skip to Main Content

Lawful Intelligence Blog

Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More
Location Data Used By Law Enforcement

Intercepted Location Data Can Help Intelligence Agencies

Published on November 10th, 2020 | by Michael Gebretsadik

  • November 10, 2020

Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991 and ushered in a new era of cellular communications. However, there was no built-in location…

Read More

The Need for Visual Analytics in Law Enforcement – Part 2

Published on September 27th, 2013 | by SS8 Blog

  • September 27, 2013

Social Network Analysis (SNA) methods are the subject of this first blog in a series of blogs on analytics techniques, with the discussion focused on several question constructs, as per my previous foundation blog on the wider Analytics topic: What…

Read More

Mapping in Intelligence Analysis & Investigations

Published on July 23rd, 2013 | by SS8 Blog

  • July 23, 2013

We attended the 2013 Esri International User Conference, held July 8-12 in San Diego, CA, and it was quite an experience. Esri is a dedicated team of hard working individuals who clearly love what they do. We could feel the…

Read More

The Need for Visual Analytics in Law Enforcement – Part 1

Published on July 23rd, 2013 | by SS8 Blog

  • July 23, 2013

Today's Law Enforcement Agencies (LEAs) and related intelligence organizations are under siege on a number of fronts, and will need to change and evolve decades old, stove pipe practices and workflows to maintain their ability to detect and action credible…

Read More