
Meeting Lawful Intelligence Challenges for IoT
As billions of IoT devices are provisioned, their multitude of roles are mirrored by their complex impact on lawful intelligence. Endpoints that range from consumer
Encryption and OTT apps limit the value of lawful eavesdropping tools like wiretaps, but mobile networks offer a powerful engine for new insights: real-time geographical awareness using high-accuracy location.
As with the broader missions of the law enforcement and intelligence communities, lawful intelligence must balance investigative rigor with the need to preserve privacy and other civil protections.
In investigations, lives depend on the reliability of lawful intelligence platforms. To help analysts maximize the value of all available data, these platforms require advanced testing and continuous updating.
Lawful interception of voice by LEAs harkens back to a time when unencrypted phone calls over a wireline carrier network defined electronic communication. In the smartphone era, other methods have proliferated.
By gathering, collating, and drawing possible conclusions from all available information, AI and ML can act as resource multipliers for lawful and location intelligence, just as they do for network operations.
As billions of IoT devices are provisioned, their multitude of roles are mirrored by their complex impact on lawful intelligence. Endpoints that range from consumer
The evolution of wide-area networking continues to drive processing out to the network edge. That trend first gained traction with widespread cloud adoption, and it
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991
For the last 50 years, the telecom industry has been happily providing technology for people to make voice calls, and to assure proper accounting they
5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way
“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used
Communication Service Providers (CSPs), including those that provide Over-the-Top (OTT) services, are obligated by law, to provide lawful intercept capabilities. This ensures that when law
The last decade has seen an explosion of virtualized deployments for cost saving and flexible deployment scenarios. Virtualization enables Service Providers to quickly deploy 5G
With 5G here, will 4G networks be going away? 5G is here. It’s being rolled out in countries around the world. You may have started
As telecom operators plan their rollout of the fifth generation (5G) of network services, two distinct services have emerged, mobile and fixed wireless access (or
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan