LI

Lawful Interception

Security
Introduced in Rel-4
A standardized security and regulatory framework that enables authorized law enforcement agencies to intercept communications and related data within telecommunications networks. It is a critical compliance requirement for network operators, ensuring privacy laws are respected while supporting legal surveillance activities.

Description

Lawful Interception (LI) is a comprehensive, standardized architecture and set of interfaces defined by 3GPP that allows Network Operators (NOs) and Internet Service Providers (ISPs) to provide legally authorized interception of telecommunications traffic and associated information to Law Enforcement Agencies (LEAs). It is not a single component but a system involving multiple network functions, interfaces (known as Handover Interfaces - HI), and a strict separation between the network's operational functions and the interception functions. The LI system is designed to be activated only upon presentation of a valid legal warrant and operates covertly, without alerting the target subscriber (the Intercept Subject).

Architecturally, a 3GPP LI system is divided into three main functional groups: the Intercepting Control Element (ICE), the Mediation Function (MF), and the Law Enforcement Monitoring Facility (LEMF). The ICE is embedded within the network nodes that handle the target's communications, such as the MME, SGW, PGW, SMF, UPF in 5G, or MSC, SGSN, GGSN in earlier generations. Its role is to duplicate and divert a copy of the Intercept Related Information (IRI) – which includes call signaling data, location information, and service usage data – and the Content of Communication (CC) – the actual voice, video, or user plane data packets – towards the MF. The MF, often a separate mediation device, normalizes, formats, and delivers this intercepted data to one or more LEMFs via standardized Handover Interfaces (HI1, HI2, HI3). HI1 is for interception order management, HI2 delivers IRI, and HI3 delivers CC.

How it works begins when a LEMA (Law Enforcement Monitoring Agency) sends a lawful authorization (warrant) to the network operator. The operator's administration system configures the relevant ICEs within the network to identify traffic for the specified target (using identifiers like IMSI, MSISDN, or IP address). Once activated, the ICE performs deep packet inspection and signaling monitoring to capture all IRI and CC associated with the target. This data is then sent to the MF, which ensures it is formatted according to standards like ETSI ES 201 671 or 3GPP TS 33.108 and delivered securely to the LEMF. The system is designed for high reliability, security (to prevent unauthorized access), and scalability to handle multiple simultaneous intercepts without impacting the quality of service for other subscribers. Its role is to provide a legally compliant, auditable, and technically robust mechanism for surveillance, which is a mandatory requirement for telecom operators in most jurisdictions.

Purpose & Motivation

Lawful Interception exists to balance two fundamental societal needs: the individual's right to privacy and the state's duty to investigate crime and ensure national security. Before standardization, interception capabilities were vendor-proprietary and often incompatible, making it difficult for law enforcement to work across different network operators and jurisdictions. This lack of standardization could also lead to legal challenges regarding the admissibility of intercepted evidence. 3GPP LI standardization, beginning in earnest from Release 4 onwards, was driven by regulatory requirements from governments worldwide, mandating that public communications networks must have built-in capabilities to support authorized interception.

The primary problems it solves are providing a consistent, reliable, and legally defensible method for intercepting modern digital communications and ensuring that such powerful capabilities are implemented with strong safeguards against abuse. It addresses the technical challenge of intercepting packet-switched data (in addition to circuit-switched voice), which became predominant with GPRS, UMTS, and later technologies. The standardized architecture ensures that interception can be performed regardless of the underlying network technology (2G, 3G, 4G, 5G, IMS) or the vendor equipment used, facilitating interoperability for law enforcement. It also defines strict security requirements for the Handover Interfaces and the mediation function to protect the integrity and confidentiality of both the interception process and the intercepted data.

Historically, its evolution has been closely tied to new network architectures and services. Each new 3GPP system release introduced LI specifications for new network entities and services, such as the IP Multimedia Subsystem (IMS) in Release 5, LTE/EPC in Release 8, and 5G System in Release 15. This continuous evolution ensures that LI capabilities keep pace with technological advancements like VoLTE, network slicing, and edge computing, preventing the existence of 'lawful intercept blind spots' that could be exploited. The framework is essential for network operators to meet their license obligations and avoid penalties, while providing LEAs with the tools needed for effective investigation in the digital age.

Key Features

  • Standardized architecture with Intercepting Control Element (ICE), Mediation Function (MF), and Law Enforcement Monitoring Facility (LEMF)
  • Three defined Handover Interfaces (HI1, HI2, HI3) for secure delivery of warrants, intercept-related information (IRI), and content of communication (CC)
  • Covert operation ensuring the intercept subject is unaware of the surveillance
  • Support for intercepting both circuit-switched and packet-switched communications across all 3GPP generations (2G to 5G) and IMS
  • Strong security mechanisms to protect the interception infrastructure and data from unauthorized access
  • Scalable design to handle multiple simultaneous intercepts without network performance degradation

Evolution Across Releases

Rel-4 Initial

Introduced foundational Lawful Interception specifications for 3GPP circuit-switched and packet-switched domains. It defined the basic architecture, functional entities, and handover interfaces (HI1, HI2, HI3) for GSM and UMTS networks, establishing the framework for delivering Intercept Related Information (IRI) and Content of Communication (CC) to law enforcement.

Defining Specifications

SpecificationTitle
TS 21.905 3GPP TS 21.905
TS 22.495 3GPP TS 22.495
TS 22.822 3GPP TS 22.822
TS 23.889 3GPP TS 23.889
TS 23.919 3GPP TS 23.919
TS 25.322 3GPP TS 25.322
TS 26.346 3GPP TS 26.346
TS 26.998 3GPP TS 26.998
TS 31.102 3GPP TR 31.102
TS 31.103 3GPP TR 31.103
TS 33.106 3GPP TR 33.106
TS 33.108 3GPP TR 33.108
TS 33.126 3GPP TR 33.126
TS 33.127 3GPP TR 33.127
TS 33.128 3GPP TR 33.128
TS 33.501 3GPP TR 33.501
TS 33.831 3GPP TR 33.831
TS 33.848 3GPP TR 33.848
TS 33.880 3GPP TR 33.880
TS 36.322 3GPP TR 36.322
TS 38.212 3GPP TR 38.212
TS 38.214 3GPP TR 38.214
TS 38.882 3GPP TR 38.882
TS 38.889 3GPP TR 38.889