skip to Main Content

Lawful Intelligence Blog

Shifting Requirements For Lawful Intelligence In The Era Of More Everything - SS8 Networks

Shifting Requirements for Lawful Intelligence in the Era of More Everything

Published on January 11th, 2022 | by Dr. Cemal Dikmen & Ernest Ng

  • January 11, 2022

Today’s lawful intelligence measures draw on a long legacy of intercepted communications. And while the days of simple wiretaps are long gone, the foundational idea of deploying “eyes and ears” to “overhear” illicit communications persists, even in sophisticated intelligence and…

Read More
Identifying Criminals In The Faceless World Of Social Media - SS8 Networks Blog

Identifying Criminals in the Faceless World of Social Media

Published on December 14th, 2021 | by Dr. Cemal Dikmen & Ernest Ng

  • December 14, 2021

The massive, ever-growing role of social networks in human communication comes with a unique set of hazards. In particular, the layer of concealment provided by online contact can easily be abused by bad actors who either choose to remain unidentified…

Read More
Extending Visibility Into Cryptocurrency Transactions - SS8 Networks

Extending Visibility into Cryptocurrency Transactions

Published on October 7th, 2021 | by Dr. Cemal Dikmen

  • October 7, 2021

Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that range from human and drug trafficking to terrorism and ransomware. Cryptocurrency transactions associated with criminal…

Read More
10 Potential Missteps To Avoid During Lawful Intelligence Deployments - SS8

10 Potential Missteps to Avoid During Lawful Intelligence Deployments

Published on April 8th, 2021 | by Jason Patino

  • April 8, 2021

The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed projects provides experience and knowledge that can be leveraged to anticipate and avoid the most…

Read More
Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More
Sidelink And Its Impact On Lawful Intelligence - SS8 Networks

Sidelink and Its Impact on Lawful Intelligence

Published on November 24th, 2020 | by Kevin McTiernan

  • November 24, 2020

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are "uplink" and "downlink" the terms used? No, for years there have also been "Sidelink" communications. That is, direct…

Read More
Intercepted Location Data Can Help Intelligence Agencies - SS8 Networks

Intercepted Location Data Can Help Intelligence Agencies

Published on November 10th, 2020 | by Michael Gebretsadik

  • November 10, 2020

Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991 and ushered in a new era of cellular communications. However, there was no built-in location…

Read More
What Is Target Intercept Vs Bulk Intercept? - SS8 Networks

What is Target Intercept vs Bulk Intercept?

Published on October 27th, 2020 | by David Anstiss

  • October 27, 2020

Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance, is focused on individuals or a Subject of Interest (SoI) with government or judicial oversight…

Read More