• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Is Apple iPhone’s Non-Volatile Memory the Hero of the FBI Hack?

Late Friday, word came that the FBI hacked another iPhone, adding to the roster of Apple devices it has successfully penetrated, and making mincemeat of the company’s legendary “strong encryption” at least a second time. Once again, as was the case with the famous San Bernardino terrorist’s iPhone, the U.S.’s leading federal law enforcement agency dropped its legal case … [Read more...]

Group 2000: Merging Facial Recognition with Classic ISS

If you wish to fathom how the surveillance discipline of facial recognition crosses over into the areas of ELINT, COMINT, SIGINT and OSINT, ask Group 2000 of The Netherlands. Since late 2015 the company has offered a 3D facial recognition system both standalone and in combination with products designed for conventional intelligence work. Group 2000’s LIMA Biometric Identity … [Read more...]

Coming Up: Review of Group 2000 + Inside Scoop on FBI/Apple Hack

Next week C5IS will cover a hot player in lawful intercept, Group 2000 of The Netherlands, and will also reveal exactly how the FBI cracked the San Bernardino terrorist's iPhone. Established in the late 1970s, Group 2000 is a respected presence in the law enforcement and government intelligence fields, providing an array of solutions for lawful intercept, mobile location and … [Read more...]

Inside ISS World: Dr. Jerry Lucas and the “Wiretapper’s Ball”

Some 14 years after its founding, ISS World has reached a milestone. Widely recognized as the center point where the world’s finest experts in SIGINT, COMINT, ELINT, OSINT and all other forms Intelligence Support Systems (ISS) convene to share ideas and move product, ISS World has always managed to be in the right place at the right time. At the moment that means it is … [Read more...]

FBI/Apple Back Door Fracas — Much Ado About Nothing, or Zerodium?

C5IS weighs the odds that Zerodium deserves credit for hacking the San Bernardino terrorists’ iPhone. For months, liberal media have been aflame over the Apple/FBI battle over “back door” access to an iPhone that belonged to one of the San Bernardino terrorists responsible for murdering 14 individuals in a shooting spree. Apple CEO Tim Cook won the cover of TIME one week, … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login