OSINT) 2Oolkit on the Go
Total Page:16
File Type:pdf, Size:1020Kb
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract July 2013 I tried classified research; I was limited. I tried unclassified research; I was without limits. Then a friend told me a secret; mine was not. E. Ben Benavides Open Source Intelligence (OSINT) 2oolKit On The Go Open Source Intelligence is the non-cloak-and-dagger Ninety percent of intelligence comes from open sources. The other ten aspect of fact collecting. Alan D. Tompkins percent, the clandestine work, is just the more dramatic. The real intelligence hero is Sherlock Holmes, not James Bond. Lieutenant General Sam Wilson, USA Ret. Former Director, Defense Intelligence Agency Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Comments Datamining Tools Open Source Intelligence (OSINT): What It Is Defense and What It Isn’t Demographics & Religion (See Also Religion) How To Use Open Source Intelligence Denial and Deception OSINT Tools: The Foundation for Social- Department of Homeland Security engineering and Phishing Attacks Department of Justice Intelligence Gathering Department of The Treasury Tactical and Strategic Intelligence Directories of the World Components of Strategic Intelligence Domain Name Servers The Intelligence Community Drugs and Terrorism, Drug Cartels, And The Intelligence Cycle Criminal Organizations Open Source Intelligence Cycle Drug Smuggling Techniques MiningThe Internet For Intelligence Mexican Drug Cartels Reach Into The U.S. Key Army Access Sites Drug Cartels Moving Into The U.S. Must Haves References Economic/Financial Core Open Source Intelligence Documents & E-Mail Lookups Guides Embassies of the World MI Officer Students Energy Global Incidents (interactive maps) Fauxtography Access by Topic Federal Government 911 Final Report Fusion Centers Acquisition Gangs (includes gangs in the Military) Afghanistan Global Incidents Interactive Maps Africa Global Threats/Conflict Agriculture Google Al Qaeda/Taliban Google Hacks And Others Aljazeera Hate Groups on The Internet Ammunition Plants and Depots Hezbollah Area/International Codes Homeland Security (See Also Department of Armies Of The World Homeland Security) Aviation Human Trafficking Banking & Finance HUMINT Biometrics Identity Theft Blogs and World Blogs Image, Audio, Video Finder Bomb Threat Stand-Off Distances IMINT Bridges Information Dominance/Operations CAMS Around the World Improvised Explosive Devices Center for Army Lessons Learned (CALL) Intelligence Resources Central Intelligence Agency (CIA) International Intelligence Agencies Chemical/Biological/Radiological Internet Privacy and Security China Interpol Collective Intelligence Iranian Military Computer Forensics Iraninan Websites Counterintelligence And Espionage Iraq Counterterrorism Islam/Islamic Websites Country Links/Studies Islamic Heraldry Crime & Justice Israel Cryptome (controversial site but has good Language Training information) Language/Web Site Translators Online (In Critical Thinking Other Words) Cuba Law Enforcement Support Cultural Intelligence Lessons Learned Cyber & Information Warfare Library Resources Databases (Some Searchable) Link Analysis Tools/Software 2 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Liquefied Natural Gas Facilities Russia Lone Wolves Satellite and Space Views (real time) Major Commands (MACOMS) Search Engines & Meta Search Engines Mapping and Related Material (Includes Deep Web) Marine Corps Secret Armies Medical Intelligence Secure Email Military Magazines Shopping Malls Military Operations in Urban Terrain (MOUT) Social Engineering Missile Threat Social Networking Muslim Brotherhood Software For The Open Source Analyst National/International Most Wanted WEB includes Visualization Software Sites Steganography and Terrorists National and International Resources Sudan National Security Agency Suicide Bombers Newspapers Around The World Suicide Bomber Profile Nongovernment Organizations (NGOs) Suspicious Behavior Could Indicate Terror North Korean Military Plotting Nuclear Power Plants and WMD Series Suspicious Packages (Cryptome) Syria Nuclear Reactors and Storage Taiwan Nuclear Terrorism Taliban Online Services Technology Theft/Transfer Open Source Center (formerly the Foreign Terrorism Broadcast Information Service) Terrorism News OSINT Links Terrorism Funding OSINT Support Terrorist Targets OSINT Tools Terrorist Websites OSINT Training The Deep Web OSINT Exploitation and The Criminal Threat Tools For Communication Security Open Source Software Tracerouting Organized Crime Training Resources Pakistan Transportation People Finder Tunnels Piracy UAVs Ports Worldwide Venezuela Propaganda (anti-U.S.) Water Conflict Public Data On Sex Offenders Weapons Around The Globe Public Intelligence Weapons of Mass Destruction Rail Weather Reference/Research Tools World News Network Sitemap (make this your Religions (see Also Demographics & first stop) Religions) Miscellaneous Resources For Online Investigators 3 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Comments Forward any sites you feel should be added to me at [email protected] This is a living document and at the time of publication all links were active but don’t give up if you get the “Page Not Found” message. If a link does not work, try copying the link to the URL window. If it still doesn’t work place the cursor at the end of the URL address and backspace to the first slash and hit the enter key. If it still does not work keep backspacing to the next slash and press the enter key. Keep doing this until you either get a hit or enter the home page. Once in the homepage you should be able to find what you are looking for. But we all know the chaotic nature of the WEB and over time some sites will be pulled off or no longer function. If this is the case, you have a final recourse - the wayback machine, http://www.archive.org/. Copy the entire URL and paste it into the “take me back” box in the homepage. This should take you back to the original homepage and from there you can pick up key words to find what you are looking for. I realize also that we don’t think alike. If you feel some links do not belong in a particular category let me know and I will make the adjustments. If you feel a new category should be added please justify it, and if you discover links that you think are relevant to the handbook please submit your list and I will update. Together we can create a valuable guide that is not only useful to the intelligence analyst but also beneficial to all branches of the military, and civilian agencies. The idea is to develop something that any branch (infantry, artillery, armor, etc) besides MI can use for their own intelligence gathering. Remember, “Every Soldier Is A Sensor”. We could also apply this to the civilian world and say “Every Citizen Is A Sensor”. A good example is the individual that spotted the smoking SUV in Times Square and alerted police to the situation. Had the contents smoldered long enough it is quite possible the situation could have turned into something more serious. While I have tried to get you to your objective as quickly as possible, there is still no substitute for effective searching techniques. I strongly recommend looking over this very basic WEB searching techniques site http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Handouts.html and download the tutorial with powerpoint slides and handouts. The information is from 2009 but still very appropriate. I also like Russ Haynal’s Internet Training at http://navigators.com/opensource.html and I think you will too. Very easy to follow and digest the information even while working at your own pace. There are two areas one cannot get away from on the WEB, pornography and theological/political agendas. I have definitely made sure that none of the links end up with the former, but the latter cannot be avoided. I have been advised that I probably have published too much information and have made it easier for the criminal element. All the information gathered has been through open source harvesting and anyone with even the slightest knowledge of good searching techniques will be able to gather the same information. For example, the nuclear related portions in this handbook when merged together will produce a neat little file. You can gather this same information at the public library or by visiting several blogs and merging the results. Scattered throughout this handout you will run across material like Unclassified/FOUO, Law Enforcement Sensitive (LES), Restricted, Controlled Unclassified Information, Sensitive But Unclassified (SBU) and other caveats. Again, this is all open source exploitation. I did not hack into any sites! That’s my story and I’m sticking to it. Those links that require a .mil or .gov return address are included for those authorized access, they will not work for those not authorized access. Prior to leaving the service of the U.S. Army, I established that this is my intellectual property and there are no applicable constraints on my sharing it with the public. 4 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Open Source Intelligence (OSINT): What It Is and What It Isn’t According to the NATO Open Source Intelligence Handbook, November 2001, there are four distinct categories of open source information and intelligence. 1) Open Source Data (OSD). Data is the raw print, broadcast, oral debriefing, or other form