Checks, balances, and measurements for your Lawful Interception IT Architecture