Proposal for a computer-assisted analysis of lawful interceptions of communication