The present invention generally relates to systems, software, methods, nodes and more particularly to mechanisms and techniques, to provide Law Enforcement Agencies with monitoring or retention data related to multiple telecommunication identities owned by single or multiple operators.
Lawful Interception is used for legally monitoring voice and data communications between parties of interest to LEA. Data Retention is used to store data generated from e.g. public telecommunication and the Internet, which might be requested by Law Enforcement Authorities in the course of investigations concerning said suspected criminals. In governments around the world, various law enforcement agencies may have the right to authorize this interception/retention in their respective jurisdictions.
Information IRI and Content of Communication CC for the same target. The different parts used for interception are disclosed in current Lawful Interception standards (see 3GPP TS 33.107 and 3GPP TS 33.108—Release 8). A Law Enforcement Monitoring Facility LEMF is connected to three Mediation Functions MF, MF2 and MF3 respectively for ADMF, DF2, DF3 i.e. an Administration Function ADMF and two Delivery Functions DF2 and DF3. The Administration Function and the Delivery Functions are each one connected to the LEMF via standardized handover interfaces HI1-HI3, and connected via interfaces X1-X3 to an Intercepting Control Element ICE in a telecommunication system. Together with the delivery functions, the ADMF is used to hide from ICEs that there might be multiple activations by different Law Enforcement Agencies. Messages REQ sent from LEMF to ADMF via HI1 and from the ADMF to the network via the X1—1 interface comprise identities of a target that is to be monitored. The HI1 interface is thus used to set the interception orders in the operator network. The Delivery Function DF2 receives Intercept Related Information IRI from the network via the X2 interface. DF2 is used to distribute the IRI to relevant Law Enforcement Agencies LEAs via the HI2 interface. The Delivery Function DF3 receives Content of Communication CC, i.e. speech and data, on X3 from the ICE. Requests are also sent from the ADMF to the Mediation Function MF2 in the DF2 on an interface X1—2 and to the Mediation Function MF3 in the DF3 on an interface X1—3. The requests sent on X1—3 are used for activation of Content of Communication, and to specify detailed handling options for intercepted CC. In Circuit Switching, DF3 is responsible for call control signalling and bearer transport for an intercepted product. Intercept Related Information IRI, received by DF2 is triggered by Events that in Circuit Switching domain are either call related or non-call related. In Packet Switching domain the events are session related or session unrelated.
For the activation of Intercept Related Information IRI, the message sent from the ADMF to the DF contains the target identity, which can be, for instance, one of the following: the IMSI, MSISDN or IMEI codes commonly associated to a mobile phone subscription. Moreover, the message sent from the ADMF to the DF contains the address for delivery of IRI (i.e. the LEMF address), which subset of information shall be delivered, a DF2 activation identity, which uniquely identifies the activation for DF2 and is used for further interrogation or deactivation, respectively. Furthermore, the message sent from the ADMF to the DF also contains the warrant reference number, if required by national option.
Intercept Related Information IRI events are generated at various moments, particularly when a call is initiated or ended, or for all supplementary services during a call and also for information which is not associated to a call. That is, there are call-related IRI events and non call-related IRI events. In any case, whenever an IRI event occurs which is originated by or directed to a mobile subscriber, the Intercepting Control Element ICE in the network sends the relevant data to the DF2 for them to be delivered to the LEMF.
To assure correlation between the independently transmitted Content of Communication CC and Intercept Related Information IRI of an intercepted call, the following parameters are used: Lawful Interception Identifier LIID, Communication Identifier CID and CC Link Identifier CCLID. Law enforcement can provide an alphanumeric string, the Case Identity to identify a particular surveillance. A case identity may be assigned to a Monitored Object through a command.
While Lawful Interception is a real-time exercise, data from the past is used when Data Retention is practised.
