• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Endgame Systems: Isn’t Zero Day Still the End Game?

Leave a Comment

A little more than two years have passed since Marine Corps veteran Nate Fick took the helm as CEO at Endgame Systems. Fick has turned Endgame toward providing vulnerability intelligence and away from the company’s once-vaunted Zero Day capabilities. The question is whether Endgame would entirely abandon such a valuable asset. Answer: They’d rather not say. At the heart of … [Read more...]

Paladion: Where Malware and Information Security Meet

Leave a Comment

With the infusion of US $10 million last June from long time investor Nadathur Holdings, India’s Paladion is on track to become a leading information security player. Who better to devise state-of-the-art defenses of priceless data assets than a company that knows malware from experience: through its use against criminals and terrorists? Many a provider of lawful intercept … [Read more...]

Exploring the Fuzzy Math of U.S. Cyber Defense

Leave a Comment

U.S. cyber defense is finally getting its act together. This year the Obama Administration unveiled a new Cyber Threat Intelligence Integration Center to coordinate intel on cyber threats. The proposed fiscal year budget for 2016 rose to US $14 billion for cyber activities. Included in this budget: US $500 million for 3,000 new cyber experts at Cyber Command and US $227 million … [Read more...]

3.27.2015 -Top Surveillance News That Didn’t Make the Cut

Leave a Comment

Once again C5IS brings you top surveillance news relevant to the field but overlooked by media. Our picks this week: Images That Fool Machine Learning. So much for trying to wed artificial intelligence and video surveillance. Researchers at Cornell University and the University of Wyoming Evolving AI Laboratory "have created images that look to humans like white noise or … [Read more...]

Behind the News: French Push Surveillance Law; No VUPEN at Pwn2Own

1 Comment

As a journal focused on analysis, C5IS typically relegates news coverage to media outlets, but this week we'll make an exception for stories everybody else missed: new moves in France promoting surveillance law overhaul; zero day king VUPEN's apparent no-show at the annual InfoSec Pwn2Own competition; the demise of the EFF's "Jewel vs. NSA" lawsuit;  and on a lighter note, a … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login