• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Islamic State Terrorism – Has the Time Come to Respond with Tactical Nukes?

Warnings of Islamic State interest in "dirty bombs" - radiological dispersal devices (RDDs) that spread radiation over a target area - surface periodically, but are generally overshadowed by the terrorist group's use of "lone wolf attacks" like the one in London this week. Despite its increased reliance on terrorists-behind-the-wheel and weapons no more sophisticated than a … [Read more...]

Mobile Hacking: SS7, SIGTRAN, Diameter Protocols Put Networks at Risk

A "new" U.S. government report finds that SS7, SIGTRAN, Diameter and other protocols put mobile and IP networks at risk to cyber attacks. Why didn't they notice the problem when first revealed in 2008? Call it the Revenge of the CLECs. When the communications industry underwent massive deregulation two decades past - e.g., in the U.S. Telecom Act of 1996 and similar laws in … [Read more...]

How NSA & GCHQ Hacked Gemalto SIM Card Keys By the Billions

  Non-malware endpoint attacks drove GCHQ's hack of Gemalto SIM card keys - and these invisible tools remain popular at the CIA and NSA to this day. It was the biggest hack of SIM card keys and mobile networks ever: The joint NSA/GCHQ breach of the Gemalto SIM card empire, cracking the security of billions of mobile phones and scores of mobile networks worldwide. … [Read more...]

Best Mobile Hacking – Gemalto SIM Cards, Diameter and 5G IoT

This week C5IS takes you on a tour - past, present and future - of the best mobile hacking. Coming up in a series of three analyses: the NSA/GCHQ end point, encryption bypass attack on Gemalto SIM Cards; recent revelations that vulnerability of phones using SS7 and SIGTRAN persists as the industry migrates to Diameter protocol; plus the ways hackers plan to attack Internet of … [Read more...]

Knowlesys KIS: China’s World Class OSINT Extraction Engine

When the Peoples Republic of China needs to monitor its citizens on social media or other OSINT sources, they don't have to look far - Knowlesys KIS (Knowlesys Intelligence System) is already on the case providing detailed insights that can be gleaned from any website, social media or news engine. The Peoples Liberation Army as well as local government bureaus in China also … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login