
Lawful Intelligence across Cloud and Legacy Networks
The introduction of 5G, high bandwidth services, and new applications mark a new, intensive era of cloud adoption by communication service providers (CSPs) for their
The transition from one year to the next is a natural time for assessment. At SS8, that appraisal helps illuminate the present state of lawful intelligence, anticipate trends for the coming year, and guide
As emerging technologies such as the internet of things and autonomous vehicles expand the scope and volume of traffic transmitted over public communications networks, new data types are enabling novel
National border crossings provide unique touchpoints for lawful intelligence operations. Controls at a country’s points of ingress and egress require travelers to present identification, submit to search,
Mobile devices have long been capable of peer-to-peer networking using their built-in Bluetooth, Wi-Fi, and cellular radios. The technical term for this connectivity is Sidelink, but it is more widely
Generally, people have a greater expectation of privacy at home than in public, and rightfully so. Regulatory measures such as search warrants protect those expectations while also allowing for society’s
The introduction of 5G, high bandwidth services, and new applications mark a new, intensive era of cloud adoption by communication service providers (CSPs) for their
The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed
With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel
As billions of IoT devices are provisioned, their multitude of roles are mirrored by their complex impact on lawful intelligence. Endpoints that range from consumer
The evolution of wide-area networking continues to drive processing out to the network edge. That trend first gained traction with widespread cloud adoption, and it
Two Decades of Lawful Interception Technology Innovation A couple of weeks ago, our marketing team let me know that SS8 was going to be 20
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991
Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance,
For the last 50 years, the telecom industry has been happily providing technology for people to make voice calls, and to assure proper accounting they
5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way
In March of 2018 U.S. Congress passed the CLOUD Act, which addressed a growing issue for domestic and international law enforcement, Internet service operators (such
The 5G world is upon us! Which means Law Enforcement Agencies (LEAs) have a headache: 10X to 100X normal data rates are on the horizon. LEAs
“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used
Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we
Communication Service Providers (CSPs), including those that provide Over-the-Top (OTT) services, are obligated by law, to provide lawful intercept capabilities. This ensures that when law
The last decade has seen an explosion of virtualized deployments for cost saving and flexible deployment scenarios. Virtualization enables Service Providers to quickly deploy 5G
Location information is gathered from connected devices including mobile phones. It is a critical data point which, when used by Law Enforcement Agencies (LEAs), tracks
Communications have shifted from traditional (voice, email and SMS offered by telecom operators) to encrypted, over-the-top (OTT) applications. Which unfortunately leaves law enforcement agencies (LEAs)
As bandwidth increases by up to 100x in the next 24 months, law enforcement agencies (LEAs) may find it difficult to manage the amount of
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan