skip to Main Content

Lawful Intelligence Blog

Lawful Intelligence in a Zero-Trust World

Published on March 24th, 2022 | by Dr Eric Burger

  • March 24, 2022

Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this model focused on authenticating and verifying users, applications, and processes at their points of entry.…

Read More
Applying Lawful Intelligence To OTT Messaging Platform Communications

Applying Lawful Intelligence to OTT Messaging Platform Communications

Published on January 28th, 2022 | by Dr. Cemal Dikman & David Anstiss

  • January 28, 2022

Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in particular has emerged as the most popular messaging app in the world, with more than…

Read More
Shifting Requirements For Lawful Intelligence In The Era Of More Everything - SS8 Networks

Shifting Requirements for Lawful Intelligence in the Era of More Everything

Published on January 11th, 2022 | by Dr. Cemal Dikmen & Ernest Ng

  • January 11, 2022

Today’s lawful intelligence measures draw on a long legacy of intercepted communications. And while the days of simple wiretaps are long gone, the foundational idea of deploying “eyes and ears” to “overhear” illicit communications persists, even in sophisticated intelligence and…

Read More
Identifying Criminals In The Faceless World Of Social Media - SS8 Networks Blog

Identifying Criminals in the Faceless World of Social Media

Published on December 14th, 2021 | by Dr. Cemal Dikmen & Ernest Ng

  • December 14, 2021

The massive, ever-growing role of social networks in human communication comes with a unique set of hazards. In particular, the layer of concealment provided by online contact can easily be abused by bad actors who either choose to remain unidentified…

Read More
Extending Visibility Into Cryptocurrency Transactions - SS8 Networks

Extending Visibility into Cryptocurrency Transactions

Published on October 7th, 2021 | by Dr. Cemal Dikmen

  • October 7, 2021

Just a tiny fraction of cryptocurrency transactions are related to criminal activity, but they are still a critical mechanism for payment associated with crimes that range from human and drug trafficking to terrorism and ransomware. Cryptocurrency transactions associated with criminal…

Read More
10 Potential Missteps To Avoid During Lawful Intelligence Deployments - SS8

10 Potential Missteps to Avoid During Lawful Intelligence Deployments

Published on April 8th, 2021 | by Jason Patino

  • April 8, 2021

The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed projects provides experience and knowledge that can be leveraged to anticipate and avoid the most…

Read More
Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More
Sidelink And Its Impact On Lawful Intelligence - SS8 Networks

Sidelink and Its Impact on Lawful Intelligence

Published on November 24th, 2020 | by Kevin McTiernan

  • November 24, 2020

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are "uplink" and "downlink" the terms used? No, for years there have also been "Sidelink" communications. That is, direct…

Read More