Date Added: Nov 2009
This paper analyzes the security properties of these inter-faces. It demonstrates that the standard CALEA interfaces are vulnerable to a range of unilateral attacks by the intercept target. In particular, because of poor design choices in the interception architecture and protocols, experiments show it is practical for a CALEA-tapped target to over-whelm the link to law enforcement with spurious signaling messages without degrading her own traffic, effectively pre-venting call records as well as content from being monitored or recorded. It also identifies stop-gap mitigation strategies that partially mitigate some of identified attacks.