
Lawful Intercept: The High-Risk Dilemma
“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used
Recent legislation (like the US CLOUD Act) is designed to streamline lawful access to data across borders but stops short of addressing encryption, creating diplomatic and political tensions.
Lawful intelligence uses advanced technologies, but is only an adjunct to human expertise. These use cases show how intelligence tradecraft detects, deters, and disrupts threats while upholding legal standards.
Lawful intelligence gives investigators access to vast, complex data sets. Automated tools allow analysis at massive scale, but cases are built by humans, making the usability of such solutions critical.
The massive diversity and volume of data available to feed lawful intelligence practices creates significant technical complexity. Lawful intelligence platforms work below the surface to manage that complexity.
When investigators begin a new case, they often start with virtually nothing to go on. Lawful intelligence is the framework of methods, tools, and techniques that guides investigators toward resolution.

“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used
SS8 announced its interoperability with the latest Affirmed Networks virtual Evolved Packet Core (vEPC).

Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we
SS8 announces the first Evolved Packet Core (EPC) integration of their Lawful Intelligence platform on Amazon Web Services (AWS) for Communication Service Providers (CSPs) and Law Enforcement Agencies.

Communication Service Providers (CSPs), including those that provide Over-the-Top (OTT) services, are obligated by law, to provide lawful intercept capabilities. This ensures that when law
25-Year Veteran in Telecom and IT Infrastructure to Focus on New Partnerships and Driving Business Expansion for SS8’s Network Intelligence Technology.

The last decade has seen an explosion of virtualized deployments for cost saving and flexible deployment scenarios. Virtualization enables Service Providers to quickly deploy 5G
SS8 is proud to announce the deployment of its new lawful intelligence application for mission-critical push-to-talk (MCPTT) capabilities which integrate with telecom operator systems provided by leading MCPTT vendors.

Location information is gathered from connected devices including mobile phones. It is a critical data point which, when used by Law Enforcement Agencies (LEAs), tracks

Communications have shifted from traditional (voice, email and SMS offered by telecom operators) to encrypted, over-the-top (OTT) applications. Which unfortunately leaves law enforcement agencies (LEAs)
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan