-
5G
The evolution of wide-area networking continues to drive processing out to the network edge. That trend first gained traction with widespread cloud adoption, and it...
-
5G
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”...
-
Communication Provider
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991...
-
Intelligence
Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance,...
-
Communication Provider
For the last 50 years, the telecom industry has been happily providing technology for people to make voice calls, and to assure proper accounting they...
-
5G
5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way...
-
Intelligence
In March of 2018 U.S. Congress passed the CLOUD Act, which addressed a growing issue for domestic and international law enforcement, Internet service operators (such...
-
5G
The 5G world is upon us! Which means Law Enforcement Agencies (LEAs) have a headache: 10X to 100X normal data rates are on the horizon. LEAs...
Published on February 16th, 2021 | by Dr. Cemal Dikmen & Mr. Syed Hussain
The evolution of wide-area networking continues to drive processing out to the network edge. That trend first gained traction with widespread cloud adoption, and it accelerated as the global build-out of IoT began. Now, 5G’s massive... Read More →
Published on November 24th, 2020 | by Kevin McTiernan
Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink” the terms used? No, for years there have also been “Sidelink”... Read More →
Published on November 10th, 2020 | by Michael Gebretsadik
Having location capabilities in a mobile network was originally an afterthought. The first Global System for Mobile (GSM) network was launched in Finland in 1991 and ushered in a new era of cellular communications. However, there... Read More →
Published on October 27th, 2020 | by David Anstiss
Overview There are two broad types of surveillance capabilities and they are classified as Targeted Intercept and Bulk (Mass) Intercept. Targeted interception, or targeted surveillance, is focused on individuals or a Subject of Interest (SoI) with... Read More →
Published on October 13th, 2020 | by Dr. Keith Bhatia
For the last 50 years, the telecom industry has been happily providing technology for people to make voice calls, and to assure proper accounting they have been creating a simple Call Detailed Record (CDR) for each.... Read More →
Published on September 22nd, 2020 | by Dr. Cemal Dikmen
5G is the most exciting new technology when it comes to wireless communications. Just like when 4G/LTE enabled many application developments that changed the way we live today, 5G will revolutionize the way we live moving... Read More →
Published on September 2nd, 2020 | by Kevin McTiernan
In March of 2018 U.S. Congress passed the CLOUD Act, which addressed a growing issue for domestic and international law enforcement, Internet service operators (such as Microsoft) and national governments. The legislation acronym stands for Clarifying... Read More →
Published on July 30th, 2020 | by David Brown
The 5G world is upon us! Which means Law Enforcement Agencies (LEAs) have a headache: 10X to 100X normal data rates are on the horizon. LEAs often intercept and analyze communication data when investigating a suspect of... Read More →
Published on May 28th, 2020 | by Kevin McTiernan
Today, the Internet of Things (or IoT) is a common part of our lives. Internet-connected thermostats enable us to make better energy decisions and we can check on our homes, even when we are thousands of... Read More →
Published on May 7th, 2020 | by Dr. Keith Bhatia & Mr. Syed Hussain
Communication Service Providers (CSPs), including those that provide Over-the-Top (OTT) services, are obligated by law, to provide lawful intercept capabilities. This ensures that when law enforcement agencies (LEAs) issue a court warrant, the providers capture and... Read More →
Published on April 21st, 2020 | by John Macaulay
The last decade has seen an explosion of virtualized deployments for cost saving and flexible deployment scenarios. Virtualization enables Service Providers to quickly deploy 5G and IoT services and to deploy a multitude of new services.... Read More →
Published on April 14th, 2020 | by SS8 Marketing
MILPITAS, Calif. – April 14, 2020 – SS8 Networks, the leader in Lawful Intercept and Monitoring Center platforms, is proud to announce the deployment of their new lawful intelligence application for mission critical push-to-talk (MCPTT) capabilities... Read More →
Published on March 24th, 2020 | by Dr. Keith Bhatia
Communications have shifted from traditional (voice, email and SMS offered by telecom operators) to encrypted, over-the-top (OTT) applications. Which unfortunately leaves law enforcement agencies (LEAs) the world over missing vital information needed for their investigations. Additionally,... Read More →
Published on March 13th, 2020 | by Dr. Keith Bhatia
As bandwidth increases by up to 100x in the next 24 months, law enforcements agencies (LEAs) may find it difficult to manage the amount of data flowing into their current Lawful Intelligence systems. One of the... Read More →
Published on February 20th, 2020 | by SS8 Marketing
Offering unparalleled cloud-based end-to-end lawful intelligence MILPITAS, Calif. – February 20, 2020 – SS8 Networks, a leader in Lawful Intercept and Monitoring Center platforms, is proud to announce the completion of the first Lawful Intelligence platform... Read More →
Published on January 14th, 2020 | by SS8 Marketing
MILPITAS, Calif. – January 14, 2020 – SS8 Networks, the leader in Lawful Intercept and Monitoring Center platforms, is proud to announce the launch of its new virtualized end-to-end lawful intelligence platform to meet the demands... Read More →
Published on March 31st, 2019 | by Kevin McTiernan
As telecom operators plan their rollout of the fifth generation (5G) of network services, two distinct services have emerged, mobile and fixed wireless access (or FWA). These services are being launched on separate timelines and are... Read More →
Published on December 10th, 2020 | by Dr. Cemal Dikmen
Two Decades of Lawful Interception Technology Innovation A couple of weeks ago, our marketing team let me know that SS8 was going to be 20 years old in December. The news seemed as though my own... Read More →
Published on June 30th, 2020 | by Dr. Keith Bhatia
“High-Risk” Providers Recently, we’ve heard a lot about “high-risk” network equipment providers and their potential security vulnerabilities. There is a fear they may be used by Nation-States surveillance tools against companies or other nations. In some... Read More →