Open Source Intelligence (OSINT) 2Oolkit on the Go

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Intelligence (OSINT) 2Oolkit on the Go Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract September 2012 I tried classified research; I was limited. I tried unclassified research; I was without limits. Then a friend told me a secret; mine was not. E. Ben Benavides Open Source Intelligence (OSINT) 2oolKit On The Go Open Source Intelligence is the non-cloak-and-dagger aspect of fact collecting. Alan D. Tompkins Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Comments Cultural Intelligence Open Source Intelligence (OSINT): What It Cyber & Information Warfare Is and What It Isn’t Databases (Some Searchable) How To Use Open Source Intelligence Datamining Tools Intelligence Gathering Defense Tactical and Strategic Intelligence Demographics & Religion (See Also Components of Strategic Intelligence Religion) The Intelligence Community Denial and Deception The Intelligence Cycle Department of Homeland Security Open Source Intelligence Cycle Department of Justice MiningThe Internet For Intelligence Department of The Treasury Key Army Access Sites Directories of the World Must Haves References Domain Name Servers Core Open Source Intelligence Drugs and Terrorism, Drug Cartels, And Documents & Guides Criminal Organizations MI Officer Students Drug Smuggling Techniques Global Incidents (interactive maps) Mexican Drug Cartels Reach Into The Access by Topic U.S. 911 Final Report Drug Cartels Moving Into The U.S. Acquisition Economic/Financial Afghanistan El Paso Intelligence Center (EPIC) Africa E-Mail Lookups Agriculture Embassies of the World Al Qaeda/Taliban Energy Aljazeera Fauxtography Ammunition Plants and Depots Federal Government Area/International Codes Fusion Centers Armies Of The World Gangs (includes gangs in the Military) Aviation Global Incidents Interactive Maps Banking & Finance Global Threats/Conflict Biometrics Google Blogs and World Blogs Google Hacks And Others Bomb Threat Stand-Off Distances Hate Groups on The Internet Bridges Hezbollah CAMS Around the World Homeland Security (See Also Center for Army Lessons Learned (CALL) Department of Homeland Security) Central Intelligence Agency (CIA) Human Trafficking Chemical/Biological/Radiological HUMINT China Identity Theft Collective Intelligence Image, Audio, Video Finder Computer Forensics IMINT Counterintelligence And Espionage Information Dominance/Operations Counterterrorism Improvised Explosive Devices Country Links/Studies Intelligence Resources Crime & Justice International Intelligence Agencies Cryptome (controversial site but has good Internet Privacy and Security information) Interpol Critical Thinking Iranian Military Cuba Iraninan Websites 2 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Iraq Public Data On Sex Offenders Islam/Islamic Websites Public Intelligence Islamic Heraldry Rail Israel Reference/Research Tools Language Training Religions (see Also Demographics & Language/Web Site Translators Online Religions) (In Other Words) Russia Law Enforcement Support Satellite and Space Views (real time) Lessons Learned Search Engines & Meta Search Engines Library Resources Secret Armies Link Analysis Tools/Software Secure Email Liquefied Natural Gas Facilities Shopping Malls Lone Wolves Social Engineering Major Commands (MACOMS) Social Networking Mapping and Related Material Software For The Open Source Analyst Marine Corps includes Visualization Software Medical Intelligence Steganography and Terrorists Military Magazines Sudan Military Operations in Urban Terrain Suicide Bombers (MOUT) Suicide Bomber Profile Missile Threat Suspicious Behavior Could Indicate Muslim Brotherhood Terror Plotting National/International Most Wanted WEB Suspicious Packages Sites Taiwan National Security Agency Taliban Newspapers Around The World Technology Theft/Transfer Nongovernment Organizations (NGOs) Terrorism North Korean Military Terrorism News Nuclear Power Plants and WMD Series Terrorism Funding (Cryptome) Terrorist Targets Nuclear Reactors and Storage Terrorist Websites Nuclear Terrorism Tracerouting Online Services Training Resources Open Source Center (formerly the Transportation Foreign Broadcast Information Service) Tunnels OSINT Links UAVs OSINT Support Venezuela OSINT Training Water Conflict OSINT Exploitation and The Criminal Weapons Around The Globe Threat Weapons of Mass Destruction Open Source Software Weather Organized Crime World News Network Sitemap (make this Pakistan your first stop) People Finder Miscellaneous Piracy Ports Worldwide Propaganda (anti-U.S.) 3 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Comments Forward any sites you feel should be added to me at [email protected] or [email protected] This is a living document and at the time of publication all links were active but don’t give up if you get the “Page Not Found” message. If a link does not work, try copying the link to the URL window. If it still doesn’t work place the cursor at the end of the URL address and backspace to the first slash and hit the enter key. If it still does not work keep backspacing to the next slash and press the enter key. Keep doing this until you either get a hit or enter the home page. Once in the homepage you should be able to find what you are looking for. But we all know the chaotic nature of the WEB and over time some sites will be pulled off or no longer function. If this is the case, you have a final recourse - the wayback machine, http://www.archive.org/. Copy the entire URL and paste it into the “take me