An investigation about subjects suspected of criminal activities does not only involve the monitoring of calls and retrieval of data items related to communications of a single target identity, for example a single MSISDN, IMSI, IMEI, IP address, etc. used by the suspected subjects. It is in fact often needed to extend the investigation to multiple identities, for example because the subjects suspected of criminal activities use more than one handset or because the investigation has to consider also other people in relationship with the suspected and whose conversations with each other and with the suspected are also under investigation. This scenario is even more complicated in case the target identities are owned by different operators or providers.
In order for a LEA to monitor all those target identities, several warrants or requests have to be used in the existing Lawful Intercept and Data Retention systems, one for each identity. Even in rather simple investigations, the Authorities need to manage a number of warrants or requests and a number of target identities, which are likely to be spread among different operators. This management is costly and time consuming for the LEA investigators. Moreover, often the data retrieved and the intercepted calls obtained by a LEA are duplicated, because they relate to cross-communications between e.g. two subjects whose identities are both a target of the same investigation. Much time is wasted to discard the duplicate information retrieved, or to correlate the various information with each other within the same investigation.
The above-mentioned problem and others are solved by the invention which provides a new functionality for Lawful Intercept and Data Retention that allows combining multiple warrants/queries into one request. In particular, it is described an enhancement of the handover interfaces HI1/HI-A of Lawful Interception LI and Data Retention DR, respectively, which allow to trigger a single warrant with multiple targets included in lists for Lawful Intercept, and performing multiple queries towards those lists in Data Retention, allowing LEA investigators to save time and effort.
According to one aspect of the invention, a number of telecommunication identities of one or more target users are grouped in at least one list of telecommunication identities which is identified by a corresponding identification element, or list identifier. This list identifier can be used as a correlation item in a further enhancement of handover interfaces HI2/HI-B of LI and DR, respectively. This can be useful for example to correlate data related to the same investigation.
According to another aspect of the invention, the information data retrieved from a telecommunications network which relate to the number of identities included in the list of target identities are tagged with a corresponding list identifier before they are delivered to the Authorities requesting the information data.
According to a further aspect of the invention, if the multiple identities which are under investigation are managed by a plurality of network operators, then the single warrant/query is repartitioned into a plurality of requests each directed to each of the network operators managing one or more of said identities.
In one aspect of the invention a Lawful Interception embodiment is disclosed. In another one, the invention works within the framework of a Data Retention application.
The objects of the invention are achieved by methods, arrangements, nodes, systems and articles of manufacture.
The invention will now be described more in detail with the aid of preferred embodiments in connection with the enclosed drawings.
In the first example of
In a first step, the Law Enforcement Management Function LEMF identifies for example two e.g. IMEI lists of handsets, list L containing identities x and y, and list K containing identities x′, y′ and z, and passes a request for Lawful Intercept “Request LI” to the Administration Function ADMF of the LI. Then, the Lawful Interception is activated in phase “Activate LI” by providing a single warrant for each list L, K in an Intercepting Control Element ICE (e.g., Gateway GPRS Support Node GGSN, Mobile Switching Centre MSC, etc.) by fetching an e.g. IMEI list of targets, linked to a respective list identifier List_id L and List_id K. Subsequently, the ICE intercepts and filters (“IMEI x”, “IMEI y”) and (“IMEI x′”, “IMEI y′”, “IMEI z”), and generally speaking “IMEI m” and “IMEI n” belonging to a generic list List_id, only relevant traffic coming from or going to the identities, listed in the lists identified by List_id L and List_id K (and generally speaking, any list identified by a List_id). The ICE forwards raw IRIs (“IRI x”, “IRI y”) , (“IRI x′”, “IRI y′”, “IRI z”), and generally speaking “IRI n”, and optionally CC (in general, “CC m”) to the Lawful Interception mediation system LEMF, when traffic data related to any of the IMEI in the target lists reaches the ICE. Data relate to the originator or recipient identities under monitoring.
Preferably, possible duplicates are filtered out, before providing the intercepted data on the Handover Interface. For example if IMEIx is in communication with IMEIy, in a specified time window and they are in the same list, the intercepted communication will be reported only once on the Handover Interface. Finally, Lawful Interception Mediation System converts the intercepted traffic into the required standard format and sends it to a collection function running at the LEMFs.
