Ask any industry observer to name the top global players in lawful intercept (LI) and they’ll list the usual market giants: Verint, SS8, BAE Systems, Cellebrite, Septier and Utimaco. But ask what advantage one firm offers over another and you're apt to draw a blank stare. Market befuddlement on this point underscores an ongoing challenge to LI vendors: the need to … [Read more...]
“All Greek to Them” – The Debate over Lawful Intercept Security
Greece’s recent subpoena of a former U.S. Embassy official with suspected ties to the CIA has revived a long-running debate over lawful intercept security. Do surveillance systems pose security risks via backdoors that can be opened by law enforcement, intelligence agencies -- or anyone? The answer: Given all the other ways to intercept mobile, why bother? Surveillance … [Read more...]
Next Week: SS8, Chinese Hackathon + Backdoor Man – CIA’s Role in Greek Vodafone Intercept
Next week C5IS travels 'round the planet for a close-up on some of the more intriguing players and events in the electronic surveillance sector. First up: a review of U.S. surveillance player, SS8. Widely known for its work in lawful intercept, analytics and social media monitoring, SS8 is a market leader going head-to-head with Verint and other big box providers. But what's … [Read more...]
Utimaco LIMS: Porsche of Lawful Intercept (at Audi Prices)
When Time scribbles the history of 2011’s Arab Spring it will be a shocker: how fanatics traded stability for bloody chaos, unleashed the demons of Islamic fascism (arguably to the point of making those they “liberated” sentimental for dictatorial rule) -- and gave respected lawful intercept companies such as Utimaco an undeserved black eye or doing the honest job of protecting … [Read more...]
Red Herring: Law Enforcement’s “Going Dark” Spiel
Once again the FBI is raising the alarm on Capitol Hill, citing surveillance laws so outdated that law enforcement is “Going Dark” in the fight against crime and terrorism. Officials paint a world where evildoers leverage encryption and P2P services to get away without a trace. Confined by laws designed in bygone pre-Internet days, frustrated agents watch cases go cold. It’s … [Read more...]