• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Is Harris StingRay Above the Law?

Leave a Comment

Is U.S. law enforcement's fondness of the Harris StingRay running wild? How often are such mobile location and interception devices, broadly known as "IMSI catchers," used, and under what (if any) legal authority? These are not idle questions. They form the basis of a written summons to a public hearing by Senators Patrick Leahy and Charles Grassley, respectively the … [Read more...]

FBI Seeks Hackers for Ethical Geek Squad

If you thought FBI Director James Comey was blowing hot air in his Brookings Institute attack on Apple/Google encryption last Fall, snap out of it: As a first step toward regaining the upper hand, the FBI seeks hackers interested in working for the agency as full-time special cyber agents. Applicants must be certified as "ethical hackers" and meet the FBI's usual requirements … [Read more...]

The BT and SS8 Connection: GCHQ Intrusion on Demand

At a recent U.S. conference BT and SS8 co-exhibited -- an unusual move that may well reveal their relationship in a unique area: malware. The sight of an outsized trade show banner featuring the logos of BT and SS8 against a London panorama gets one’s attention. It is virtually unheard of for a communications service provider to make a public display of its involvement with … [Read more...]

Vupen Security: The “Golden Boys” of Malware

In the broader landscape of intrusive technology, where players are damned by the media, privacy advocates and occasionally court systems, one company remains above the fray and invariably comes off looking squeaky clean: Vupen Security, the “golden boys" of malware used by government agencies to combat terrorism. They may also be the very best in the business. Based in … [Read more...]

Product Shootout: Lawful Malware

With the recent flap over iOS 8 and Android encryption, law enforcement and intelligence agencies may well wonder whether the “lawful malware” they’ve bought from the world’s top intrusive surveillance companies is about to become iJunk. How, they well may ask, can agents get past smart device encryption so strong that even manufacturers can’t help? Let the Right One … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login