
Lawful Intelligence in a Zero-Trust World
Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this
The transition from one year to the next is a natural time for assessment. At SS8, that appraisal helps illuminate the present state of lawful intelligence, anticipate trends for the coming year, and guide
As emerging technologies such as the internet of things and autonomous vehicles expand the scope and volume of traffic transmitted over public communications networks, new data types are enabling novel
National border crossings provide unique touchpoints for lawful intelligence operations. Controls at a country’s points of ingress and egress require travelers to present identification, submit to search,
Mobile devices have long been capable of peer-to-peer networking using their built-in Bluetooth, Wi-Fi, and cellular radios. The technical term for this connectivity is Sidelink, but it is more widely
Generally, people have a greater expectation of privacy at home than in public, and rightfully so. Regulatory measures such as search warrants protect those expectations while also allowing for society’s
Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this
The engineers responsible for communication service providers’ (CSPs) lawful interception systems must maintain and update their unique skill sets with ongoing training. The particular expertise
With just over 4 billion unique, public addresses in the IPv4 scheme and north of 10 billion devices today, many Communication Service Providers (CSPs) assign
The lawful interception and mediation programs that communications service providers (CSPs) are mandated to integrate into their platforms fulfill a social responsibility as well as
Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in
Today’s lawful intelligence measures draw on a long legacy of intercepted communications. And while the days of simple wiretaps are long gone, the foundational idea
The massive, ever-growing role of social networks in human communication comes with a unique set of hazards. In particular, the layer of concealment provided by
As the volume, variety, and velocity of data potentially available to lawful intelligence grows exponentially, the control mechanisms that govern its interception become more critical.
Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes
Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that
Technology developments for telecommunications networks often add more challenges than benefits for lawful intelligence operations. Separating the noise from the signal in massive 5G data
It’s an irony of this moment that, even as 5G networks increase the amount of data on public networks by orders of magnitude, the technology
As communication service providers (CSPs) continue to build out 5G networks, standards-based infrastructure is replacing the proprietary interfaces, formats, and protocols of previous technology generations.
Most telecommunications carriers operate equipment from different generations of technology, and often have multiple vendor environment. Carriers can accrete these layers over time, as their
As unmanned aerial vehicles (UAVs) become more common, they are of growing interest to law enforcement agencies (LEAs). Drones have been widely adopted as part
As 5G networks roll out across the world, law enforcement agencies (LEAs) are being forced to reimagine investigation methods related to lawful intelligence. The types
The metadata that surrounds the data payloads for lawful intelligence intercepts has become as important as the payload data itself. Location data, for example, can
Successive generations of technology continue to enable the discovery, assembly, and analysis of information that plays a key role in every law-enforcement investigation. Digitization helped
The history of lawful intelligence runs a parallel course to the evolution of communications technology, from wiretaps placed on mechanical switches in the last century
We are in an intensive era of cloud adoption by communication service providers (CSPs) for 5G networks. This shift is driven by the need for
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan