skip to Main Content

Lawful Intelligence Blog

Lawful Intelligence Across Cloud And Legacy Networks - SS8

Lawful Intelligence across Cloud and Legacy Networks

Published on April 20th, 2021 | by Dr. Keith Bhatia & Syed Hussain

  • April 20, 2021

The introduction of 5G, high bandwidth services, and new applications mark a new, intensive era of cloud adoption by communication service providers (CSPs) for their 5G networks. This shift is needed for enhanced flexibility and cost-effectiveness to accommodate 5G’s increased…

Read More
10 Potential Missteps To Avoid During Lawful Intelligence Deployments - SS8

10 Potential Missteps to Avoid During Lawful Intelligence Deployments

Published on April 8th, 2021 | by Jason Patino

  • April 8, 2021

The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed projects provides experience and knowledge that can be leveraged to anticipate and avoid the most…

Read More
Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More
Meeting Lawful Intelligence Challenges For IoT - SS8

Meeting Lawful Intelligence Challenges for IoT

Published on March 16th, 2021 | by Dr. Cemal Dikmen

  • March 16, 2021

As billions of IoT devices are provisioned, their multitude of roles are mirrored by their complex impact on lawful intelligence. Endpoints that range from consumer electronic devices to sensors on industrial systems, each contribute to an ever-increasing current of diverse…

Read More

Enabling Lawful Intelligence at the Network Edge

Published on February 16th, 2021 | by Dr. Cemal Dikman & Syed Hussain

  • February 16, 2021

The evolution of wide-area networking continues to drive processing out to the network edge. That trend first gained traction with widespread cloud adoption, and it accelerated as the global build-out of IoT began. Now, 5G’s massive increases in traffic rates…

Read More

SS8 Celebrates 20th Anniversary

Published on December 10th, 2020 | by Dr. Cemal Dikmen

  • December 10, 2020

Two Decades of Lawful Interception Technology Innovation A couple of weeks ago, our marketing team let me know that SS8 was going to be 20 years old in December. The news seemed as though my own child was celebrating his…

Read More
Two Mobile Phones Communicating

Sidelink and Its Impact on Lawful Intelligence

Published on November 24th, 2020 | by Kevin McTiernan

  • November 24, 2020

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are "uplink" and "downlink" the terms used? No, for years there have also been "Sidelink" communications. That is, direct…

Read More
Location Data Used By Law Enforcement

Intercepted Location Data Can Help Intelligence Agencies

Published on November 10th, 2020 | by Michael Gebretsadik

  • November 10, 2020

Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991 and ushered in a new era of cellular communications. However, there was no built-in location…

Read More
Demonstrating Targeted Interception

What is Target Intercept vs Bulk Intercept?

Published on October 27th, 2020 | by David Anstiss

  • October 27, 2020

Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance, is focused on individuals or a Subject of Interest (SoI) with government or judicial oversight…

Read More