{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:38Z","timestamp":1750307738304,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653724","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"512-523","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Can they hear me now?"],"prefix":"10.1145","author":[{"given":"Micah","family":"Sherr","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Gaurav","family":"Shah","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Eric","family":"Cronin","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Sandy","family":"Clark","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Matt","family":"Blaze","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Lawful interception architecture and functions","author":"Project Generation Partnership","year":"2000","unstructured":"3rd Generation Partnership Project . Lawful interception architecture and functions . Technical Specification Group Services and System Aspects 3GPP TS33.107 v3.1.0, 2000 . 3rd Generation Partnership Project. Lawful interception architecture and functions. Technical Specification Group Services and System Aspects 3GPP TS33.107 v3.1.0, 2000."},{"key":"e_1_3_2_1_2_1","volume-title":"Wiretap report","author":"Administrative Office of the United States Courts.","year":"2007","unstructured":"Administrative Office of the United States Courts. Wiretap report , 2007 . Administrative Office of the United States Courts. Wiretap report, 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"TIA\/ATIS","author":"American National Standards Institute.","year":"2003","unstructured":"American National Standards Institute. Lawfully authorized electronic surveillance. Joint Standard ANSI\/J-STD-025B , TIA\/ATIS , Aug. 2003 . American National Standards Institute. Lawfully authorized electronic surveillance. Joint Standard ANSI\/J-STD-025B, TIA\/ATIS, Aug. 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"Alliance for Telecommunications Industry Solutions","author":"ANSI.","year":"2004","unstructured":"ANSI. UMTS handover interface for lawful interception handover interface for lawful interception. Standard ANSI T1.724--2004 , Alliance for Telecommunications Industry Solutions , Jan. 2004 . ANSI. UMTS handover interface for lawful interception handover interface for lawful interception. Standard ANSI T1.724--2004, Alliance for Telecommunications Industry Solutions, Jan. 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.17"},{"key":"e_1_3_2_1_6_1","volume-title":"LLQ \/ IP RTP Priority)","author":"Systems Cisco","year":"2006","unstructured":"Cisco Systems , Inc. VoIP over Frame Relay with Quality of Service (Fragmentation, Traffic Shaping , LLQ \/ IP RTP Priority) , February 2006 . Document ID 12156. Cisco Systems, Inc. VoIP over Frame Relay with Quality of Service (Fragmentation, Traffic Shaping, LLQ \/ IP RTP Priority), February 2006. Document ID 12156."},{"key":"e_1_3_2_1_7_1","volume-title":"National Communications System","author":"Technologies Communication","year":"2003","unstructured":"Communication Technologies , Inc. SMS over SS7. Technical Information Bulletin 03--2 , National Communications System , Dec. 2003 . Communication Technologies, Inc. SMS over SS7. Technical Information Bulletin 03--2, National Communications System, Dec. 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.017223"},{"key":"e_1_3_2_1_9_1","volume-title":"PTO","author":"Dikmen C. T.","year":"2003","unstructured":"C. T. Dikmen and M. Karabatur . System for intercept of wireless communications. Patent No. 6, 577, 865, U.S . PTO , 2003 . C. T. Dikmen and M. Karabatur. System for intercept of wireless communications. Patent No. 6, 577, 865, U.S. PTO, 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"Siemens","author":"Product Line Management EWSD","year":"2002","unstructured":"EWSD Product Line Management . EWSD integrated CALEA with dial-out capability. Bulletin 02PB-CALEA01 , Siemens , 2002 . EWSD Product Line Management. EWSD integrated CALEA with dial-out capability. Bulletin 02PB-CALEA01, Siemens, 2002."},{"key":"e_1_3_2_1_11_1","volume-title":"Oct.","author":"Implementation Unit FBI CALEA","year":"2008","unstructured":"FBI CALEA Implementation Unit . AskCALEA frequently asked questions , Oct. 2008 . http:\/\/www.askcalea.net\/faqs.html. FBI CALEA Implementation Unit. AskCALEA frequently asked questions, Oct. 2008. http:\/\/www.askcalea.net\/faqs.html."