23.10.2012 Views

Open Source Intelligence (OSINT) Link Directory - Allsource Global ...

Open Source Intelligence (OSINT) Link Directory - Allsource Global ...

Open Source Intelligence (OSINT) Link Directory - Allsource Global ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

IEDs/EFPs<br />

November 2011<br />

Public Places<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>) <strong>Link</strong> <strong>Directory</strong><br />

Targeting Tomorrow’s Terrorist Today (T 4 ) through <strong>OSINT</strong><br />

by: Mr. E. Ben Benavides<br />

CounterTerrorism<br />

Money Laundering<br />

Human Smuggling<br />

Country Studies<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> is<br />

the non-cloak-and-dagger<br />

aspect of fact collecting.<br />

(Alan D. Tompkins)<br />

Infrastructure<br />

Gang Warfare<br />

Weapon Smuggling


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Table of Contents<br />

Comments ................................................................................................................................. 6<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>): What It Is and What It Isn’t ................................................. 7<br />

How To Use <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> ...................................................................................... 7<br />

Dual Classification of <strong>Open</strong> <strong>Source</strong> Information and Able Danger .............................................. 7<br />

<strong>Intelligence</strong> Gathering ................................................................................................................ 7<br />

Tactical and Strategic <strong>Intelligence</strong> .............................................................................................. 7<br />

Components of Strategic <strong>Intelligence</strong> ......................................................................................... 7<br />

The <strong>Intelligence</strong> Community ....................................................................................................... 7<br />

The <strong>Intelligence</strong> Cycle ................................................................................................................ 7<br />

MiningThe Internet For <strong>Intelligence</strong> ............................................................................................ 9<br />

Key Army Access Sites .............................................................................................................26<br />

Must Haves References ............................................................................................................27<br />

Core <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Documents & Guides ...........................................................27<br />

MI Officer Students ...............................................................................................................28<br />

<strong>Global</strong> Incidents (interactive maps) .......................................................................................28<br />

Access by Topic ........................................................................................................................30<br />

911 Final Report....................................................................................................................30<br />

Acquisition .............................................................................................................................30<br />

Afghanistan ...........................................................................................................................30<br />

Africa .....................................................................................................................................31<br />

Agriculture .............................................................................................................................32<br />

Al Qaeda/Taliban ..................................................................................................................32<br />

Aljazeera ...............................................................................................................................32<br />

Ammunition Plants and Depots .............................................................................................33<br />

Area/International Codes .......................................................................................................33<br />

Armies Of The World .............................................................................................................33<br />

Aviation .................................................................................................................................33<br />

Banking & Finance ................................................................................................................34<br />

Biometrics .............................................................................................................................34<br />

Blogs and World Blogs ..........................................................................................................35<br />

Bomb Threat Stand-Off Distances ........................................................................................35<br />

Bridges ..................................................................................................................................38<br />

CAMS Around the World .......................................................................................................39<br />

Center for Army Lessons Learned (CALL).............................................................................39<br />

Central <strong>Intelligence</strong> Agency (CIA) .........................................................................................39<br />

Chemical/Biological/Radiological ...........................................................................................40<br />

China ....................................................................................................................................41<br />

Collective <strong>Intelligence</strong> ...........................................................................................................43<br />

Computer Forensics ..............................................................................................................43<br />

Counterintelligence And Espionage.......................................................................................43<br />

Counterterrorism ...................................................................................................................43<br />

Country <strong>Link</strong>s/Studies ...........................................................................................................44<br />

Crime & Justice .....................................................................................................................46<br />

Cryptome (controversial site but has good information) .........................................................47<br />

Critical Thinking.....................................................................................................................47<br />

Cuba .....................................................................................................................................50<br />

2


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Cultural <strong>Intelligence</strong> ...............................................................................................................50<br />

Cyber & Information Warfare .................................................................................................52<br />

Databases (Some Searchable) .............................................................................................52<br />

Datamining Tools ..................................................................................................................55<br />

Defense ................................................................................................................................55<br />

Demographics & Religion (See Also Religion) .......................................................................56<br />

Denial and Deception ............................................................................................................56<br />

Department of Homeland Security ........................................................................................56<br />

Department of Justice ...........................................................................................................56<br />

Department of The Treasury .................................................................................................57<br />

Directories of the World .........................................................................................................57<br />

Domain Name Servers ..........................................................................................................58<br />

Drugs and Terrorism, Drug Cartels, And Criminal Organizations ...........................................58<br />

Drug Smuggling Techniques .................................................................................................58<br />

Mexican Drug Cartels Reach Into The U.S. ..........................................................................58<br />

Drug Cartels Moving Into The U.S. ........................................................................................34<br />

Economic/Financial .............................................................................................................. .61<br />

El Paso <strong>Intelligence</strong> Center (EPIC)....................................................................................... .61<br />

E-Mail Lookups .....................................................................................................................68<br />

Embassies of the World ........................................................................................................69<br />

Energy ..................................................................................................................................69<br />

Fauxtography ........................................................................................................................70<br />

Federal Government .............................................................................................................70<br />

Gangs (includes gangs in the Military) ...................................................................................71<br />

<strong>Global</strong> Incidents Interactive Maps .........................................................................................73<br />

<strong>Global</strong> Threats/Conflict ..........................................................................................................73<br />

Google ..................................................................................................................................74<br />

Google Hacks And Others .....................................................................................................74<br />

Hamas ..................................................................................................................................75<br />

Hate Groups on The Internet .................................................................................................75<br />

Hezbollah ..............................................................................................................................76<br />

Homeland Security (See Also Department of Homeland Security) ........................................76<br />

Human Trafficking .................................................................................................................76<br />

HUMINT ................................................................................................................................77<br />

Identity Theft .........................................................................................................................77<br />

Image, Audio, Video Finder ...................................................................................................78<br />

IMINT ....................................................................................................................................80<br />

Information Dominance/Operations .......................................................................................80<br />

Improvised Explosive Devices ...............................................................................................81<br />

<strong>Intelligence</strong> Resources ..........................................................................................................82<br />

International <strong>Intelligence</strong> Agencies ........................................................................................82<br />

Internet Privacy and Security.................................................................................................83<br />

Interpol ..................................................................................................................................83<br />

Iranian Military .......................................................................................................................83<br />

Iraninan Websites .................................................................................................................85<br />

Iraq........................................................................................................................................88<br />

Islam/Islamic Websites ..........................................................................................................89<br />

Islamic Heraldry ....................................................................................................................89<br />

Israel .....................................................................................................................................90<br />

Language Training ................................................................................................................91<br />

Language/Web Site Translators Online (In Other Words) ......................................................94<br />

3


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Law Enforcement Support .....................................................................................................94<br />

Lessons Learned ...................................................................................................................95<br />

Library Resources .................................................................................................................95<br />

<strong>Link</strong> Analysis Tools/Software.................................................................................................95<br />

Liquefied Natural Gas Facilities .............................................................................................96<br />

Major Commands (MACOMS) ...............................................................................................96<br />

Mapping and Related Material ...............................................................................................97<br />

Marine Corps ........................................................................................................................97<br />

Medical <strong>Intelligence</strong> ............................................................................................................. 101<br />

Military Magazines .............................................................................................................. 102<br />

Military Operations in Urban Terrain (MOUT) ...................................................................... 103<br />

Missile Threat ...................................................................................................................... 104<br />

Muslim Brotherhood ............................................................................................................ 104<br />

National/International Most Wanted WEB Sites ................................................................... 105<br />

National Security Agency .................................................................................................... 105<br />

Newspapers Around The World .......................................................................................... 105<br />

Nongovernment Organizations (NGOs) ............................................................................... 106<br />

North Korean Military .......................................................................................................... 106<br />

Nuclear Power Plants and WMD Series (Cryptome) ........................................................... 108<br />

Nuclear Reactors and Storage ............................................................................................ 108<br />

Nuclear Terrorism ............................................................................................................... 113<br />

Online Services ................................................................................................................... 114<br />

<strong>Open</strong> <strong>Source</strong> Center (formerly the Foreign Broadcast Information Service) ........................ 114<br />

<strong>OSINT</strong> <strong>Link</strong>s ........................................................................................................................ 114<br />

<strong>OSINT</strong> Support ................................................................................................................... 117<br />

<strong>OSINT</strong> Training ................................................................................................................... 117<br />

<strong>OSINT</strong> Exploitation and The Criminal Threat ....................................................................... 117<br />

<strong>Open</strong> <strong>Source</strong> Software ........................................................................................................ 119<br />

Organized Crime ................................................................................................................. 120<br />

Pakistan .............................................................................................................................. 120<br />

People Finder ...................................................................................................................... 121<br />

Piracy .................................................................................................................................. 121<br />

Ports Worldwide .................................................................................................................. 122<br />

Propaganda (anti-U.S.) ....................................................................................................... 122<br />

Public Data On Sex Offenders ............................................................................................ 122<br />

Public <strong>Intelligence</strong> ............................................................................................................... 122<br />

Rail...................................................................................................................................... 123<br />

Reference/Research Tools .................................................................................................. 123<br />

Religions (see Also Demographics & Religions) .................................................................. 123<br />

Russia ................................................................................................................................. 124<br />

