• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Internet of Things: The Map of Cyber Intrusion Vulnerability

Leave a Comment

The Web is alive with a new report by Evans Data Corporation showing rapid expansion of the Internet of Things (IoT). The report cites North America and the Asia Pacific region as being well ahead in IOT development projects, while EMEA (Europe, the Middle East and Africa) lag far behind due to lack of interest by developers. The implication: Those in the lead are … [Read more...]

NYSE Goes Dark: Dismiss it or FREAK Out?

1 Comment

FREAK vulnerability, a sleeper for nearly a decade, serves as a reminder that widespread IT security weakness remains an unaddressed crisis-in-the-making. One day after the epic outage of the New York Stock Exchange, the crash of United Airlines computer systems and similar problems at The Wall Street Journal, the trio of incidents has moved out of the front page and off … [Read more...]

SSI Pacific: Riding the Wave of Multi-Play Surveillance

C5IS reviews Australia’s SSI Pacific, a provider of turnkey lawful intercept solutions, data retention and analytics, cybersecurity, and real-time OSINT. There was a time when specialist practitioners dominated the surveillance marketplace. A company might offer lawful intercept solutions, but not warrant management; or strictly mobile location; or analytics and … [Read more...]

Silent Circle’s U.S. Exit — What Was the Point?

Leave a Comment

C5IS reviews Silent Circle, a maker of encryption to protect mobile calling, messaging and videoconferencing, and the “surveillance-proof” Blackphone. In business as in life, what often seems coincidence is in fact deliberate timing. In August 2013, Silent Circle without warning cancelled its popular Silent Mail service, characterizing e-mail as the sole point of … [Read more...]

Sqrll Cyber Defense: Begin With the Right Questions

Leave a Comment

Interviews with Sqrll co-founder Ely Khan invariably mention his background as Director of Cybersecurity at the White House. Accumulo-based cybersecurity leader Sqrll launched in 2012. The White House suffered a notorious cyberattack in 2014. If White House data wasn’t protected by a system with the proven quals of Sqrll, why not? Welcome to the contrary worlds of top … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login