• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Can Wintego CatchApp Really Crack WhatsApp E2E Encryption?

C5IS reviews Wintego CatchApp, a solution that leverages a little-known vulnerability in WhatsApp's Signal protocol implementation. Wintego created an uproar in late 2016 when it was revealed that a product brochure made the claim that Wintego’s CatchApp solution offers the “unprecedented capability” to crack end-to-end encryption (E2EE) used by the popular messaging … [Read more...]

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal is but one component of Magal’s broad portfolio of physical and cybersecurity solutions sold to governments and critical infrastructure enterprises. But tucked away inside its giant parent company, CyberSeal is a hidden gem of special … [Read more...]

Presidential Cybersecurity Order – Trumped by WannaCrypt Malware

On May 12, 2017, the Administration issued a long-awaited Executive Order on Cybersecurity, outlining the President’s strategy - and mandate - to improve security for federal agencies, critical infrastructure industries and other enterprises. Depending on your interpretation, it was either perfect timing for President Donald Trump, cyber-wise - or else Friday the 13th struck a … [Read more...]

Best Mobile Hacking – Gemalto SIM Cards, Diameter and 5G IoT

This week C5IS takes you on a tour - past, present and future - of the best mobile hacking. Coming up in a series of three analyses: the NSA/GCHQ end point, encryption bypass attack on Gemalto SIM Cards; recent revelations that vulnerability of phones using SS7 and SIGTRAN persists as the industry migrates to Diameter protocol; plus the ways hackers plan to attack Internet of … [Read more...]

Sovereign Intelligence and Sixgill: Applying AI to Dark Web Analytics

C5IS explores the merits of Sovereign Intelligence and Sixgill, pioneers in deploying deep learning and AI for Dark Web Analytics. With the Deep Web and Dark Web comprising some 90 percent of the Internet, the trick of finding the right data to monitor and analyze for "actionable intelligence" is half the challenge. Equally daunting: automating the process so that alerts are … [Read more...]

Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

IMSI Catchers by Pro-Solve – UK’s Mini-Harris Corporation

With global market giants such as Harris Corporation and Rayzone to contend with, and tough competition on the home front from specialty … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login