• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Darktrace – What AI Cyber Defense Portends for Malware’s Future

Inspired by MI5, Darktrace Antigena defensive cyber learns and corrects system weaknesses via AI - also the perfect tool for malware. One of the more alarming outcomes of the black hat arts is the evolution of cyber breaches that use cognitive computing techniques to “learn” about a potential victim’s network or personal interests and to make modifications that will leverage … [Read more...]

Antiquated Box: Endpoint Attacks Flank Gemalto Ethernet Encryptor

The ability to hack into ethernet fiber cables via evanescent couplers has been a proven interception capability for 10 years at least. In response, the Gemalto Ethernet Encryptor product line offers end-to-end encryption that thwarts a coupler from hacking ethernet in mid-stream. One minor caveat for potential buyers, which often include financial instituions and government … [Read more...]

Blue Coat ProxySG Man-in-the-Middle Attack Still Beats SSL

Blue Coat ProxySG and Encrypted Tap remain a vital tool for complete visibility into encrypted traffic. Earlier this summer we reviewed Symantec's acquisition of Blue Coat, wherein long-struggling Symantec set out to improve its position in the cybersecurity market by absorbing a true giant -- and even making Blue Coat's CEO top dog. This was actually a smart move by … [Read more...]

Fifth Dimension: Deep Learning for True Pre-Crime Prevention

  When ISS World Americas 2016 opens, attendees have an opportunity to see a solution far beyond the usual run-of-the-mill malware, lawful intercept, packet capture and analytics ware on display: Fifth Dimension Deep Learning, a true pre-crime solution. This is the real thing -- not a Tom Cruise fantasy. Fifth Dimension has documented case studies of preventing … [Read more...]

Equation Group and the Real Dunces of the Zero Day Leak – Cisco and Juniper

By now the news of a purported hack at the NSA revealing a 2013 suite of Zero Days, and their link to the agency's Technical Analytics Organization (TAO) aka The Equation Group, has been analyzed ad infinitum. Most conclude -- prematurely, we believe -- that the leak of such a large cache of Zero Day vulnerabilities and exploits represents a huge embarrassment for the NSA, as … [Read more...]

Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login