• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

How Munk Outed NSO Group Yet Boosted Israel’s Malware King

For obvious reasons, most companies that specialize in "ethical malware" like to fly below the radar. Yet invariably, providers of intrusive systems are"outed" to the public sooner or later. Sometimes such exposure comes about purely by accident. Other times it results from the work of equally talented spyware experts working for the other side. We have seen examples of both in … [Read more...]

PLATH Group Expands from RF Monitoring to Cyber Security and Malware

As an acknowledged leader in military RF monitoring and analysis for more than 60 years, PLATH Group surprised many analysts in 2012 with its sudden dip into markets of primary interest to intelligence agencies and law enforcement: cyber security, forensics and malware. Was PLATH changing course? No, that is hardly the case. PLATH simply took advantage of an opportunity to … [Read more...]

Lawful Malware: Wolf Intelligence at the Door

When black hatter Phineas Fisher hacked The Hacking Team one year ago today it signalled a dark day for the renowned Italian Lawful Malware provider, revealing numerous company-confidential communications. The Hacking Team gradually recovered from the embarrassing incident and moved on. Then in April 2016 came word that Italian authorities had revoked The Hacking Team’s … [Read more...]

The Art and Science of DNS Hijacking

DNS hijacking is a form of cyber attack that involves using malware to infect a target’s device, gain access to its TCP/IP data, change these settings, then re-route the target to a fake duplicate of a bona fide site to either capture personal information or to track the target, or both. As a stock in trade not only of black hats but also ethical malware companies and law … [Read more...]

Is Apple iPhone’s Non-Volatile Memory the Hero of the FBI Hack?

Late Friday, word came that the FBI hacked another iPhone, adding to the roster of Apple devices it has successfully penetrated, and making mincemeat of the company’s legendary “strong encryption” at least a second time. Once again, as was the case with the famous San Bernardino terrorist’s iPhone, the U.S.’s leading federal law enforcement agency dropped its legal case … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login