While Palantir and the U.S. Army continue their running argument over whose platform is better -- Gotham or DCGS-A -- “reality” courtesy of the U.S. Department of Defense may have intervened with an alternative that renders the sniping irrelevant: military grade X6 Smartglasses that deliver real time tactical data directly to troops on the ground, without reliance on hand-held … [Read more...]
Group 2000: Merging Facial Recognition with Classic ISS
If you wish to fathom how the surveillance discipline of facial recognition crosses over into the areas of ELINT, COMINT, SIGINT and OSINT, ask Group 2000 of The Netherlands. Since late 2015 the company has offered a 3D facial recognition system both standalone and in combination with products designed for conventional intelligence work. Group 2000’s LIMA Biometric Identity … [Read more...]
Thomson Reuters OSINT — With a Little Help From Their Friends
Best-known for its long history in wire service journalism and other media, Thomson Reuters has branched out in recent years to offer sophisticated OSINT search, analytics and visualization capabilities. The company’s portfolio of “Integrated Solutions” today helps law enforcement agencies (LEAs) scan millions of public records and apply complementary tools that quickly lead to … [Read more...]
EZchip: Accelerated Data Interception
C5IS reviews EZchip, a provider of ARM-based multicore processors that speed the capture of network data for DPI solutions. As networks move to ever higher speeds, law enforcement and government agencies find themselves in a contest to keep interception solutions up to par with carriers bent on hitting multi-gigabit rates. Into this race step companies like Israel’s EZchip … [Read more...]
NetFlow Versus Tor: Surveillance Winning That Fight
In NetFlow Versus Tor, the latest round of legitimate computer science vs. terrorists using the Onion Router, lab tests show it is now possible to deanonymize targets on the world’s most popular and infamous anonymous service. Tor enjoys legendary status as a service that encrypts network communications end-to-end, is completely impenetrable to surveillance and … [Read more...]