• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Equation Group and the Real Dunces of the Zero Day Leak – Cisco and Juniper

By now the news of a purported hack at the NSA revealing a 2013 suite of Zero Days, and their link to the agency's Technical Analytics Organization (TAO) aka The Equation Group, has been analyzed ad infinitum. Most conclude -- prematurely, we believe -- that the leak of such a large cache of Zero Day vulnerabilities and exploits represents a huge embarrassment for the NSA, as … [Read more...]

Zero Days vs. Malware — What’s the Difference?

In the popular mind, Zero Days and Malware – including Trojans, bots, bugs, rootkits, worms, spyware and other forms – are commonly lumped together under the general heading of viruses and more recently “cyber attacks.” While the latter term is appropriate as a generic catch-all, it is important for law enforcement to understand the difference between Zero Days and Malware as … [Read more...]

PLATH Group Expands from RF Monitoring to Cyber Security and Malware

As an acknowledged leader in military RF monitoring and analysis for more than 60 years, PLATH Group surprised many analysts in 2012 with its sudden dip into markets of primary interest to intelligence agencies and law enforcement: cyber security, forensics and malware. Was PLATH changing course? No, that is hardly the case. PLATH simply took advantage of an opportunity to … [Read more...]

Blue Coat Plus Symantec: Enterprise Cyber Conquest

So Symantec buys Blue Coat Systems for US $4.65 billion. It is a curious thing when a struggling company buys another for twice the most recent bid, installs the acquired team’s leader as CEO, neglects to mention that the two firms have some conflicting products, then announces the sale late on a Friday -- generally a red flag that someone seeks to bury a story after analysts … [Read more...]

Is China’s Counter-Terrorism Law Really So Dreadful?

Six months have passed since implementation of China's Counter-Terrorism Act, a law that drew fierce criticism from privacy organizations, tech companies that do business in China, and U.S. President Obama. Heading the list of complaints were objections to Chinese authorities’ plans to require “back doors” into network equipment and end user devices, as well as access to all … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login