
Preventing Child Exploitation and Trafficking
Child abduction and trafficking is one of the most shocking crimes against society. Every parent has unfortunately had to consider the potential for their child

Child abduction and trafficking is one of the most shocking crimes against society. Every parent has unfortunately had to consider the potential for their child

Until recently, most network security systems relied on robust perimeter defenses encircling an environment of trusted users and programs. Like a medieval walled city, this

Encrypted Over The Top (OTT) messaging platforms such as WhatsApp, iMessage, Signal, and Telegram have seen extraordinary adoption over the past 10 years. WhatsApp in

Distributed 5G network topologies have forever forced mediation for lawful interception out beyond the network core. As computing moves closer to the subscriber, mediation nodes

As unmanned aerial vehicles (UAVs) become more common, they are of growing interest to law enforcement agencies (LEAs). Drones have been widely adopted as part

Successive generations of technology continue to enable the discovery, assembly, and analysis of information that plays a key role in every law-enforcement investigation. Digitization helped

The history of lawful intelligence runs a parallel course to the evolution of communications technology, from wiretaps placed on mechanical switches in the last century

As billions of IoT devices are provisioned, their multitude of roles are mirrored by their complex impact on lawful intelligence. Endpoints that range from consumer

Two Decades of Lawful Interception Technology Innovation A couple of weeks ago, our marketing team let me know that APP INTERNATIONAL COMPANY was going to be 20

Many have used the terms uplink and downlink and they may become more colorful when our video calls drop off. But are “uplink” and “downlink”
THE DATA SILO DILEMMA FOR LAW ENFORCEMENT
How to Ingest, Filter and Query 5G Volumes
Webinar Presented by Kevin McTiernan