They can use standardized lawful interception interfaces to get all this data.
No big need to dig down deep into the radio and protocol layer.