@CurtWilson @hdm
I agree. CAs should have adequate security. I just don't know whether it helps to notify black sheep CAs of security issues.
I have "only" researched lawful interception tech personally. Mostly because I was interested in the viability of VPNs in certain cases. And what attack surface there is.
ETSI has a standard for lawful interception. They also refer to cases where the ISP cannot offer decryption via Men In The Middle approaches (national legislations may differ).
Then the law enforcement agency has to handle this based on the original packets.
https://www.etsi.org/deliver/etsi_tr/102500_102599/102528/01.01.01_60/tr_102528v010101p.pdf
On a network level, Cisco offers Lawful Interception setups.
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/policies/ios-xe-17/policies-book-xe/lawful-intercept.pdf
This is openly specified. So, anyone can dig into the details.
There are various suppliers in the surveillance tech sector, which handle the CA part in cases, where it is necessary. Some more discreet than others, but the process is the same across the board:
https://www.edecision4u.com/lawful%20interception%20article_07.html