• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Tracking Elusive Targets: Keysight Signal Analyzers and RF Sensors

  Agilent's spin off of Keysight unleashed a giant in the military RF monitoring marketplace, with 12 R & D centers worldwide and 9,500 employees including the largest sales and support staff in its sector. Keysight's emergence as a solo player focused on electronic test & measurement, RF signal analysis represents an important and beneficial development to the … [Read more...]

Elbit Systems’ CYBERBIT: Not Your Father’s Lawful Intercept

When Israel's Elbit Systems purchased the Cyber and Intelligence Division of NICE Systems last year, Elbit's mission was to leverage the new asset to elevate its CYBERBIT subsidiary into a global powerhouse in two areas: cyber security for the enterprise, and lawful interception for government agencies and police. They've succeeded at both, and in remarkable ways. On the law … [Read more...]

Equation Group and the TAO of Advanced Persistent Threat

In August 2016 the Equation Group, aka the Tailored Access Operations (TAO) division of the NSA, attracted unwanted headlines with reports that anonymous attackers had hacked into the group and made off with critical intelligence plus high-end malware. The purported hackers, known as “The Shadow Brokers,” made their success known by publishing  300 megabytes of unencrypted data … [Read more...]

TelcoBridges Lawful Intercept for VoIP – One Box to Rule Them All

TelcoBridges of Canada is a maker of hardware and software systems for communications service providers, with deployments in over 100 nations. Established in 2002, the company specializes in session border controllers (SBCs) and VoIP media control gateways (MCGs). Privately held TelcoBridges competes with renowned brands such as Sonus, Juniper, ASTRAN, Cisco, Oracle, Edgewater … [Read more...]

Network Functions Virtualization for ISS – Still Up in the Clouds

Of the many “disruptive” technologies to emerge in recent years, few have aroused greater fanfare -- or confusion and even anxiety in certain quarters -- than Network Functions Virtualization (NFV), the proposed migration of network tasks from proprietary hardware to more economical “virtual” systems comprised of software and white boxes. Stripping away the tech jargon that … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login