
Law enforcement needs to know from where this information is originating.
Explanation with regard to the INTERNET:
This requirement is not applicable.
3.2. Law enforcement agencies require that the format for transmitting the intercepted communications to the monitoring facility be a generally available format. This format will be agreed upon on an individual country basis (Requirements Item 3.2. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
The format utilised must not be a "proprietary" format, but should be a readily available and "reasonable" format.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
3.3. If network operators/service providers initiate encoding, compression or encryption of telecommunications traffic, law enforcement agencies require the network operators/service providers to provide intercepted communications en Claire (Requirements Item 3.3. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
This requirement includes call detail information as well as call content data.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services. Note that where a target modifies the traffic by encoding or encryption or by applying any other process, it is the responsibility of the intercepting agency to extract intelligence from the received product.
3.4. Law enforcement agencies require network operators/service providers to be able to transmit the intercepted communications to the law enforcement monitoring facility via fixed or switched connections (Requirements Item 3.4. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
3.5. Law enforcement agencies require that the transmission of the intercepted communications to the monitoring facility meet applicable security requirements (Requirements Item 3.5. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement. Reference is made to the International User Requirements (IUR) - Security document for additional details.
The definition of "applicable security requirements" may have a major impact on multinational MSS providers.
Security issues for international information exchange may face sovereignty issues.
Explanation with regard to the INTERNET:
This requirement applies unchanged to internet services.
Explanation with regard to S-PCS:
There can be no degradation of voice quality of the target's service due to the interception. This includes, but is not limited to things such as: delay of call setup; delay of voice transmission; delay of inability to initiate features; denial of service; degraded voice quality, and "anomalous" indications displayed on the target's mobile.
The need for international Law enforcement co-operation may increase significantly the number of "authorized" personnel with access to an intercept order.
The definition of "unauthorized person" may have severe impact on the intercept administration for an MSS provider. For a gateway serving multiple nations, foreign citizens may have access to interception orders.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to S-PCS:
The need for international Law enforcement co-operation may increase significantly the number of "authorized" personnel with access to an intercept order.
The definition of "unauthorized person" may have severe impact on the intercept administration for an MSS provider. For a gateway serving multiple nations, foreign citizens may have access to interception orders.
Unauthorized personnel cannot have access to the "product" of the intercept or audit information or other intercept related data.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
5.1. Law enforcement agencies require network operators/service providers to protect information on which and how many interceptions are being or have been performed, and not disclose information on how interceptions are carried out (Requirements Item 5.1. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
This requirement includes target identification information.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to the PROVISION OF SUBSCRIBER RELATED DATA AND CALL ASSOCIATED DATA:
This requirement includes a requirement to protect all information associated with requests for subscriber details.
5.2. Law enforcement agencies require network operators/service providers to ensure that intercepted communications are only transmitted to the monitoring agency specified in the interception authorization (Requirements Ibm 5.2. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
5.3. According to national regulations, network operators/service providers could be obliged to maintain and adequately protected record of activations of interceptions (Requirements Item 5.3. - OJ 96/C 329/01)
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to S-PCS:
This includes the terrestrial telecommunications service provider(s), if any, to whom the subscriber or user has access.
The information needed by law enforcement to provision an intercept may reside on gateways owned and operated by a foreign organization or company.
This information may also reside with the service provider providing the targeted service.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to S-PCS:
There should be no impacts or issues specific to an MSS provider. Every MSS should be able to meet this requirement.
If a country requires that a person from a network operator/service provider be present in a court to verify, this may be an issue for multinational MSS providers.
Explanation with regard to the INTERNET
This requirement applies unchanged to Internet services.
Explanation with regard to the PROVISION OF SUBSCRIBER RELATED DATA AND CALL ASSOCIATED DATA:
With the introduction of such telecommunication network functionality as number portability, this requirement is extended to include the requirement for the network operator/service provider to notify the intercepting agency if the target service is "ported" to another network operator/service provider while an interception order is in force.
Explanation with regard to S-PCS:
Because a given MSS gateway may serve satellite coverage to multiple nations, capacity for intercepts should include requirements of each nation served.
The maximum number of simultaneous interceptions for a given subscriber may need to abide by capacity requirements of multiple nations. Multiple countries may have interceptions for the same mobile subscriber being served out of one gateway.
National requirements are defined as multiple countries requirements.
"Flagged" numbers must be such as to accommodate all the capacity needs of the national law enforcement agencies requirements.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to S-PCS:
Language, time differences, technical interfaces may increase significantly the sophistication, and therefore, the time required to provision intercepts in gateway serving multiple countries.
Sovereignty issues may cause further delays if co-operation of law enforcement from different countries is required.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Explanation with regard to the PROVISION OF SUBSCRIBER RELATED DATA AND CALL ASSOCIATED DATA:
This requirement includes providing access to subscriber data needed to obtain and implement the warrant as quickly as possible.
Explanation with regard to S-PCS:
Performance standards must be of an acceptable level and are subject to the standards of the original call.
Explanation with regard to the INTERNET:
This requirement applies unchanged to Internet services.
Part 2: Supplementary Requirements
RELATED DATA AND CALL ASSOCIATED DATA
General
This Explanatory Memorandum relates to the requirements of law enforcement agencies for information about:
the identity of subscribers;
Applicable services
Law enforcement agencies require access to information about subscribers to all telecommunications services including, but not limited to, the following:
circuit switched telephony services, e.g. PSTN, ISDN;
Law enforcement agencies also require the means to access information about subscribers in other countries in situations where those subscribers may be operating within the agency's jurisdiction. Examples of these situations include, but are not limited to the following:
Internationally roaming mobile subscribers;
Requirements
On the basis of the Council Resolution of 17 January 1995, the existing requirements as specified in item 6 shall be supplemented with items 6.1 to 6.7.
SUPPLEMENTARY REQUIREMENTS WITH REGARD TO ITEM 6
6.1. Law enforcement agencies require access to information kept by the providers of telecommunications networks, telecommunications services and Internet services on the subject's identity. Examples of this information include, but are not limited to, the following:
the full name and address of the interception subject, including postal code;
6.2. Law enforcement agencies require the means to access information on the numbering plans or identification numbers for telecommunications services to help identify an interception subject's provider. Typical service plans that may require identification are, but are not limited to, the following:
ISDN-services;
6.3. Law enforcement agencies require access to information kept by the providers of telecommunications networks, telecommunications services and Internet services on the interception subject's service number or other distinctive
identifier. Examples of this information may include, but are not limited to the following:
Types of services and features used by the interception subject;
6.4. Law enforcement agencies require access to information kept by the providers of telecommunications networks, telecommunications services and Internet services on the interception subject's optional service's and features. Examples of this information may include, but are not limited to the following:
For wireline PSTNs these features include call diversion, call waiting, call completion, pre-selection of a long distance carrier, Voice mail and abbreviated dialling;
This requirement is also applicable for those services which incorporate the use of prepaid card technology.
6.5. Law enforcement agencies require access to traffic and billing records of an interception subject.
6.6. Law enforcement agencies require the providers of telecommunications networks, telecommunications services and Internet services to keep an up-to-date register of Individual Mobile Equipment Identity codes of mobile communications equipment which is sold by these providers to their clients.
6.7. Law enforcement agencies require all subscriber information to be obtained from a search commencing with:
the service number or other distinctive identifier, or
Introduction
The requirements relating to security measures are specified for network operators/service providers to comply with. These requirements are laid down in order to safeguard the interests of the services authorized by law to carry out telecommunications interceptions (Law Enforcement Agencies).
These requirements can be seen as a further elaboration on the requirements of the Council Resolution of 17 January 1995 (items 3.5, 5., 5.1, 5.2, 5.3), (OJ 96/C 329101).
Compliance with the requirements will ensure the following:
protecting the interests of those affected by an intercept from disclosure of their telecommunications to parties other than the intercepting agency.
preventing that the telecommunication access of intercepting agencies is blocked, and
preventing and also tracing the abuse of the technical telecommunications intercept facilities used by network operators/service providers.
SUPPLEMENTARY REQUIREMENTS:
11.1. The network operator/service provider shall co-operate with regular security reviews by the Law enforcement agencies.
11.2. Interception orders and interception data shall be classified in accordance with the appropriate national security level. Law enforcement agencies require that the network operator/service provider will ensure the confidentiality of all interception orders and interception data.
11.3. Interception orders must be destroyed by the network operator/service provider within a certain period, as required by national legislation and procedures.
11.4. Law enforcement agencies require that in case of violation of the integrity and/or the confidentiality of the interception order or interception data, the network operator/service provider shall take all necessary action to prevent dissemination of the information. It will notify the host nation s responsible agency as soon as possible about the violation. Furthermore the Law enforcement agencies require the network operator/service provider to take all due action to prevent such an event to occur in future.
12.1. A list with the names and job descriptions of these persons has to be handed over to the Law enforcement agencies.
13.1. The network operator/service provider has to assure that the integrity and the confidentiality of the interception data during transmission is safeguarded to the level required by the Law enforcement agencies. Therefor all communication lines used for interception purposes are to be protected.
13.2. Law enforcement agencies require that information with regard to the actual interceptions implemented in a particular telecommunication system, shall not be made available to unauthorised persons.
14.1. Law enforcement agencies require the network operator/service provider to store the interception order as specified by national security standards. The network operator/service provider is not allowed to store the call content.
WITH REGARD TO CRYPTOGRAPHY
16.1. The handover of cryptographic key material should be immediate. the computational and operational process a law enforcement authority needs to undertake to decrypt the data, including any reconstruction or rebuilding of keys, should involve minimal time and resources to ensure an efficient, economic and timely operation.
16.2. The provision of data as plaintext should take place as soon possible; in urgent cases within a few hours or minutes.
17.1. Where cryptographic key material is being provided, it must be delivered, either in electronic format or another agreed format using a secure means of transmission. this must be protected to ensure the authenticity, integrity and confidentiality of such material, and that it is provided in a non-repudiational manner.
17.2. The cryptographic key material or plaintext data must only be transmitted to the agency specified in the authorization.
17.3. Law enforcement agencies require providers of cryptographic services not to disclose to the target or any third party:
Part 3: Additional Definitions Supplementing the Glossary contained in the Council Resolution of 17 January 1995
ACCESS (Glossary OJ 96/C 329/019)
The technical capability to interface with a communications facility, such as a communications line or switch, so that a law enforcement agency can acquire and monitor communications and call associated data carried on the facility.
AUTHENTICITY (New)
Establishing the validity of a claimed identity of a user, device or another entity in an information or communications system.
AVAILABILITY (New)
The property that data information and information and communications systems are accessible and usable on a timely basis in the required manner.
CALL (Glossary OJ 96/ C 329/019)
Any connection (fixed or temporary) capable of transferring information between two or more users of a telecommunications system.
CALL ASSOCIATED DATA (Glossary OJ 96/C 329/019)
Signalling information passing between a target service and the network or another user. Includes signalling information used to establish the call and to control its progress (e.g. call hold, call handover). Call associated data also includes information about the call that is available to the network operator/service provider (e.g. duration of connection)
CONFIDENTIALITY (New)
The property that data or information is not made available or disclosed to unauthorised individuals, entities or processes.
CRYPTOGRAPHY (New)
The discipline which embodies principles, means and methods for transformation of data in order to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation and/or prevent its unauthorised use.
CRYPTOGRAPHIC KEY (New)
Parameter used with a cryptographic algorithm to transform, validate, authenticate, encrypt or decrypt data.
CRYPTOGRAPHIC SERVICES (New)
The facilities which provide cryptographic.
DATA (New)
The representation of information in a manner suitable for communication, interpretation, storage, or processing.
DECRYPTION (New)
The inverse function of encryption
ENCRYPTION (New)
The transformation of data by the use of cryptography to produce unintelligible data (encrypted data) to ensure its confidentiality.
HOST (New)
Any (end-user) computer system that connect to a network.
INTEGRITY (New)
The property that data or information has not been modified or altered in an unauthorized manner.
INTERCEPTION DATA (New)
It means call content, call associated data and subscriber related data.
INTERCEPTION (Glossary OJ 96/C 329/019)
As used here, the statutory based action of providing access and delivery of a subject's telecommunication and call associated data to law enforcement agencies.
INTERCEPTION INTERFACE (Glossary OJ 96/C 329/019)
The physical location within the network operators/service providers telecommunications facilities where access to the intercepted communications or call associated data is provided. The interception interface is not necessarily a single, fixed point.
INTERCEPTION ORDER (Glossary OJ 96/C 329/019)
An order placed on a network operator/service provider for assisting a law enforcement agency with a lawful authorised telecommunications interception.
INTERCEPTION SUBJECT (Glossary OJ 96/C 329/019)
Person or persons identified in the lawful authorisation and whose incoming and outgoing communications are to be intercepted and monitored.
