• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough analytics. In tandem with the uptick in lone wolf terrorist attacks across Europe, the Middle East and Central Asia, demand for ISS solutions has soared, benefitting the finances of private firms and boosting stock prices of those … [Read more...]

FPGAs: Understanding the Stars of High-Speed Data Capture

  Field-programmable gate arrays (FPGAs) are circuit boards that can be programmed by the user for a variety of applications including lawful intercept and government surveillance. FPGAs are important to ISS because they accelerate the capture of “unstructured” data, i.e., any type that does not follow a predefined data model, from voice to SMS, video, HTML web … [Read more...]

Verint Intelligence Fusion Center – Great Thing, or Same Thing?

Verint made a huge push on its Intelligence Fusion Center in 2016, hawking the Big Data Analytics platform for ISS solution at trade shows ‘round the world and in a series of online videos. Intelligence Fusion Center is a fine solution, not a bad thing, at all. The problem is it’s the same thing - nearly identical to any number of other solutions competing in the same … [Read more...]

Sqrll Cyber Defense: Begin With the Right Questions

Leave a Comment

Interviews with Sqrll co-founder Ely Khan invariably mention his background as Director of Cybersecurity at the White House. Accumulo-based cybersecurity leader Sqrll launched in 2012. The White House suffered a notorious cyberattack in 2014. If White House data wasn’t protected by a system with the proven quals of Sqrll, why not? Welcome to the contrary worlds of top … [Read more...]

Trovicor: The Black Panther of Surveillance

1 Comment

Of all the symbols in the surveillance industry, few resonate like the black panther of Trovicor. Pound for pound scarcely larger than a man, the panther is a silent stalker that strikes with speed, cunning and astounding strength. Size is irrelevant when counted against the assets of intelligence, stealth and – where prey are cornered -- jaws as powerful as a … [Read more...]

Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Presidential Cybersecurity Order – Trumped by WannaCrypt Malware

On May 12, 2017, the Administration issued a long-awaited Executive Order on Cybersecurity, outlining the President’s strategy - and mandate … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login