• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

EU Report on Dual-Use Export Policy Credits C5IS

We confess: C5IS does not spend a great deal of time perusing reports by the European Commission, even when the topic is export for dual-use weapons and ISS technologies. Hence the time lapse in noticing that our work is cited as source for the Commission's "FINAL REPORT: Data and Information Collection for EU Dual-Use Export Control Policy Review" authored by Stockholm … [Read more...]

FireEye Mandiant: FBI’s Secret Malware Friend?

When reports emerge about the U.S. Federal Bureau of Investigations’ offensive cyber capabilities (creating a fake newspaper website to catch a Seattle bomber and similar phishing escapades) the question always arises: Where does this talent arise -- in-house of via subcontractor? -- and the short answer is FireEye Mandiant. Before we delve into how Mandiant works with the … [Read more...]

NETI: Government-Run ISS by NATO’s Fickle Friend, Hungary

NETI IT Consulting Ltd. is a versatile surveillance vendor run by the government of Hungary. While the company is ostensibly an exclusive holding of a non-profit entity -- the Theodore Puskás Foundation (PTA) -- the two are one and the same entity, share identical “corporate” officers and one website, and report directly up to the e-Government Center in the Office of the Prime … [Read more...]

SciEngines: Terrorist Coronary Failure By Custom Hardware Attack

C5IS reviews SciEngines, a provider of FPGA-based cryptanalytic devices for custom hardware attack by military and government intelligence against encrypted terrorist and criminal communications. Off in some dusty corner of the ISIS caliphate, skilled cryptologists run an online college for initiates of the Islamic State on ways to conceal communications via encryption and … [Read more...]

Bay Talkitec 3G Video Call Lawful Interception: Big Deal or Yawner?

When Bay Talkitec introduced its “Smart Intercept” product with 3G Video Lawful Interception, the company set out to make a splash with what looked to be a new and original LEA surveillance product for its time. The solution provides “real-time” interception of 3G video calls, as well as recording, logging and analysis of video and voice. Smart Intercept also does double duty … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login