• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

FireEye Mandiant: FBI’s Secret Malware Friend?

When reports emerge about the U.S. Federal Bureau of Investigations’ offensive cyber capabilities (creating a fake newspaper website to catch a Seattle bomber and similar phishing escapades) the question always arises: Where does this talent arise -- in-house of via subcontractor? -- and the short answer is FireEye Mandiant. Before we delve into how Mandiant works with the … [Read more...]

The Hacking Team — On the Comeback Trail?

A complementary pass sent to law enforcement agents for ISS World Europe [June 7 - 9 in Prague] promotes, among other things, sessions titled ‘Zero In On Your Target: Advanced Social Engineering Techniques” and “New Cutting-Edge Surveillance Tools” hosted by The Hacking Team. It’s a sign that Italy’s premier provider of intrusive or ethical malware solutions is making a strong … [Read more...]

FBI Network Investigative Techniques: Gray Realm of Legal Blackhat

Recent reports on FBI Network Investigative Techniques (NITs) skirt two key issues: What is the legal authority for the legal Blackhat activities, and once a warrant is obtained, what are the specific technologies involved -- just malware or something more? As it turns out, both the legal and technical aspects of NITs constitute a gray realm that blurs the black and white … [Read more...]

Reborn in the U.S.A: The Long, Winding Story of Gamma Group

  Gamma Group and The Hacking Team are without question the two most prestigious providers of network injection solutions, surveillance industry jargon for malware used to take over targets’ communications devices. Yet while their products are similar in many ways, the companies and their histories are completely unlike. One is an open book -- the other a dark hole on … [Read more...]

Cisco: Encryption Backdoors and the Art of Public Posturing

In a joint letter to the White House, Cisco Systems and other tech companies including Facebook and Google earlier this year joined privacy advocates in defending the right to use strong encryption, and opposing mandatory “backdoors” that would permit government access to customers’ encrypted data. But hold on. Cisco and other network equipment vendors by law already provide … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login