skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 202175 Find in a Library
Title: Communications Monitoring for Law Enforcement
Journal: Intersec: The Journal of International Security  Volume:13  Issue:9  Dated:September 2003  Pages:282-284
Author(s): Kim V. Larsen
Date Published: September 2003
Page Count: 3
Type: Technical Assistance
Format: Article
Language: English
Country: United Kingdom
Annotation: This article discusses investigative and crime detection tools that are currently used by law enforcement and some future developments in these tools.
Abstract: Communications monitoring is both a necessary and useful exercise in order to investigate crimes and to intercept information that can be used as evidence. Communications monitoring presents a challenge that can be met with the right equipment. Interception equipment must be designed to handle all traffic types and to allow for future updates when new communications types are introduced. Criminals have access to the same advanced types of communication as law enforcement agencies and often they are a few steps ahead, due to differences in the use and availability of resources. It is important that all communications monitoring equipment units be integrated or at least be able to work together. Other demands on equipment include modularity, upgradability, and seamless integration of new units to avoid downtime. Monitoring Internet Provider (IP) traffic is one of the latest technological challenges for manufacturers of monitoring equipment. IP traffic is monitored and filtered according to the defined criteria. The IP traffic that matches the defined criteria is transferred from the interception box to the Law Enforcement Monitoring Facility (LEMF) as HI3 (contents of the intercepted communication) information, along with HI2 (intercept-related information). In the LEMF, operators can now view the intercepted IP traffic in its original form and perform data analysis. Continued developments within technology will bring faster and more efficient communication lines, as well as more types of communication, of which many will be carried by the Internet. Tools that can perform data analysis and social network analysis will be in great demand as these tools can help law enforcement agencies identify targets faster.
Main Term(s): Computer aided investigations; Future trends
Index Term(s): Computer aided operations; Computer evidence; Criminal justice information systems; Data collections; Evidence collection; Future of policing
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.