
Using Big Data to Reduce Violence Against Women and Girls
The World Health Organization estimates that about one in three women globally have been victims of physical and/or sexual violence. This violence ranges from domestic
Encryption and OTT apps limit the value of lawful eavesdropping tools like wiretaps, but mobile networks offer a powerful engine for new insights: real-time geographical awareness using high-accuracy location.
As with the broader missions of the law enforcement and intelligence communities, lawful intelligence must balance investigative rigor with the need to preserve privacy and other civil protections.
In investigations, lives depend on the reliability of lawful intelligence platforms. To help analysts maximize the value of all available data, these platforms require advanced testing and continuous updating.
Lawful interception of voice by LEAs harkens back to a time when unencrypted phone calls over a wireline carrier network defined electronic communication. In the smartphone era, other methods have proliferated.
By gathering, collating, and drawing possible conclusions from all available information, AI and ML can act as resource multipliers for lawful and location intelligence, just as they do for network operations.
The World Health Organization estimates that about one in three women globally have been victims of physical and/or sexual violence. This violence ranges from domestic
Preventing low-level street crime is important not only to protect public safety and property, but also as an investigative gateway into larger criminal enterprises. Drug
Child abduction and trafficking is one of the most shocking crimes against society. Every parent has unfortunately had to consider the potential for their child
Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in
Today’s lawful intelligence measures draw on a long legacy of intercepted communications. And while the days of simple wiretaps are long gone, the foundational idea
The massive, ever-growing role of social networks in human communication comes with a unique set of hazards. In particular, the layer of concealment provided by
Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes
Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that
Most telecommunications carriers operate equipment from different generations of technology, and often have multiple vendor environment. Carriers can accrete these layers over time, as their
As unmanned aerial vehicles (UAVs) become more common, they are of growing interest to law enforcement agencies (LEAs). Drones have been widely adopted as part
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan