Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’S Terrorist Today (T4) Through OSINT By: Mr

Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’S Terrorist Today (T4) Through OSINT By: Mr

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract June 2011 Country Studies Public Places Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’s Terrorist Today (T4) through OSINT by: Mr. E. Ben Benavides CounterTerrorism Infrastructure Money Laundering Gang Warfare Open Source Intelligence is the non-cloak- and-dagger aspect of fact collecting. (Alan D. Tompkins) Human Smuggling Weapon Smuggling IEDs/EFPs Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Table of Contents ........................................................................................................................ 2 Comments ................................................................................................................................... 7 Open Source Intelligence (OSINT): What It Is and What It Isn’t ................................................... 8 How To Use Open Source Intelligence ........................................................................................ 9 Key Army Access Sites .............................................................................................................. 17 Must Haves References ............................................................................................................ 18 Core Open Source Intelligence Documents & Guides ........................................................... 18 MI Officer Students ................................................................................................................ 18 Global Incidents (interactive maps) ....................................................................................... 18 911 Final Report .................................................................................................................... 20 Acquisition ............................................................................................................................. 20 Afghan Security Forces Order of Battle (OOB) ............................................................ 20 http://www.longwarjournal.org/oob/afghanistan/i ndex.php .................................................................................................................................... 20 Africa ..................................................................................................................................... 21 Agriculture .............................................................................................................................. 22 Al Qaeda/Taliban ................................................................................................................... 22 Aljazeera ................................................................................................................................ 22 Ammunition Plants and Depots .............................................................................................. 23 Area/International Codes ....................................................................................................... 23 Armies Of The World ............................................................................................................. 23 Aviation .............................................................................................................................. 23 Banking & Finance ................................................................................................................. 24 Biometrics .............................................................................................................................. 24 BLOGS .................................................................................................................................. 25 Bridges .................................................................................................................................. 29 Center for Army Lessons Learned (CALL) ...................................................................... 29 CAMS Around the World ........................................................................................................ 29 Chemical/Biological/Radiological ........................................................................................... 30 China ..................................................................................................................................... 31 Collective Intelligence ............................................................................................................ 33 Computer Forensics ............................................................................................................... 33 Counterintelligence And Espionage ....................................................................................... 33 Counterterrorism .................................................................................................................... 33 Country Links/Studies ............................................................................................................ 34 Crime & Justice ...................................................................................................................... 36 Cryptome (controversial site but has good information) ......................................................... 37 Critical Thinking ..................................................................................................................... 37 Cuba ...................................................................................................................................... 40 Cultural Intelligence ............................................................................................................... 40 Cyber & Information Warfare ................................................................................................. 41 Databases (Some Searchable) .............................................................................................. 42 Datamining Tools ................................................................................................................... 45 Defense ................................................................................................................................. 45 Demographics & Religion (See Also Religion) ....................................................................... 45 Denial and Deception ............................................................................................................. 46 2 Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Department of Homeland Security ......................................................................................... 46 Department of Justice ............................................................................................................ 47 Department of The Treasury .................................................................................................. 47 Directories of the World ......................................................................................................... 47 Domain Name Servers ........................................................................................................... 47 Drugs and Terrorism, Drug Cartels, And Criminal Organizations ........................................... 48 Drug Smuggling Techniques/Methods ................................................................................... 50 ..................................................................................................................................... 51 Mexican Drug Cartels Reach Into The U.S. ........................................................................... 51 Drug cartels moving into the US ............................................................................................ 54 Mexico’s Drug Killings ............................................................................................................ 55 Drug Trafficking Through Central America (Great Interactive Map) ....................................... 58 http://www1.stratfor.com/images/interactive/Central_american_roa ds.htm .................................................................................................................................... 58 Economic/Financial ................................................................................................................ 59 E-Mail Lookups ...................................................................................................................... 59 Embassies of the World ......................................................................................................... 60 Energy ................................................................................................................................... 60 Fauxtography a term used to describe instances of photojournalism (most coming from sources in the Middle East) in which photos have been either misrepresented by staging or other means, or manipulated with computer software. Source: http://mediamythbusters.com/index.php?title=Fauxtography ................................................. 61 Federal Government .............................................................................................................. 61 Gangs (includes gangs in the Military) ................................................................................... 62 Investigating Gang Homicides - A

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    171 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us