• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Do Media Share Responsibility for Orlando Terrorist Attack?

In the months leading up to the Orlando terrorist attack, does anyone recall a positive news article or analysis on lawful intercept or any aspect of the surveillance industry? It’s doubtful. Not only after the Edward Snowden NSA revelations, but well before, national and tech trade press embraced a hostile attitude toward intelligence support systems (ISS). Among today’s media … [Read more...]

Is China’s Counter-Terrorism Law Really So Dreadful?

Six months have passed since implementation of China's Counter-Terrorism Act, a law that drew fierce criticism from privacy organizations, tech companies that do business in China, and U.S. President Obama. Heading the list of complaints were objections to Chinese authorities’ plans to require “back doors” into network equipment and end user devices, as well as access to all … [Read more...]

Deciphering the Harris Hailstorm IMSI Catcher: All About LTE

In the nearly five years since Harris Corporation launched its latest model of IMSI catcher, Hailstorm, the general consensus on the product remains “no consensus” -- a remarkable achievement in “keeping the lid on” a surveillance technology of any kind. To this day, descriptions of Hailstorm are so scattered and opaque that even the most astute ISS professional could be … [Read more...]

Does Dark Mail Really Pose a Threat to Surveillance?

C5IS examines Dark Mail, the long-awaited secure email system that may not be so hacker-proof as advertised. A former General Counsel for the National Security Agency once commented that if an agent could obtain sufficient metadata on a target, then “content” became almost irrelevant. Metadata alone would provide sufficient indication of the target’s whereabouts, identity … [Read more...]

The Art and Science of DNS Hijacking

DNS hijacking is a form of cyber attack that involves using malware to infect a target’s device, gain access to its TCP/IP data, change these settings, then re-route the target to a fake duplicate of a bona fide site to either capture personal information or to track the target, or both. As a stock in trade not only of black hats but also ethical malware companies and law … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login