},{"key":"e_1_3_2_1_12_1","unstructured":"R. Gayraud and O. Jacques. SIPp. http:\/\/sipp.sourceforge.net\/.  R. Gayraud and O. Jacques. SIPp. http:\/\/sipp.sourceforge.net\/."},{"key":"e_1_3_2_1_13_1","volume-title":"PTO","author":"Howell R. M.","year":"1996","unstructured":"R. M. Howell . Method of intercepting telecommunications. Patent No. 5, 920, 611, U.S . PTO , 1996 . R. M. Howell. Method of intercepting telecommunications. Patent No. 5, 920, 611, U.S. PTO, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"PTO","author":"Howell R. M.","year":"1996","unstructured":"R. M. Howell . Telecommunications intercept system. Patent No. 5, 943, 393, U.S . PTO , 1996 . R. M. Howell. Telecommunications intercept system. Patent No. 5, 943, 393, U.S. PTO, 1996."},{"key":"e_1_3_2_1_15_1","volume-title":"July","author":"International Packet Communications Consortium","year":"2003","unstructured":"International Packet Communications Consortium . Lawfully Authorized Electronic Surveillance for Softswitch-based Networks , July 2003 . International Packet Communications Consortium. Lawfully Authorized Electronic Surveillance for Softswitch-based Networks, July 2003."},{"volume-title":"May","year":"2007","key":"e_1_3_2_1_16_1","unstructured":"IPFabrics. DeepSweep VoIP Surveillance Modules User's Manual , May 2007 . http:\/\/www.ipfabrics.com\/pdf\/VoIP_SM_users_manual.pdf. IPFabrics. DeepSweep VoIP Surveillance Modules User's Manual, May 2007. http:\/\/www.ipfabrics.com\/pdf\/VoIP_SM_users_manual.pdf."},{"key":"e_1_3_2_1_17_1","volume-title":"May","author":"ITU.","year":"1998","unstructured":"ITU. ISDN user-network interface layer 3 specification for basic call control. Recommendation Q.931 , May 1998 . ITU. ISDN user-network interface layer 3 specification for basic call control. Recommendation Q.931, May 1998."},{"key":"e_1_3_2_1_18_1","volume-title":"November","author":"Abstract Syntax Notation ITU.","year":"2008","unstructured":"ITU. Information technology - Abstract Syntax Notation One (ASN.1) : Specification of basic notation. Recommendation X.680 , November 2008 . ITU. Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation. Recommendation X.680, November 2008."},{"key":"e_1_3_2_1_19_1","volume-title":"PTO","author":"Kampmeier E. E.","year":"2000","unstructured":"E. E. Kampmeier , D. B. Smith , and M. R. Smith . Utilization of communication channels between a central office switch and a law enforcement agency. Patent No. 6, 728, 338, U.S . PTO , 2000 . E. E. Kampmeier, D. B. Smith, and M. R. Smith. Utilization of communication channels between a central office switch and a law enforcement agency. Patent No. 6, 728, 338, U.S. PTO, 2000."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1106275.1106296"},{"volume-title":"December","year":"2008","key":"e_1_3_2_1_21_1","unstructured":"Orenstein, James . In the matter of an application {REDACTED} of the united states of america memorandum for an order authorizing the use of a pen register and trap and trace device... United States District Court Eastern District of New York Case 1: 08-mc-00595-JO , December 2008 . Orenstein, James. In the matter of an application {REDACTED} of the united states of america memorandum for an order authorizing the use of a pen register and trap and trace device... United States District Court Eastern District of New York Case 1:08-mc-00595-JO, December 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"Inc.","author":"Electronic Surveillance Focus Team PacketCable","year":"2004","unstructured":"PacketCable Electronic Surveillance Focus Team . PacketCable Electronic Surveillance Specification. Specification PKT-SP-ESP-I03-040113, Cable Television Laboratories , Inc. , January 2004 . PacketCable Electronic Surveillance Focus Team. PacketCable Electronic Surveillance Specification. Specification PKT-SP-ESP-I03-040113, Cable Television Laboratories, Inc., January 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2007.376605"},{"key":"e_1_3_2_1_24_1","volume-title":"Secure Networks","author":"Ptacek T.","year":"1998","unstructured":"T. Ptacek and T. Newsham . Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report , Secure Networks , Inc ., 1998 . T. Ptacek and T. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., 1998."