Research Article
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media
@INPROCEEDINGS{10.1007/978-3-642-35515-8_3, author={Esti Peshin}, title={Law Enforcement 2.0: Regulating the Lawful Interception of Social Media}, proceedings={Digital Forensics and Cyber Crime. Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, proceedings_a={ICDF2C}, year={2012}, month={12}, keywords={}, doi={10.1007/978-3-642-35515-8_3} }
- Esti Peshin
Year: 2012
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media
ICDF2C
Springer
DOI: 10.1007/978-3-642-35515-8_3
Abstract
Lawful interception (LI) has evolved over the past few decades from target based monitoring & interception of telecomm conversations, to the monitoring & interception of packet switched (IP) communications. However, in spite of this evolution, the nature of the communication remained linear, where the initiator communicates with one, or a number of, recipients. Initially, with telecomm, all of the participants in the call were online, i.e. active participants at the time of the call; whereas, with the introduction of packet-switched or IP traffic, some of the interaction between the participants became turn-based, where the recipients receive the information from the initiator after an interval. Notwithstanding spam, the participants, more often than not, opted to receive the information.