• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Speak Up: Voice Biometrics for Cybersecurity

Leave a Comment

Calling all voice biometrics providers. Emergency in progress at the nation's capital. Following the massive cyberattack on the U.S. government's Office of Personnel Management (OPM) data, the White House directed federal agencies to ratchet up security of computer systems. Among the emergency measures called for: priority threat detection systems and patching blatant … [Read more...]

S2T: How to Find ISIS on the Dark Web

Leave a Comment

C5IS reviews Singapore’s S2T, a specialist in Dark Web data and identity extraction. Sometimes military analysts tracking targets on social media get lucky. Tucked among the usual recruitment videos and propaganda, a member of ISIS tweets about his “command and control” capabilities and adds a photo. Analysts tag that quickly and within hours, as happened earlier this month, … [Read more...]

Cyberattacks: The Need for Mandatory Cybersecurity

Leave a Comment

Defense Advanced Research Projects Agency (DARPA) chief Arati Prabhakar foresees a day when automated systems will “reason” about IT vulnerabilities subject to cyberattacks, then create patches and deploy them in real time. That future can’t arrive soon enough for large enterprises, which are both victim and cause of the current cyberattack wildfire. Why hold the enterprise … [Read more...]

Can Narus Boost Symantec Commercial Sales?

When Symantec purchased Narus licenses and brought over key personnel from Boeing on January 12, 2015, the goal was to kick start enterprise sales. What better timing than in the wake of the SONY hack, right? But if Narus’ track record is any indication, it’s fair to ask if Symantec picked the right horse. The core expertise of Narus is and always has been deep packet … [Read more...]

Enterprise Differentiation: How’s That Working for SS8?

Ask any industry observer to name the top global players in lawful intercept (LI) and they’ll list the usual market giants: Verint, SS8, BAE Systems, Cellebrite, Septier and Utimaco. But ask what advantage one firm offers over another and you're apt to draw a blank stare. Market befuddlement on this point underscores an ongoing challenge to LI vendors: the need to … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login