Satellite and Space Views (real time) .................................................................................. 124<br />

Search Engines & Meta Search Engines ............................................................................. 124<br />

Secret Armies ..................................................................................................................... 126<br />

Secure Email ....................................................................................................................... 126<br />

Shopping Malls ................................................................................................................... 126<br />

Social Engineering .............................................................................................................. 126<br />

Social Networking ............................................................................................................... 127<br />

Software For The <strong>Open</strong> <strong>Source</strong> Analyst includes Visualization Software ............................ 128<br />

Steganography and Terrorists ............................................................................................. 133<br />

Sudan ................................................................................................................................. 135<br />

Suicide Bombers ................................................................................................................. 135<br />

4


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Suicide Bomber Profile ........................................................................................................ 135<br />

Suspicious Behavior Could Indicate Terror Plotting ............................................................. 135<br />

Suspicious Packages .......................................................................................................... 135<br />

Taiwan ................................................................................................................................ 135<br />

Taliban ................................................................................................................................ 135<br />

Technology Theft/Transfer .................................................................................................. 139<br />

Terrorism............................................................................................................................. 139<br />

Terrorism News ................................................................................................................... 142<br />

Terrorism Funding ............................................................................................................... 142<br />

Terrorist Targets .................................................................................................................. 143<br />

Terrorist Websites ............................................................................................................... 144<br />

Tracerouting ........................................................................................................................ 145<br />

Training Resources ............................................................................................................. 145<br />

Transportation ..................................................................................................................... 145<br />

Tunnels ............................................................................................................................... 146<br />

UAVs ................................................................................................................................... 146<br />

Venezuela ........................................................................................................................... 146<br />

Visualization Tools .............................................................................................................. 147<br />

Water Conflict ..................................................................................................................... 147<br />

Weapons Around The Globe ............................................................................................... 148<br />

Weapons of Mass Destruction ............................................................................................. 148<br />

Weather .............................................................................................................................. 149<br />

World News Network Sitemap (make this your first stop) .................................................... 149<br />

Miscellaneous ..................................................................................................................... 149<br />

5


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Comments<br />

Forward any sites you feel should be added to me at ben.benavides@gmail.com<br />

This is a living document and at the time of publication all links were active but don’t give up if you get<br />

the “Page Not Found” message. If a link does not work, try copying the link to the URL window. If it still<br />

doesn’t work place the cursor at the end of the URL address and backspace to the first slash and hit the<br />

enter key. If it still does not work keep backspacing to the next slash and press the enter key. Keep doing<br />

this until you either get a hit or enter the home page. Once in the homepage you should be able to find<br />

what you are looking for. But we all know the chaotic nature of the WEB and over time some sites will be<br />

pulled off or no longer function. If this is the case, you have a final recourse - the wayback machine,<br />

http://www.archive.org/. Copy the entire URL and paste it into the “take me back” box in the homepage.<br />

This should take you back to the original homepage and from there you can pick up key words to find<br />

what you are looking for.<br />

I realize also that we don’t think alike. If you feel some links do not belong in a particular category let<br />

me know and I will make the adjustments. If you feel a new category should be added please justify it,<br />

and if you discover links that you think are relevant to the handbook please submit your list and I will<br />

update. Together we can create a valuable guide that is not only useful to the intelligence analyst but also<br />

beneficial to all branches of the military, and civilian agencies. The idea is to develop something that any<br />

branch (infantry, artillery, armor, etc) besides MI can use for their own intelligence gathering. Remember,<br />

“Every Soldier Is A Sensor”. We could also apply this to the civilian world and say “Every Citizen Is A<br />

Sensor”. A good example is the individual that spotted the smoking SUV in Times Square and alerted<br />

police to the situation. Had the contents smoldered long enough it is quite possible the situation could<br />

have turned into something more serious.<br />

While I have tried to get you to your objective as quickly as possible, there is still no substitute for<br />

effective searching techniques. I strongly recommend looking over this very basic WEB searching<br />

techniques site http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Handouts.html and download<br />

the tutorial with powerpoint slides and handouts. I also like Russ Haynal’s Internet Training at<br />

http://navigators.com/opensource.html and I think you will too. Very easy to follow and digest the<br />

information even while working at your own pace.<br />

There are two areas one cannot get away from on the WEB, pornography and theological/political<br />

agendas. I have definitely made sure that none of the links end up with the former, but the latter cannot<br />

be avoided.<br />

I have been advised that I probably have published too much information and have made it easier for<br />

the criminal element. All the information gathered has been through open source harvesting and anyone<br />

with even the slightest knowledge of good searching techniques will be able to gather the same<br />

information. For example, the nuclear related portions in this handbook when merged together will<br />

produce a neat little file. You can gather this same information at the public library or by visiting several<br />

blogs and merging the results. Scattered throughout this handout you will run across material like<br />

Unclassified/FOUO, Law Enforcement Sensitive (LES), Restricted, Controlled Unclassified Information,<br />

and other caveats. Again, this is all open source exploitation. I did not hack into any sites! That’s my story<br />

and I’m sticking to it.<br />

Those links that require a .mil or .gov return address are included for those<br />

authorized access, they will not work for those not authorized access.<br />

Prior to leaving the service of the U.S. Army, I established that this is my intellectual property and there<br />

are no applicable constraints on my sharing it with the public.<br />

6


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>): What It Is and What It Isn’t<br />

According to the NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook, November 2001, there are four<br />

distinct categories of open source information and intelligence.<br />

1) <strong>Open</strong> <strong>Source</strong> Data (OSD). Data is the raw print, broadcast, oral debriefing, or other form of<br />

information from a primary source. It can be a photograph, a tape recording, a commercial satellite image,<br />

or a personal letter from an individual. A god example is a reporter embedded with forces in Afghanistan<br />

or Iraq. He/she is taking pictures, talking to soldiers, recording conversations and firefights, and taking<br />

notes with a pen or pencil. This is considered raw data until it goes through a conversion process to<br />

create a coherent product.<br />

2) <strong>Open</strong> <strong>Source</strong> Information (OSI). OSI is comprised of the raw data that can be put together,<br />

generally by an editorial process that provides some filtering and validation as well as presentation<br />

management. OSI is generic information that is usually widely disseminated. Newspapers, books,<br />

broadcasts, and general daily reports are part of the OSI world. An example is a reporter embedded with<br />

forces who takes the raw data and converts it into a meaningful article that is printed in newspapers,<br />

magazines or broadcasted over the air waves. OSI is what a Soldier would purchase at the bookstore<br />

inside the Post Exchange in the form of USA Today or Newsweek.<br />

3) <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>). <strong>OSINT</strong> is information that has been deliberately<br />

discovered, discriminated, distilled, and disseminated to a select audience, generally the commander and<br />

his/her immediate staff, in order to address a specific question. In the case of a battlefield commander, it<br />

would more than likely be answering the priority intelligence requirements (PIR) or specific orders or<br />

requests (SOR). <strong>OSINT</strong>, in other words, applies the proven process of intelligence to the broad diversity<br />

of open sources of information, and creates intelligence. Example: The meaningful article above (OSI)<br />

that was created from raw data is used to support an operation. It’s quite possible that a photo<br />

accompanying the article may be of a house known to harbor insurgents. The photo in the article<br />

identifies the location and now can be used to support a tailored operation to attack the insurgents.<br />

4) Validated <strong>OSINT</strong> (<strong>OSINT</strong>-V). <strong>OSINT</strong>-V is information to which a very high degree of certainty<br />

can be attributed. It can only be produced by an all-source intelligence professional, with access to<br />

classified intelligence sources, whether working for a nation or for a coalition staff. It can also come from<br />

an assured open source to which no question can be raised concerning its validity (live video of an<br />

aircraft arriving at an airport that is broadcast over the media). <strong>OSINT</strong>-V is <strong>OSINT</strong> for which there are<br />

either confirming or unavailable classified sources or there are no available classified sources disputing<br />

<strong>OSINT</strong>. <strong>OSINT</strong>-V is produced only when the analyst has access to classified sources.<br />

Example: CNN reporter takes photos and reports on a bridge. <strong>Intelligence</strong> personnel are aware<br />

the bridge is vital for the movement of insurgent supplies; however, CNN is unaware of that. Classified<br />

information confirms that such a bridge exists. This in effect validates the reporting as <strong>OSINT</strong>-V,<br />

especially if the bridge is identified to be destroyed to keep insurgents from moving supplies. But, if there<br />

isn’t anything in the classified holdings to deny the existence of the bridge, it is still considered <strong>OSINT</strong>-V<br />

since this is the first time the bridge has been observed and reported, and there are other sources like<br />

other reporters to backup the findings.<br />

People in the intelligence business are realists and know that everything cannot be monitored<br />

simultaneously; construction of new infrastructure is continuously taking place around the world. We<br />

cannot keep track of all new buildings, bridges, roads or airfields being built. This is what makes open<br />

source reporting extremely valuable. It covers the areas the classical “INTS” are not assigned to cover.<br />

The only time <strong>OSINT</strong>-V can be disputed is when there is confirming evidence to deny the information.<br />

Summary: How do I know when I have <strong>OSINT</strong>? The simple answer is the analyst does not have<br />

