Calling all voice biometrics providers. Emergency in progress at the nation's capital. Following the massive cyberattack on the U.S. government's Office of Personnel Management (OPM) data, the White House directed federal agencies to ratchet up security of computer systems. Among the emergency measures called for: priority threat detection systems and patching blatant … [Read more...]
Tactical Mobile Interception: The Gamma Group Nobody Knows
C5IS reviews “passive” and “active” mobile interception and location capabilities of The Gamma Group. The UK’s Gamma Group has gone to great lengths to distance itself from its most famous product -- FinFisher ethical malware -- even to the point of spinning off the unit as a separate German company, and ostensibly shedding any further involvement with Trojans or Zero Days … [Read more...]
S2T: How to Find ISIS on the Dark Web
C5IS reviews Singapore’s S2T, a specialist in Dark Web data and identity extraction. Sometimes military analysts tracking targets on social media get lucky. Tucked among the usual recruitment videos and propaganda, a member of ISIS tweets about his “command and control” capabilities and adds a photo. Analysts tag that quickly and within hours, as happened earlier this month, … [Read more...]
The Little Black Book of Electronic Surveillance: 3rd Edition
Introducing the third edition of our classic industry guide: The Little Black Book of Electronic Surveillance. It's not so "little" anymore. LBBES has doubled in size since the first edition. The book is packed with information on the industry's leading vendors, products and services, and updated to reflect recent changes: vendor acquisitions, partnerships and expansions into … [Read more...]
SSI Pacific: Riding the Wave of Multi-Play Surveillance
C5IS reviews Australia’s SSI Pacific, a provider of turnkey lawful intercept solutions, data retention and analytics, cybersecurity, and real-time OSINT. There was a time when specialist practitioners dominated the surveillance marketplace. A company might offer lawful intercept solutions, but not warrant management; or strictly mobile location; or analytics and … [Read more...]