Aspects of systems and methods for lawful intercept reporting are described. In one implementation, an incoming connection between a mobile device and a communication system is authorized. Lawful intercept reporting may be triggered for the mobile device based on the incoming connection and an attachment attribute associated with the mobile device. The attachment attribute is indicative of a last connection of the mobile device irrespective of a network domain in which the mobile device was connected. Further, the attachment attribute associated with the mobile device may be updated based on the incoming connection.