skip to Main Content

Lawful Intelligence Blog

10 Potential Missteps To Avoid During Lawful Intelligence Deployments - SS8

10 Potential Missteps to Avoid During Lawful Intelligence Deployments

Published on April 8th, 2021 | by Jason Patino

  • April 8, 2021

The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed projects provides experience and knowledge that can be leveraged to anticipate and avoid the most…

Read More
Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More
Two Mobile Phones Communicating

Sidelink and Its Impact on Lawful Intelligence

Published on November 24th, 2020 | by Kevin McTiernan

  • November 24, 2020

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are "uplink" and "downlink" the terms used? No, for years there have also been "Sidelink" communications. That is, direct…

Read More
Location Data Used By Law Enforcement

Intercepted Location Data Can Help Intelligence Agencies

Published on November 10th, 2020 | by Michael Gebretsadik

  • November 10, 2020

Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991 and ushered in a new era of cellular communications. However, there was no built-in location…

Read More
Demonstrating Targeted Interception

What is Target Intercept vs Bulk Intercept?

Published on October 27th, 2020 | by David Anstiss

  • October 27, 2020

Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance, is focused on individuals or a Subject of Interest (SoI) with government or judicial oversight…

Read More
Intelligence Monitoring Center

Understanding 5G Standards for Lawful Intercept

Published on September 22nd, 2020 | by Dr. Cemal Dikmen

  • September 22, 2020

5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way we live today, 5G will revolutionize the way we live moving forward. Low-latency and high-speed…

Read More

Deploying Lawful Intelligence in an IoT World

Published on May 28th, 2020 | by Kevin McTiernan

  • May 28, 2020

Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we can check on our homes, even when we are thousands of miles away, through connected…

Read More

Silence is Golden After All…

Published on July 25th, 2013 | by SS8 Blog

  • July 25, 2013

I was reading an article in the most recent issue of Science News that focused on the need for analyzing cellular phone communications by criminals. The article mentioned a case in Italy where investigators were able to analyze mobile phone…

Read More

Mapping in Intelligence Analysis & Investigations

Published on July 23rd, 2013 | by SS8 Blog

  • July 23, 2013

We attended the 2013 Esri International User Conference, held July 8-12 in San Diego, CA, and it was quite an experience. Esri is a dedicated team of hard working individuals who clearly love what they do. We could feel the…

Read More