Change search
ReferencesLink to record
Permanent link

Direct link
Lawful Interception and Countermeasures: In the era of Internet Telephony
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. (CCSlab)
2008 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Lawful interception and the way it is performed have played a significant role in the effectiveness of this type of communication monitoring. Although the secrecy of interception and the related equipment are supposed to provide correct information to a law enforcement agency, there are some countermeasures that can be taken by the subject that can seriously undermine the collection of correct and accurate data.

This thesis project attempts to identify the problems that exist for interception of telephony (be it fixed, mobile, or via the Internet). Moreover, there are some suggestions for improvements how lawful interception should be performed in order to avoid possible attacks that could decrease the credibility of the intercepted data. Numerous publications (in print or distributed on the Internet) have described weaknesses in the current state of the art lawful interception when using equipment that can be purchased in the market. This thesis presents improvements in how LI can be conducted in order to avoid these vulnerabilities. Additionally, there is a description of the key escrow systems and the possibility of avoiding one of their most significant vulnerabilities.

The main problem of the lawful interception is the rapid changes in telecommunications and the complicated architecture of the telecommunication networks, as both make monitoring vulnerable to specific countermeasures. An analysis of how lawful interception can take place and current countermeasures for lawful interception of Internet telephony are vital in order to identify the problems in carrying out such intercepts today and to make suggestions for improvements.

This topic is especially relevant given the current Swedish “FRA lagen” regarding interception of electronic communication going into, out of, and through Sweden. Not only is it important to understand how lawful interception can be performed or prevented, but it is also important to understand how information obtained from lawful interception could be purposely misleading or falsified.

Place, publisher, year, edition, pages
2008. , 55 p.
Trita-ICT-COS, ISSN 1653-6347 ; COS/CCS 2008-20
Keyword [en]
Lawful interception, countermeasures, key escrow, SRTP/MIKEY, digital signatures
National Category
Communication Systems
URN: urn:nbn:se:kth:diva-91683OAI: diva2:511012
Subject / course
Computer Communication
Educational program
Master of Science - Internetworking
2008-09-18, Seminar room Grimeton, Isafjordsgatan 22, Kista, 13:00 (English)
Available from: 2012-03-20 Created: 2012-03-19 Last updated: 2013-09-09Bibliographically approved

Open Access in DiVA

fulltext(909 kB)198 downloads
File information
File name FULLTEXT01.pdfFile size 909 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Evripidis, Romanidis
By organisation
Communication Systems, CoS
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 198 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 704 hits
ReferencesLink to record
Permanent link

Direct link