By Joe
                                              Hogan and Marc
                                              Price
                                        It reads like a spy
                                          novel or political thriller. A person
                                          of interest is identified. He’s
                                          accessed jihadist web sites. He’s
                                          received and made calls from a person
                                          who, in turn, has received calls from
                                          Afghanistan or Western Pakistan. He
                                          has sent a flurry of recent picture
                                          messages from a vulnerable national
                                          monument. Police move fast to corroborate
                                          these facts with other information:
                                          a questionable driver’s license
                                          from a state with lax rules, a recent
                                          pilot’s license, a money transfer
                                          from overseas.
                                        Worldwide communications
                                          are essential for our freedom. At the
                                          same time they are one of the best
                                          means we have to identify early warning
                                          signs of impending threats. As in the
                                          example above, any single call or event
                                          may be insignificant by itself, while
                                          in total, these events present a complete
                                          profile worthy of interest.
                                        But do operators and
                                          governments have all the tools they
                                          need to record, track, and correlate
                                          such information? The answer is yes,
                                          and as the importance of the tools
                                          grows, so does the sophistication. 
                                        Lawful interception
                                          and surveillance mandates have gone
                                          from a low-visibility back-office function
                                          to a critical need, in an environment
                                          where operators may be asked and required
                                          to compile millions of customer records
                                          in a matter of hours to turn over to
                                          authorities. The focus, budget and
                                          auditing of the operator’s lawful
                                          intercept capabilities have thus come
                                          to the forefront. Political ramifications
                                          aside, this is a very real challenge
                                          that service providers have little
                                          choice but to face. Furthermore, with
                                          the rise to prominence of many different
                                          types of data services—text messaging,
                                          video and email—this problem
                                          becomes even more complex. By way of
                                          example, while five voice sessions
                                          produce five voice call records, a
                                          single IP-based session can produce
                                        hundreds, or even thousands of records.
                                        Authorities understand
                                          well that a complete picture of voice
                                          and data is necessary to greatly improve
                                          the odds of identifying a person of
                                          interest. Indeed, having such a complete
                                          picture narrows the list of possible
                                          suspects whereas information from voice
                                          calls or data alone would fail to narrow
                                          the pool sufficiently.
                                        For operators, the
                                          importance of dealing with lawful interception
                                          mandates cannot be understated. However,
                                          mandates such as the Communications
                                          Assistance for Law Enforcement Act
                                          (CALEA) in the U.S., and similar mandates
                                          in Europe and elsewhere, have raised
                                          a conundrum. How do service providers
                                          rectify the tug of war that exists
                                          between providing quality and safe
                                          service to customers, while at the
                                          same time delivering