<strong>OSINT</strong> until the open source information has been processed and analyzed, and supports a specific<br />

requirement. The specific requirement can be a tailored operation or simply answering a question. The<br />

7


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

analyst has to be very careful when it comes to distinguishing between OSI and <strong>OSINT</strong>. <strong>Open</strong> source<br />

information exploitation is exactly what the name implies, that which is gathered/collected from open<br />

sources. In general, it is information that is available to the general public without restrictions unless it is<br />

copyrighted material. These include newspapers, the internet, books, phone books, scientific journals,<br />

radio broadcasts, television, individuals, and other forms. On the other hand, <strong>OSINT</strong> is an intelligence<br />

gathering discipline that involves collecting information from open sources and analyzing it to produce<br />

usable intelligence, and there isn’t anything that says intelligence must be classified in order for it to have<br />

utility. In the <strong>Intelligence</strong> Community, the term "open" refers to overt, publicly available sources (as<br />

opposed to covert or classified sources); it is not related to open-source software. <strong>OSINT</strong> is distinguished<br />

from straight research in that it applies the process of intelligence to create tailored knowledge supportive<br />

of a specific decision by a specific individual or group.<br />

How To Use <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong><br />

By eHow Culture & Society Editor http://www.ehow.com/how_2126848_use-open-sourceintelligence.html<br />

<strong>Open</strong> source intelligence is a process of information gathering from public and overt sources,<br />

such as newspapers and military trade journals, that produces "actionable intelligence." Far from being<br />

the hobby of amateurs, open source intelligence is used by official military and government intelligence<br />

agencies on a regular basis.<br />

1. Gather sources. The number of possible open source intelligence outlets is limitless. Some<br />

basic ones are newspapers, which report on things like troop and fleet movement, and even civilians who<br />

visit other countries and can make relevant observations upon return. Strategy and defense information<br />

websites, such as Jane's Group, also provide high quality information for you to harvest.<br />

2. Pick a region or topic. Monitoring all varieties of open source intelligence across regional and<br />

topical interests takes huge amounts of manpower. To effectively use open source intelligence you<br />

should focus on one region or issue at a time. This will help you to stay on top of the latest information<br />

and will allow you to develop a background understanding of intelligence items.<br />

3. Connect the dots. Once you have gathered your sources you need to monitor news and<br />

information in order to connect the dots. Look, for example, at how heads of state visits coincide with<br />

arms sales. Then consider troop and fleet movement against rising tensions in various regions. Use<br />

widely available technology such as Google Earth, Bing Maps 3D, and others to get views of important<br />

locations. Take all this kind of information and try to deduce the most likely intelligence information from it.<br />

4. Test your theories. One of the best ways to test a theory that you've constructed on the basis<br />

of open source intelligence is to publish the theory. You can post theories on strategy discussion forums<br />

or you can send your piece to influential military bloggers or even newspapers. Check the responses from<br />

other members of the open source intelligence community to see what the criticisms might be.<br />

8


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Dual Classification of <strong>Open</strong> <strong>Source</strong> Information<br />

1 August 2011 (<strong>Source</strong>: http://cryptome.org/0005/double-secret.htm )<br />

The US Director of National <strong>Intelligence</strong> has stated<br />

(http://www.spacewar.com/reports/Analysis_Classifying_open_source_intel_999.html ) that increasingly<br />

heavy use by spies of open source information requires classifying the information to cloak its use. This is<br />

exemplified by Anthony Shaffer, a former military spy, in an interview with Government Security News in<br />

September 2005 describing the early days of classifying open source information acquired from the<br />

Internet. Shaffer made a distinction between the use of open information for intelligence purposes, which<br />

had legal restrictions, and use of the information for military operations which did not have those<br />

restrictions. This may account for the reliance upon military intelligence to gather domestic information<br />

forbidden to spies, that is to classify such information as military in addition to its secrecy classification.<br />

(The interview has been withdrawn from GSN but is available on Archive.org)<br />

http://web.archive.org/web/20070205134153/http://www.gsnmagazine.com/sep_05/shaffer_interview.html<br />

[Excerpts]<br />

SHAFFER:<br />

When the information from LIWA arrived at Tampa, Scott Philpott and his team started looking at it<br />

critically, trying to figure out what this really meant; based on other classified databases and lawyer<br />

review. The lawyers started looking at the data as well for any legal issues regarding the fact that this<br />

information came from “open sources”.<br />

GSN:<br />

Even before anyone at Able Danger made the decision to try to share its findings with other agencies or<br />

departments?<br />

SHAFFER:<br />

Absolutely.<br />

GSN:<br />

Even while the data is still being gathered and analyzed?<br />

SHAFFER:<br />

Absolutely, because there were so many critical issues regarding this, simply because it dealt with open<br />

sources. When an intelligence officer, like me, looks at the data, does that somehow magically turn it into<br />

“intelligence”? That was the critical issue. Somehow, there is this interpretation that even open source<br />

information could be construed as intelligence information because of its use. If Tony Shaffer, intelligence<br />

officer, takes data off the Internet and I use it for a project does that make it “intelligence” and subject it to<br />

all of the rules that govern the oversight of intelligence information?<br />

GSN:<br />

Which legal organization within SOCOM is raising these questions?<br />

SHAFFER:<br />

We’re talking about the lawyers. All lawyers in DoD report back to the DoD General Counsel. There’s no<br />

exception to that. Therefore, it doesn’t matter if the lawyer sits in SOCOM or Defense <strong>Intelligence</strong>, they all<br />

report back to the General Counsel.<br />

GSN:<br />

How big is the group of lawyers sitting in SOCOM?<br />

SHAFFER:<br />

I don’t know the exact size of the shop. I suspect it is probably between eight to a dozen folks, for the<br />

headquarters itself.<br />

9


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

GSN:<br />

Do you remember how the battle over this issue began?<br />

SHAFFER:<br />

Oh, I do, because from Day One, they were worried about, “Where are you getting this data from? What’s<br />

the source of the data? This is open source. How can it be this detailed?”<br />

There were a lot of interrogatives the lawyers were asking regarding the sourcing of the information. I had<br />

no problem ever with oversight and answering the hard questions. The concern was, again, this was open<br />

source, but are we somehow violating some U.S. person’s rights by the fact we’re bringing in [the<br />

information] and using it for intelligence purposes?<br />

GSN:<br />

Was it one of the staff lawyers or was it the head of SOCOM’s legal department that was the principal<br />

mover and shaker of this?<br />

SHAFFER:<br />

I don’t know that answer, but the lawyer assigned to Able Danger was the person who explained this to<br />

us.<br />

GSN:<br />

Was the resistance that you were getting to the methodology -- we haven’t even gotten to the conclusions<br />

yet -- driven largely by this individual lawyer or by his organization?<br />

SHAFFER:<br />

By the organization. I’m confident because I started getting problems with this issue back in my<br />

headquarters in D.C., through the DIA lawyers. I know they were talking to each other and it became a<br />

big issue that all the lawyers in DoD were talking about. One of the investigators currently looking into<br />

this, when I talked to him this last week, confirmed to having the same problems even now. What open<br />

source collection really means, and what level of oversight is appropriate to protect U.S. persons’ rights,<br />

even when intelligence officers look at stuff off the open Internet. The debate remains now.<br />

GSN:<br />

Did this issue get to the DoD general counsel?<br />

SHAFFER:<br />

Yes it did. I know for a fact that it did because I talked to the general counsel lawyer who was the<br />

oversight for this issue. I know for a fact that is was being looked at by the DoD general counsel.<br />

GSN:<br />

Did the General Counsel’s organization know about this matter?<br />

SHAFFER:<br />

Based on direct knowledge, I know they were looking at -- and dealing with -- all these issues because a<br />

subsequent operation, the nickname of the operation was Dorhawk Galley, which happened in the spring<br />

of 2001, before 9/11, I had to talk to the general counsel about the same set of issues, because this had<br />

to do with the Internet and U.S. persons and open source information. I personally briefed George Tenet<br />

on this and I briefed the National Security Council twice.<br />

GSN:<br />

On the issue of open sourcing?<br />

SHAFFER:<br />

On the legal set of issues regarding Dorhawk Galley, which were compatible to the issues we were facing<br />

for Able Danger.<br />

GSN:<br />

10


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Can you summarize the legal argument barring the use of open source information against U.S. citizens<br />

or quasi-citizens?<br />

SHAFFER:<br />

There are two concerns. First, the government has to be careful about what information it puts on the<br />

open Internet because, obviously, if they put something out there, U.S. people can see it. Therefore, it<br />

has to be above board.<br />

Second issue, comparing that information to anything else out there regarding open source information. If<br />

you put information out [on the Internet], you have the reasonable belief, that it’s not going to be<br />

protected. That’s my judgment. If you put something on the Internet, such as a blog statement, it isn’t<br />

protected, it’s open. Does the government have the right to look at that and the use it against you if they<br />

so choose? That is one of the fundamental issues. Because although it’s not protected, and it’s out there,<br />

does the government have the right to do something with it?<br />

What can you look at and not look at regarding U.S. citizens? That was one of the issues we were dealing<br />

with regarding these open Internet searches, which the lawyers were concerned about.<br />

