• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Off the Rails: Wassenaar Arrangement on Export Controls for Surveillance

When the United Kingdom added “intrusive” surveillance technologies to the Wassenaar Arrangement list of “weapons” in late 2013, analysts speculated whether the handwriting was on the wall for some ISS vendors.  If adopted by member nations of the Arrangement, the rules would place stricter export licensing requirements not only on lawful malware but also on Zero Days, IMSI … [Read more...]

Zero Days vs. Malware — What’s the Difference?

In the popular mind, Zero Days and Malware – including Trojans, bots, bugs, rootkits, worms, spyware and other forms – are commonly lumped together under the general heading of viruses and more recently “cyber attacks.” While the latter term is appropriate as a generic catch-all, it is important for law enforcement to understand the difference between Zero Days and Malware as … [Read more...]

Blue Coat Systems Jousts With Hacking Team – And Misses

Security company Blue Coat Systems has won kudos from security press in recent days for spotting an Android-focused drive-by attack supposedly linked to Italian ethical malware company, The Hacking Team. The comparatively rare but highly lethal exploit of Android vulnerabilities was discovered at Blue Coat laboratory, and has the gift of infecting targeted mobile devices merely … [Read more...]

FireEye Mandiant: FBI’s Secret Malware Friend?

When reports emerge about the U.S. Federal Bureau of Investigations’ offensive cyber capabilities (creating a fake newspaper website to catch a Seattle bomber and similar phishing escapades) the question always arises: Where does this talent arise -- in-house of via subcontractor? -- and the short answer is FireEye Mandiant. Before we delve into how Mandiant works with the … [Read more...]

Internet of Things: The Map of Cyber Intrusion Vulnerability

Leave a Comment

The Web is alive with a new report by Evans Data Corporation showing rapid expansion of the Internet of Things (IoT). The report cites North America and the Asia Pacific region as being well ahead in IOT development projects, while EMEA (Europe, the Middle East and Africa) lag far behind due to lack of interest by developers. The implication: Those in the lead are … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login