• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Future Analytics: X6 Smartglasses Powered by Ignite

While Palantir and the U.S. Army continue their running argument over whose platform is better -- Gotham or DCGS-A -- “reality” courtesy of the U.S. Department of Defense may have intervened with an alternative that renders the sniping irrelevant: military grade X6 Smartglasses that deliver real time tactical data directly to troops on the ground, without reliance on hand-held … [Read more...]

Group 2000: Merging Facial Recognition with Classic ISS

If you wish to fathom how the surveillance discipline of facial recognition crosses over into the areas of ELINT, COMINT, SIGINT and OSINT, ask Group 2000 of The Netherlands. Since late 2015 the company has offered a 3D facial recognition system both standalone and in combination with products designed for conventional intelligence work. Group 2000’s LIMA Biometric Identity … [Read more...]

Thomson Reuters OSINT — With a Little Help From Their Friends

Best-known for its long history in wire service journalism and other media, Thomson Reuters has branched out in recent years to offer sophisticated OSINT search, analytics and visualization capabilities. The company’s portfolio of “Integrated Solutions” today helps law enforcement agencies (LEAs) scan millions of public records and apply complementary tools that quickly lead to … [Read more...]

EZchip: Accelerated Data Interception

C5IS reviews EZchip, a provider of ARM-based multicore processors that speed the capture of network data for DPI solutions. As networks move to ever higher speeds, law enforcement and government agencies find themselves in a contest to keep interception solutions up to par with carriers bent on hitting multi-gigabit rates. Into this race step companies like Israel’s EZchip … [Read more...]

NetFlow Versus Tor: Surveillance Winning That Fight

  In NetFlow Versus Tor, the latest round of legitimate computer science vs. terrorists using the Onion Router, lab tests show it is now possible to deanonymize targets on the world’s most popular and infamous anonymous service. Tor enjoys legendary status as a service that encrypts network communications end-to-end, is completely impenetrable to surveillance and … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login