},{"key":"e_1_3_2_1_25_1","unstructured":"Recall Technologies Inc. R2801 Line Latch\/Slave Controller. Product specification 2005. http:\/\/recallt3.com\/products.htm.  Recall Technologies Inc. R2801 Line Latch\/Slave Controller. Product specification 2005. http:\/\/recallt3.com\/products.htm."},{"key":"e_1_3_2_1_26_1","unstructured":"S. Sanfilippo. Hping -- Active Network Security Tool.  S. Sanfilippo. Hping -- Active Network Security Tool."},{"key":"e_1_3_2_1_27_1","volume-title":"Internet Engineering Task Force","author":"Schulzrinne H.","year":"2003","unstructured":"H. Schulzrinne , S. Casner , R. Frederick , and V. Jacobson . RTP: A transport protocol for real-time applications. RFC 3350 , Internet Engineering Task Force , July 2003 . H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A transport protocol for real-time applications. RFC 3350, Internet Engineering Task Force, July 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1106275.1106295"},{"key":"e_1_3_2_1_29_1","volume-title":"July","author":"No Magistrate","year":"2006","unstructured":"Smith, Magistrate No . H-06-356M. In the matter of the application of the united states of america for an order authorizing (1) installation and use pen register and trap and trace device. United States District Court Southern District of Texas Houston Division Case 4: 06-mj-00356 , July 2006 . Smith, Magistrate No. H-06-356M. In the matter of the application of the united states of america for an order authorizing (1) installation and use pen register and trap and trace device. United States District Court Southern District of Texas Houston Division Case 4:06-mj-00356, July 2006."},{"key":"e_1_3_2_1_30_1","unstructured":"TeleCommunications Systems. Lucent\/TCS short message service center. http:\/\/www1.telecomsys.com\/carriers\/lucent_smsc.cfm.  TeleCommunications Systems. Lucent\/TCS short message service center. http:\/\/www1.telecomsys.com\/carriers\/lucent_smsc.cfm."},{"key":"e_1_3_2_1_31_1","volume-title":"TeleDNA short messaging service center (SMSC)","author":"TeleDNA Inc.","year":"2008","unstructured":"TeleDNA Inc. TeleDNA short messaging service center (SMSC) , 2008 . http:\/\/www.teledna.com\/pdf\/smsc.pdf. TeleDNA Inc. TeleDNA short messaging service center (SMSC), 2008. http:\/\/www.teledna.com\/pdf\/smsc.pdf."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1460557.1460560"},{"key":"e_1_3_2_1_33_1","volume-title":"States Congress. Omnibus Crime Control and Safe Streets Act of 1968: Title III. Pub. L. No. 90--351","author":"United","year":"1968","unstructured":"United States Congress. Omnibus Crime Control and Safe Streets Act of 1968: Title III. Pub. L. No. 90--351 , 82 Stat. 197, USA , June 1968 . (codified as amended in 18 U.S.C. Sect. 2510--2522). United States Congress. Omnibus Crime Control and Safe Streets Act of 1968: Title III. Pub. L. No. 90--351, 82 Stat. 197, USA, June 1968. (codified as amended in 18 U.S.C. Sect. 2510--2522)."},{"key":"e_1_3_2_1_34_1","volume-title":"States Congress. Communications Assistance for Law Enforcement Act. Pub. L. No. 103-414","author":"United","year":"1994","unstructured":"United States Congress. Communications Assistance for Law Enforcement Act. Pub. L. No. 103-414 , 108 Stat. 4279, United States of America , Oct. 1994 . (codified as amended in scattered sections of 18 U.S.C. and 47 U.S.C. Sect. 229, 1001--1010, 1021). United States Congress. Communications Assistance for Law Enforcement Act. Pub. L. No. 103-414, 108 Stat. 4279, United States of America, Oct. 1994. (codified as amended in scattered sections of 18 U.S.C. and 47 U.S.C. Sect. 229, 1001--1010, 1021)."},{"key":"e_1_3_2_1_35_1","volume-title":"USA","author":"United States House of Representatives.","year":"1994","unstructured":"United States House of Representatives. Telecommunications carrier assistance to the government. H.R. Rep. No. 103--827 , USA , Oct. 1994 . United States House of Representatives. Telecommunications carrier assistance to the government. H.R. Rep. No. 103--827, USA, Oct. 1994."}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:53Z","timestamp":1750253933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653724"}},"subtitle":["a security analysis of law enforcement wiretaps"],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":35,"alternative-id":["10.1145\/1653662.1653724","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653724","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}