
Three Best Practices for Lawful Intelligence Metadata Analytics
The metadata that surrounds the data payloads for lawful intelligence intercepts has become as important as the payload data itself. Location data, for example, can
As with the broader missions of the law enforcement and intelligence communities, lawful intelligence must balance investigative rigor with the need to preserve privacy and other civil protections.
In investigations, lives depend on the reliability of lawful intelligence platforms. To help analysts maximize the value of all available data, these platforms require advanced testing and continuous updating.
Lawful interception of voice by LEAs harkens back to a time when unencrypted phone calls over a wireline carrier network defined electronic communication. In the smartphone era, other methods have proliferated.
By gathering, collating, and drawing possible conclusions from all available information, AI and ML can act as resource multipliers for lawful and location intelligence, just as they do for network operations.
The limited scope and rigid architectures of some lawful intelligence platforms can lead to expensive change orders. SS8 is built to scale on demand while minimizing cost and operational impact.
The metadata that surrounds the data payloads for lawful intelligence intercepts has become as important as the payload data itself. Location data, for example, can
The process of deploying and integrating solutions for lawful interception, handover, and analysis of network data is complex, but well-charted. Looking carefully at previously completed
With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991
Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance,
5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way
The 5G world is upon us! Which means Law Enforcement Agencies (LEAs) have a headache: 10X to 100X normal data rates are on the horizon. LEAs
Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we
I was reading an article in the most recent issue of Science News that focused on the need for analyzing cellular phone communications by criminals.
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses 3rd Party cookies to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping these cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!