back” box in the homepage. This should take you back to the original homepage and from there you can pick up key words to find what you are looking for. I realize also that we don’t think alike. If you feel some links do not belong in a particular category let me know and I will make the adjustments. If you feel a new category should be added please justify it, and if you discover links that you think are relevant to the handbook please submit your list and I will update. Together we can create a valuable guide that is not only useful to the intelligence analyst but also beneficial to all branches of the military, and civilian agencies. The idea is to develop something that any branch (infantry, artillery, armor, etc) besides MI can use for their own intelligence gathering. Remember, “Every Soldier Is A Sensor”. We could also apply this to the civilian world and say “Every Citizen Is A Sensor”. A good example is the individual that spotted the smoking SUV in Times Square and alerted police to the situation. Had the contents smoldered long enough it is quite possible the situation could have turned into something more serious. While I have tried to get you to your objective as quickly as possible, there is still no substitute for effective searching techniques. I strongly recommend looking over this very basic WEB searching techniques site http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Handouts.html and download the tutorial with powerpoint slides and handouts. The information is from 2009 but still very appropriate. I also like Russ Haynal’s Internet Training at http://navigators.com/opensource.html and I think you will too. Very easy to follow and digest the information even while working at your own pace. There are two areas one cannot get away from on the WEB, pornography and theological/political agendas. I have definitely made sure that none of the links end up with the former, but the latter cannot be avoided. I have been advised that I probably have published too much information and have made it easier for the criminal element. All the information gathered has been through open source harvesting and anyone with even the slightest knowledge of good searching techniques will be able to gather the same information. For example, the nuclear related portions in this handbook when merged together will produce a neat little file. You can gather this same information at the public library or by visiting several blogs and merging the results. Scattered throughout this handout you will run across material like Unclassified/FOUO, Law Enforcement Sensitive (LES), Restricted, Controlled Unclassified Information, and other caveats. Again, this is all open source exploitation. I did not hack into any sites! That’s my story and I’m sticking to it. Those links that require a .mil or .gov return address are included for those authorized access, they will not work for those not authorized access. Prior to leaving the service of the U.S. Army, I established that this is my intellectual property and there are no applicable constraints on my sharing it with the public. 4 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Open Source Intelligence (OSINT): What It Is and What It Isn’t According to the NATO Open Source Intelligence Handbook, November 2001, there are four distinct categories of open source information and intelligence. 1) Open Source Data (OSD). Data is the raw print, broadcast, oral debriefing, or other form of information from a primary source. It can be a photograph, a tape recording, a commercial satellite image, or a personal letter from an individual. A god example is a reporter embedded with forces in Afghanistan or Iraq. He/she is taking pictures, talking to soldiers, recording conversations and firefights, and taking notes with a pen or pencil. This is considered raw data until it goes through a conversion process to create a coherent product. 2) Open Source Information
Recommended publications
  • Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’S Terrorist Today (T4) Through OSINT By: Mr
    Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract June 2011 Country Studies Public Places Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’s Terrorist Today (T4) through OSINT by: Mr. E. Ben Benavides CounterTerrorism Infrastructure Money Laundering Gang Warfare Open Source Intelligence is the non-cloak- and-dagger aspect of fact collecting. (Alan D. Tompkins) Human Smuggling Weapon Smuggling IEDs/EFPs Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Table of Contents ........................................................................................................................ 2 Comments ................................................................................................................................... 7 Open Source Intelligence (OSINT): What It Is and What It Isn’t ................................................... 8 How To Use Open Source Intelligence ........................................................................................ 9 Key Army Access Sites .............................................................................................................. 17 Must Haves References ............................................................................................................ 18 Core Open Source Intelligence Documents & Guides ........................................................... 18 MI Officer Students ...............................................................................................................
