skip to Main Content

Lawful Intelligence Blog

NEC and SS8 Certify Trans-Pacific Lawful Interception

Published on July 18th, 2022 | by Patrick Lopez of NEC and Franklin Recio of SS8

  • July 18, 2022

Secure provisioning, monitoring, mediation, and handover of lawfully intercepted data have long been critical considerations for Communication Service Providers (CSPs) in the design and buildout of public networks. Full interoperability with lawful intelligence solutions allows law enforcement agencies (LEAs), government…

Read More

Money Mules and Location-Based Financial Forensics

Published on May 24th, 2022 | by David Anstiss & Rory Quann

  • May 24, 2022

Preventing low-level street crime is important not only to protect public safety and property, but also as an investigative gateway into larger criminal enterprises. Drug and human trafficking are common examples of complex, multinational criminal operations that depend on hyper-local…

Read More

Lawful Intelligence in a Zero-Trust World

Published on March 24th, 2022 | by Dr Eric Burger

  • March 24, 2022

Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this model focused on authenticating and verifying users, applications, and processes at their points of entry.…

Read More
Applying Lawful Intelligence To OTT Messaging Platform Communications

Applying Lawful Intelligence to OTT Messaging Platform Communications

Published on January 28th, 2022 | by Dr. Cemal Dikman & David Anstiss

  • January 28, 2022

Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in particular has emerged as the most popular messaging app in the world, with more than…

Read More
Shifting Requirements For Lawful Intelligence In The Era Of More Everything - SS8 Networks

Shifting Requirements for Lawful Intelligence in the Era of More Everything

Published on January 11th, 2022 | by Dr. Cemal Dikmen & Ernest Ng

  • January 11, 2022

Today’s lawful intelligence measures draw on a long legacy of intercepted communications. And while the days of simple wiretaps are long gone, the foundational idea of deploying “eyes and ears” to “overhear” illicit communications persists, even in sophisticated intelligence and…

Read More
Identifying Criminals In The Faceless World Of Social Media - SS8 Networks Blog

Identifying Criminals in the Faceless World of Social Media

Published on December 14th, 2021 | by Dr. Cemal Dikmen & Ernest Ng

  • December 14, 2021

The massive, ever-growing role of social networks in human communication comes with a unique set of hazards. In particular, the layer of concealment provided by online contact can easily be abused by bad actors who either choose to remain unidentified…

Read More
Extending Visibility Into Cryptocurrency Transactions - SS8 Networks

Extending Visibility into Cryptocurrency Transactions

Published on October 7th, 2021 | by Dr. Cemal Dikmen

  • October 7, 2021

Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that range from human and drug trafficking to terrorism and ransomware. Cryptocurrency transactions associated with criminal…

Read More
10 Potential Missteps To Avoid During Lawful Intelligence Deployments - SS8

10 Potential Missteps to Avoid During Lawful Intelligence Deployments

Published on April 8th, 2021 | by Jason Patino

  • April 8, 2021

The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed projects provides experience and knowledge that can be leveraged to anticipate and avoid the most…

Read More