skip to Main Content
Emerging Lawful Intelligence Challenges From Sidelink Communications

Published on October 27th, 2021 | by Kevin McTiernan

Emerging Lawful Intelligence Challenges from Sidelink Communications

Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes must be provisioned at the network edge, dramatically reducing backhaul requirements by ingesting massive data flows in real-time and executing handover of the intercepted portion over long-haul connections.

In order to deliver on the 5G enabled applications, user equipment (UE) or internet of things (IoT) devices may need to communicate directly with each other, without connecting to a cellular tower. And, when one device is not within range of a tower, direct communications with another device that is within range can be leveraged and may be highly useful for mission-critical communications.

As device-to-device communication (formally referred to as Sidelink) becomes standardized, undoubtedly software will be created to enable communications between individuals. This shift in communication data away from the cellular network may cause otherwise intercepted data to be missed by standard lawful intercept solutions. As the volume and scope of these off-network communications continue to increase, a significant lawful intelligence gap for law enforcement agencies (LEAs) is created.

Growth of Peer-to-Peer Usage Models

With the development of more capable computing technology and devices, new usage models based on Sidelink communications are gaining greater interest. This growth parallels the continuing buildout of 5G networks and the massive influx of machine-to-machine traffic that accompanies it.

Machine to machine communications among IoT devices will range from industrial sensors and actuators to robots and drones, especially as they get closer to supporting fully autonomous use cases. Intelligent vehicles (self-driving or otherwise) can communicate information such as position, velocity, and acceleration with each other to coordinate their movements, while also improving safety and optimizing traffic flow. Web networks can connect endpoints with or without a CSP network, for uses in smart cities, sensor networks, and peer-to-peer communication between consumer handsets, or AI assistants.

The communications in all of the above use cases occur outside the reach of current mediation capabilities for lawful intelligence. To exacerbate matters, 6G communication services, which are anticipated to be commercialized by the end of this decade, are expected to continue the existing trends by further increasing the prevalence of off-network communications. Resulting in a shorter wireless signaling range, accompanied by an elevated focus on ultra-short-range usages such as peer-to-peer networking and sensing.

Because of the increase in Sidelink communications, LEAs will be required to juggle both adapting their lawful intelligence practices to address pervasive encryption, while also accommodating for the significant increases off-network communications in future investigations. However, Sidelink communications can be beneficial in mission-critical situations.

Off-Network Communication for First Responders

Sidelink communications have the specific potential for use by first responders such as firefighters, police, and military personnel. For example, in the immediate aftermath of a terror attack or natural disaster, it is common for telephone networks to be overwhelmed as people check in with friends and family members. Because Sidelink communication is point to point, bypassing the overwhelmed cellular networks, it can enable more reliable communications among response teams.

For instance, land-mobile radio (LMR) devices can typically be switched to a “simplex” or “walkie-talkie” mode for Sidelink communication, which provides a distinct architectural advantage over the mobile phones more typically carried by responder personnel. Many LMR sets have large external antennas and can operate at power levels in the range of 3-5 watts, compared to the small internal antennas and .25-watt limitation for typical phone handsets.

The LTE and 5G standards include Proximity Services (ProSe) to support off-network communications, but the transmission range is far less than the several miles offered by LMRs. Moreover, most mobile phones do not support ProSe communications.

Recently, the First Responder Network Authority (FirstNet)—the US entity charged with building and administering an interoperable public safety broadband network—has responded to this set of shortcomings by issuing a request for information (RFI) that calls for technology solutions to provide off-network broadband connections. An effort that highlights the likelihood that novel device-to-device communications approaches are likely to emerge in the coming years.

Unfortunately though, as these technologies move from the theoretical to the practical and proliferate, many will be adopted by those seeking to evade data interception through the network, whether because of privacy concerns or because of criminal intent. Bringing such communications under the umbrella of lawful intelligence is challenging and will require new approaches.

Future of Sidelink Communications and Lawful Intercept

History demonstrates that criminal groups tend to co-opt legitimate technology applications for nefarious ends. For example, an app made for secure communications or transactions between individuals can become the basis for drug deals or communication during a terrorist attack. SS8 has unmatched expertise and reach to enable lawful intelligence across emerging technologies such as Sidelink communications, helping give LEAs better access to these hidden channels.

In some cases, multiple off-network devices may communicate among themselves while also reaching the public telecom network indirectly through one or more on-network devices. Data may be transmitted over the public connection using either a handset or a portable base station. In either case, those transmissions are susceptible to lawful interception using current methods. Typically, however, the intercepted data is traceable back only to the point where it connected to the public network, obscuring the identity of the device where it originated.

Such topologies could potentially be large, multi-tiered, and complex, including many phone handsets, IoT devices, and other endpoints. The inability to identify a data transmission’s specific point of origin has the potential to significantly limit investigations. Especially in industrial applications, where data reaches the LTE or 5G network only when it is batch-uploaded from the edge to a central point on a sporadic basis. Maximizing the intelligence available from intercepted data in such cases is an active area of SS8 research.

As Sidelink communications play a larger potential role in investigations, SS8 continues to be on the cutting edge in working with LEAs and other stakeholders to define the implications of this shift. Combining these scenarios with other aspects of lawful interception, forensic investigation, and data fusion is poised to play a growing role in the future of lawful intelligence practices.

To learn more about SS8’s solutions for lawful enforcement agencies, visit the SS8 website.

Conclusion

The concept of having devices connect to each other without connecting to a network is not new – look at Bluetooth and Wi-Fi Direct. But how D2D communications are being embraced by cutting edge technologies is new.

Sidelink reduces the number of communication hops to zero. It takes advantage of the high bandwidth available in 5G’s new radio spectrum which makes for an ultra-fast, low latency connection. But not all D2D traffic will go over a telecom operator’s network and will therefore be outside the reach of lawful intelligence platforms.

Law enforcement agencies need to be aware of all communications channels they need to execute an investigation and regulators need to revisit the services for which they require telecom operators to assist. Ultimately, telecom operators will need to ensure that they are still in compliance with those regulations.

Ensure your organization is both compliant and keeping pace with emerging technology by contacting the SS8 team today.

About Kevin McTiernan

Kevin McTiernan Image

Kevin has over 20 years of extensive experience in the telecommunications and network security industries. At SS8, Kevin is the VP of Government Solutions and is responsible for leading the vision, design, and delivery of SS8’s government solutions, including the Xcipio® compliance portfolio. You can learn more about Kevin on his LinkedIn profile by clicking here.

 

About SS8 Networks

SS8 provides Lawful Intelligence platforms. They work closely with leading intelligence agencies, communication providers, law enforcement agencies and standards bodies. Xcipio® is already proven to meet the very high demands of 5G and provides the ability to transcode (convert) between lawful intercept handover versions and standard families. Intellego® XT is a monitoring center that includes MetaHub, a best-in-class data analytics tool for intercepted, 3rd party and location data. Both product portfolios are used worldwide for the capture, analysis, and delivery of data for the purposes of criminal investigations.

Tweet Us @SS8       Follow Us LinkedIn