Digital Forensics and Cyber Crime. Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers

Research Article

Law Enforcement 2.0: Regulating the Lawful Interception of Social Media

Download82 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-35515-8_3,
        author={Esti Peshin},
        title={Law Enforcement 2.0: Regulating the Lawful Interception of Social Media},
        proceedings={Digital Forensics and Cyber Crime. Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2012},
        month={12},
        keywords={},
        doi={10.1007/978-3-642-35515-8_3}
    }
    
  • Esti Peshin
    Year: 2012
    Law Enforcement 2.0: Regulating the Lawful Interception of Social Media
    ICDF2C
    Springer
    DOI: 10.1007/978-3-642-35515-8_3
Esti Peshin

    Abstract

    Lawful interception (LI) has evolved over the past few decades from target based monitoring & interception of telecomm conversations, to the monitoring & interception of packet switched (IP) communications. However, in spite of this evolution, the nature of the communication remained linear, where the initiator communicates with one, or a number of, recipients. Initially, with telecomm, all of the participants in the call were online, i.e. active participants at the time of the call; whereas, with the introduction of packet-switched or IP traffic, some of the interaction between the participants became turn-based, where the recipients receive the information from the initiator after an interval. Notwithstanding spam, the participants, more often than not, opted to receive the information.