Assessing the risk to intercept VoIP calls