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 113 CONGRESS, SECOND SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 113 CONGRESS, SECOND SESSION Vol. 160 WASHINGTON, TUESDAY, JUNE 24, 2014 No. 99 House of Representatives The House met at 10 a.m. and was was traveling along a walled road in Government—Federal, State, and called to order by the Speaker pro tem- Afghanistan when an IED exploded and local—will play a large role in ending pore (Mr. THOMPSON of Pennsylvania). disabled the lead vehicle in the convoy. hunger. The problem is too big and too f Lieutenant Andrews quickly jumped much a part of our basic values for gov- out of his vehicle and was assessing the ernment institutions not to get in- DESIGNATION OF SPEAKER PRO damage of the vehicle that had hit the volved. TEMPORE IED, and he saw through the glint in We already created the programs The SPEAKER pro tempore laid be- his eye an RPG coming straight for that will help us end hunger: SNAP, fore the House the following commu- him and his fellow troops. So, in an in- WIC, and school meals, just to name a nication from the Speaker: stant, he jumped on top of his fellow few. Many of these programs are under- WASHINGTON, DC, soldiers and took the brunt of the RPG. funded and need to be responsibly up- June 24, 2014. He sacrificed himself so that his bud- dated for the 21st century. The truth is I hereby appoint the Honorable GLENN dies would live.
    [Show full text]
  • CAPSTONE 19-4 Indo-Pacific Field Study
    CAPSTONE 19-4 Indo-Pacific Field Study Subject Page Combatant Command ................................................ 3 New Zealand .............................................................. 53 India ........................................................................... 123 China .......................................................................... 189 National Security Strategy .......................................... 267 National Defense Strategy ......................................... 319 Charting a Course, Chapter 9 (Asia Pacific) .............. 333 1 This page intentionally blank 2 U.S. INDO-PACIFIC Command Subject Page Admiral Philip S. Davidson ....................................... 4 USINDOPACOM History .......................................... 7 USINDOPACOM AOR ............................................. 9 2019 Posture Statement .......................................... 11 3 Commander, U.S. Indo-Pacific Command Admiral Philip S. Davidson, U.S. Navy Photos Admiral Philip S. Davidson (Photo by File Photo) Adm. Phil Davidson is the 25th Commander of United States Indo-Pacific Command (USINDOPACOM), America’s oldest and largest military combatant command, based in Hawai’i. USINDOPACOM includes 380,000 Soldiers, Sailors, Marines, Airmen, Coast Guardsmen and Department of Defense civilians and is responsible for all U.S. military activities in the Indo-Pacific, covering 36 nations, 14 time zones, and more than 50 percent of the world’s population. Prior to becoming CDRUSINDOPACOM on May 30, 2018, he served as
    [Show full text]
  • Meiser Hawii 0085A 10946.Pdf
    MAKING IT: SUCCESS, MEDIOCRITY, AND FAILURE IN THE KITCHEN A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI’I AT MANOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN SOCIOLOGY APRIL 2021 By Ellen T. Meiser Dissertation Committee: Dr. David T. Johnson, Chairperson Dr. Jennifer Darrah Dr. Manfred Steger Dr. Wei Zhang Dr. Cathryn Clayton Keywords: Success, Mediocrity, Failure, Culinary Industry, Chefs, Cooking, Emotions, Culture, Embodiment, Kitchen Capital 1 ACKNOWLEDGEMENTS This dissertation would not exist if it were not for the guidance, encouragement, and intelligence of my advisor, Dr. David T. Johnson. Mahalo nui loa for the many hours you’ve spent talking with me, reading over drafts, and sending me articles and books that you thought I’d find helpful. I hope one day to be as fantastic a mentor as you have been to me. I also want to thank my committee members Dr. Jennifer Darrah, Dr. Manfred Steger, Dr. Wei Zhang, and Dr. Cathryn Clayton for their great minds, great support, and great suggestions throughout my dissertation process. Much of the joy of graduate school stems from the relationships you form with classmates. So, thank you to my colleagues who offered their eyes to look over drafts, ears to listen to meandering talks, and words of advice. Last, I want to thank my family: my mom and dad, whose pride in me has never wavered and whose love is unending. My brother, who informed me at the age of 11 that I was pronouncing “culinary” incorrectly—leading to me tell everyone I was going to attend “coronary school” to become a chef—and who almost 20 years later let me stay with him as I conducted interviews in New York.
    [Show full text]
  • An Introduction to Sociolinguistics LEARNING ABOUT LANGUAGE
    An Introduction to Sociolinguistics LEARNING ABOUT LANGUAGE General Editors: Geoffrey Leech & Mick Short, Lancaster University Already published: Analysing Sentences (2nd edition) Noel Burton-Roberts Words and Their Meaning Howard Jackson An Introduction to Phonology Francis Katamba Grammar and Meaning Howard Jackson Realms of Meaning: An Introduction to Semantics Th. R. Hofmann An Introduction to Psycholinguistics Danny D. Steinberg An Introduction to Spoken Interaction Anna-Brita Stenström Watching English Change Laurie Bauer Meaning in Interaction: An Introduction to Pragmatics Jenny Thomas An Introduction to Cognitive Linguistics Friedrich Ungerer and Hans-Jörg Schmid Exploring the Language of Poems, Plays and Prose Mick Short Contemporary Linguistics: An Introduction William O’Grady, Michael Dobrovolsky and Francis Katamba Analysing Sentences Noel Burton-Roberts An Introduction to Natural Language Processing Through Prolog Clive Matthews An Introduction to Child Language Development Susan Foster-Cohen The Sounds of Language: An Introduction to Phonetics Henry Rogers An Introduction to Foreign Language Learning and Teaching Keith Johnson An Introduction to Sociolinguistics (4th edition) Janet Holmes An Introduction to Sociolinguistics Fourth Edition JANET HOLMES First published 1992 by Pearson Education Limited Second edition published 2001 Third edition published 2008 Fourth edition published 2013 Published 2013 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN 711 Third Avenue, New York, NY 10017, USA Routledge is an imprint of the Taylor & Francis Group, an informa business Copyright © 1992, 2001, 2008, 2013, Taylor & Francis. The right of Janet Holmes to be identified as author of this Work has been asserted by her in accordance with the Copyright, Designs and Patents Act 1988.
