Review article
Information security and the lawful interception of communications through telecom service providers infrastructure: advanced model system architecture
Natalija Parlov
orcid.org/0000-0002-8468-7465
; University of Zadar, Zadar, Croatia
Željko Sičaja
orcid.org/0000-0003-2608-5922
; University of Zadar, Zadar, Croatia
Tihomir Katulić
; University of Zagreb, Faculty of Law, Zagreb, Croatia
Riko Luša
orcid.org/0000-0002-5262-7361
; University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb, Croatia
Abstract
Communication interception for national security purposes, as well as for purposes of conducting a criminal investigation, is an invaluable asset of law enforcement agencies. In technical terms, this field has seen rapid advances in the last decade, while available software programmes and platforms for lawful interception (LI) are now able to monitor a broad spectrum of communication channels. Lawful interception of communications invariably intersects with fundamental rights and freedoms of persons in the European Union and the Member States. The purpose of this paper, as part of the discussion on the framework of lawful interception, is to present a study of advanced lawful interception software with its functionalities and processes, compare it with the most common lawful interception models and analyse the software architecture defined by the European Telecommunications Standards Institute (ETSI) as a general standard. While this particular model of LI architecture has initially been designed to intercept voice communications, it can be successfully applied to intercept communications over Internet Protocol (IP) channels. Finally, the paper offers a comparative insight into different kinds of LI software and their capabilities in line with communication interception regulation.
Keywords
lawful interception; LI; telecom service providers; information security; cybersecurity; national security
Hrčak ID:
256580
URI
Publication date:
30.3.2021.
Visits: 2.535 *