15 March 1999

Date: Sun, 14 Mar 1999 21:02:02 +0000
To: ukcrypto@maillist.ox.ac.uk
From: Duncan Campbell <duncan@gn.apc.org>
Subject: Some extracts from ENFOPOL 98 


Based on a lawful enquiry and given a target identifier or other information
about the target or encrypted data with related information, law enforcement
agencies require: 

¨       full details of the target including service number;    
¨       information that will fully identify the cryptographic services used by
        the target; and 
¨       the technical parameters of the method used to implement the
        cryptographic service.

Law enforcement agencies require access to the decrypted message as quickly (in
urgent cases within a few hours or minutes).  The law enforcement agencies will
specify how it wishes to achieve this result; either through the provision of
cryptographic key material and all necessary information to decrypt the data or
exceptionally by provision of the data as plaintext.  Access to the decrypted
message must be available for those encryption systems that allow for both
national and international operation.

The handover of cryptographic key material should be immediate.  The
computational and operational process a law enforcement authority needs to
undertake to decrypt the data, including any reconstruction or rebuilding of
keys, should involve minimal time and resources to ensure an efficient,
economic and timely operation.

The provision of data as plaintext should take place as soon possible; in
urgent cases within a few hours or minutes.


Law enforcement agencies require a real-time, full-time monitoring capability
for the interception of telecommunications.  Call associated data should also
be provided in real-time.  If call associated data cannot be made available in
real time, law enforcement agencies require the data to be available as soon as
possible upon call termination 

The identifier for an Internet service which is a target service will usually
be the means by which the service is known to the service provider and used to
authenticate (and possibly to bill) a person attempting to use the service
and/or the means by which traffic is directed to the service. Examples of
service identifiers are:   

¨       IP address (for services with a fixed IP address)  
¨       Account number  
¨       Logon id/password  
¨       PIN number  
¨       E-mail address 

Call associated data refers to the signalling information contained within the
IP datagrams and also where appropriate, to the calling line identifier of the
telephone service used by the interception subject to connect to the Internet

Before implementation of the interception, law enforcement agencies require:
(1) the interception subject's identity, service number or other distinctive
Identifier, (2) Information on the services and features of the
telecommunications system used by the interception subject and delivered by
network operators/service providers, and (3) information on the technical
parameters of the transmission to the law enforcement monitoring facility 

Law enforcement agencies require access to information about subscribers to all
telecommunications services including, but not limited to, the following:
circuit switched telephony services, 

¨       PSTN,
¨       ISDN; 
¨       terrestrial mobile services, e.g. GSM, AMPS, D-AMPS, CDMA, DCS-1800; 
¨       satellite-based mobile services, e.g. IRIDIUM, Globalstar, ICO; 
¨       Trunked mobile services, e.g. TETRA;   
¨       Internet services both dial -in and fixed based;  
¨       calling card services both pre-paid and account based;   
¨       call-back services;  
¨       long distance and international services;  
¨       paging services;  
¨       data services, e.g. X.25, X.400, ATM, frame relay, and;  
¨       voice mail services. 

Law enforcement agencies also require the means to access information about
subscribers in other countries in situations where those subscribers may be
operating within the agency's jurisdiction. Examples of these situations
include, but are not limited to the following:  

¨       Internationally roaming mobile subscribers;  
¨       Subscribers to S-PCS services such as Iridium, and;  
¨       Subscribers to international carriers where the subscriber database is
        in another country. 

Law enforcement agencies require access to information kept by the providers of
telecommunications networks, telecommunications services and Internet services
on the subject's Identity. Examples of this information include, but are not
limited to, the following:   

¨       the full name and address of the Interception subject including postal
¨       the full name and address, including postal code, of the party which
        pays the bill for the services provided to the interception subject;  
¨       sufficient credit card details to identify the account if the
        interception subject pays by credit card, and  
¨       the directory name and address as shown in the directory. 

Law enforcement agencies require access to information kept by the providers of
telecommunications networks, telecommunications services and Internet services
on the interception subject's service number or other distinctive Identifier.
Examples of this information may include, but are not limited to the following:
Types of services and features used by the interception subject;   

¨       Wire line directory numbers;    
¨       Technical identifiers and codes of the telecommunications equipment
        such as the MSISDN, IMSI and IMEI GSM identifiers, which are supplied by 
        the provider to the interception subject; 
¨       The means by which a provider identifies a subscriber of Internet on
        cable TV;  
¨       User identifier or code given by a caller and used by an Internet
        provider to authenticate and bill the user; 
¨       Cable or channel identifiers for fixed point services;  
¨       IP address for users of fixed Internet services;        
¨       Associated directory number on a voice mail service;    
¨       E-mail address;         
¨       The PIN or code given by the caller and used by the provider to
        authenticate    and bill a user of calling card services, and;  
¨       The means by which an international or long distance service provider
        authenticates a caller.

Law enforcement agencies require access to traffic and billing records of an
interception subject.


I will be taking about some this stuff at LSE on Tuesday :  (snip from Peter's

Global information surveillance:
Intelligence and law enforcement
planning and capabilities 

Duncan Campbell will report on and discuss
his current work for the European
Parliament on such systems as
Echelon and proposed legislation /
mutual assistance arrangements as
Enfopol and the US Communications
Assistance to Law Enforcement Act.

See http://csrc.lse.ac.uk/Colloquia/colloquia1.htm for further information.