    [Show full text]
  • UNIVERSITY of CALIFORNIA, IRVINE on Taste and Nation
    UNIVERSITY OF CALIFORNIA, IRVINE On Taste and Nation Dissertation Submitted in partial satisfaction of the requirements for the degrees of DOCTOR OF PHILOSOPHY in Visual Studies by Anna Therese Kryczka Dissertation Committee Chancellor’s Professor Cécile Whiting, Chair Professor Catherine Liu Associate Professor Victoria E. Johnson 2016 © 2016 Anna Therese Kryczka DEDICATION To my family and friends with gratitude ii TABLE OF CONTENTS Page ACKNOWLEDGMENTS iv CIRRICULUM VITAE v ABSTRACT vi INTRODUCTION 1 CHAPTER 1 Historicism on the New Frontier: Making Taste in the Kennedy White House 23 CHAPTER 2 Oldenburg, Los Angeles, and A Certain America 65 CHAPTER 3 Art and Infrastructure: The Suburbs as Elsewhere 120 CHAPTER 4 Worthy Pleasure: TV, Video Art, and Cooking 168 CONCLUSION 229 BIBLIOGRAPHY 234 iii ACKNOWLEDGMENTS I wish to first thank my advisor Cécile Whiting whose prompt, thorough, and thoughtful guidance made the task of finishing the dissertation a joyful process. Her trust and support gave me the confidence to execute this project. My committee members Victoria Johnson and Catherine Liu were integral to the formation and articulation of this undertaking. Cécile, Vicky, and Catherine also importantly modeled three divergent and equally inspiring models of academic practice. I sincerely could not imagine a better committee. Beyond my committee, I wish to acknowledge Visual Studies faculty members Lucas Hilderbrand, Amy Powell, Bliss Lim, and Jamie Nisbet for their wise counsel and support. In anthropology I am grateful to have worked with and been encouraged by Keith Murphy, Bill Maurer, and Julia Elyachar. My dear friends and colleagues Robert J. Kett, Meredith Goldsmith, and Laura Holzman provided invaluable editorial and emotional support.
    [Show full text]
  • Antisemitism Worldwide 2014
    The Lester and Sally Entin Faculty of Humanities Moshe Kantor Database for the Study of Contemporary Antisemitism and Racism Antisemitism Worldwide 2014 General Analysis Draft European Jewish Congress Ze'ev Vered Desk for the Study of Tolerance and Intolerance in the Middle East, Stephen Roth Institute for the Study of Contemporary Antisemitism and Racism 1 The Lester and Sally Entin Faculty of Humanities Moshe Kantor Database for the Study of Contemporary Antisemitism and Racism Antisemitism Worldwide 2014 General Analysis Draft European Jewish Congress Ze'ev Vered Desk for the Study of Tolerance and Intolerance in the Middle East, Stephen Roth Institute for the Study of Contemporary Antisemitism and Racism 2 This brochure is dedicated to the memory of those murdered at the Jewish Museum in Brussels, at the Charlie Hebdo offices and the HyperCasher in Paris, and at the synagogue in Copenhagen, 2014-2015. Editor Dina Porat, Head of the Kantor Center Kantor Center Researchers Irena Cantorovich – Post Soviet Region Lidia Lerner – Latin America and Spain Sarah Rembiszewski – Western Europe and Germany Mikael Shainkman – Scandinavia Raphael Vago – Hungary, Romania and Slovakia Contributors Esther Webman – Arab Countries Michal Navoth - Greece Jean Yves Camus – France Renee Dayan Shabott (CI) - Mexico Simon Erlanger – Switzerland Stefano Gatti and Betti Guetta (CDEC) - Italy Jeremy Jones (AIJAC) – Australia Vyacheslav Likhacher (EAJC), Ukraine Guy Muller (CIDI) – Netherlands Louiz Nazario - Brazil Beatriz Rittigstein (CAIV) – Venezuela Petra Koutská Schwarzová (Prague Jewish Community) – Czech Republic Patrick Studer (SIG) - Switzerland (German Speaking) Jason Turetsky and Oren Segal (ADL) - USA Mike Whine (CST) – UK Statistics Haim Fireberg Website http://kantorcenter.tau.ac.il/ The Kantor Center team would like to express its deep gratitude to all contributors.
    [Show full text]
  • Certified for Partial Publication Opinion I
    11/20/2015 People v. Valdez, 201 Cal. App. 4th 1429 ­ Cal: Court of Appeal, 4th Appellate Dist., 3rd Div. 2011 ­ Google Scholar 201 Cal.App.4th 1429 (2011) THE PEOPLE, Plaintiff and Respondent, v. VINCENT JULIAN VALDEZ, JR., Defendant and Appellant. No. G041904. Court of Appeals of California, Fourth District, Division Three. December 16, 2011. 1431 *1431 Melissa Hill, under appointment by the Court of Appeal, for Defendant and Appellant. Edmund G. Brown, Jr., and Kamala D. Harris, Attorneys General, Dane R. Gillette, Chief Assistant Attorney General, Gary W. Schons, Assistant Attorney General, Lilia E. Garcia and Kristine A. Gutierrez, Deputy Attorneys General, for Plaintiff and Respondent. CERTIFIED FOR PARTIAL PUBLICATION[*] OPINION ARONSON, J.— A jury convicted Vincent Julian Valdez, Jr., of two counts of attempted murder, four counts of assault with a firearm, and two counts of street terrorism (Pen. Code, § 186.22, subd. (a)), arising from two separate driveby shootings.[1] The jury also found numerous enhancement allegations to be true, including that Valdez committed the underlying offenses for the benefit of a criminal street gang (§ 186.22, subd. (b)), was armed and vicariously discharged a firearm in the first driveby shooting (§§ 12022, subd. (a)(1), 12022.53, subds. (d) & (e)(1)), and personally used and discharged a firearm in the second shooting (§§ 12022.5, subd. (a), 12022.53, subd. (c)). Valdez raises a host of contentions on appeal. In the published portion of this opinion, we address Valdez's challenge to a trial exhibit consisting of printouts of his MySpace social media Internet page, which the prosecution's gang expert relied on in forming his opinion Valdez was an active gang member.
    [Show full text]
  • Nonprofit Security Grant Program
    Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/05/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The below Threat Chronology is intended to assist applicants in responding to the “Threat” question in Part III (A) of the Investment Justification (“making the case”): The applicant should discuss the identification and substantiation of prior threats or attacks against the organization or a closely related organization by a terrorist organization, network, or cell (this would also include Violent Homegrown Extremists). Note: Proofs should include any findings from a previously conducted risk assessment, police findings, and/or insurance claims specific to the location. Absent direct threats, a sub-applicant may substantiate the threat through the public record, as discussed below. Recommendations (in order of priority): In answering this question, a sub-applicant should (in order or priority): 1. Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. Note: This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. 2. Report on incidents/threats that have occurred in the community and/or State where the organization is located. 3. Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Note: With respect to referencing the public record, there is limited working space in the IJ, so sub- applicants should be selective in choosing appropriate examples to incorporate into the response: Events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large.
    [Show full text]
  • CALIFORNIA STATE UNIVERSITY, NORTHRIDGE Minors a Thesis
    CALIFORNIA STATE UNIVERSITY, NORTHRIDGE Minors A thesis submitted in partial fulfillment of the requirements For the degree of Master of Fine Arts in Screenwriting By Joseph Anthony Zastawny August 2017 Copyright by Joseph Anthony Zastawny 2017 ii The thesis of Joseph Anthony Zastawny is approved: Professor Jonathan Stahl Date Professor Jared Rappaport Date Professor Scott Sturgeon, Chair Date California State University, Northridge iii Table of Contents Copyright ii Signature Page iii Abstract v Minors 1 iv Abstract Minors By Joseph Anthony Zastawny Master of Fine Arts in Screenwriting Two twelve year old boys try to remain friends after joining rival gangs on the south side of Chicago. v MINORS EXT. SOUTHWEST SIDE OF CHICAGO - WINTER - DAY (1996) ESTABLISHING. SHOTS of the greater city, tighten in to meat packing district, shopping district on Ashland Blvd. Rooftops and cars exhale clouds of steam. It is cold and grey. EXT. RESIDENTIAL NEIGHBORHOOD - DAY The rushing SOUNDS of a COMMUTER TRAIN full of passengers, runs above residential buildings. Small bungalow style track homes line the street. JERRY (12), and SAMMY (13), walk along a sidewalk, backpacks in tow. Jerry has a handled box of “Worlds Finest Chocolates.” Sammy pauses. SAMMY Try this one. EXT. BUNGALOW HOUSE - DAY Jerry walks up to a house and rings the bell. “DING.” Sammy waits at the bottom of the steps. JERRY Worlds Finest chocolates. Jerry rings harder. He notices no movement in the windows through the sheer curtains. JERRY (CONT’D) Nobody’s home. Sammy walks to the side of the house. He tests windows to see if they are open.
