Investigation

🔐 Mystery Surveillance Software

What is "CSC Software, Five Cast"?

What We Found

While reviewing Metro Nashville procurement documents, we encountered a reference to "CSC Software, Five Cast" described as "Communication and situational awareness software enabling coordination across multiple safety agencies."

The Problem

After extensive research, we cannot find any software product that matches this exact description. What we can confirm raises significant questions about how surveillance technology is being described—or obscured—in official Metro documents.

Our Best Assessment

Based on available evidence, we believe this refers to Fivecast (stylized as one word, not "Five Cast"), an Australian company that provides open-source intelligence (OSINT) surveillance software.

However, the description in the Metro document appears to significantly misrepresent what this software actually does. "Communication and situational awareness software" suggests something benign—perhaps a dispatch system or inter-agency messaging platform.

What Fivecast actually provides is mass surveillance infrastructure: automated collection and analysis of publicly available data to build profiles, identify networks, and monitor online activity.

"Delivers unmatched access to multi-media data across a diverse range of platforms on the Surface, Deep and Dark Web, enabling analysts to securely undertake persistent, targeted collection of near real-time data customizable to their specific requirements."

— Fivecast's own website

If This Is Fivecast, Here's What It Does

Fivecast is not "communication" software. According to the company's own marketing materials and deployment documentation, it's an AI-powered open-source intelligence (OSINT) platform originally developed with Five Eyes intelligence agencies. This isn't consumer-grade social media monitoring—it's military-intelligence infrastructure.

🌐 Data Sources
Fivecast aggregates data across multiple layers of the internet:
  • Surface Web: Social media platforms, forums, blogs, news sites
  • Deep Web: Private databases, gated communities, archived content
  • Dark Web: Tor networks, encrypted forums, marketplaces
They claim access to 8+ billion people records through aggregated third-party databases—more than Earth's population, including historical/deceased profiles.
🧠 AI Analysis Capabilities
Fivecast's machine learning models perform:
  • Sentiment Analysis: Classifies emotional tone of content
  • Emotion Detection: Identifies anger, fear, joy, and other emotional states
  • Topic Clustering: Groups related content and conversations
  • "Radicalization" Detection: Flags content matching predefined threat patterns
  • Predictive Risk Scoring: Assigns automated threat scores to individuals
🔗 Network Mapping
The platform builds relationship graphs showing:
  • Social connections across platforms
  • Communication patterns and frequency
  • Shared interests, locations, and activities
  • Second and third-degree connections
This creates a comprehensive "digital footprint" for targeted individuals and their entire social networks.

LeoSight: Fusus by Another Name

The MOU also includes LeoSight—a "Unified Command" platform explicitly named in Exhibit A. LeoSight was founded in March 2025 by the former Chief Revenue Officer of Fusus, precisely when Nashville was killing the Fusus contract. This isn't speculation—it's documented in corporate records.

🔗 Integrated Systems
LeoSight integrates the same surveillance technologies as Fusus:
  • CAD — Computer-Aided Dispatch: Real-time tracking of all 911 calls and police responses
  • AVL — Automatic Vehicle Location: GPS tracking of all patrol vehicles
  • LPR — License Plate Recognition: Automated scanning and database matching of vehicle plates
  • RMS — Records Management System: Access to arrest records, incident reports, field contacts
  • VMS — Video Management System: Integration of public and private camera feeds
  • DFR — Drone as First Responder: Automated drone deployment for surveillance
📅 The Timeline
  • 2019-2024: Fusus's CRO helps build the surveillance platform
  • 2022: MNPD contracts with Fusus without council approval
  • 2022-2025: Nashville community fights back through four council votes
  • March 2025: Former CRO founds LeoSight—precisely when Nashville is killing Fusus
  • April 2025: O'Connell abandons Fusus, says guardrails aren't enough
  • November 2025: LeoSight appears in Downtown Partnership MOU
Same Marketing, Different Name

Fusus pitched its platform as enabling "shared situational awareness." LeoSight's MOU description? "Public Safety software allowing all partners to have situational awareness." The language is nearly identical because the technology is the same.

Who Else Uses This?

Fivecast isn't theoretical. Federal contract data shows exactly how government agencies deploy this technology:

U.S. Customs and Border Protection $3.4 Million

CBP uses Fivecast to analyze travelers' social media, detecting "sentiment and emotion" in posts. The system flags individuals for additional scrutiny based on AI interpretation of their online activity—before they've entered the country.

Immigration and Customs Enforcement ~$4.2 Million

ICE uses Fivecast for immigration investigations. The platform's network mapping identifies family members, associates, employers, and community connections—building comprehensive profiles for enforcement actions.

Defense Counterintelligence and Security Agency ~$9.1 Million

DCSA monitors 2+ million federal employees and contractors with security clearances. Fivecast provides continuous evaluation through social media surveillance—flagging "concerning" online behavior.

No Data Sharing Restrictions

The MOU contains no provisions restricting data sharing with federal agencies. Once the Downtown Partnership operates Fivecast, there's no legal barrier to sharing intelligence with ICE, CBP, or other federal entities.

Capability Breakdown

😠 Emotion Detection

AI classifies emotional states in posts—anger, fear, sadness, joy. CBP specifically uses this to flag "concerning" emotional patterns in travelers. The accuracy of these classifications is unverified and unauditable.

⚠️ Automated Risk Scoring

Individuals receive automated "threat scores" based on their online activity. These scores can trigger surveillance escalation without human review—and without the subject's knowledge.

🕸️ Social Graph Analysis

Maps relationships across platforms to identify associates, family members, and connections. Targeting one person means surveilling their entire social network.

📍 Location Tracking

Aggregates location data from geotagged posts, check-ins, and metadata. Can reconstruct movement patterns and identify regular locations like home, work, and social venues.

🔮 "Radicalization" Detection

AI flags content matching "radicalization" patterns—undefined criteria that could include political organizing, protest participation, or criticism of authorities.

⏰ Historical Analysis

Searches years of archived content. Deleted posts, old accounts, and long-forgotten comments can all be retrieved and analyzed.

The Data Pipeline

Understanding how data flows through this system reveals why the privatized structure is so dangerous:

Surveillance Data Flow
Your Social Media
→
Public posts, comments, connections scraped
Fivecast Database
→
Aggregated with 8B+ other profiles
AI Analysis
→
Emotion, sentiment, risk scoring applied
Downtown Partnership
→
Private nonprofit with zero public accountability
???
No restrictions on downstream sharing

The critical vulnerability is at step 4. Once data reaches the Downtown Partnership, Metro's surveillance ordinances don't apply. There's no public records access, no Council oversight, and no legal barrier to sharing with federal agencies like ICE.

"The MOU requires Metro 'shall not apply for any funds under this program'—permanently ceding control to an entity outside democratic accountability."

Physical Surveillance Infrastructure

Fivecast is just one component. The MOU also includes physical surveillance equipment:

📹 Camera Networks
  • Rapid-Deploy Cameras: Mobile units that can be positioned anywhere in the district
  • Centralized Video Walls: Command displays integrating public and private camera feeds
  • Real-Time Fusion Centers: "Tech Centers" correlating multiple surveillance streams
This mirrors the Fusus architecture Nashville rejected—but operated by a private entity. LeoSight provides the integration layer, correlating all these feeds into a single command interface.
🔊 Audio Surveillance
The MOU includes "noise surveillance" technology—audio monitoring systems deployed in public spaces. Combined with Fivecast's social media monitoring, this creates surveillance coverage of both online and physical speech.
🚐 Mobile Command Infrastructure
  • Tactical Support Posts: Mobile command vehicles "used by MNPD SWAT"
  • Armored Vehicles: Military-style tactical vehicles
  • Deployable Command Centers: Surveillance hubs that can be positioned for events or ongoing monitoring
Note: These would be purchased by the Downtown Partnership, not Metro—bypassing public procurement.

Why Private Control Matters

The technical capabilities are concerning. The governance structure makes them dangerous.

When surveillance technology is operated by government agencies, there are at least some constraints: FOIA requests can reveal what data is collected, civil rights laws provide some protections, elected officials have oversight authority.

Private entities like the Downtown Partnership operate outside these constraints:

This is why the structure matters as much as the technology. Military-grade surveillance tools plus zero accountability equals unchecked power.

What We Don't Know

Critical questions remain unanswered. We're publishing what we've found so far, but transparency requires acknowledging the gaps in our knowledge.

❓ Open Questions
  • Is this actually Fivecast? We're making an educated guess based on the name similarity and Nashville's documented interest in surveillance technology.
  • What is "CSC Software"? We cannot identify any software product by this name in the public safety sector.
  • Which agencies have access? The description mentions "multiple safety agencies" but doesn't specify which ones.
  • What's the scope of deployment? Are they monitoring social media? Dark web? Specific populations?
  • What are the costs? Fivecast ONYX is typically an enterprise-level product with substantial licensing fees. No pricing appears in the MOU.
  • What oversight exists? Who approves searches? What's the data retention policy?
Why Vague Descriptions Are a Red Flag

When government contracts describe surveillance technology as "communication and situational awareness software," it suggests either: incompetence (contract writers don't understand what they're purchasing), evasion (deliberately vague language to avoid scrutiny), or normalizing (making surveillance sound routine and unremarkable). None of these options are acceptable when deploying technology that can monitor residents' online activity, build comprehensive digital profiles, track social networks, and access dark web platforms.

Methodology Note

This report is based on publicly available information about Fivecast products, the company's own marketing materials, government procurement databases, and news coverage of similar deployments in other cities.

We cannot definitively confirm that "CSC Software, Five Cast" refers to Fivecast ONYX without access to the actual contract documents. The MOU showed only a fragment describing the software.

We encourage readers to file public records requests for the full contract documentation and to contact Council members with questions about this procurement.

Technical Opposition Matters

Council members need to hear from people who understand these systems. Your technical expertise can cut through marketing claims and explain what this infrastructure actually does.

Take Action Now →