In the second example of
In a first step, the Law Enforcement Management Function LEMF identifies for example two e.g. IMEI lists of handsets, list L containing identities x and y, and list K containing identities z and w, which are not owned by a single operator. The LEMF passes a request for Lawful Intercept “Request” to the Administration Function ADMF of the LI. Then, in a second phase the lists are transferred from ADMF to a Multi-Operator Mediation Function “Multi-Op MF” (see “Activate Multi-Op LI”). The triggered warrant shall use a special operator identifier associated to the Multi-Op MF. Then, the Lawful Interception mediation system, using the embedded Multi-Operator Mediation Function, provisions multiple warrants repartitioned among several ICEs, (ICE1, ICE2 in the example) each one owned by a specific operator, by fetching an e.g. IMEI list of targets, linked to a respective list identifier List_id L and List_id K. Subsequently, each ICE intercepts and filters only relevant traffic coming from or going to the identities, listed in the lists identified by List_id L and List_id K (in the example ICE 1: “IMEI x” for List_id L and “IMEI w” for List_id K; ICE 2: “IMEI y” for List_id L and “IMEI z” for List_id K). The ICE forwards raw IRIs (“IRI x”, “IRI y”, “IRI z”, “IRI w”) , and optionally CCs (not shown in
Preferably, possible duplicates are filtered out, before providing the intercepted data on the Handover Interface. For example if IMEIx is in communication with IMEIy, in a specified time window and they are in the same list eg. identified by List_id L, the intercepted communication will be reported only once on the Handover Interface. Finally,
Lawful Interception Mediation System converts the intercepted traffic into the required standard format and sends it to a collection function running at the LEMFs, further correlating the provided data by Operator Identifier.
With reference to
The delivered data includes traffic data information related to the identities, e.g. IP addresses, each one of them belonging to the respective list identified by e.g. List_id L and List_id K.
In this process, possible duplicates, for example when the originator identity and recipient identity are both in the same list which is monitored, are filtered out. For example, if a first IP address k is in communication, in the specified time window, with a second IP address j which is in the same list of IP addresses under investigation, the monitored communication is reported only once on the Handover interface.
Moreover, the list identifier List-id can be used as a correlation item for the provided traffic query results.
With reference to
Also in this process, possible duplicates, for example when the originator identity and recipient identity are both in the same list which is monitored, are filtered out. For example, if a first IMSI k is in communication, in the specified time window, with a second IMSI j which is in the same list of IMSIs under investigation, the monitored communication is reported only once on the Handover interface.
Moreover, the list identifier List-id can be used as a correlation item for the provided traffic query results.
The method and systems which have been described above have several advantages, especially for the LEAs. In fact, by using multi-target warrants/multiple list queries, the investigators can save a significant amount of time and efforts. Moreover, the list identifiers—and more generally the process which has been described—gives the Lawful Enforcement Agencies the possibility to get correlated data, providing a more complete and manageable overview of data related to monitored targets for investigation purposes. The LEA can perform multi-target warrants/multiple list queries using subscribers' identities event when they are not owned by a single operator, therefore helping investigators to save time and effort.
The description, for purposes of explanation and not limitation, sets forth specific details, such as particular components, electronic circuitry, techniques, etc., in order to provide an understanding of the present invention. But it will be apparent to one skilled in the art that the present invention may be practised in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known methods, devices, and techniques, etc., are omitted so as not to obscure the description with unnecessary detail. Individual function blocks are shown in one or more figures. Those skilled in the art will appreciate that functions may be implemented using discrete components or multi-function hardware. Processing functions may be implemented using a programmed microprocessor or general-purpose computer. The invention is not limited to the above described and in the drawings shown embodiments but can be modified within the scope of the enclosed claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2010/070162 | 12/17/2010 | WO | 00 | 6/11/2013 |