C5IS reviews Australia’s SSI Pacific, a provider of turnkey lawful intercept solutions, data retention and analytics, cybersecurity, and real-time OSINT. There was a time when specialist practitioners dominated the surveillance marketplace. A company might offer lawful intercept solutions, but not warrant management; or strictly mobile location; or analytics and … [Read more...]
China’s Sinovatio: Surveillance from the Heartland of Hacking
Sinovatio, based in Shenzhen, China, is an established maker of surveillance products: lawful intercept devices, deep packet inspection, decryption, mobile location, forensics, social media OSINT harvesting and Big Data analytics. But is a comprehensive portfolio enough to overcome the poisonous environment surrounding Chinese IT following the recent spate of cyberattacks? … [Read more...]
Subsentio Buys Neustar’s Lawful Intercept Business
Subsentio, a trusted third party provider (TTP) of CALEA solutions to U.S. communications service providers, has purchased the lawful intercept and warrant management businesses of Neustar. Key elements of the agreement: Communications service providers previously served by Neustar’s Legal Compliance Services (LCS) division are now under management by Subsentio. With … [Read more...]
Surveillance Vendor Reviews: C5IS Nears the Century Mark
In advance of our one-year anniversary, C5IS observes an important milestone: publication of nearly 100 surveillance vendor reviews spanning market leaders -- and a few also-rans -- in the global electronic surveillance industry. Our surveillance vendor reviews cover companies that provide one or more of the following products and services: trusted third party services for … [Read more...]
Incognito Broadband Command Center: Not a Replacement for DPI
Canada’s Incognito Software is well regarded as a provider of OSS/BSS support for the communications service provider (CSP) industry, with a heavy emphasis on cable companies. But Incognito touts other skills, as well: the ability to collect customer IP data using a method the company claims to be more effective than Deep Packet Inspection (DPI). It's a bold claim, and not … [Read more...]