• Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login

C5IS

Did Vupen Really Go Away?

Nearing the one year anniversary of founder Chaouki Bekrar's decision to shut down Vupen and launch a new company, Zerodium, which allegedly buys but does not create its own Zero Days, we come across a curious leak: Vupen is in the process of developing -- and may have already completed -- an iOS Zero Day for its long time favorite client, the NSA. That was it: one line … [Read more...]

FBI/Apple Back Door Fracas — Much Ado About Nothing, or Zerodium?

C5IS weighs the odds that Zerodium deserves credit for hacking the San Bernardino terrorists’ iPhone. For months, liberal media have been aflame over the Apple/FBI battle over “back door” access to an iPhone that belonged to one of the San Bernardino terrorists responsible for murdering 14 individuals in a shooting spree. Apple CEO Tim Cook won the cover of TIME one week, … [Read more...]

FBI Network Investigative Techniques: Gray Realm of Legal Blackhat

Recent reports on FBI Network Investigative Techniques (NITs) skirt two key issues: What is the legal authority for the legal Blackhat activities, and once a warrant is obtained, what are the specific technologies involved -- just malware or something more? As it turns out, both the legal and technical aspects of NITs constitute a gray realm that blurs the black and white … [Read more...]

Rayzone InterApp for Wi-Fi Interception: Wintego Lookalike?

When the Rayzone InterApp Wi-Fi “cloud and app” interception product debuted at Paris Milipol in late November, it was hailed as a game-changing innovation in tactical mobile interception. InterApp can pull any data off a smartphone linked to a public Wi-Fi network, including a target’s email, texts, images, files, IMEI and MAC address -- and track & identify hundreds of … [Read more...]

Cisco: Encryption Backdoors and the Art of Public Posturing

In a joint letter to the White House, Cisco Systems and other tech companies including Facebook and Google earlier this year joined privacy advocates in defending the right to use strong encryption, and opposing mandatory “backdoors” that would permit government access to customers’ encrypted data. But hold on. Cisco and other network equipment vendors by law already provide … [Read more...]

« Previous Page
Next Page »

Recent Posts

  • CSRA GangNET Analytics for Law Enforcement
  • BrightPlanet Adds Tor Cracking to its Deep Web Repertoire
  • Three Years After Phineas Fisher, FinFisher Sprouts New Wings
  • In U.S., Subpoenas for Records Far Outnumber Wiretaps
  • Nokia 1357 ULIS – Big Iron Lawful Intercept Still Going Strong

Cyber

Three Years After Phineas Fisher, FinFisher Sprouts New Wings

  FinFisher is the best-recognized brand in the field of "ethical malware," with market leadership established for more than a … Continue Reading

Mobile Location

CyberSeal Double Play: IMSI Catchers and Detectors

In industry panels on mobile interception, it’s not often that the name CyberSeal surfaces. As a subsidiary of Israel’s Magal S3, CyberSeal … Continue Reading

Law Enforcement

In U.S., Subpoenas for Records Far Outnumber Wiretaps

One overlooked fact in the ongoing debate over surveillance is that the volume of warrants for records far outweighs the annual number of … Continue Reading

Analytics

CSRA GangNET Analytics for Law Enforcement

C5IS reviews CSRA GangNET. With gangs contributing to some 80 percent of violent crimes in the U.S., analytics solutions that can … Continue Reading

Military

BrightPlanet Adds Tor Cracking to its Deep Web Repertoire

Since it unceremoniously dumped its Twitter monitoring product BlueJay for law enforcement in 2016, BrightPlanet has remodeled itself as … Continue Reading

Viewpoint

Big Data & OSINT – TMI (Too Much Information)

  C5IS considers whether the difficulty in preempting lone wolf attacks stems from too much Big Data & OSINT - or not enough … Continue Reading

Copyright © 2025 · C5IS · Log in

MENU
  • Home
  • About C5IS
  • Analytics
  • Law Enforcement
  • Cyber
  • ISR
  • Mobile Location
  • Viewpoint
  • Join Now
    • Login