Requirements to point for autonomous access to information in a 4G mobile communications network
DOI:
https://doi.org/10.20535/2411-1031.2025.13.1.328984Keywords:
lawful interception, electronic communication network, network set, mobile communication, technical means, point for autonomous access, functional modules, gatewayAbstract
The article examines requirements to point for autonomous access to information in a 4G mobile communications network. It is noted, that the objects of interception are the content of communication sessions of interception subjects (surveillance subscribers), information about their location and service profiles fixed to the end (terminal) equipment of interception subjects. Two groups of requirements are specified: general and specific only for the interception of information in specified network. The authors, like a number of scientists, consider a single system of technical means to be a functional combination of control and processing means of bodies authorized to remove information from electronic communication networks, means of protected transport network and network set. Certain functional modules of the 4G mobile communication networks, interaction with which is necessary for authorized bodies to lawful intercept information, are given. It is established the type and content of the information, that generated by the specified functional modules. It is noted, that actions for simultaneous interception of information must be carried out in automatic mode at the point for autonomous access to information in the mobile network. Attention was drawn to the need to modernize the gateways of network sets of the technical means for their adaptation to use in the 4G mobile communication network. The gateway of the network set of the technical means of the interception system on the internal interfaces must provide to functional modules a surveillance table with identification objects and must receive from them informational messages and metadata of interception objects, related with interception subjects (surveillance subscribers). Suggested offers for changes to the normative document on lawful interception in Ukraine. The proposals are recommended to be used during the planning of operativesearch, counter-intelligence, reconnaissance measures and covert investigative (search) actions in 4G mobile communication networks of public use in Ukraine.
References
Verkhovna Rada of Ukraine. (2020, Dec. 16), Law no. 089-IX, About electronic communications. [Online]. Available: https://zakon.rada.gov.ua/laws/show/1089-20#Text. Accessed on: Dec. 24, 2024.
Security Service of Ukraine and the Admin. of the SSSCIP. (2021, Dec. 31). Order no 460/781, Technical means for the implementation by authorized equipment’s of operative-search, counter-intelligence, reconnaissance measures and covert investigative (search) actions in electronic communication networks of public use in Ukraine. General technical requirements. [Online]. Available: https://zakon.rada.gov.ua/rada/show/v1519950-18#Text. Accessed on: Dec. 24, 2024.
V. A. Stepanov, and S. M. Grischenko, “A unified system of technical means of lawful interception from electronic communication networks”, Col. of sci. wor. NA SSU, no. 78, pp. 211-215, 2021.
S. M. Grischenko, and V. A. Stepanov, “Conditions of autonomous access to information during interception of information from electronic communications networks”, Information and law, no. 1 (36), pp. 123-127, 2021, doi: https://doi.org/10.37750/2616-6798.2021.1(36).238192.
V. A. Stepanov, and S. M. Grischenko, “A point for autonomous access to information in the electronic communications network”, Information and law, no. 3 (50), pp. 171-176, 2024, doi: https://doi.org/10.37750/2616-6798.2024.3(50).311724.
V. M. Lazebnyi, “Current Aspects of Legal Regulation for Monitoring Electronic Communications and Removal of Information from Electronic Communication Networks in Ukraine”, Bul. of KhNUIA, no. 3 (94), pp. 113-125, 2021, doi: https://doi.org/10.32631/v.2021.3.10.
A. V. Manzhay, and S. V. Penkov, “Standardization in the field of lawful interception of telecommunications”, Legia si Vista, no. 5/2, pp. 86-89, 2017. [Online]. Available: https://ibn.idsi.md/sites/default/files/imag_file/86_89_Standartizacija%20v%20sfere%20zakonnogo%20perehvata%20telekommunikacij.pdf. Accessed on: Dec. 24, 2024.
V. A. Stepanov, and I. K. Stishenko, “Peculiarities of lawful interception of information from telecommunication networks”, Spec. Telecom. Sys. and Inf. Prot., no. 10, pp. 76-80, 2005.
V. A. Stepanov, and Y. V. Chelpan, “Aspects of lawful interception of information in a mobile communication network, that simultaneously uses technologies 4G, 5G та IMS”, Telecom. and Inf. Tech., no. 3 (84), pp. 69-76, 2024. doi: https://doi.org/10.31673/2412-4338.2024.036976.
ETSI TS 101 158 V1.3.1: Telecommunications security. Lawful Interception. Requirements for network functions. [Online]. Available: https://www.etsi.org/deliver/etsi_ts/101100_101199/101158/01.03.01_60/ts_101158v010301p.pdf. Accessed on: Dec. 24, 2024.
EU Council resolution. (2001, June 20), Council resolution ENFOPOL. On law enforcement operational needs with respect to public telecommunication network and services. Ukrainian translation. [Online]. Available: https://zakon.rada.gov.ua/laws/show/994_234#Text. Accessed on: Dec. 24, 2024.
EU Council resolution. (1995, Jan. 17). Council resolution no. 96/С 329/01 On the lawful interception of telecommunications. Ukrainian translation. [Online]. Available: https://zakon.rada.gov.ua/laws/show/994_235#Text. Accessed on: Dec. 24, 2024.
ETSI TS 133 127 V17.5.0 (2022): Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Lawful Interception (LI) architecture and functions. [Online]. Available: https://www.etsi.org/deliver/etsi_ts/133100_13319/133127/17.05.00_60/ts_133127v170500p.pdf Accessed on: Dec. 24, 2024.
Cabinet of Ministers of Ukraine. (2016, Jan. 13). Resolution no. 95 On the approval of conformity assessment modules, which are used to develop conformity assessment procedures, and rules for the use of conformity assessment modules. [Online]. Available: https://zakon.rada.gov.ua/laws/show/95-2016-%D0%BF#Text. Accessed on: Dec. 24, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Collection "Information Technology and Security"

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).