INTELLIGENCE EXPLOITATION of the INTERNET 1 Step 2: Identify Possible Search Terms
Total Page:16
File Type:pdf, Size:1020Kb
TABLE OF CONTENTS INTRODUCTION............................................................................................................. 4 CHAPTER I: INTERNET OVERVIEW ....................................................................... 6 Section A: World-Wide-Web (WWW) ........................................................................... 6 Section B: Newsgroups ..................................................................................................... 8 Section C: Email List Overview..................................................................................... 11 Section D: Chat ............................................................................................................... 13 CHAPTER II: DIRECTION ......................................................................................... 14 Section A: Mission Analysis ........................................................................................... 14 Steps in Mission Analysis......................................................................................... 14 Step 1: Sources of the Mission.............................................................................. 15 Step 2: Superior’s Mission and Intent................................................................... 15 Step 3: Derive Elements of Own Mission............................................................. 17 Step 4: Identify Assumptions................................................................................ 17 Step 5: Identify Objectives.................................................................................... 18 Section B: Primary Intelligence Requirement (PIR) Development ........................... 18 Direction Development Worksheet........................................................................... 19 CHAPTER III: COLLECTION.................................................................................... 20 Section A: Collection Planning ...................................................................................... 20 Collection Management............................................................................................ 20 Making a Collection Plan.......................................................................................... 20 An Internet Collection Plan ...................................................................................... 21 The Internet Collection Planning Steps .................................................................... 22 Step 1: Determine Searchable Information Requirements.................................... 22 Step 2: Determine Best Site or Search................................................................. 22 Step 3: Identify the Details to Access or Find Specific Information ................... 22 Step 4: Determine Search Time Constraints........................................................ 23 Using the Internet Collection Plan............................................................................ 23 Standing Requirements ............................................................................................. 23 Internet Collection Plan ............................................................................................ 24 Section B: Search Strategies .......................................................................................... 25 Search Methodology ................................................................................................. 25 Prepare Before You Search....................................................................................... 25 Step 1: Identify Key Concepts .............................................................................. 25 INTELLIGENCE EXPLOITATION OF THE INTERNET 1 Step 2: Identify Possible Search Terms ................................................................ 26 Topic Development Worksheet ............................................................................ 26 Step 3: Decide Which Method to Use To Search ................................................. 28 Step 4: Construct Your Search............................................................................. 31 Step 5. Limit Your Search ................................................................................... 36 Step 6. Refine Your Search.................................................................................. 37 Section C: Search Worksheet ........................................................................................ 39 Section D: Search Tools.................................................................................................. 41 Search Engines.......................................................................................................... 41 What are search engines?...................................................................................... 41 How do search engines work? .............................................................................. 41 What are the pros and cons of search engines?..................................................... 42 Are search engines all the same? .......................................................................... 42 How do search engines rank web pages?.............................................................. 42 When do you use search engines? ........................................................................ 42 Major Search Engine – Features Guide - 2002......................................................... 46 Search Tools.............................................................................................................. 50 Copernic................................................................................................................ 50 Deep-Web/Invisible Web.......................................................................................... 50 Searching the Invisible Web ................................................................................. 50 Deep Query Manager............................................................................................ 51 Section E: Searching Anonymously On The Web ....................................................... 53 CHAPTER IV: PROCESSING ..................................................................................... 56 Section A: Source Evaluation ........................................................................................ 56 Critically Analysing Information Sources ................................................................ 56 Determining the Source of Web Pages ..................................................................... 59 Step 1: Study the URL ......................................................................................... 59 Step 2: Do a “whois” on the domain name.......................................................... 59 Step 3: Perform a Traceroute to the host name.................................................... 61 Step 4: Read the web-page and follow-up with the point of contact (if any) ...... 61 How to Read a URL.................................................................................................. 62 Traceroute ................................................................................................................. 63 McAfee Visual Trace............................................................................................ 66 Section B: Evaluation Checklists.................................................................................. 68 Evaluation Checklist for an Advocacy Web Page .................................................... 69 Evaluation Checklist for a Business/Marketing Web Page ...................................... 70 Evaluation Checklist for a News Web Page ............................................................. 71 Evaluation Checklist for an Informational Web Page .............................................. 72 Evaluation Checklist for a Personal Web Page......................................................... 73 Section C: Validated Source Lists ................................................................................. 74 Powermarks 3.5......................................................................................................... 74 INTELLIGENCE EXPLOITATION OF THE INTERNET 2 Section D: Effective Summary....................................................................................... 77 Copernic Summarizer ............................................................................................... 77 CHAPTER V: DISSEMINATION................................................................................ 79 Section A: Report Layering ........................................................................................... 79 Section B: Dissemination with Microsoft Outlook........................................................ 80 Section C: Dissemination and Classification ................................................................ 82 ANNEXES: ...................................................................................................................... 84 Annex A: More information on Source Evaluation..................................................... 84 Searching Upstream...................................................................................................... 85 Annex B: Selected Information Sources ....................................................................... 88 a. Terrorist Threat Research (Rev 04 Mar 02)...................................................................