    [Show full text]
  • The Nanjing Atrocities: Crimes of War Has Been an Extraordinarily Collaborative Effort Within Facing History and Ourselves
    A FACING HISTORY AND OURSELVES PUBLICATION CRIMES OF WAR A FACING HISTORY AND OURSELVES PUBLICATION Facing History and Ourselves is an international educational and professional development organization whose mission is to engage students of diverse backgrounds in an examination of racism, prejudice, and antisemitism in order to promote the development of a more humane and informed citizenry. By studying the historical development of the Holocaust and other examples of genocide, students make the essential connection between history and the moral choices they con- front in their own lives. For more information about Facing History and Ourselves, please visit our website at http:// www.facinghistory.org. Copyright © 2014 by Facing History and Ourselves National Foundation, Inc. All rights reserved. Facing History and Ourselves® is a trademark registered in the US Patent & Trademark Office. ISBN-13: 978-1-940457-05-5 ISBN-10: 1-940457-05-X ABOUT FACING HISTORY AND OURSELVES Facing History and Ourselves is a global nonprofit organization founded in 1976 by educators who wanted to develop a more effective and rewarding way to engage students. We’re guided by the belief that the lifeblood of democracy is the ability of every rising generation to be active, responsible decision makers who’ve learned to value compassion as much as reason. By integrating the study of history and literature with ethical decision mak- ing, innovative teaching strategies, and extraordinary resources, professional development opportunities, and coaching, our program enables second- ary school teachers to promote students’ historical understanding, critical thinking, and social and emotional learning, and to facilitate transformative dialogue in their classrooms.
    [Show full text]
  • [ Fires Iten Owns
    n r a _________7 i -, r ‘ e w jT --1/ ■ ■ , - Jm tip ; piiBWgl M G o o d m o r n i n g S e n io ]^ rs g n o u p Ib a c k ss M i t ic h e U b ill . Today’s forecast: ~ -. ------ Partty cloudy wilh’widik'idelyscflttered’ar: flic WaahiDgton Post*^------------ “ TT'TT--of-the-reform-fTi-factiofT+avc-cndorscdnh the • ■ StillrRothcncflccicdned thc’widcsprcad'dis--------- -------- lernoon-and-cvCTittg-tl5*thundftrstOTinsT~^ —— ZZZZ—ZZZZl-Test:LyoteJialdsJcey.- J*3 nc n ivholc.wh. __________ ^__________ annointmerit in the plarplan's failure tojnsurc- Lighe varioblc winds. HighsHij near 95 dc- MW A SH IN G TO N — The AAmerican m Asso- i I ■ mi' m . ^c'm ost glar;laring cxccption is ihc AARFRP. every American, "I donJon I want you to over- grces. Lows 55 to 65. cialHation o f Retired Persons, thehe majori lobby- ‘ the sclf-st■styled “pro-rcform " bloc.li5.lhat had which uchicvcs/cs its principal objcctivcs; inii interpret whal I said.”d." he told a reporter. P a g e A 2 ~ ' iogog group for senior citiZens,;ns. announced the mostt tol gain from President 'Clinton'sG: Mitchell’s bill;ill; prc,scripiion drug bcnufiifils “ll's nol a pcrlecl bill,)ill. but better than the Wednesday it will supportjhcthe hcalih:carc_.original hihealth care proposol. As-Ss-Mitchcll- for Medicarec nrecipients anti govcmipcticnt sialus-quo," )ill of Senate Majority Lead(ader George J. narrowed?d the scope o f his' b ill,. 1h e to o k paym cnts-for loilo n ^ s r m carc.
    [Show full text]