
2024 Brings Stricter Requirements for e-Evidence Preservation
The massive data volumes associated with 5G networks can provide critical evidence in support of criminal investigations – if transmitted and stored efficiently and in
Protection of accuracy, fairness, and transparency must be demonstrated if AI-touched material influences investigative decisions or prosecutorial judgments.
Reflecting on the past and looking towards our future, SS8 thanks our customers, community, and employees for a successful 25 years that sets the stage for an unlimited future of value-driven lawful intelligence.
Criminal organizations commit substantial financial crime at international border crossings, either connected to or independent of higher-profile violations such as smuggling and human trafficking.
Law enforcement agencies (LEAs) all over the world face intensifying personnel shortages. Most are unable to meet recruitment targets or even to compensate for ongoing retirements with new hires.
With 5G deployments ongoing and 6G some years away, 3GPP Release 18 provides an evolutionary step forward with the first 5G Advanced (5.5G) standard, enhancing performance, efficiency, and flexibility.
The massive data volumes associated with 5G networks can provide critical evidence in support of criminal investigations – if transmitted and stored efficiently and in
The regulations and workflows that provide legal authorization for lawful interception are critical to protecting citizen privacy and the integrity of the evidence gathered. Control
As emerging technologies such as the internet of things and autonomous vehicles expand the scope and volume of traffic transmitted over public communications networks, new
National border crossings provide unique touchpoints for lawful intelligence operations. Controls at a country’s points of ingress and egress require travelers to present identification, submit
Mobile devices have long been capable of peer-to-peer networking using their built-in Bluetooth, Wi-Fi, and cellular radios. The technical term for this connectivity is Sidelink,
Child abduction and trafficking is one of the most shocking crimes against society. Every parent has unfortunately had to consider the potential for their child
Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this
Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in
Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes
As unmanned aerial vehicles (UAVs) become more common, they are of growing interest to law enforcement agencies (LEAs). Drones have been widely adopted as part
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan