• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Sovereign Intelligence and Sixgill: Applying AI to Dark Web Analytics

C5IS explores the merits of Sovereign Intelligence and Sixgill, pioneers in deploying deep learning and AI for Dark Web Analytics. With the Deep Web and Dark Web comprising some 90 percent of the Internet, the trick of finding the right data to monitor and analyze for "actionable intelligence" is half the challenge. Equally daunting: automating the process so that alerts are … [Read more...]

Skry and Elliptic: Cracking Cryptocurrency Blockchain

As recently as 2014-15, law enforcement investigators tended to look upon Blockchain - the peer-to-peer encrypted record of transactions used by Bitcoin - with a mix of horror and frustration. Blockchain’s system of anonymizing transactions made it all but impossible to detect who was using Bitcoin, whether for illicit purposes such as drug dealing, money laundering, murder for … [Read more...]

Far Surveillance Horizon: Blockchain and the Internet of Things

Is the Internet of Things (IoT) the next major avenue for tracking terrorists and criminals? If so, pioneering work is being done not just by the ISS community, but by an emerging group known as the Blockchain Alliance, a consortium of experts who help track criminals on the foremost technology backbone of both the IoT and digital currency: Blockchain. In this two-part … [Read more...]

Google and Glimmerglass – 20,000 Leagues Under the Sea

Google's ramp-up in investment in undersea fiber optics is in the vanguard of content providers' bid for greater control of international communications — and will bring them face-to-face with the market leader in photonic switching and tapping, Glimmerglass Networks. Recall Google Corp's outrage over the 2013 Edward Snowden revelation that the NSA had effectively tapped all … [Read more...]

DARPA Memex and the Hunt for Deep or Dark Web Intelligence

The teaming of companies such as Diffeo, Uncharted Software and Hyperion Gray in the DARPA Memex partnership program has spurred major advances in alternative search technologies, making it possible to range all over the Web, including the Deep and the Dark portions. Without question, the types of information now available through Memex-inspired search capabilities far … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login