A method for interception of encrypted end-to-end (12, 14) communication
data stores encryption keys (42, 44) of secure communication users. Upon
intercept activation (47) a decrypt function (20) provides plain text
data to an authorized appropriate law agency (30).