• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

3.27.2015 -Top Surveillance News That Didn’t Make the Cut

Leave a Comment

Once again C5IS brings you top surveillance news relevant to the field but overlooked by media. Our picks this week: Images That Fool Machine Learning. So much for trying to wed artificial intelligence and video surveillance. Researchers at Cornell University and the University of Wyoming Evolving AI Laboratory "have created images that look to humans like white noise or … [Read more...]

Phonexia Biometrics: Under the Watchful Eye of Russia

Leave a Comment

When ISS World-Europe convenes in Prague this June, one of the many companies presenting will be the Czech Republic’s own Phonexia, a provider of voice biometrics and speech analytics. Phonexia, a respected global player, will doubtless shine. But given current regional tensions, the idea of holding a surveillance tech event in Eastern Europe might appear daft to some. More … [Read more...]

Trovicor: The Black Panther of Surveillance

1 Comment

Of all the symbols in the surveillance industry, few resonate like the black panther of Trovicor. Pound for pound scarcely larger than a man, the panther is a silent stalker that strikes with speed, cunning and astounding strength. Size is irrelevant when counted against the assets of intelligence, stealth and – where prey are cornered -- jaws as powerful as a … [Read more...]

Is the Clock Really Ticking on NSA Mass Data Collection?

Leave a Comment

When the U.S. House of Representatives overwhelmingly passed the USA Freedom Act (H.R. 3361) last summer, the future looked grim for the NSA’s mass data collection program. The bill would have gutted Section 215 of the Patriot Act, placing severe restrictions on the terms by which government agencies can use the law to collect evidence. But in the months following the proposed … [Read more...]

Cyberattacks: The Need for Mandatory Cybersecurity

Leave a Comment

Defense Advanced Research Projects Agency (DARPA) chief Arati Prabhakar foresees a day when automated systems will “reason” about IT vulnerabilities subject to cyberattacks, then create patches and deploy them in real time. That future can’t arrive soon enough for large enterprises, which are both victim and cause of the current cyberattack wildfire. Why hold the enterprise … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login