GSN:<br />

What kind of records would be referred to as on the open Internet?<br />

SHAFFER:<br />

For example, corporate records. Say a company talks about its business activities overseas and lists<br />

them. If I take that information, as an intelligence officer, and say “Gee, I may want to look at this for<br />

some intelligence operation down the road.” I take it, print it off and put it in a file. Any file I keep as an<br />

intelligence officer is subject to oversight.<br />

GSN:<br />

Say, for example, hoovers.com, which presents all kinds of corporate financial information, lists every<br />

overseas office of every U.S. publicly-traded company. Now, you look at this and say “Hey, there are 37<br />

companies that have an office in Lagos, Nigeria.”<br />

SHAFFER:<br />

Right. You’re spot on.<br />

GSN:<br />

You’re saying that someone on the legal side of the intelligence community might have said, “We don’t<br />

even have the right to do that. You can’t gather that information off the Internet, which is publicly out<br />

there, and use it in an intelligence manner.”<br />

SHAFFER:<br />

You hit the nub of it, absolutely. That’s what they were concerned about.<br />

GSN:<br />

What was the Able Danger program’s response to that legal argument?<br />

SHAFFER:<br />

Well, we aren’t doing intelligence collection operations, we’re doing operational planning. Therefore,<br />

whatever we’re doing should not fall under intelligence guidelines.<br />

GSN:<br />

That was sort of a stretch, wasn’t it? Here you have this ultra-secret and important intelligence mission<br />

which you claim is happening under operational planning, but wasn’t that somewhat bogus?<br />

SHAFFER:<br />

No, it wasn’t bogus. It was the operational focus. The idea was that we were trying to use this information<br />

for purposes not of intelligence collection. Obviously, we wanted to do it to confirm or vet information, but<br />

I wasn’t using this to plan to go after some U.S. citizen. That was not the purpose.<br />

11


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The purpose was to look at linkages. That’s what we were doing. So, any given byte of information<br />

probably wouldn’t even have been looked at [individually] because it didn’t fit the criteria of our search.<br />

There was [vast amounts] of information. Out of all that, we’re only going to look for things that are<br />

relevant to the target, Al Qaeda.<br />

If I take information off the Internet and put it into a file, I’m doing that electronically, with the database.<br />

That was the issue. You’re doing it electronically. The argument was, “When you take all this information<br />

off the Internet, how do you then protect U.S. citizen rights?” The lawyers were looking at all the<br />

information that was coming in. They had to vet everything. They were personally looking at it and had a<br />

validation process.<br />

GSN:<br />

What would they have pointed to and said, “This is a violation. We can’t allow you to do this”?<br />

SHAFFER:<br />

That’s where the whole issue comes in of lawyers saying, “You can’t look at these guys, who are<br />

suspected as being terrorists.” All this information is coming in. They had this vetting process. And then,<br />

all this information comes to us regarding these [suspected terrorists] who were here legally, as part of<br />

these data runs. But, the lawyers are now saying, “You can’t look at that. We’re going to put that in the<br />

‘U.S person’ category that you can’t look at.”<br />

There is a vetting process. They’re trying to protect U.S citizens’ rights. I briefed the general counsel on<br />

this. I briefed George Tenet on this. The problem was, where do you draw that line regarding protection of<br />

U.S. persons -- between U.S. citizens, such as yourself, and these other folks who are here legally, but<br />

not technically deserving of the same protections? That’s the kernel of the issue.<br />

12


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

<strong>Intelligence</strong> Gathering<br />

<strong>Source</strong>s: http://seattletimes.nwsource.com/html/nationworld/2016162814_threatwhat10.html<br />

http://www.seattlepi.com/news/article/An-intel-Q-A-How-the-US-gets-it-where-it-goes-2163524.php#page-<br />

1<br />

http://romenews-tribune.com/bookmark/15489804<br />

http://www.theskanner.com/article/911-Special-<strong>Intelligence</strong>-QA--How-the-US-Gets-It-Where-It-Goes-<br />

2011-09-11<br />

By The Associated Press<br />

Some questions and answers about the gathering and use of intelligence:<br />

WASHINGTON (AP) — U.S. intelligence in the struggle against terrorism comes in many forms,<br />

maddeningly general, improbably precise, a game of sorts with vast consequences for winner and loser.<br />

It's a satellite image showing tribesmen gathering in a remote area where none should be — the<br />

photograph so clear you can see the caliber of ammunition they are carrying.<br />

It's a snatched bit of conversation between two terrorist leaders, overheard by a trusted source the<br />

terrorists don't realize is listening.<br />

It's a stolen diplomatic cable. That's right, we steal.<br />

Each of these sources and a multitude of others can become the tips that put an entire nation on alert, as<br />

a single tip has done from a single source just before the 10th anniversary of the Sept. 11 attacks.<br />

Here are some questions and answers about the gathering and use of intelligence:<br />

Q: What is intel?<br />

A: Simply put, it is information from anywhere that the U.S. can use to its advantage in the world, either in<br />

pursuit of its goals or to protect its people. It can be as basic as a diplomat reading a local newspaper and<br />

passing on something interesting to a superior in an embassy or Washington. But it gets much more<br />

sophisticated and aggressive than that.<br />

In counterterrorism, bits and pieces of information form a messy picture like an impressionist painting.<br />

Those collecting the signs and signals look for a pattern, eventually an image, that gives them a target to<br />

go after or tells them which target to protect.<br />

___<br />

Q: What are the main forms of intel?<br />

A: Perhaps the spookiest is measurement intelligence, known as "masint," using far-away technology to<br />

get extremely up close and personal. The U.S. is capable of placing a sensor near a suspected terrorist<br />

hideout that can count the number of heartbeats in a room and gauge how fast they're beating. There are<br />

even efforts to understand what a "guilty" heartbeat pattern might be.<br />

Masint, working in combination with other kinds of intelligence-gathering, was one of the clinchers in the<br />

raid that killed Osama bin Laden. The U.S. measured the approximate height of the tall man who paced<br />

beneath the trellis outside the kitchen in a Pakistani compound, to help determine bin Laden was that<br />

man.<br />

13


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Then there is human intelligence, or "humint," which has been around since the dawn of spycraft and is<br />

still vital. That's the tipster you cultivate and pay, or perhaps the unproven one who simply walks into a<br />

U.S. embassy and offers information.<br />

"Sigint," or signals intelligence, monitors or otherwise exploits radio, telephone or satellite phone<br />

transmissions. "Imint" is imagery intelligence that includes photographs showing the outlines of a nuclear<br />

power plant, obscured in desert sands, or a terrorist training base tucked in a mountainside.<br />

Cybertracking is a newer tool, pursuing terrorists who use computers either to attack a computer network<br />

or, more often, to organize how their own human network would launch a physical attack.<br />

___<br />

Q: What happens to this mountain of raw material?<br />

A: Each of those streams of data is captured by a multibillion-dollar worldwide network of U.S. satellites,<br />

armed drones, static blimps and high-flying spy aircraft, manned or unmanned, that suck up so much<br />

sound it takes massive computers to crunch all the data and help analysts overwhelmed by the technical<br />

information to find meaningful clues.<br />

Sometimes these streams are collected by U.S. operatives — Americans or those in U.S. employ — who<br />

go behind enemy lines or into enemy homes, leaving behind the sensors that will provide the data.<br />

True to its name, the Central <strong>Intelligence</strong> Agency is an "all-source" organization using all means.<br />

___<br />

Q: How do all these eyes and ears work together?<br />

A: Sometimes they don't. After a Nigerian allegedly tried to bring down a Detroit-bound airliner on<br />

Christmas Day almost two years ago, it emerged that his father had warned U.S. diplomats about his<br />

son's possible terrorist sympathies, but that tip was lost in the blizzard of counterintelligence.<br />

But in the bin Laden raid, a human source led to the compound in the Pakistani army town of Abbottabad.<br />

Signals intelligence monitored for phone calls emanating from there, and found none, because bin Laden<br />

forbade them, hoping to evade detection by just such technical means. Masint was derived from the<br />

imagery taken by drones and satellites.<br />

All of this helped to convince CIA analysts they had found their man and persuade President Barack<br />

Obama to approve a dangerous and diplomatically risky raid into Pakistani sovereign territory.<br />

___<br />

Q: How is all of this intel sorted through so that the real threats are detected and averted?<br />

A: The ever-present risk is that they won't be. One of the failings of pre-9/11 counterintelligence was that<br />

information was jealously guarded by the individual intelligence agencies. Word of a potential plot to fly<br />

planes into U.S. landmarks was received by one agency. Another agency had word terrorists might be<br />

attending flight school. Each organization kept to itself the dots of information that, when connected, could<br />

have revealed the larger pattern of a massive terrorist plot.<br />

Before raw data and human tips can be called "intelligence," they must be analyzed, and if possible,<br />

corroborated. The CIA alone has 2,500 people in its Directorate of <strong>Intelligence</strong> devoted to that task. There<br />

are thousands more across the 16 intelligence agencies, sifting raw data, and cross-comparing within<br />

their own agencies, and with others, to spot a pattern.<br />

14


___<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Q: What does it mean to receive — and warn the public about — a credible and specific but unconfirmed<br />

threat, as in the latest case?<br />

A: A credible threat means it was heard from a trusted source, not just anyone. Specific means the U.S.<br />

has details about when, where or how an attack might unfold. When a threat is specific and credible but<br />

unconfirmed, that means intelligence officials haven't been able to validate the information even though<br />

they trust the source who gave it to them.<br />

This particular threat is not unusual, but it's being taken so seriously because it comes days before the<br />

