top of page


Do You Want to Be the First to Truly Protect Customers from Phone Theft?
With phone thefts surging across the UK and Europe, CSPs must act now – before regulators force their hand. By leveraging their lawful access and network visibility, CSPs can become critical allies in the fight against organised crime. Powerful analytics and intelligence solutions are already available to help operators and law enforcement work together to detect, disrupt, and prevent phone theft in real time.
Jun 235 min read


Subtonomy showcases new features of its data retention and geolocation solution REX at ISS Europe 2025
SUBTONOMY , the leading vendor of precision lawful intercept request technology, has announced it will exhibit at ISS World Europe ( 3-6...
May 54 min read


Decoding EU Data Retention #5
The EU data retention saga is far from over. Telcos remain at the confluence of demanding legal obligations, evolving judicial interpretations, technological challenges, and societal expectations regarding privacy. While the CJEU has set high standards for fundamental rights protection, the resulting legal fragmentation and uncertainty create significant burdens. A proactive, informed, and adaptable approach, focusing on robust compliance, strong security, and engagement in p
Apr 304 min read


Decoding EU Data Retention #4
How do these data retention mandates, permitted under the ePrivacy Directive's exceptions , interact with the overarching data protection framework in the EU – the General Data Protection Regulation (GDPR)? The short answer: They must coexist, and compliance with both is mandatory. Retained communications metadata (like call logs, location info, IP addresses) is undeniably personal data. Therefore, any national law requiring Telcos to retain this data must not only meet the
Apr 304 min read


EU IP Address Retention #3
What Telcos MUST know after the Hadopi Ruling The recent CJEU ruling in Case C-470/21 , commonly referred to as the Hadopi judgment,...
Apr 304 min read


Decoding EU Data Retention #2
Navigating the Exceptions - When Can Data Be Retained? In our last post , we saw how the Court of Justice of the European Union (CJEU)...
Apr 293 min read


Decoding EU Data Retention #1
The Turning Point - Why the Old Rules No Longer Apply For years, telecommunications operators (Telcos) across the European Union operated...
Apr 293 min read


Subtonomy showcases new features of its data retention and geolocation solution REX at ISS MEA 2025
SUBTONOMY, the leading vendor of precision lawful intercept request technology, has announced it will exhibit at ISS MEA 2025.
Jan 133 min read


How Norway built a world-class Search and Rescue Service empowered by mobile location data and Subtonomy REX
Norway’s integrated Search and Rescue (SAR) Service is a world-class, fully integrated set of government, voluntary and private enterprise s
May 13, 20243 min read


Enhancing Police Investigations and SAR Operations with Legal Data Retention Requests
Mobile operators will be able to discover how REX assists them to fulfill their obligations in a timely, highly accurate and cost-effective
May 23, 20233 min read


Optimizing mobile location data: Security, accuracy, and GDPR compliance
Mobile location data has great potential in helping trap criminals, locate lost and injured people, and assist with anti-terrorism...
May 22, 20233 min read


The Critical Role of Accurate Mobile Location Data in Criminal Investigations
Mobile location data now plays a critical role in many criminal investigations worldwide.
May 7, 20235 min read


The Untold Story – How Mobile Phone Location Data Drives Criminal Investigations
Behind the scenes of every major criminal investigation, mobile network operators (MNOs) play a pivotal role. Lawfully-authorized mobile...
Apr 17, 20233 min read
Subtonomy REX Blog
Welcome to the heart of innovation in telecom security, lawful intercept, data retention and search and rescue operations — the Subtonomy REX Blog. This is where industry meets expertise, offering you a deep dive into the technologies and strategies that are transforming data retention and lawful intercept as we know it.
bottom of page