CLOUD Act – Its Impact on Law Enforcement
In March of 2018 U.S. Congress passed the CLOUD Act, which addressed a growing issue for domestic and international law enforcement, Internet service operators (such
Lawful and location intelligence technologies are critical to the missions of law enforcement, the intelligence community, and emergency services organizations worldwide. They help agents safeguard society
The encryption of nearly all digital communications today advances individual privacy protections, but it also obscures payloads and endpoints from lawful interception. Accordingly, law enforcement agencies
Pervasive encryption of internet communications continues to challenge lawful interception and intelligence practices, and investigators require updated tools and techniques. At the same time, communications
The convergence of communication data with other types of digital traffic – notably media content – and the continued adoption of 5G networks is creating massive data flows around lawful interception subjects
Widespread commercial use of drones is poised to become commonplace in the coming years, such as Amazon’s introduction of fast airborne package delivery to homes and businesses, starting in 2024. This
In March of 2018 U.S. Congress passed the CLOUD Act, which addressed a growing issue for domestic and international law enforcement, Internet service operators (such
The 5G world is upon us! Which means Law Enforcement Agencies (LEAs) have a headache: 10X to 100X normal data rates are on the horizon. LEAs
“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used
Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we
Communication Service Providers (CSPs), including those that provide Over-the-Top (OTT) services, are obligated by law, to provide lawful intercept capabilities. This ensures that when law
The last decade has seen an explosion of virtualized deployments for cost saving and flexible deployment scenarios. Virtualization enables Service Providers to quickly deploy 5G
Location information is gathered from connected devices including mobile phones. It is a critical data point which, when used by Law Enforcement Agencies (LEAs), tracks
Communications have shifted from traditional (voice, email and SMS offered by telecom operators) to encrypted, over-the-top (OTT) applications. Which unfortunately leaves law enforcement agencies (LEAs)
As bandwidth increases by up to 100x in the next 24 months, law enforcement agencies (LEAs) may find it difficult to manage the amount of
With 5G here, will 4G networks be going away? 5G is here. It’s being rolled out in countries around the world. You may have started
As telecom operators plan their rollout of the fifth generation (5G) of network services, two distinct services have emerged, mobile and fixed wireless access (or
5G Brings on new challenges for regulatory compliance. SS8 is leading in 5G Lawful Interception (LI) mediation, with the 1st 5G deployment in production. We are
Do not be left behind! The transition to 5G networks by wireless network providers will radically increase the number of new high bandwidth applications and
Gartner publishes Hype Cycle for Threat-Facing Technologies and SS8 is recognized as a sample vendor in the category of Network Traffic Analysis (NTA).
The network is the source of truth for uncovering both devices and suspects of interest. SS8’s unique ability to extract intelligence from network communications right
In part one of Kidnapping: The Social Impact, I provided background on the organized crime of kidnapping as a growing evil-industry by detailing the problem
The Problem Kidnapping is one of the felonies that have a larger social impact in a population. These crimes are usually conducted through organized crime,
Social Network Analysis (SNA) methods are the subject of this first blog in a series of blogs on analytics techniques, with the discussion focused on
I was reading an article in the most recent issue of Science News that focused on the need for analyzing cellular phone communications by criminals.
We attended the 2013 Esri International User Conference, held July 8-12 in San Diego, CA, and it was quite an experience. Esri is a dedicated
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses 3rd Party cookies to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping these cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!