10th anniversary of 9/11, a date al-Qaida has eyed for attack.<br />

___<br />

Q: How is the intel being analyzed in the latest threat?<br />

A: Right now, teams of analysts are combing through information gleaned from one trusted source, who<br />

heard that a small group of attackers, perhaps from Pakistan, might blow up a car bomb in New York or<br />

Washington. One or all of the attackers might be from Pakistan. Newly minted al-Qaida leader Ayman al-<br />

Zawahri might be behind it.<br />

These analysts are looking for anything to corroborate that report in the reams of information they've<br />

gathered tracking travelers to the U.S. from Pakistan. U.S. spies overseas will be going back to their<br />

sources to see if anyone has heard the same rumor.<br />

Everything unfolds in a hurry.<br />

"You don't have the luxury of vetting the source and then disseminating the information," said Phillip<br />

Mudd, a former top counterterrorist official at the CIA and the FBI. "You have to tell everyone what you<br />

heard and then try to prove the information is legitimate.<br />

He said he would be directing analysts to pore over everything that can be gleaned from flight and<br />

passport logs of potential foreign suspects who have traveled to the U.S.<br />

"Figuring out who would-be attackers are, or even whether they exist, could take months, where the<br />

drumbeat of national security wants answers in minutes or days," Mudd said.<br />

___<br />

Q: What rules do U.S. intelligence-gatherers have to play by?<br />

A: Looser rules than for most people.<br />

The CIA operates under the U.S. law known as Title 50 — literally a license to break laws in foreign<br />

countries, by committing espionage, persuading a local official to commit treason, or in extreme<br />

circumstances, to go into a foreign country and target an al-Qaida suspect for killing or capture. Title 50<br />

operations are covert, meaning the U.S. never intends to acknowledge them. Other intelligence agencies,<br />

such as the eavesdropping National Security Agency and the new Cyber Command, routinely operate<br />

under Title 50 as well.<br />

___<br />

Q: Ultimately, doesn't it all come down to getting lucky — or unlucky?<br />

A: It can feel that way. There is a favorite expression among intelligence officials, memorably if<br />

15


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

confusingly uttered by former Defense Secretary Donald H. Rumsfeld, that captures the essence of their<br />

work:<br />

"As we know, there are known knowns; there are things we know we know. We also know there are<br />

known unknowns; that is to say we know there are some things we do not know. But there are also<br />

unknown unknowns — the ones we don't know we don't know."<br />

___<br />

Associated Press writer Eileen Sullivan contributed to this report<br />

Read more: RN-T.com<br />

16


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Tactical and Strategic <strong>Intelligence</strong><br />

Tactical <strong>Intelligence</strong> - <strong>Intelligence</strong> that is required for the planning and conduct of tactical<br />

operations. This is in line with military operations being conducted on the battlefield, generally in direct<br />

contact with the enemy, the commander’s timeframe is very much compressed, and he is dealing with<br />

towns, villages, or local tribes. The commander is troubled that an insurgent force may be just over the<br />

next hill or hiding in a building waiting to ambush his forces. He is operating in the here-and-now-in-yourface<br />

cultural environment. There is no room for error!<br />

Strategic <strong>Intelligence</strong> - <strong>Intelligence</strong> that is required for forming policy and military plans at national<br />

and international levels. This is in line with more of an expanded timeframe and takes into consideration<br />

entire countries. The intelligence analysis may run months or years into the future. During this period,<br />

errors, which are not acceptable but do still occur, are not as critical as they are at the tactical level where<br />

life and death are daily concerns. Errors at this level can be corrected with the luxury of more room for<br />

maneuver.<br />

Components of Strategic <strong>Intelligence</strong><br />

The same analytical process that takes place at the strategic level can be applied at the tactical<br />

level. The tactical commander is faced with the same issues albeit at a smaller scale. Policy makers at<br />

national level worry about Iranian and North Korean WMDs but the ground commander also worries<br />

about insurgent WTDs (weapons of troop destruction) that include but are not limited to RPGs, AKs, IEDs,<br />

suicide bombers, etc. Strategic intelligence and tactical intelligence differ primarily in level of application<br />

but may also vary in terms and scope of detail.<br />

Information gathered as strategic intelligence may be categorized into eight components. An easy<br />

way to remember these components is through the use of the acronym BEST MAPS:<br />

Components of Strategic <strong>Intelligence</strong><br />

� Biographic<br />

� Economic<br />

� Sociologic<br />

� Transportation And Communications<br />

� Military Geography<br />

� Armed Forces<br />

� Political<br />

� Scientific And Technical<br />

Each of these components can further be divided into a number of subcomponents. These<br />

components and subcomponents are not all-encompassing nor mutually exclusive. This approach is<br />

merely a means to enhance familiarization with the types of information included in strategic intelligence.<br />

Biographic <strong>Intelligence</strong>:<br />

The study of individuals of actual or potential importance, their background and personalities.<br />

� Educational And Occupational History<br />

� Individual Accomplishments<br />

� Idiosyncrasies And Habits<br />

� Position, Influence, And Potential<br />

� Attitudes And Hobbies<br />

Economic <strong>Intelligence</strong>:<br />

The science of production, distribution, and use of wealth-- the material means of satisfying<br />

human desires. economic intelligence is intelligence which deals with the extent and utilization of the<br />

natural and human resources and the economic potential of nations.<br />

17


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

� Economic Warfare<br />

� Economic Vulnerability<br />

� Manufacturing<br />

� <strong>Source</strong>s Of Economic Capability<br />

Sociological <strong>Intelligence</strong>:<br />

The study of society, as well as the groups within society, their composition, organization,<br />

purposes and habits, and the role of the individual in relation to social institutions.<br />

� Population, Manpower And Labor<br />

� Cultural, Physical Characteristics Of People<br />

� Public Opinion<br />

� Education<br />

� Religion<br />

� Public Health And Welfare<br />

Transportation and Telecommunications <strong>Intelligence</strong>:<br />

Transportation <strong>Intelligence</strong>:<br />

Concerned with the operation and facilities of transportation systems in foreign countries.<br />

Telecommunications <strong>Intelligence</strong>:<br />

Concerned with the operation and facilities of civil and fixed military communications systems in<br />

foreign countries.<br />

Transportation Telecommunications<br />

- Railways - Radio<br />

- Highways - Television<br />

- Inland Waterways - Telephone<br />

- Petroleum Pipelines - Telegraph<br />

- Ports - Submarine Cable<br />

- Merchant Marine - Related Comms<br />

- Aviation - Media<br />

Military Geography:<br />

Geography is the science of the description of the land, sea and air, and the distribution of plant<br />

and animal life, including man and his industries.<br />

Military geographical intelligence is the military evaluation of all geographical factors which may in<br />

any way influence military operations.<br />

� Description<br />

� Natural Features<br />

� Manmade Features<br />

� Sub-Component Name<br />

� Physical Geography<br />

� Human And Cultural Geography<br />

Armed Forces <strong>Intelligence</strong>:<br />

Is the integrated study of the organized land, sea, and air forces, both actual and potential, of<br />

foreign nations.<br />

Strategy: Strategic military problems of the nation in light of position, terrain, economic, political, and other<br />

factors.<br />

18


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Tactics: Employment of weapons, employment and operations of the various arms and services, special<br />

operations training.<br />

Category: Order of battle - equipment - logistics - organization/administration - military manpower<br />

Political <strong>Intelligence</strong>:<br />

Political intelligence is intelligence concerning foreign and domestic policies of governments and<br />

the activities of political movements.<br />

� Basic Principles Of Government/National Policies<br />

� Government Structure<br />

� Foreign Policy<br />

� Political Organizations And Parties<br />

� Pressure Groups<br />

� Electoral Procedures<br />

� Public Order And Safety<br />

� Subversion<br />

� <strong>Intelligence</strong> And Security Organization<br />

� Propaganda<br />

Scientific And Technical <strong>Intelligence</strong>:<br />

Is the study and evaluation of a foreign countries scientific and technical capability and potential<br />

to supports its objective through the development of new weapons and new equipment.<br />

� New Weapons And Equipment<br />

� Missiles And Space<br />

� Nuclear, Biological, And Chemical<br />

� Basic And Applied Science<br />

Overt Collection Responsibilities:<br />

� Dept. Of State: Political, Sociological, Economic, Scientific And Technical.<br />

� Dept. Of Defense: Military intelligence information (also scientific/technical and economic pertinent to<br />

DoD missions.<br />

� CIA: Exploitation of domestic sources of foreign intelligence; monitoring of foreign radio broadcasts<br />

