
Sidelink and Its Impact on Lawful Intelligence
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”
Quantum Computing may enable communications that do not travel across a network in the conventional sense and endanger traditional encryption methods, carrying critical implications for lawful intelligence.
Preventing illicit trafficking is a daunting task for border security agencies. AI-powered Computer Vision and location intelligence enhance security, reduce costs, and close surveillance gaps.
Effective lawful intelligence solutions do more than just ingest and analyze data. They build evidential narratives compelling enough for court that are backed by a fully auditable chain of custody.
Encryption and OTT apps limit the value of lawful eavesdropping tools like wiretaps, but mobile networks offer a powerful engine for new insights: real-time geographical awareness using high-accuracy location.
Lawful interception of voice by LEAs harkens back to a time when unencrypted phone calls over a wireline carrier network defined electronic communication. In the smartphone era, other methods have proliferated.
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991
“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used
Communication Service Providers (CSPs), including those that provide Over-the-Top (OTT) services, are obligated by law, to provide lawful intercept capabilities. This ensures that when law
The last decade has seen an explosion of virtualized deployments for cost saving and flexible deployment scenarios. Virtualization enables Service Providers to quickly deploy 5G
Location information is gathered from connected devices including mobile phones. It is a critical data point which, when used by Law Enforcement Agencies (LEAs), tracks
Communications have shifted from traditional (voice, email and SMS offered by telecom operators) to encrypted, over-the-top (OTT) applications. Which unfortunately leaves law enforcement agencies (LEAs)
As bandwidth increases by up to 100x in the next 24 months, law enforcement agencies (LEAs) may find it difficult to manage the amount of
Gartner publishes Hype Cycle for Threat-Facing Technologies and SS8 is recognized as a sample vendor in the category of Network Traffic Analysis (NTA).
We attended the 2013 Esri International User Conference, held July 8-12 in San Diego, CA, and it was quite an experience. Esri is a dedicated
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan