22 April 2002: Add 6 Netherlands interception documents.

21 April 2001: Add 2 meeting documents, 2 reports, attendees, ETSI TR 101 944.

26 March 2001: Add EG 201 781, TS 133 107, TR 101 876 and ES 201 671 in the Netherlands.

9 March 2001: Add updated TIA J-STD-025-A with link to TIA CALEA Web site.

8 March 2001: Add ETR 278. Thanks to A. Add references to GSM and US cellular cryptographic weaknesses.

7 March 2001. Thanks to several persons.

This presents European (ETSI) and US (TIA) standards for electronic surveillance of telecommunications.

See also an overview and analysis of 3GPP algorithms, which provides links to numerous other documents:

http://www.research.att.com/~janos/3gpp.html

And see the Third Generation Partnership Project 2 for North American and Asian standards: http://www.3gpp2.org/

For background on electronic surveillance:

http://jya.com/esnoop.htm


WAI/GT/FuncSpecs V1.0.1 (2000-06)
Functional Specifications for lawful interception of
Internet traffic in The Netherlands

http://cryptome.org/espy/101WAIGTFSv101.doc (67K)


Questions and Answers About Functional Specs [NL]

http://cryptome.org/espy/QA-FS-isps.doc (60K)


Questions about the Functional Specifications for
Lawful Interceptions [NL]

http://cryptome.org/espy/FS-Questions.pdf (16K)


Transport of Intercepted IP Traffic [NL]
v 0.1.2

http://cryptome.org/espy/TIITv012.pdf (313K)


Questions about the Transport of Intercepted
IP Traffic document [NL]

http://cryptome.org/espy/TIIT-Questions.pdf (29K)


ILETS '99: draft report [NL]

http://cryptome.org/espy/ILETS99-report.doc (42K)


Meeting Documents
'SECLI-26-Working Group LI, Île' Meeting
21 February 2001

http://cryptome.org/espy/20010221Meet26-LU.html (49KB)


Meeting Documents
'SECLI-#27' Meeting
April 2001

http://cryptome.org/espy/2001040Meeting27G1.html (68KB)


Report of WG LI meeting Les Ulis 21st-22nd February 2001

http://cryptome.org/espy/20010221Secli26LUM.doc (60KB)


Report of WG LI meeting Grimstad 3-5 April 2001

http://cryptome.org/espy/20010405Meeting27GM.doc (89KB)


Attendees at WG LI meeting Grimstad 3-5 April 2001

http://cryptome.org/espy/20010405Meeting27GM.xls (20KB)


ETSI TR 101 944 V0.0.7 8 (2001-03)
Technical Report
Telecommunications Security;
Lawful Interception (LI);
Issues on IP Interception

http://cryptome.org/espy/TR101-944v008.doc (360KB)


Draft ETSI EG 201 781 V1.1.1 (2000-03)
ETSI Guide
Intelligent Networks (IN);
Lawful Interception

http://cryptome.org/espy/EG201-781.pdf (311KB)


ETSI TS 133 107 V3.1.0 (2000-12)
Technical Specification
Universal Mobile Telecommunications System (UMTS);
3G Security;
Lawful Interception Architecture and Functions
(3GPP TS 33.107 version 3.1.0 Release 1999)

http://cryptome.org/espy/TS133-107.pdf (916KB)


ETSI TR 101 876 V1.1.1 (2001-01)
Technical Report
Telecommunications security;
Lawful Interception (LI);
Description of GPRS HI3

http://cryptome.org/espy/TR101-876.pdf (77KB)


Implementing ETSI ES 201 671 in the Netherlands
Version 0.1.1 October 2000

http://cryptome.org/espy/ES201-671-nl.txt (25KB)


ETSI ES 201 671 Edition 2, Draft 13 (1999-09)
ETSI Standard
Telecommunications security;
Lawful Interception (LI);
Handover interface for the lawful interception of
telecommunications traffic

http://cryptome.org/espy/ES201-671-2-dft13.doc (964KB)

http://cryptome.org/espy/ES201-671-2-dft13.zip (Zipped, 270KB)


ETSI ES 201 671 V1.1.1 (1999-07)
ETSI Standard
Telecommunications security;
Lawful Interception (LI);
Handover interface for the lawful interception of telecommunications traffic

http://cryptome.org/espy/ES201-671.pdf (485KB)


3G TS 33.106 V3.0.0 (1999-07)
Technical Specification
3rd Generation Partnership Project;
Technical Specification Group Services and Systems Aspects;
WG3 Security
Lawful Interception Requirements
(3G TS 33.106 version 3.0.0)

http://cryptome.org/espy/33106-300.pdf (66KB)


EN 301 040 V2.0.0 (1999-06)
European Standard (Telecommunications series)
Terrestrial Trunked Radio (TETRA);
Security;
Lawful Interception (LI) interface

http://cryptome.org/espy/EN301-040.pdf (145KB)


ES 201 158 V1.1.2 (1998-05)
ETSI Standard
Telecommunications security;
Lawful Interception (LI);
Requirements for network functions

http://cryptome.org/espy/ES201-158.pdf (156KB)


ETSI ETR 278
TECHNICAL March 1996
REPORT
Source: ETSI TC-SAGE Reference: DTR/SAGE-00014
ICS: 33.020
Key words: GSM, cipher algorithm
Security Algorithms Group of Experts (SAGE);
Report on the specification and evaluation of the
GSM cipher algorithm A5/2

http://cryptome.org/espy/ETR278e01p.pdf (36KB)

For more on weaknesses of the GSM A5 algorithm see:

http://www.isaac.cs.berkeley.edu/isaac/gsm.html
http://cryptome.org/a51-crack.htm


ETSI ETR 331
TECHNICAL December 1996
REPORT
Source: ETSI TC-STAG Reference: DTR/NA-002310
ICS: 33.020
Key words: Security
Security Techniques Advisory Group (STAG);
Definition of user requirements for lawful interception of telecommunications;
Requirements of the law enforcement agencies

http://cryptome.org/espy/ETR331e01p.pdf (66KB)


ETSI ETR 363
TECHNICAL January 1997
REPORT
Source: ETSI TC-SMG Reference: DTR/SMG-101020Q
ICS: 33.020
Key words: Digital cellular telecommunications system, Global System for Mobile communications (GSM)
GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS - R
Digital cellular telecommunications system;
Lawful Interception requirements for GSM
(GSM 10.20 version 5.0.1)

http://cryptome.org/espy/ETR363e01p.pdf (102KB)


ETSI TR 101 750 V1.1.1 (1999-11)
Technical Report
Telecommunications and Internet Protocol
Harmonization Over Networks (TIPHON);
Security;
Studies into the Impact of lawful interception

http://cryptome.org/espy/TR101750v010101p.pdf (71KB)


ETSI TS 101 507 V7.3.0 (1999-11)
Technical Specification
Digital cellular telecommunications system (Phase 2+);
Lawful Interception - stage 1
(GSM 02.33 version 7.3.0 Release 1998)

http://cryptome.org/espy/TS101507v070300p.pdf (72KB)


ETSI TS 101 509 V7.1.0 (1999-11)
Technical Specification
Digital cellular telecommunications system (Phase 2+);
Lawful Interception;
Stage 2
(GSM 03.33 version 7.1.0 Release 1998)

http://cryptome.org/espy/TS101509v070100p.pdf (739KB)


PacketCableTM Electronic Surveillance Specification
PKT-SP-ESP-I01-991229

http://cryptome.org/espy/PCESS-pkt-991229.pdf (147KB)


TR45.AHAG
Common Cryptographic Algorithms
Revision D.1, Publication Version
September 13, 2000

http://cryptome.org/espy/TR45-ccad1.pdf (689KB)

For more on the weaknesses of US cellular algorithms see:

http://jya.com/puzzle.htm
http://jya.com/tr453.htm
http://www.zedz.net/mirror/cave/index.html


TR45.AHAG
Interface Specification for Common Cryptographic Algorithms
Revision D.1, Publication Version
September 13, 2000

http://cryptome.org/espy/TR45-isccad1.pdf (228KB)


TIA TR-45
Lawfully Authorized Electronic Surveillance
J-STD-025
Rev. A
May 31, 2000

http://cryptome.org/espy/TR45-jstd025a.pdf (523KB)

See also the TIA Web site on the Communications Assistance for Law Enforcement Act of 1994 (CALEA)

http://www.tiaonline.org/government/calea/


TIA TR-45 2000 WORKPLAN
Version 3.2
May 31, 2000

http://cryptome.org/espy/TR45-00workplanv3-2.pdf (37KB)


TIA TR-45 2000 WORKPLAN
Version 3.4
August 30, 2000

http://cryptome.org/espy/TR45-00workplanv3-4.pdf (40KB)


TIA TR-45 2000/2001 WORKPLAN
Version 3.6
November 30, 2000

http://cryptome.org/espy/TR45-00workplanv3-6.pdf (43KB)


TR-45 1999/2000 WORKPLAN, Rev. 5.1, November 15, 1999

http://cryptome.org/espy/3Gworkplanv5-1.pdf (29KB)


TR-45 1999/2000 WORKPLAN, Rev. 5.2, December 8, 1999

http://cryptome.org/espy/3Gworkplanv5-2.pdf (27KB)