19


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

THE INTELLIGENCE COMMUNITY<br />

MISSION AND AUTHORITIES OF THE DIRECTOR OF NATIONAL INTELLIGENCE (DNI)<br />

The Director of National <strong>Intelligence</strong> (DNI) serves as the head of the <strong>Intelligence</strong> Community (IC),<br />

overseeing and directing the implementation of the National <strong>Intelligence</strong> Program (NIP) and acting as the<br />

principal advisor to the President, the National Security Council, and the Homeland Security Council for<br />

intelligence matters. Working together with the Principal Deputy DNI (PDDNI) and with the assistance of<br />

Mission Managers and four Deputy Directors, the Office of the Director of National <strong>Intelligence</strong>’s goal is to<br />

protect and defend American lives and interests through effective intelligence.<br />

20


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

THE INTELLIGENCE CYCLE<br />

Equally important to the components of strategic intelligence is an awareness of the strategic<br />

intelligence cycle and the debriefer's role within that cycle. The first step is the identification of intelligence<br />

gaps. Analysts translate these gaps into intelligence requirements - the second step. In the third step, the<br />

strategic debriefer fulfills those requirements. The fourth step involves preparation of an intelligence<br />

report. The fifth and last step is the preparation of an intelligence report evaluation by the originator of the<br />

requirement. These evaluations measure the quality of the information as well as the quality of the report<br />

writing.<br />

The <strong>Intelligence</strong> Cycle is the process of developing raw information into finished intelligence for<br />

policymakers to use in decisionmaking and action. There are five steps which constitute the <strong>Intelligence</strong><br />

Cycle.<br />

1. Planning and Direction<br />

... is management of the entire effort, from identifying the need for data to delivering an intelligence<br />

product to a consumer. It is the beginning and the end of the cycle—the beginning because it involves<br />

drawing up specific collection requirements and the end because finished intelligence, which supports<br />

policy decisions, generates new requirements.<br />

The whole process depends on guidance from public officials. Policymakers—the President, his aides,<br />

the National Security Council, and other major departments and agencies of government—initiate<br />

requests for intelligence.<br />

2. Collection<br />

... is the gathering of the raw information needed to produce finished intelligence. There are many<br />

sources of information, including open sources such as foreign broadcasts, newspapers, periodicals, and<br />

books. <strong>Open</strong> source reporting is integral to CIA's analytical capabilities. There are also secret sources of<br />

information. CIA operations officers collect such information from agents abroad and from defectors who<br />

provide information obtainable in no other way.<br />

Finally, technical collection—electronics and satellite photography—plays an indispensable role in<br />

modern intelligence, such as monitoring arms control agreements and providing direct support to military<br />

forces.<br />

3. Processing<br />

... involves converting the vast amount of information collected to a form usable by analysts. This is done<br />

through a variety of methods including decryption, language translations, and data reduction.<br />

4. All-<strong>Source</strong> Analysis and Production<br />

... is the conversion of basic information into finished intelligence. It includes integrating, evaluating, and<br />

analyzing all available data—which is often fragmented and even contradictory—and preparing<br />

intelligence products. Analysts, who are subject-matter specialists, consider the information's reliability,<br />

validity, and relevance. They integrate data into a coherent whole, put the evaluated information in<br />

context, and produce finished intelligence that includes assessments of events and judgments about the<br />

implications of the information for the United States.<br />

The CIA devotes the bulk of its resources to providing strategic intelligence to policymakers. It performs<br />

this important function by monitoring events, warning decisionmakers about threats to the United States,<br />

and forecasting developments. The subjects involved may concern different regions, problems, or<br />

personalities in various contexts—political, geographic, economic, military, scientific, or biographic.<br />

Current events, capabilities, and future trends are examined.<br />

The CIA produces numerous written reports, which may be brief—one page or less—or lengthy studies.<br />

They may involve current intelligence, which is of immediate importance, or long-range assessments. The<br />

Agency presents some finished intelligence in oral briefings. The CIA also participates in the drafting and<br />

production of National <strong>Intelligence</strong> Estimates, which reflect the collective judgments of the <strong>Intelligence</strong><br />

Community.<br />

5. Dissemination<br />

21


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The last step, which logically feeds into the first, is the distribution of the finished intelligence to the<br />

consumers, the same policymakers whose needs initiated the intelligence requirements. Finished<br />

intelligence is provided daily to the President and key national security advisers. The policymakers, the<br />

recipients of finished intelligence, then make decisions based on the information, and these decisions<br />

may lead to the levying of more requirements, thus triggering the <strong>Intelligence</strong> Cycle.<br />

22


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

MARCH 6, 2010<br />

MiningThe Internet For <strong>Intelligence</strong><br />

HOW MUCH DATA IS GENERATED ON INTERNET EVERY YEAR/MONTH/DAY?<br />

According to Neilson Online currently there are more than 1,733,993,741 internet users. How much data<br />

are these users generating ?<br />

Few numbers to understand how much data is generated every year.<br />

Email<br />

* 90 trillion – The number of emails sent on the Internet in 2009.<br />

* 247 billion – Average number of email messages per day.<br />

* 1.4 billion – The number of email users worldwide.<br />

* 100 million – New email users since the year before.<br />

* 81% – The percentage of emails that were spam.<br />

* 92% – Peak spam levels late in the year.<br />

* 24% – Increase in spam since last year.<br />

* 200 billion – The number of spam emails per day (assuming 81% are spam).<br />

Websites<br />

* 234 million – The number of websites as of December 2009.<br />

* 47 million – Added websites in 2009.<br />

Web servers<br />

* 13.9% – The growth of Apache websites in 2009.<br />

* -22.1% – The growth of IIS websites in 2009.<br />

* 35.0% – The growth of Google GFE websites in 2009.<br />

* 384.4% – The growth of Nginx websites in 2009.<br />

* -72.4% – The growth of Lighttpd websites in 2009.<br />

Domain names<br />

* 81.8 million – .COM domain names at the end of 2009.<br />

* 12.3 million – .NET domain names at the end of 2009.<br />

* 7.8 million – .ORG domain names at the end of 2009.<br />

* 76.3 million – The number of country code top-level domains (e.g. .CN, .UK, .DE, etc.).<br />

* 187 million – The number of domain names across all top-level domains (October 2009).<br />

* 8% – The increase in domain names since the year before.<br />

Internet users<br />

* 1.73 billion – Internet users worldwide (September 2009).<br />

* 18% – Increase in Internet users since the previous year.<br />

* 738,257,230 – Internet users in Asia.<br />

* 418,029,796 – Internet users in Europe.<br />

* 252,908,000 – Internet users in North America.<br />

* 179,031,479 – Internet users in Latin America / Caribbean.<br />

* 67,371,700 – Internet users in Africa.<br />

* 57,425,046 – Internet users in the Middle East.<br />

* 20,970,490 – Internet users in Oceania / Australia.<br />

Social media<br />

* 126 million – The number of blogs on the Internet (as tracked by BlogPulse).<br />

* 84% – Percent of social network sites with more women than men.<br />

* 27.3 million – Number of tweets on Twitter per day (November, 2009)<br />

* 57% – Percentage of Twitter’s user base located in the United States.<br />

* 4.25 million – People following @aplusk (Ashton Kutcher, Twitter’s most followed user).<br />

* 350 million – People on Facebook.<br />

* 50% – Percentage of Facebook users that log in every day.<br />

* 500,000 – The number of active Facebook applications.<br />

Images<br />

23


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

* 4 billion – Photos hosted by Flickr (October 2009).<br />

* 2.5 billion – Photos uploaded each month to Facebook.<br />

* 30 billion – At the current rate, the number of photos uploaded to Facebook per year.<br />

Videos<br />

* 1 billion – The total number of videos YouTube serves in one day.<br />

* 12.2 billion – Videos viewed per month on YouTube in the US (November 2009).<br />

* 924 million – Videos viewed per month on Hulu in the US (November 2009).<br />

* 182 – The number of online videos the average Internet user watches in a month (USA).<br />

* 82% – Percentage of Internet users that view videos online (USA).<br />

* 39.4% – YouTube online video market share (USA).<br />

* 81.9% – Percentage of embedded videos on blogs that are YouTube videos.<br />

Web browsers<br />

* 62.7% – Internet Explorer<br />

* 24.6% – Firefox<br />

* 4.6% – Chrome<br />

* 4.5% – Safari<br />

* 2.4% – Opera<br />

* 1.2% – Other<br />

Malicious software<br />

* 148,000 – New zombie computers created per day (used in botnets for sending spam, etc.)<br />

* 2.6 million – Amount of malicious code threats at the start of 2009 (viruses, trojans, etc.)<br />

* 921,143 – The number of new malicious code signatures added by Symantec in Q4 2009.<br />

(<strong>Source</strong>: http://hadoop-karma.blogspot.com/2010/03/how-much-data-is-generated-on-internet.html)<br />

Megabytes, Gigabytes, Terabytes... What Are They?<br />

These terms are usually used in the world of computing to describe disk space, or data storage space,<br />

and system memory. For instance, just a few years ago we were describing hard drive space using the<br />

term Megabytes. Today, Gigabytes is the most common term being used to describe the size of a hard<br />

drive. In the not so distant future, Terabyte will be a common term. But what are they? This is where it<br />

gets quite confusing because there are at least three accepted definitions of each term.<br />

