Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting




Download 1.31 Mb.
NameOpen Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting
page1/68
A typeDocumentation
manual-guide.com > manual > Documentation
  1   2   3   4   5   6   7   8   9   ...   68

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract

January 2011




Country Studies



Public Places

Open Source Intelligence (OSINT) Link Directory

Targeting Tomorrow’s Terrorist Today (T4) through OSINT

by: Mr. E. Ben Benavides


CounterTerrorism



Infrastructure







Money Laundering



Gang Warfare


Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting.

(Alan D. Tompkins)




Weapon Smuggling



Human Smuggling





IEDs/EFPs


Table of Contents


Table of Contents 2

Comments 7

Open Source Intelligence (OSINT): What It Is and What It Isn’t 8

How To Use Open Source Intelligence 9

Key Army Access Sites 17

Must Haves References 18

Core Open Source Intelligence Documents & Guides 18

MI Officer Students 18

Global Incidents (interactive maps) 18

911 Final Report 20

Acquisition 20

Africa 21

Agriculture 22

Al Qaeda/Taliban 22

Aljazeera 22

Ammunition Plants and Depots 22

Area/International Codes 23

Armies Of The World 23

Aviation 23

Banking & Finance 24

Biometrics 24

BLOGS 25

Bridges 29

Center for Army Lessons Learned (CALL) 29

CAMS Around the World 29

Chemical/Biological/Radiological 30

China 31

Collective Intelligence 33

Computer Forensics 33

Counterintelligence And Espionage 33

Counterterrorism 33

Country Links/Studies 34

Crime & Justice 36

Cryptome (controversial site but has good information) 37

Critical Thinking 37

Cuba 39

Cultural Intelligence 40

Cyber & Information Warfare 41

Databases (Some Searchable) 42

Datamining Tools 45

Defense 45

Demographics & Religion (See Also Religion) 45

Denial and Deception 46

Department of Homeland Security 46

Department of Justice 47

Department of The Treasury 47

Directories of the World 47

Domain Name Servers 47

Drugs and Terrorism, Drug Cartels, And Criminal Organizations 48

Drug Smuggling Techniques/Methods 49

49

Mexican Drug Cartels Reach Into The U.S. 49

Drug cartels moving into the US 52

Mexico’s Drug Killings 53

Economic/Financial 54

E-Mail Lookups 54

Embassies of the World 55

Energy 55

Fauxtography a term used to describe instances of photojournalism (most coming from sources in the Middle East) in which photos have been either misrepresented by staging or other means, or manipulated with computer software. Source: http://mediamythbusters.com/index.php?title=Fauxtography 56

Federal Government 56

Gangs 56

Investigating Gang Homicides - A gang murder investigation requires your best detective skills to solve the crime and protect the witnesses. 57

http://www.policemag.com/Channel/Gangs/Articles/2010/10/Investigating-Gang-Homicides.aspx 57

Global Incidents Interactive Maps 58

Global Threats/Conflict 59

Google 59

Google Hacks And Others 60

Hamas 60

Hate Groups 60

Hezbollah 61

Homeland Security (See Also Department of Homeland Security) 61

Human Trafficking 62

HUMINT 62

Identity Theft 63

Image, Audio, Video Finder 63

IMINT 66

Information Dominance/Operations 66

Improvised Explosive Devices 67

Intelligence Disciplines 69

Intelligence Resources 69

International Intelligence Agencies 69

Internet Privacy and Security 70

Interpol 71

Iran/Iranian Military 71

Spy Photos Reveal 'Secret Launch Site' For Iran's Long-Range Missiles 72

http://www.timesonline.co.uk/tol/news/world/middle_east/article3724048.ece 72

Open Source Readings On Iran 72

http://uskowioniran.blogspot.com/2008/04/open-source-readings-on-iran.html 72

Iran’s Nuclear Sites http://www.nti.org/e_research/profiles_pdfs/Iran/iran_nuclear_sites.pdf 73

75

Iraninan Websites 76

Iraq 76

Islam/Islamic Websites 77

Islamic Heraldry 78

Islamic Terror Groups 78

Islamic Terorism http://en.wikipedia.org/wiki/Islamic_terrorism 78

Islamic Terrorr Groups (Pacific) 78

Islamic Terror Groups (USA) 78

Israel 78

Type link directly into URL box; clicking will not function http://www.nogw.com/ilweapons.html 81

Israel's Nuclear Facilities http://www.atomicarchive.com/Almanac/IsraeliFacilities_static.shtml 82

Language Training 84

Language/Web Site Translators Online (In Other Words) 84

Law Enforcement Support 84

Lessons Learned 85

Library Resources 85

Link Analysis Tools/Software 86

Liquefied Natural Gas Facilities 86

Major Commands (MACOMS) 86

Mapping and Related Material 88

Marine Corps 92

Medical Intelligence 92

Military Magazines 94

Military Operations in Urban Terrain (MOUT) 94

Militia Groups 95

Missile Threat 96

Muslim Brotherhood 96

National/International Most Wanted WEB Sites 97

Newspapers Around The World 97

Nongovernment Organizations (NGOs) 98

North Korea/Korean Military 98

Nuclear Reactors and Storage and Other Items of Interest 101

Nuclear Terrorism 103

Online Services 104

Open Source Center (formerly the Foreign Broadcast Information Service) 104

Open Source Intelligence Links 104

Open Source Intelligence Support 108

Open Source Intelligence Training 108

Smartphone Applications 110

Now here are two apps no self respecting terrorist or smuggler should be without; Compass and GpsCompassMap. My intentions are not of sounding heartless or to delve into the macabre but rather to point out the control criminals obtain with this technology. The following examples deal mostly with Google Earth and how it has been utilized by terrorists. With the newer applications one does not need the desktop or laptop computer but a simple smartphone with all the bells and whistles of a regular CPU. The other advantage is that you do not leave as large an electronic footprint. The smartphone GPS is turned on as needed to avoid detection. There are other ways also. 110

