skip to Main Content

Lawful Intelligence Blog

Using International Gateways for Lawful Interception

Published on June 22nd, 2022 | by Baski Mohan

  • June 22, 2022

Communication service provider (CSP) networks are becoming more dynamically defined and more distributed, particularly as 5G networks and the internet of things (IoT) are further integrated. Many workloads are executed at the network edge by cloud-native, virtualized network functions. This…

Read More

Preventing Child Exploitation and Trafficking

Published on May 10th, 2022 | by Kevin McTiernan & Kevin Metcalf

  • May 10, 2022

Child abduction and trafficking is one of the most shocking crimes against society. Every parent has unfortunately had to consider the potential for their child to be a victim of deception and exploitation, but today that reality is accentuated by…

Read More

Extracting Intelligence from Location-Based Services

Published on April 27th, 2022 | by Michael Gebretsadik

  • April 27, 2022

In general, 5G networks make gathering intelligence from digital communications more difficult due to factors such as encryption, increased traffic, and more diverse types of data. However, location-based services are a notable exception. The 5G Location Management Function (LMF) enables…

Read More

Five Questions to Ask About Lawful Intercept Platform Support

Published on April 12th, 2022 | by Jamie Barton, Jeff Bland & Robert Reisig

  • April 12, 2022

Technical support is critical to the lawful intelligence mission, for both the mediation systems operated by communication service providers (CSPs) and the analytics and investigation platforms used by law enforcement agencies (LEAs). CSPs face potential regulatory liability if they suffer…

Read More

Lawful Intelligence in a Zero-Trust World

Published on March 24th, 2022 | by Dr Eric Burger

  • March 24, 2022

Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this model focused on authenticating and verifying users, applications, and processes at their points of entry.…

Read More

How to Train Successful Lawful Intercept Engineers

Published on March 15th, 2022 | by Jamie Barton, Jeff Bland & Robert Reisig

  • March 15, 2022

The engineers responsible for communication service providers’ (CSPs) lawful interception systems must maintain and update their unique skill sets with ongoing training. The particular expertise required of these team members makes this requirement challenging. In addition to telecom and network…

Read More

Reconciling Public and Private IP Addresses to Aid Law Enforcement

Published on February 23rd, 2022 | by Kevin McTiernan & Rory Quann

  • February 23, 2022

With just over 4 billion unique, public addresses in the IPv4 scheme and north of 10 billion devices today, many Communication Service Providers (CSPs) assign private addresses to subscribers and leverage a carrier-grade network address translation (CG-NAT) to allow those…

Read More
Emerging Lawful Intelligence Challenges From Sidelink Communications - SS8 Networks

Emerging Lawful Intelligence Challenges from Sidelink Communications

Published on October 27th, 2021 | by Kevin McTiernan

  • October 27, 2021

Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes must be provisioned at the network edge, dramatically reducing backhaul requirements by ingesting massive data…

Read More
The Growing Sophistication Of Location Intelligence - SS8 Networks

The Growing Sophistication of Location Intelligence

Published on September 21st, 2021 | by Michael Gebretsadik

  • September 21, 2021

Technology developments for telecommunications networks often add more challenges than benefits for lawful intelligence operations. Separating the noise from the signal in massive 5G data flows will only get more difficult as time goes on, driven by factors such as…

Read More
Five Challenges Of Gathering Digital Evidence In A 5G World

Five Challenges of Gathering Digital Evidence in a 5G World

Published on September 2nd, 2021 | by David Anstiss

  • September 2, 2021

It’s an irony of this moment that, even as 5G networks increase the amount of data on public networks by orders of magnitude, the technology itself obscures more and more of it from lawful intelligence operations. Alongside the problem of…

Read More