By now the news of a purported hack at the NSA revealing a 2013 suite of Zero Days, and their link to the agency's Technical Analytics Organization (TAO) aka The Equation Group, has been analyzed ad infinitum. Most conclude -- prematurely, we believe -- that the leak of such a large cache of Zero Day vulnerabilities and exploits represents a huge embarrassment for the NSA, as … [Read more...]
Riverbed Builds on Wireshark Packet Capture with Aternity
Beginning with its 2010 acquisition of CACE Technology -- then the principal sponsor of Wireshark -- Riverbed has long been recognized as a leader in deep packet inspection for network monitoring purposes that improve customer experience and loyalty. Less well recognized is Wireshark's role as a vital tool in performing man-in-the-middle (MITM) attacks for purposes of … [Read more...]
France’s Ockham Solutions Blends Analytics and Forensics
While we are on the subject of French ISS companies this week [see Aqsaqom review], let us consider another important vendor from that land, Ockham Solutions. Ockham augments the work of lawful intercept with an analytics and forensics solution that goes beyond the call of duty for investigators. Launched in 2005 by a former law officer and his IT partner, Ockham Solutions … [Read more...]
Aqsacom Lawful Intercept: Diversifying to Beat Market Saturation
In the surveillance industry since 1994, France’s Aqsaqom is among the oldest, largest and most respected lawful intercept vendors. Over time the company has grown from a startup offering a single lawful intercept solution into a recognized industry giant delivering multiple standards-based products that integrate with and expand upon the capabilities of its core product. The … [Read more...]
Harris IMSI Catchers Still Put the Sting in Mobile Location
The StingRay. This review updates an earlier C5IS analysis of Harris IMSI catchers, still among the most popular active mobile location products. Law enforcement and government intelligence agencies are increasingly more interested in a target's exact location in real time versus tapping into his communications. And yet the use of mobile location data in lawful intercept and … [Read more...]