No doubt you have heard or read about Iraqi insurgents having Google Earth imagery of British military bases (http://news.nationalgeographic.com/news/2007/03/070312-google-censor.html). 110

There are indications that the gunmen who stormed Mumbai on November 26, and the people who trained them, were technically literate. The group appears to have used complex GPS systems to navigate their way to Mumbai by sea. They communicated by satellite phone, used mobile phones with several different SIM cards, and may have monitored events as the siege unfolded via handheld Blackberry web browsers (http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article5311241.ece). 110

Israel’s fears in regards to Google Earth’s satellite imaging tools have come to fruition. Members of Palestine’s al-Aqsa Martyrs Brigade, a group aligned with the Fatah political party, has admitted to using Google Earth for mapping targets for rocket strikes. Khaled Jaabari, the group’s commander, has said that they are using Google Earth images to check details against their own maps in order to find sensitive areas that are vulnerable to strikes (http://mashable.com/2007/10/25/missile-attacks-israel-google-earth/). 110

GpsCompassMap – Another great little app. Combine Google Earth, Compass and this one and you have some power at your disposal. This one could replace Compass altogether but the more apps to cross check for accuracy, the better. Criminals are sure to fall in love with this one. It is extremely accurate. Went home for lunch and adjusted all the settings for the round-trip. It tells how many satellites are available and the number it is taking advantage of. Speed (miles, kilometers, knots, etc) of vehicle is very accurate as I compared it to my speedometer. As you leave the departure point the screen adjusts to show the entire track and at the end shows distance traveled. Geo coordiantes which change according to location are a great feature. Superb tool for smugglers on the Southwest (Arizona/Mexico) Border but that’s as far as I go. 111

Open Source Software
111

Operations Security (OPSEC) 111

Organized Crime 111

Pakistan 112

Patriot Groups 112

People Finder 112

Propaganda (anti-U.S.) 113

Public Data On Sex Offenders 113

Public Intelligence 114

Rail 114

Reference/Research Tools 114

Religions (see Also Demographics & Religions) 115

Russia 116

Satellite and Space Views (real time) 117

Search Engines & Meta Search Engines 117

Secret Armies 119

Shopping Malls 119

Social Engineering 119

Social Engineering Fundamentals, Part I: Hacker Tactics 119

Social Engineering Fundamentals, Part II: Combat Strategies 119

Social Networking
120

Searching for Saddam. A five-part series on how the U.S. military used social networking to capture the Iraqi dictator. http://www.slate.com/id/2245228/ 120

Software For The Open Source Analyst includes Visualization Software 121

Sudan 124

Suicide Bombers 125

How to Handle Suspicious Mail 125

What constitutes a suspicious letter or parcel? Some typical characteristics which ought to trigger suspicion include letters or parcels that: 125

Taliban 127

Technology Theft/Transfer 127

Terrorism 127

Terrorism News (News on Terrorism continually updated from thousands of sources around the net.) http://www.topix.net/news/terrorism 131

Terrorism Funding 131

Terrorist Targets 131

Terrorist Websites 132

Tracerouting 133

Training Resources 134

Transportation 134

Tunnels 134

UAVs 134

Venezuela 135

Visualization Tools 136

Water Conflict 136

Weapons Around The Globe 136

Weapons of Mass Destruction 137

Weather 137

World News Network Sitemap (make this your first stop) 137

Miscellaneous 138


  1   2   3   4   5   6   7   8   9   ...   68

Share in:

Related:

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconNeed for an Open Source Intelligence Database

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconAbstract This document describes how to install and use Kannel, the...

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconA comparison of Proprietary and Open Source Software as a Way to...

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconWhy does genealogy need Open Source?

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconAis simulator open source

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconEnabling Business Through Open Source Technology

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconOpen source network mapping software

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconTop Five Open Source Packages for System Administrators

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconWindows-Based, Open Source, Assistive Technology

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconKoha an Open-Source Integrated Library System (ils)

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconWindows-Based, Open Source, Assistive and Communications Technology

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconWhen placing a TurboChef oven near an open heat source, strictly adhere to the following

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconManual for the casaa application for Coding Treatment Interactions...

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconManual dedicated to crm vTiger crm open source

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconHllapi, appc (L 2), cics, Internet Spiders, ethical hacking, search...

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting icon2. DoD distinguishes transactions as those from procurement sources...

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconConsiderations When Collecting gps data on Incidents Using gis mapping

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconPedestrian Passive Safety in Aspect of Passenger Cars Design

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconThis document explains Open Dental’s conversion process to help you...

Open Source Intelligence is the non­-cloak-and-dagger aspect of fact collecting iconMeasure dhs is a five-year project to assist institutions in collecting...




manual




When copying material provide a link © 2017
contacts
manual-guide.com
search