• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Netronome – The Power Behind Blue Coat and SS8

  C5IS reviews Netronome, a provider of advanced software and hardware solutions for lawful intercept and SSL decryption. One of the common secrets of the ISS industry is that the technical geniuses behind ISS innovation often act as silent partners and suppliers for  the big name brand” in surveillance. Such is the case with California-based Netronome,  which for … [Read more...]

Contego Solutions: Clean Slate or “Advanced German Technology” Redux?

  When we came across Contego Solutions of Dubai UAE, we were overcome by déjà vu, but couldn’t think why. Contego is a provider of “digital forensics” solutions for mobile, audio, PC and video, that may be used for either cyber or investigative purposes. Clientele include ISS players such as PLATH Group Nexa Technologies, as well as enterprise customers. Contego … [Read more...]

Equipment Interference: Ticking Time Bomb of UK’s Investigatory Powers Act

Since passage of the UK's Investigatory Powers Act by Parliament, most attention has focused on the clause requiring ISPs to retain all customer Internet data records for 12 months and allowing LEAs to access the metadata without a warrant. But tucked away in the Parliament's law is a provision far more likely to arouse the ire of device and network hardware manufacturers - … [Read more...]

Telesoft Data Retention Probe Fingerprints Targets on IPv4 Mobile Nets

A new Telesoft Data Retention Probe that easily manhandles the challenges of monitoring targets on IPv4 mobile networks is now hitting the marketplace. Telesoft’s breakthrough is timely on two counts: public policy and technology. The United Kingdom’s recently enacted Investigatory Powers Bill mandates that all service providers offering Internet connectivity maintain IP Data … [Read more...]

How Thales PNij Leaves France Vulnerable to Terrorism

Few nations outside the Middle East war zones have suffered more horrific terrorist attacks as France. The two worst incidents, in Paris Nov. 13, 2015 and Nice July 14, 2016, followed France’s deployment of a system designed to prevent such attacks - Thales PNij (Plateforme Nationale des Interceptions Judiciaires). According to French law enforcement officers the PNij is so … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2023 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login