• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

How Private Cyber Contractors Dominate U.S. Intelligence

Outside the closed world of the U.S. Intelligence Community, private cyber contractors get mixed reviews. Mention the word "contractor" and the public siezes on the image of Edward Snowden, either as heroic whistle blower or betrayer of national trust. Beyond that, there is a general consensus that contractors, even when attaining top security clearance, work in a strictly … [Read more...]

Antiquated Box: Endpoint Attacks Flank Gemalto Ethernet Encryptor

The ability to hack into ethernet fiber cables via evanescent couplers has been a proven interception capability for 10 years at least. In response, the Gemalto Ethernet Encryptor product line offers end-to-end encryption that thwarts a coupler from hacking ethernet in mid-stream. One minor caveat for potential buyers, which often include financial instituions and government … [Read more...]

Criminal Profiling the Terrorist – Is Radical Islam a Psychosis?

    Today, C5IS departs from our usual realm of tech analysis to examine the psychological characteristics behind terrorism. Among our chief tenets: that individuals who commit terrorism in the name of Radical Islam are the psychological echo of paranoid schizophrenics. The two types are closely similar: lone wolves who feel persecuted, want revenge against … [Read more...]

Trovicor – Masters of End-to-End Lawful Intercept

Any time "Jersey" crops up in our location-tracing, we can say with certainty that the visitor is Trovicor, island king of lawful intercept and intelligence solutions that span that span the full gamut of requirements. Trovicor's footprint is a mile wide in the ISS marketplace, testimony to the company's prominence as one the oldest, best-established and most reliable providers … [Read more...]

Penetrating the Hype Over 5G IoT Hacking – and 5G Itself

The audience looked puzzled when Telecom Italia (TI) CTO Giovanni Ferigo veered from his talk on 5G progress into a revelation on his "personal nightmare" - 5G IoT hacking. Press and show came to Mobile World Congress to hear market leaders TI beat the drum the greatest innovation yet in mobility. They were geared up for marketing hooplah. Ferigo delivered on that count, to be … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login