SS8 Announces MEC Interception for Lawful Intelligence
SS8 Networks announced that it deployed its Xcipio mediation and interception platform in one of the largest global CSPs to support their Multi-access Edge Computing (MEC) infrastructure.
Quantum Computing may enable communications that do not travel across a network in the conventional sense and endanger traditional encryption methods, carrying critical implications for lawful intelligence.
Preventing illicit trafficking is a daunting task for border security agencies. AI-powered Computer Vision and location intelligence enhance security, reduce costs, and close surveillance gaps.
Effective lawful intelligence solutions do more than just ingest and analyze data. They build evidential narratives compelling enough for court that are backed by a fully auditable chain of custody.
Encryption and OTT apps limit the value of lawful eavesdropping tools like wiretaps, but mobile networks offer a powerful engine for new insights: real-time geographical awareness using high-accuracy location.
Lawful interception of voice by LEAs harkens back to a time when unencrypted phone calls over a wireline carrier network defined electronic communication. In the smartphone era, other methods have proliferated.
SS8 Networks announced that it deployed its Xcipio mediation and interception platform in one of the largest global CSPs to support their Multi-access Edge Computing (MEC) infrastructure.
SS8 Networks announced the addition of Kevin Metcalf, a former federal agent and founder of the National Child Protection Task Force, to their team.
Two Decades of Lawful Interception Technology Innovation A couple of weeks ago, our marketing team let me know that SS8 was going to be 20
SS8 Networks has reached an exciting milestone as the company announces its 20th anniversary as a lawful intercept and monitoring center platform provider.
SS8 Networks, the leader in Lawful Intercept and Monitoring Center platforms, proudly announces it has been awarded two multi-million dollar Lawful Intelligence contracts using its Intellego XT and Xcipio family of products.
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991
Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance,
For the last 50 years, the telecom industry has been happily providing technology for people to make voice calls, and to assure proper accounting they
5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan