By Joe
Hogan and Marc
Price
It reads like a spy
novel or political thriller. A person
of interest is identified. He’s
accessed jihadist web sites. He’s
received and made calls from a person
who, in turn, has received calls from
Afghanistan or Western Pakistan. He
has sent a flurry of recent picture
messages from a vulnerable national
monument. Police move fast to corroborate
these facts with other information:
a questionable driver’s license
from a state with lax rules, a recent
pilot’s license, a money transfer
from overseas.
Worldwide communications
are essential for our freedom. At the
same time they are one of the best
means we have to identify early warning
signs of impending threats. As in the
example above, any single call or event
may be insignificant by itself, while
in total, these events present a complete
profile worthy of interest.
But do operators and
governments have all the tools they
need to record, track, and correlate
such information? The answer is yes,
and as the importance of the tools
grows, so does the sophistication.
Lawful interception
and surveillance mandates have gone
from a low-visibility back-office function
to a critical need, in an environment
where operators may be asked and required
to compile millions of customer records
in a matter of hours to turn over to
authorities. The focus, budget and
auditing of the operator’s lawful
intercept capabilities have thus come
to the forefront. Political ramifications
aside, this is a very real challenge
that service providers have little
choice but to face. Furthermore, with
the rise to prominence of many different
types of data services—text messaging,
video and email—this problem
becomes even more complex. By way of
example, while five voice sessions
produce five voice call records, a
single IP-based session can produce
hundreds, or even thousands of records.
Authorities understand
well that a complete picture of voice
and data is necessary to greatly improve
the odds of identifying a person of
interest. Indeed, having such a complete
picture narrows the list of possible
suspects whereas information from voice
calls or data alone would fail to narrow
the pool sufficiently.
For operators, the
importance of dealing with lawful interception
mandates cannot be understated. However,
mandates such as the Communications
Assistance for Law Enforcement Act
(CALEA) in the U.S., and similar mandates
in Europe and elsewhere, have raised
a conundrum. How do service providers
rectify the tug of war that exists
between providing quality and safe
service to customers, while at the
same time delivering