INTERNET (New)
The collection of networks and gateways that use the TCP/IP protocol suite and function as a single, co-operative virtual network. The Internet provides universal connectivity and three levels of network services: applications level services like electronic mail the build on the first two.
INTERNET PROTOCOL / IP (New)
(Internet Protocol). The TCP/IP standard protocol that defines the IP datagram as the unit of information passed across an internet and provides the basis for connectionless, best-effort packet delivery service. IP includes the ICMP (Internet control and error message protocol) as an integral part. The entire protocol suite is often referred to as TCP/IP because TCP and IP are two most fundamental protocols.
IP ADDRESS / Internet-Address (New)
The 32-bit address assigned to hosts that want to participate in a TCP/IP internet.
IP DATAGRAM (New)
The basic unit of information passed across a TCP/IP internet. It contains a source and destination address along with data.
IUR (New)
International User Requirements
LAW ENFORCEMENT AGENCY (Glossary OJ 96/C 329/019)
A service authorised by law to carry out telecommunications interceptions.
LAW ENFORCEMENT AGENCY with regard to cryptography (New)
An organisation authorised by lawful authorization, based on national law, to receive cryptographic key material and all necessary information to decrypt the data or the plaintext data.
LAW ENFORCEMENT MONITORING FACILITY (Glossary OJ 96/C 329/019)
A law enforcement facility designated as the transmission destination for the intercepted communications and call associated data for a particular interception subject. The site where monitoring/recording equipment is located.
LAWFUL ACCESS (Glossary OJ 96/C 329/019)
Access by third party individuals or entities, including governments, to plaintext, or cryptographic keys, of encrypted data, in accordance with law.
LAWFUL AUTHORISATION (Glossary OJ 96/C 329/019)
Permission granted to a law enforcement agency under certain conditions to intercept specified telecommunications. Typically this refers to an order or warrant issued by a legally authorised body.
NETWORK OPERATOR/SERVICE PROVIDER (Glossary OJ 96/C 329/019)
Networkoperator = the operator of a public telecommunications infrastructure which permits the conveyance of signals between defined network termination points by wire, by microwave, by optical means or by other electromagnetic means; and
Serviceprovider = the natural or legal person providing (a) public telecommunications service(s) whose provision consists wholly or partly in the transmission and routing of signals on a telecommunication.
PLAINTEXT (New)
Intelligible data.
QUALITY OF SERVICE (Glossary OJ 96/C 329/019)
The quality specification of a communications channel, system, virtual channel, computer-communications session, etc. Quality of service may be measured, for example, in terms of signal-to-noise ratio, bit error rate, message throughput rate or call blocking probability.
RELIABILITY (Glossary OJ 96/C 329/019)
The probability that a system or service will perform in a satisfactory manner for a given period of time when used under specified operating conditions.
ROAMING (Glossary OJ 96/C 329/019)
The ability of subscriber of mobile telecommunications services to place, maintain, and receive calls when they are located outside their designated home serving are.
SESSION (New)
The term "session" is used in this document to describe a related set of transactions between the same two parties e.g. a series of requests for file transfer from the same source, and the subsequent transfer, would be regarded as a single "session". A customer connection to the Internet through a dial-in service may conduct several "sessions" in serial or parallel before disconnecting.
TARGET SERVICE (Glossary OJ 96/C 329/019)
A service associated with an interception subject and usually specified in a lawful authorisation for interception.
TCP (New)
(Transmission Control Protocol). the TCP/IP standard transport level protocol that provides the reliable, full duplex, stream service on which many application protocol depend.
TELECOMMUNICATION (Glossary OJ 96/C 329/019)
Any transfer of signs, signals, writing, images sounds, data or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system.
Spotted an error? If you've spotted a problem with this page, just click once to let us know.
Statewatch does not have a corporate view, nor does it seek to create one, the views expressed are those of the author. Statewatch is not responsible for the content of external websites and inclusion of a link does not constitute an endorsement. Registered UK charity number: 1154784. Registered UK company number: 08480724. Registered company name: The Libertarian Research & Education Trust. Registered office: MayDay Rooms, 88 Fleet Street, London EC4Y 1DH. © Statewatch ISSN 1756-851X. Personal usage as private individuals "fair dealing" is allowed. We also welcome links to material on our site. Usage by those working for organisations is allowed only if the organisation holds an appropriate licence from the relevant reprographic rights organisation (eg: Copyright Licensing Agency in the UK) with such usage being subject to the terms and conditions of that licence and to local copyright law.