• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Darktrace – What AI Cyber Defense Portends for Malware’s Future

Inspired by MI5, Darktrace Antigena defensive cyber learns and corrects system weaknesses via AI - also the perfect tool for malware. One of the more alarming outcomes of the black hat arts is the evolution of cyber breaches that use cognitive computing techniques to “learn” about a potential victim’s network or personal interests and to make modifications that will leverage … [Read more...]

Flowmon Networks: Application-Aware Flow Monitoring at 100G

Until splitting into two companies in 2015 – Flowmon Networks and Netcope Technologies – INVEA-TECH was for nearly a decade recognized as a leader in packet flow monitoring and Field Programmable Gate Array (FPGA) solutions that helped law enforcement and intelligence agencies track targets on high-speed networks. With the rapid growth of each marketplace, whether for … [Read more...]

Netcope Technologies – Helping Investigators “Cope” with 100G Ethernet

C5IS reviews Netcope, a maker of FPGA interface platforms for wire speed packet capture and filtering of 100G networks. Before getting in line to purchase ISS solutions capable of intercepting traffic on 100G Ethernet networks, it is wise to begin with a sanity check. Just how prevalent are 100G networks? Is the trend real or merely hype? The short answer is that 100G is … [Read more...]

Dated Hacking Team Malware Still Has Legs – With Criminal Hackers

Just when we thought that the woes of The Hacking Team might be letting up, word comes that an older version of the Italian company’s malware has been used in attacks against Western targets including the UK Foreign and Commonwealth Office. The news surfaced in a new white paper issued by F-Secure, an IT security vendor based in Finland. A group dubbed “Callisto” has been … [Read more...]

Linkurious: Visualization Minus Developers & Data Scientists

Make way Palantir and IBM - Linkurious makes access to graph database visualization a snap. No developers or data scientists required. More than a decade after the official “dawn” of Big Data analytics, there is general agreement that raw data findings alone are but the launchpad to the true end game of analytics: visualization that simplifies understanding of trends, coming … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login