• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough analytics. In tandem with the uptick in lone wolf terrorist attacks across Europe, the Middle East and Central Asia, demand for ISS solutions has soared, benefitting the finances of private firms and boosting stock prices of those … [Read more...]

Presidential Cybersecurity Order – Trumped by WannaCrypt Malware

On May 12, 2017, the Administration issued a long-awaited Executive Order on Cybersecurity, outlining the President’s strategy - and mandate - to improve security for federal agencies, critical infrastructure industries and other enterprises. Depending on your interpretation, it was either perfect timing for President Donald Trump, cyber-wise - or else Friday the 13th struck a … [Read more...]

Will UK Anti-Encryption Rules Backfire on Lawmakers?

Last week’s leak of draft regulations for implementing the UK’s Investigatory Powers Act (IPA)  shed new light on two of the more controversial aspects of the proposed UK anti-encryption rules: mandatory disabling of encrypted services and “equipment interference.” The rules require service providers to “remove any electronic protection applied by or on behalf of the … [Read more...]

The Fall of Arab Spring – Military Rule in the Middle East

The Fall of Arab Spring in Egypt illustrates the enduring allure of military government in the region: stability and protection of the people. During the recent visit of Egyptian President Abdel Fattah el-Sisi to the U.S., liberal media exploded with negative coverage of President Trump’s meeting with “the worst military dictator in Egyptian history.” El-Sisi was generally … [Read more...]

Criminal Profiling the Terrorist – Is Radical Islam a Psychosis?

    Today, C5IS departs from our usual realm of tech analysis to examine the psychological characteristics behind terrorism. Among our chief tenets: that individuals who commit terrorism in the name of Radical Islam are the psychological echo of paranoid schizophrenics. The two types are closely similar: lone wolves who feel persecuted, want revenge against … [Read more...]

Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Islamic State Terrorism – Has the Time Come to Respond with Tactical Nukes?

Warnings of Islamic State interest in "dirty bombs" - radiological dispersal devices (RDDs) that spread radiation over a target area - … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login