• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

How Private Cyber Contractors Dominate U.S. Intelligence

Outside the closed world of the U.S. Intelligence Community, private cyber contractors get mixed reviews. Mention the word "contractor" and the public siezes on the image of Edward Snowden, either as heroic whistle blower or betrayer of national trust. Beyond that, there is a general consensus that contractors, even when attaining top security clearance, work in a strictly … [Read more...]

Penetrating the Hype Over 5G IoT Hacking – and 5G Itself

The audience looked puzzled when Telecom Italia (TI) CTO Giovanni Ferigo veered from his talk on 5G progress into a revelation on his "personal nightmare" - 5G IoT hacking. Press and show came to Mobile World Congress to hear market leaders TI beat the drum the greatest innovation yet in mobility. They were geared up for marketing hooplah. Ferigo delivered on that count, to be … [Read more...]

First Take on CIA Vault 7 Leak – Dated & Dull

With the usual fanfare, Wikileaks fugitive-in-chief Julian Assange yesterday released the group's latest treasure trove of stolen secret documents: the CIA Vault 7 leak, comprising some 8,700 CIA documents describing, and in some cases providing specific code for, Zero Days, malware, Trojans, proxies and other forms of intrusive programs designed by the US's top intelligence … [Read more...]

Show Con Artist Wolf Intelligence the “Back Door”

In an earlier post we observed how demand for intrusive surveillance solutions in second and third world countries has fueled the emergence of new competitors such as Wolf Intelligence in a bid to compete with longstanding players in the marketplace. At least in part, these next generation malware players are getting an assist from Wassenaar Arrangement-inspired clampdowns such … [Read more...]

Cybersecurity: U.S. Safe in 2017 – Or Ripe for Attacks?

As 2016 draws to a close, the state of cybersecurity in the United States remains a mixed bag. At the highest level - protection of government intelligence and infrastructure - some progress accrued toward adoption of standards to protect government agencies from network penetration. Elsewhere it is a grim picture. In the commercial realm, widespread "cyber insecurity" … [Read more...]

Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login