• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Social Media Monitoring: The New SIGINT

Last summer we reviewed leading social media monitoring tools used by law enforcement to track criminal elements and terrorists. At the time, the general consensus was that these apps -- while fine as far as open source intelligence (OSINT) goes -- took a back seat to more covert forms of surveillance. Many questioned whether monitoring “the Twitter firehose” held any value at … [Read more...]

Next Week: Social Media Monitoring, The New Jihad + Germany’s Utimaco

We're forever hearing about ISIS' use of social media to recruit Western malcontents and promote their uniquely twisted view of Islam, but what about the flip side -- the use of social media monitoring to keep tabs on terrorists, track their whereabouts, show their faces, and build connections of their followers, friends and bosses (including those who'd rather we … [Read more...]

To Lisa Monaco: Give Your New Cyber Agency TecSec Encryption

The news from Washington this week has encryption experts at TecSec and similar companies shaking their heads. Homeland Security and Counter-Terrorism advisor Lisa Monaco debuted a new agency -- The Cyber Threat Intelligence Integration Center -- to address the rising “scale, severity and impact” of cyberattacks. But without proper focus on much-needed encryption to stop … [Read more...]

Red Herring: Law Enforcement’s “Going Dark” Spiel

Once again the FBI is raising the alarm on Capitol Hill, citing surveillance laws so outdated that law enforcement is “Going Dark” in the fight against crime and terrorism. Officials paint a world where evildoers leverage encryption and P2P services to get away without a trace. Confined by laws designed in bygone pre-Internet days, frustrated agents watch cases go cold. It’s … [Read more...]

BEA: Mystery Surveillance Company of Torino

Leave a Comment

For a leading player in so many facets of electronic surveillance, BEA certainly knows how to cover its tracks. BEA offers a range devices and technologies for RF monitoring, GSM and GPS mobile location tracking, store & forward interception, microrecorders, keyboard monitors, radio jammers and even lawful intercept. The only hitch: You might need this equipment to find the … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login