According to the IBM Dictionary of computing, when used to describe disk storage capacity, a megabyte<br />

is 1,000,000 bytes in decimal notation. But when the term megabyte is used for real and virtual storage,<br />

and channel volume, 2 to the 20th power or 1,048,576 bytes is the appropriate notation. According to the<br />

Microsoft Press Computer Dictionary, a megabyte means either 1,000,000 bytes or 1,048,576 bytes.<br />

According to Eric S. Raymond in The New Hacker's Dictionary, a megabyte is always 1,048,576 bytes on<br />

the argument that bytes should naturally be computed in powers of two. So which definition do most<br />

people conform to?<br />

When referring to a megabyte for disk storage, the hard drive manufacturers use the standard that a<br />

megabyte is 1,000,000 bytes. This means that when you buy an 80 Gigabyte Hard drive you will get a<br />

total of 80,000,000,000 bytes of available storage. This is where it gets confusing because Windows uses<br />

the 1,048,576 byte rule so when you look at the Windows drive properties an 80 Gigabyte drive will report<br />

a capacity of 74.56 Gigabytes and a 250 Gigabyte drive will only yield 232 Gigabytes of available storage<br />

space. Anybody confused yet? With three accepted definitions, there will always be some confusion so I<br />

will try to simplify the definitions a little.<br />

The 1000 can be replaced with 1024 and still be correct using the other acceptable standards. Both of<br />

these standards are correct depending on what type of storage you are referring.<br />

24


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Processor or Virtual Storage Disk Storage<br />

· 1 Bit = Binary Digit<br />

· 8 Bits = 1 Byte<br />

· 1024 Bytes = 1 Kilobyte<br />

· 1024 Kilobytes = 1 Megabyte<br />

· 1024 Megabytes = 1 Gigabyte<br />

· 1024 Gigabytes = 1 Terabyte<br />

· 1024 Terabytes = 1 Petabyte<br />

· 1024 Petabytes = 1 Exabyte<br />

· 1024 Exabytes = 1 Zettabyte<br />

· 1024 Zettabytes = 1 Yottabyte<br />

· 1024 Yottabytes = 1 Brontobyte<br />

· 1024 Brontobytes = 1 Geopbyte<br />

· 1 Bit = Binary Digit<br />

· 8 Bits = 1 Byte<br />

· 1000 Bytes = 1 Kilobyte<br />

· 1000 Kilobytes = 1 Megabyte<br />

· 1000 Megabytes = 1 Gigabyte<br />

· 1000 Gigabytes = 1 Terabyte<br />

· 1000 Terabytes = 1 Petabyte<br />

· 1000 Petabytes = 1 Exabyte<br />

· 1000 Exabytes = 1 Zettabyte<br />

· 1000 Zettabytes = 1 Yottabyte<br />

· 1000 Yottabytes = 1 Brontobyte<br />

· 1000 Brontobytes = 1 Geopbyte<br />

This is based on the IBM Dictionary of computing method to describe disk storage - the simplest.<br />

<strong>Source</strong>: http://www.whatsabyte.com/<br />

Now let's go into a little more detail.<br />

Bit: A Bit is the smallest unit of data that a computer uses. It can be used to represent two states of<br />

information, such as Yes or No.<br />

Byte: A Byte is equal to 8 Bits. A Byte can represent 256 states of information, for example, numbers or a<br />

combination of numbers and letters. 1 Byte could be equal to one character. 10 Bytes could be equal to a<br />

word. 100 Bytes would equal an average sentence.<br />

Kilobyte: A Kilobyte is approximately 1,000 Bytes, actually 1,024 Bytes depending on which definition is<br />

used. 1 Kilobyte would be equal to this paragraph you are reading, whereas 100 Kilobytes would equal an<br />

entire page.<br />

Megabyte: A Megabyte is approximately 1,000 Kilobytes. In the early days of computing, a Megabyte<br />

was considered to be a large amount of data. These days with a 500 Gigabyte hard drive on a computer<br />

being common, a Megabyte doesn't seem like much anymore. One of those old 3-1/2 inch floppy disks<br />

can hold 1.44 Megabytes or the equivalent of a small book. 100 Megabytes might hold a couple volumes<br />

of Encyclopedias. 600 Megabytes is about the amount of data that will fit on a CD-ROM disk.<br />

Gigabyte: A Gigabyte is approximately 1,000 Megabytes. A Gigabyte is still a very common term used<br />

these days when referring to disk space or drive storage. 1 Gigabyte of data is almost twice the amount of<br />

data that a CD-ROM can hold. But it's about one thousand times the capacity of a 3-1/2 floppy disk. 1<br />

Gigabyte could hold the contents of about 10 yards of books on a shelf. 100 Gigabytes could hold the<br />

entire library floor of academic journals.<br />

Terabyte: A Terabyte is approximately one trillion bytes, or 1,000 Gigabytes. There was a time that I<br />

never thought I would see a 1 Terabyte hard drive, now one and two terabyte drives are the normal specs<br />

for many new computers. To put it in some perspective, a Terabyte could hold about 3.6 million 300<br />

Kilobyte images or maybe about 300 hours of good quality video. A Terabyte could hold 1,000 copies of<br />

the Encyclopedia Britannica. Ten Terabytes could hold the printed collection of the Library of Congress.<br />

That's a lot of data.<br />

Petabyte: A Petabyte is approximately 1,000 Terabytes or one million Gigabytes. It's hard to visualize<br />

what a Petabyte could hold. 1 Petabyte could hold approximately 20 million 4-door filing cabinets full of<br />

text. It could hold 500 billion pages of standard printed text. It would take about 500 million floppy disks to<br />

store the same amount of data.<br />

25


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Exabyte: An Exabyte is approximately 1,000 Petabytes. Another way to look at it is that an Exabyte is<br />

approximately one quintillion bytes or one billion Gigabytes. There is not much to compare an Exabyte to.<br />

It has been said that 5 Exabytes would be equal to all of the words ever spoken by mankind.<br />

Zettabyte: A Zettabyte is approximately 1,000 Exabytes. There is nothing to compare a Zettabyte to but<br />

to say that it would take a whole lot of ones and zeroes to fill it up.<br />

Yottabyte: A Yottabyte is approximately 1,000 Zettabytes. It would take approximately 11 trillion years to<br />

download a Yottabyte file from the Internet using high-power broadband. You can compare it to the World<br />

Wide Web as the entire Internet almost takes up about a Yottabyte.<br />

Brontobyte: A Brontobyte is (you guessed it) approximately 1,000 Yottabytes. The only thing there is to<br />

say about a Brontobyte is that it is a 1 followed by 27 zeroes!<br />

Geopbyte: A Geopbyte is about 1000 Brontobytes! Not sure why this term was created. I'm doubting that<br />

anyone alive today will ever see a Geopbyte hard drive. One way of looking at a geopbyte is 15267<br />

6504600 2283229 4012496 7031205 376 bytes!<br />

Now you should have a good understanding of megabytes, gigabytes, terabytes and everything in<br />

between. Now if we can just figure out what a WhatsAByte is......:)<br />

DATA IS ABUNDANT, INFORMATION IS USEFUL, KNOWLEDGE IS PRECIOUS.<br />

Data. – Data is raw and it’s abundant. It simply exists and has no significance beyond its existence . It<br />

can exist in any form, usable or not. It does not have meaning of itself. Collecting users activity log will<br />

produces data.<br />

Information. – Information is data that has been given meaning by way of relational connection.<br />

Knowledge. - Knowledge is the appropriate collection of information, such that its intent is to be useful.<br />

Internet users are generating petabytes of data every day. Millions of users access billions of web pages<br />

every millisecond, creating hundreds of server logs with every keystroke and mouse click. Having only<br />

user log data is not useful. To give better service to user and generate money for business it is required<br />

to process raw data and collect information which can be used for providing knowledge to users and<br />

advertisers. <strong>Source</strong>: http://www.whatsabyte.com/<br />

Based on these figures, I opine that intelligence exists out there just waiting to be tapped. Oh, come on<br />

now, you do have search engines to help research that data; it’s only 8 zetabytes! Lots of data but guess<br />

what, even Google which is considered currently the best search engine, has only indexed about 170<br />

terabytes. Now you know why I recommend using more than one search engine with good keywords to<br />

assist.<br />

Key Army Access Sites<br />

NOTE: Several links require password access.<br />

To access Intelink or to apply for a remote access account, go to https://www.intelink.gov<br />

US Army <strong>Intelligence</strong> Center Mission:<br />

The United States Army <strong>Intelligence</strong> Center's mission is Leading, Training, Equipping and<br />

Supporting the world's premier corps of Military <strong>Intelligence</strong> Professionals who are imbued with<br />

a warrior spirit, self-discipline and mutual respect.<br />

26


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The 304th Military <strong>Intelligence</strong> Battalion's Mission:<br />

https://icon.army.mil/anon/ikn_website/index.cfm?organization=304th%20MI%20Battalion<br />

The 304th Military <strong>Intelligence</strong> Battalion conducts officer training at the tactical and operational<br />

levels in support of Army, Joint, Interagency and Multinational Commands; producing competent<br />

