skip to Main Content

Lawful Intelligence Blog

Preventing Child Exploitation and Trafficking

Published on May 10th, 2022 | by Kevin McTiernan & Kevin Metcalf

  • May 10, 2022

Child abduction and trafficking is one of the most shocking crimes against society. Every parent has unfortunately had to consider the potential for their child to be a victim of deception and exploitation, but today that reality is accentuated by…

Read More

Extracting Intelligence from Location-Based Services

Published on April 27th, 2022 | by Michael Gebretsadik

  • April 27, 2022

In general, 5G networks make gathering intelligence from digital communications more difficult due to factors such as encryption, increased traffic, and more diverse types of data. However, location-based services are a notable exception. The 5G Location Management Function (LMF) enables…

Read More

Lawful Intelligence in a Zero-Trust World

Published on March 24th, 2022 | by Dr Eric Burger

  • March 24, 2022

Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this model focused on authenticating and verifying users, applications, and processes at their points of entry.…

Read More
Applying Lawful Intelligence To OTT Messaging Platform Communications

Applying Lawful Intelligence to OTT Messaging Platform Communications

Published on January 28th, 2022 | by Dr. Cemal Dikman & David Anstiss

  • January 28, 2022

Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in particular has emerged as the most popular messaging app in the world, with more than…

Read More
Identifying Criminals In The Faceless World Of Social Media - SS8 Networks Blog

Identifying Criminals in the Faceless World of Social Media

Published on December 14th, 2021 | by Dr. Cemal Dikmen & Ernest Ng

  • December 14, 2021

The massive, ever-growing role of social networks in human communication comes with a unique set of hazards. In particular, the layer of concealment provided by online contact can easily be abused by bad actors who either choose to remain unidentified…

Read More
Meeting Rising Challenges In Lawful Interception Compliance - SS8 Networks

Meeting Rising Challenges in Lawful Interception Compliance

Published on November 11th, 2021 | by Rory Quann

  • November 11, 2021

As the volume, variety, and velocity of data potentially available to lawful intelligence grow exponentially, the control mechanisms that govern its interception become more critical. Lawful intercept access and mediation solutions must fit seamlessly into communication service provider (CSP) networks.…

Read More
Emerging Lawful Intelligence Challenges From Sidelink Communications - SS8 Networks

Emerging Lawful Intelligence Challenges from Sidelink Communications

Published on October 27th, 2021 | by Kevin McTiernan

  • October 27, 2021

Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes must be provisioned at the network edge, dramatically reducing backhaul requirements by ingesting massive data…

Read More
Extending Visibility Into Cryptocurrency Transactions - SS8 Networks

Extending Visibility into Cryptocurrency Transactions

Published on October 7th, 2021 | by Dr. Cemal Dikmen

  • October 7, 2021

Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that range from human and drug trafficking to terrorism and ransomware. Cryptocurrency transactions associated with criminal…

Read More
The Growing Sophistication Of Location Intelligence - SS8 Networks

The Growing Sophistication of Location Intelligence

Published on September 21st, 2021 | by Michael Gebretsadik

  • September 21, 2021

Technology developments for telecommunications networks often add more challenges than benefits for lawful intelligence operations. Separating the noise from the signal in massive 5G data flows will only get more difficult as time goes on, driven by factors such as…

Read More
Five Challenges Of Gathering Digital Evidence In A 5G World

Five Challenges of Gathering Digital Evidence in a 5G World

Published on September 2nd, 2021 | by David Anstiss

  • September 2, 2021

It’s an irony of this moment that, even as 5G networks increase the amount of data on public networks by orders of magnitude, the technology itself obscures more and more of it from lawful intelligence operations. Alongside the problem of…

Read More