skip to Main Content

Lawful Intelligence Blog

Extending Visibility Into Cryptocurrency Transactions - SS8 Networks

Extending Visibility into Cryptocurrency Transactions

Published on October 7th, 2021 | by Dr. Cemal Dikmen

  • October 7, 2021

Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that range from human and drug trafficking to terrorism and ransomware. Cryptocurrency transactions associated with criminal…

Read More
10 Potential Missteps To Avoid During Lawful Intelligence Deployments - SS8

10 Potential Missteps to Avoid During Lawful Intelligence Deployments

Published on April 8th, 2021 | by Jason Patino

  • April 8, 2021

The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed projects provides experience and knowledge that can be leveraged to anticipate and avoid the most…

Read More
Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More
Two Mobile Phones Communicating

Sidelink and Its Impact on Lawful Intelligence

Published on November 24th, 2020 | by Kevin McTiernan

  • November 24, 2020

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are "uplink" and "downlink" the terms used? No, for years there have also been "Sidelink" communications. That is, direct…

Read More
Location Data Used By Law Enforcement

Intercepted Location Data Can Help Intelligence Agencies

Published on November 10th, 2020 | by Michael Gebretsadik

  • November 10, 2020

Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991 and ushered in a new era of cellular communications. However, there was no built-in location…

Read More
Demonstrating Targeted Interception

What is Target Intercept vs Bulk Intercept?

Published on October 27th, 2020 | by David Anstiss

  • October 27, 2020

Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance, is focused on individuals or a Subject of Interest (SoI) with government or judicial oversight…

Read More
Intelligence Monitoring Center

Understanding 5G Standards for Lawful Intercept

Published on September 22nd, 2020 | by Dr. Cemal Dikmen

  • September 22, 2020

5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way we live today, 5G will revolutionize the way we live moving forward. Low-latency and high-speed…

Read More