A procedure for accomplishing surveillance within a managed VoP network
when end-user encryption/decryption and NAT are in place. The procedure
comprises first analyzing the network from call signaling and message
standpoints, leading to the identification of suitable surveillance
access points (SAPs) for packet interception. A Delivery Function (DF)
facilitated by the network service provider provides the means to
intercept (without alteration) and replicate packets transmitted across
the SAPs. The packets are then transmitted via the DF for collection
within a Collection Function (CF), which is managed by a Law Enforcement
Agency (LEA), for analysis by the LEA. This analysis provides, among
other benefits, the opportunity to decrypt the intercepted packets and to
identify additional suitable SAPs. In demonstrating the procedure,
several embodiments of network surveillance models are described. Each
one identifies the location of SAPs for that model. In each model,
different information is collected and different processes are followed.