• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Tracking Terrorists’ Favorite Satellite Network – Thuraya

Another day passes with another terrorist attack, as like as not orchestrated on the ground via Thuraya, long favored by Al-Qaeda and now by ISIS as the preferred mode of secure satellite communications -- but trackable to an extent thanks to the work of companies such as Rheinmetall Defence, Ability, Delma and PKI. Given the many complications, doing so is no simple … [Read more...]

Gita Tech For Multi-Purpose Military SATCOM Interception

With tactical SATCOM interception, users often find themselves in a quandary. Should they adapt existing strategic systems for tactical needs? Or are tactical interception systems specifically designed for commercial SATCOM services the better option? And if so, what is best: a family of single-purpose products, each of which monitors a specific commercial SATCOM service, or a … [Read more...]

Long Engagement: Social Media Monitoring and GEOINT

With a user count well past the 1.0 billion mark, social media might seem the fastest growing communications vehicle on record, but hand-in-hand with this explosive growth has come another important “follower” nearly as big -- if far quieter -- the Social Media Monitoring system. Now as universal as social media itself, SMMS has evolved as a major component of OSINT relied on … [Read more...]

SciEngines: Terrorist Coronary Failure By Custom Hardware Attack

C5IS reviews SciEngines, a provider of FPGA-based cryptanalytic devices for custom hardware attack by military and government intelligence against encrypted terrorist and criminal communications. Off in some dusty corner of the ISIS caliphate, skilled cryptologists run an online college for initiates of the Islamic State on ways to conceal communications via encryption and … [Read more...]

Raytheon Visual Analytics: Opting Out of War Games

Leave a Comment

C5IS reviews Raytheon’s venture into visual analytics and asks: Why did Raytheon and the Pentagon pass on embracing visualization for warfighter intel and stick with the status quo -- the beleaguered Distributed Common Ground System (DCGS) so disliked by Special Forces and Marines? With just 9,800 U.S. troops left in Afghanistan on the tail end of America’s longest-running … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login