• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

AGNITiO: Can Machine Learning Revive its Lead in Voice Biometrics?

Founded in 2004 in Madrid, with offices in Washington, D.C. and Cape Town, South Africa, AGNITiO is among the many players in voice biometrics that include Auraya, AECOM, CSID, Nuance, Speech Technology Center, TradeHarbor and Voice Biometrics Group. In the past, AGNITiO has differentiated itself by advancing the field. Currently the company is working on new systems that … [Read more...]

Future Analytics: X6 Smartglasses Powered by Ignite

While Palantir and the U.S. Army continue their running argument over whose platform is better -- Gotham or DCGS-A -- “reality” courtesy of the U.S. Department of Defense may have intervened with an alternative that renders the sniping irrelevant: military grade X6 Smartglasses that deliver real time tactical data directly to troops on the ground, without reliance on hand-held … [Read more...]

The Relevance of Axilent ACE Profiler to Surveillance

Available information on Axilent founder and CEO Loren Davie is as spare as data on the company itself: scattered career tidbits on Linkedin; tweets that reveal an array of personal interests ranging from music to Tor, the Dark Web, and an affinity for Satoshi Nakamoto, inventor of the Bitcoin protocol. Davie’s self-profile is as puzzling as that of Axilent’s new website, which … [Read more...]

VSS Monitoring: For Best-in-Class Network Packet Brokers

C5IS reviews VSS Monitoring: pioneer, market leader & arguably the very future of Network Packet Brokers. Network Packet Brokers (NPBs) and TAPs are systems designed to provide visibility into the network. Both have grown in popularity with the rise of software defined networks, virtualized networks, the cloud, and the attendant increase in the volume, bandwidth and … [Read more...]

NetFlow Versus Tor: Surveillance Winning That Fight

  In NetFlow Versus Tor, the latest round of legitimate computer science vs. terrorists using the Onion Router, lab tests show it is now possible to deanonymize targets on the world’s most popular and infamous anonymous service. Tor enjoys legendary status as a service that encrypts network communications end-to-end, is completely impenetrable to surveillance and … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login