skip to Main Content

Lawful Intelligence Blog

Lawful Intelligence Across Cloud And Legacy Networks - SS8 Networks

Lawful Intelligence in the Cloud for CSPs

Published on May 3rd, 2021 | by Dr. Keith Bhatia & Syed Hussain

  • May 3, 2021

We are in an intensive era of cloud adoption by communication service providers (CSPs) for 5G networks. This shift is driven by the need for enhanced flexibility and cost-effectiveness that will accommodate 5G’s increased data sizes and diverse usage models.…

Read More
Lawful Intelligence Across Cloud And Legacy Networks - SS8

Lawful Intelligence across Cloud and Legacy Networks

Published on April 20th, 2021 | by Dr. Keith Bhatia & Syed Hussain

  • April 20, 2021

The introduction of 5G, high bandwidth services, and new applications mark a new, intensive era of cloud adoption by communication service providers (CSPs) for their 5G networks. This shift is needed for enhanced flexibility and cost-effectiveness to accommodate 5G’s increased…

Read More
Adapting Lawful Intelligence Techniques To Todays Encrypted Reality - SS8 Networks

Adapting Lawful Intelligence Techniques to Today’s Encrypted Reality

Published on March 29th, 2021 | by Dr. Cemal Dikmen

  • March 29, 2021

With the increased attention to information privacy in recent years, a majority of electronic communications are now encrypted. Having that information irretrievably hidden creates novel challenges for law enforcement. Being unable to access the main content of a message or…

Read More

SS8 Celebrates 20th Anniversary

Published on December 10th, 2020 | by Dr. Cemal Dikmen

  • December 10, 2020

Two Decades of Lawful Interception Technology Innovation A couple of weeks ago, our marketing team let me know that SS8 was going to be 20 years old in December. The news seemed as though my own child was celebrating his…

Read More
Two Mobile Phones Communicating

Sidelink and Its Impact on Lawful Intelligence

Published on November 24th, 2020 | by Kevin McTiernan

  • November 24, 2020

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are "uplink" and "downlink" the terms used? No, for years there have also been "Sidelink" communications. That is, direct…

Read More
Demonstrating Targeted Interception

What is Target Intercept vs Bulk Intercept?

Published on October 27th, 2020 | by David Anstiss

  • October 27, 2020

Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance, is focused on individuals or a Subject of Interest (SoI) with government or judicial oversight…

Read More
CLOUD Act

CLOUD Act – Its Impact on Law Enforcement

Published on September 2nd, 2020 | by Kevin McTiernan

  • September 2, 2020

In March of 2018 U.S. Congress passed the CLOUD Act, which addressed a growing issue for domestic and international law enforcement, Internet service operators (such as Microsoft) and national governments. The legislation acronym stands for Clarifying Overseas Use of Data…

Read More

Lawful Intercept: The High-Risk Dilemma

Published on June 30th, 2020 | by Dr. Keith Bhatia

  • June 30, 2020

“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used by Nation-States surveillance tools against companies or other nations. In some western countries, the debate…

Read More

Deploying Lawful Intelligence in an IoT World

Published on May 28th, 2020 | by Kevin McTiernan

  • May 28, 2020

Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we can check on our homes, even when we are thousands of miles away, through connected…

Read More