By Tim Young
Every single day, countless terabytes
of information are transmitted across
voice and data networks worldwide. The
vast majority of that data concerns business
meetings, banking transactions, basketball
scores, graduation pictures, and other
such vital and not-so-vital information.
However, sprinkled here and there are
bits of information about terror, murder,
fraud, and extortion: Bits of information
about crime. Serious crime.
What tools to law enforcement bodies
have at their collective disposal to
handle such situations? How can potentially
dangerous information be monitored and
controlled? The best people to turn to
for answers to such questions are probably
the professionals who handle the monitoring,
collection, and control of data every
day: the OSS industry. They are the best
resource for implementing a meaningful
and comprehensive Lawful Intercept program.
Let's be clear, however, about what
it is we are talking about. Lawful intercept
(LI) is wiretapping. In order to have
a discussion about the implementation
of LI, however, we have to put aside
issues of legality. The warrantless wiretapping
that has been all over the news in the
States is not really relevant, though
it's difficult to convince many of that
point. United States Attorney General
Alberto Gonzales wrote a letter in January
of this year to Senators Leahy and Specter
of the Judiciary Committee ensuring them
that, as the court had caught up with
the needs of the fight against terrorism,
wiretapping without judicial permission
is no longer necessary. The letter admitted
no wrongdoing for the previous warrantless
wiretaps, however. Instead, it made statements
like “Although... the Terrorist
Surveillance Program fully complies with
the law, the orders the Government has
obtained will allow the necessary speed
and agility while providing substantial
advantages.” As a result, the
opponents of the previous program consider
the letter, as well as other moves made
by the administration and Gonzales alike,
to be cryptic and unapologetic.
Still, regardless of how such correspondence
would be or should be received, warrantless
wiretapping is irrelevant. LI is, by
virtue of its name, lawful. It is the
process by which communications, whether
circuit or packet-based, are monitored
for illegal activity, subject to judicial
or administrative approval and oversight.
In the days of the PSTN, wiretapping
was a relatively straight-forward process.
The physical line connecting one party
to another could be tapped, providing
all the insight one could need into the
calls being made and the