• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a decade. Originally known as Gamma International, a subsidiary of Gamma Group based in Andover, UK, the company was ostensibly spun off in 2013 as an independent entity based in Munich and renamed FinFisher. The facts of FinFisher's corporate … [Read more...]

Can Wintego CatchApp Really Crack WhatsApp E2E Encryption?

C5IS reviews Wintego CatchApp, a solution that leverages a little-known vulnerability in WhatsApp's Signal protocol implementation. Wintego created an uproar in late 2016 when it was revealed that a product brochure made the claim that Wintego’s CatchApp solution offers the “unprecedented capability” to crack end-to-end encryption (E2EE) used by the popular messaging … [Read more...]

Presidential Cybersecurity Order – Trumped by WannaCrypt Malware

On May 12, 2017, the Administration issued a long-awaited Executive Order on Cybersecurity, outlining the President’s strategy - and mandate - to improve security for federal agencies, critical infrastructure industries and other enterprises. Depending on your interpretation, it was either perfect timing for President Donald Trump, cyber-wise - or else Friday the 13th struck a … [Read more...]

Darktrace – What AI Cyber Defense Portends for Malware’s Future

Inspired by MI5, Darktrace Antigena defensive cyber learns and corrects system weaknesses via AI - also the perfect tool for malware. One of the more alarming outcomes of the black hat arts is the evolution of cyber breaches that use cognitive computing techniques to “learn” about a potential victim’s network or personal interests and to make modifications that will leverage … [Read more...]

FinFisher FinSpy – Malware’s Hardest Working Rootkit Infection

In reviews of how FinFisher FinSpy, The Hacking Teams’s RCS and similar “ethical malware” programs work, the discussion generally begins with the statement, “They plant malware on a device to take control” and ends with a list of all the capabilities that derive therefrom. All fine and well, but what are the steps leading up to the malware plant that make it successful? And how … [Read more...]

Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Antiquated Box: Endpoint Attacks Flank Gemalto Ethernet Encryptor

The ability to hack into ethernet fiber cables via evanescent couplers has been a proven interception capability for 10 years at least. In … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login