
Transforming Public Data into Open-Source Intelligence
Lawful intelligence tools and practices must be nimble enough to draw data from a wide range of sources but powerful enough to help analysts draw
Lawful intelligence tools and practices must be nimble enough to draw data from a wide range of sources but powerful enough to help analysts draw investigative insights from it. Inputs may be as reliable
While immigration stories are often full of hope, starting a new life in a new land, those stories can also be dark and terrible. Where people lack legal permission and documentation to migrate, criminal
A persistent and terrible reality is that child sexual abuse is alarmingly common. A 2023 assessment by the UK National Crime Agency (NCA) estimates that one in six girls and one in twenty boys experience
The growing complexity of the digital world has been driving the evolution from lawful interception to lawful intelligence for many years. This transition reflects massive growth in the scale and diversity
The ability to locate subjects of interest accurately, quickly, and reliably is critical to law enforcement agencies (LEAs). While device-based GNSS data can satisfy the first two criteria, it is increasingly
Lawful intelligence tools and practices must be nimble enough to draw data from a wide range of sources but powerful enough to help analysts draw
While immigration stories are often full of hope, starting a new life in a new land, those stories can also be dark and terrible. Where
A persistent and terrible reality is that child sexual abuse is alarmingly common. A 2023 assessment by the UK National Crime Agency (NCA) estimates that
The growing complexity of the digital world has been driving the evolution from lawful interception to lawful intelligence for many years. This transition reflects massive
The ability to locate subjects of interest accurately, quickly, and reliably is critical to law enforcement agencies (LEAs). While device-based GNSS data can satisfy the
Individual privacy and effective law enforcement are both necessary ingredients for democratic civil societies. Those two goals are often at odds with each other, as
As criminal activity spreads from the real world to cyberspace and now to virtual worlds, protecting the integrity of digital evidence has become even more
The ability to ingest and analyze an unlimited range of data sources is a key requirement for a modern lawful intelligence practice. The data may
Accurate, immediate, reliable caller-location information is critical for public safety answering points (PSAPs) to guide the response to emergency services calls. While international standards help
Regulators have required geographic redundancy for the network resources operated by communication service providers (CSPs) for some time but meeting this mandate has become more
Codes and ciphers have long been used to hide communications, and the practice continues to evolve and become more sophisticated and widespread today. When the
While lawful interception is often thought to have begun with wiretapping, pen registers actually predate that practice and telephones themselves, having been developed during the
The evolution of international 5G standards has brought increased privacy and security protections for users and data, which can be at odds with the needs
Communication service providers (CSPs) realize significant agility and cost benefits from cloud and edge deployment models made possible by cloud-native network architectures. Edge computing consumes
In the decades since it was first adopted in Western Europe, 112 has become the most prevalent emergency services number worldwide. While there are significant
The evolution of telecommunication industry standards has been marked by a steady and methodical progression of revision and refinement. The gradual nature of standards development
The transition from one year to the next is a natural time for assessment. At SS8, that appraisal helps illuminate the present state of lawful
As emerging technologies such as the internet of things and autonomous vehicles expand the scope and volume of traffic transmitted over public communications networks, new
National border crossings provide unique touchpoints for lawful intelligence operations. Controls at a country’s points of ingress and egress require travelers to present identification, submit
Mobile devices have long been capable of peer-to-peer networking using their built-in Bluetooth, Wi-Fi, and cellular radios. The technical term for this connectivity is Sidelink,
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses 3rd Party cookies to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping these cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!