• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Show Con Artist Wolf Intelligence the “Back Door”

In an earlier post we observed how demand for intrusive surveillance solutions in second and third world countries has fueled the emergence of new competitors such as Wolf Intelligence in a bid to compete with longstanding players in the marketplace. At least in part, these next generation malware players are getting an assist from Wassenaar Arrangement-inspired clampdowns such … [Read more...]

How Serious is Italy’s Crackdown on The Hacking Team? Deadly Serious.

In a recent New York Times article, The Hacking Team claims Italian regulators lifted the export ban on the company’s malware. Don't tell tales. On March 31, 2016, Italy’s Ministry of Economic Development (MISE) - under orders from the Directorate General for International Trade Policy - banned The Hacking Team from exporting its RCS malware to any country outside the … [Read more...]

The Big Black Book of Electronic Surveillance 5th Edition: 2017

C5IS is proud to announce The Big Black Book of Electronic Surveillance 5th Edition: 2017, the ISS industry's unique Buyer's Guide for law enforcement, government and military intelligence. The book is updated to present current product information on the best ISS vendors in 10 categories, and cross-referenced throughout to show the full range of products, services and … [Read more...]

Fake News Fallout: Can NORSI-TRANS and Russian Spyware Vendors Be Trusted?

With recent evidence of Russia’s role in influencing the outcome of the U.S Presidential election, now might not be the most opportune moment for Russian Spyware vendors to be hawking their wares at Intelligence Support Systems (ISS) conferences organized and hosted by an American enterprise. Yet such is the case with NORSI-TRANS, a featured exhibitor at the upcoming ISS World … [Read more...]

Beyond the Law? Extraordinary Cyber Power of the FBI

The following item is re-published from an earlier analysis where it was buried in review of a major U.S. cyber vendor. We are re-posting and updating that section of the analysis here as a standalone piece -- all about the extraordinary cyber power of the FBI -- to make it easier for I.S. members to find and reference. No, we are not referencing the old Steven Siegal … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login