MI professionals who are grounded in the warrior ethos and Army values and ready to deploy in<br />

support of an Army at war; simultaneously the Battalion ensures the welfare of Soldiers,<br />

civilians, and their families.<br />

<strong>Intelligence</strong> Knowledge Network (IKN):<br />

https://icon.army.mil/<br />

IKN is a Knowledge Management tool that enables <strong>Intelligence</strong> soldiers all over the world to<br />

communicate, collaborate and investigate. It hosts discussion forums, serves as a single point<br />

of entry to get to USAIC and other <strong>Intelligence</strong> Community websites, and hosts a variety of<br />

public and private web applications that support the <strong>Intelligence</strong> Community. In order to ensure<br />

that IKN continues to meet your needs, we encourage you to provide us with feedback.<br />

Must Haves References<br />

Core <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Documents & Guides<br />

NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook<br />

http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSIN<br />

T%20Handbook%20v1.2%20%2d%20Jan%202002.pdf<br />

NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Reader<br />

http://www.oss.net/dynamaster/file_archive/030201/254633082e785f8fe44f546bf5c9f1ed/NATO%20OSIN<br />

T%20Reader%20FINAL%2011OCT02.pdf<br />

<strong>Intelligence</strong> Exploitation Of The Internet<br />

http://www.oss.net/dynamaster/file_archive/030201/1c0160cde7302e1c718edb08884ca7d7/<strong>Intelligence</strong>%<br />

20Exploitation%20of%20the%20Internet%20FINAL%2018NOV02.pdf<br />

INSCOM <strong>OSINT</strong> Operations Handbook http://nipr.intelink.gov/inscom/docs/inscom_hb_v1.pdf<br />

https://www.intelink.gov/inscom/docs/inscom_hb_v1.pdf<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> FM 2-22.9 http://www.fas.org/irp/doddir/army/fmi2-22-9.pdf<br />

Untangling The WEB 2007 Edition http://nipr.intelink.gov/nsa/UTW/index.html<br />

https://www.intelink.gov/nsa/UTW/index.html<br />

<strong>Open</strong> <strong>Source</strong> Exploitation: A Guide For <strong>Intelligence</strong> Analysts<br />

http://nipr.intelink.gov/osis/training/osint_handbook_apr_04_edition.pdf<br />

https://www.intelink.gov/osis/training/osint_handbook_apr_04_edition.pdf<br />

Internet Detective a free online tutorial designed to help students develop the critical thinking<br />

required for their Internet research. The tutorial offers practical advice on evaluating the quality of<br />

websites and highlights the need for care when selecting online information sources.<br />

http://www.vts.intute.ac.uk/detective/<br />

27


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

See also<br />

One-Page <strong>OSINT</strong> <strong>Link</strong> Guide at http://www.oss.net/BASIC<br />

<strong>Directory</strong> to 30,000 pages sortable and searchable by speaker/author, year, topic, or community:<br />

http://www.oss.net/LIBRARY also re-sorted and available at http://www.oss.net/COMMUNITIES<br />

Seminal Chapter on <strong>OSINT</strong> as a Strategic All-<strong>Source</strong> <strong>Intelligence</strong> Element: http://www.oss.net/<strong>OSINT</strong>-S<br />

Seminal Chapter on <strong>OSINT</strong> as an Operational Resource Element http://www.oss.net/<strong>OSINT</strong>-O<br />

Utilization of Internet Resources for <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (Ran Hock) http://www.onstrat.com/osint<br />

<strong>OSINT</strong> <strong>Link</strong>s Collection (UK) http://www.osint.org.uk/links.html<br />

Military <strong>Intelligence</strong> Students (new to IPB/COAs/MDMP or just need a refresher) give these<br />

sites a visit.<br />

http://www.s2company.com/index.php<br />

http://www.armytoolbag.com/<br />

<strong>Global</strong> Incidents (interactive maps)<br />

Terrorism and Political Violence Threat Map 2011 (great interactive map)<br />

http://www.aon.com/risk-services/political-riskmap2/map/Interactive_Risk_Map/2011_Terrorism_Political_Violence_Map/index.html<br />

Unrest in the Arab World on Google Maps<br />

http://edition.cnn.com/SPECIALS/2011/arab.unrest/index.html<br />

http://www.mibazaar.com/meprotests.html<br />

Maersk – Track ships in real time. (we certainly do make it easy for pirates!)<br />

http://www.maerskfleet.com/#live-map<br />

Mexico Under Seige: The Drug War at Our Doorstep http://projects.latimes.com/mexico-drugwar/#/its-a-war<br />

CIA World Fact Book<br />

http://visunetdemos.demos.ibm.com/blogsamples/factbook2/FactBookSE.html<br />

Terrorist Groups Interactive Map http://www.nctc.gov/site/map/map.html<br />

Conflict Map http://nobelprize.org/educational_games/peace/conflictmap/conflictmap.html<br />

Tracking The Threat http://www.trackingthethreat.com/<br />

Nuclear Terrorism Blast Maps http://www.nuclearterror.org/blastmaps.html<br />

Worldwide Incidents Tracking System https://wits.nctc.gov/FederalDiscoverWITS/index.do?N=0<br />

Mexican Drug Cartels In The United States<br />

http://www.cnn.com/interactive/2009/05/world/map.mexican.cartels/index.html<br />

Food And Drug Incident Mapping (map displays food/medicine items…Spurious, Adulterated,<br />

Counterfeit, Contaminated, Tampered-With, Misbranded/Mislabeled, Recalled, Expired, and otherwise<br />

dangers products such as Food, Medicine, Tobacco, Alcohol, Meat/Seafood, and sometimes things like<br />

toys or jewelry, animal feed, and anything else that comes into contact with humans or things we<br />

consume) http://food.globalincidentmap.com/home.php<br />

Outbreaks <strong>Global</strong> Incident Map http://outbreaks.globalincidentmap.com/home.php<br />

Health Map <strong>Global</strong> Disease Alert Map http://www.healthmap.org/en<br />

Piracy Watch http://vfdemo.idvsolutions.com/piracy/<br />

Piracy Map 2005 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />

4<br />

28


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Piracy Map 2006 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />

3<br />

Piracy Map 2007 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />

2<br />

Piracy Map 2008 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=89<br />

Piracy Map 2009 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=21<br />

9<br />

Mapping Gang Related Activity In North America http://gangs.globalincidentmap.com/home.php<br />

USCG Ship Traffic Density Plot http://www.amver.com/density.asp<br />

Today’s Front Pages (interactive) http://www.newseum.org/todaysfrontpages/flash/default.asp<br />

News Map http://muti.co.za/static/newsmap.html<br />

Reuters AlertNet<br />

http://www.alertnet.org/map/index.htm?ct=2&style=2&ex_iso=MX,NE,TH,CD,KE<br />

Silobreaker (for those familiar with Analyst Notebook, I think you’ll like this)<br />

http://www.silobreaker.com/<br />

<strong>Global</strong> Terrorism Database http://209.232.239.37/gtd1/<br />

Interactive <strong>Global</strong> Incident Map (Terrorism Events and Other Suspicious Activity)<br />

http://www.globalincidentmap.com/<br />

PlanetData http://www.planetdata.net/worldnews/newsmap.php<br />

Google News Map http://douweosinga.com/projects/googlenewsmap<br />

Alert Map Actual Incidents http://visz.rsoe.hu/alertmap/woalert.php?lang=eng<br />

Baghdad: Mapping The Violence<br />

http://news.bbc.co.uk/2/shared/spl/hi/in_depth/baghdad_navigator/<br />

Interactive Map Beta http://www.alertnet.org/map/<br />

Public <strong>Intelligence</strong> in The Public Interest http://meta2.com/pdb/<br />

RSOE Emergency And Disaster Information Service From Budapest, Hungary<br />

http://visz.rsoe.hu/alertmap/<br />

The <strong>Global</strong> Terrorism Database (GTD) is an open-source database including information on<br />

terrorist events around the world since 1970 (currently updated through 2004). Unlike many other event<br />

databases, the GTD includes systematic data on international as well as domestic terrorist incidents that<br />

have occurred during this time period and now includes almost 80,000 cases. For each GTD incident,<br />

information is available on the date and location of the incident, the weapons used and nature of the<br />

target, the number of casualties, and -- when identifiable -- the identity of the perpetrator.<br />

http://www.start.umd.edu/data/gtd/<br />

Tracking The Threat (is database of open source information about the Al Qaeda terrorist<br />

network, developed as a research project of the FMS Advanced Systems Group. Our goal is to apply new<br />

technologies and software engineering approaches to open source intelligence while providing<br />

researchers and analysts with information about Al Qaeda) http://www.trackingthethreat.com/<br />

LiveLeak http://www.liveleak.com/live<br />

Ogle Earth Ogle Earth brings you news about virtual globes, with a special focus on Google Earth.<br />

http://www.ogleearth.com/<br />

Mapping The Future http://mappingthefuture.csis.org/imagemap.shtml<br />

http://mappingthefuture.csis.org/mappingthefuturebig2.pdf<br />

<strong>Global</strong>is - an interactive world map <strong>Global</strong>is is an interactive world atlas where you decide what<br />

is to be displayed on the map. <strong>Global</strong>is aims to create an understanding for similarities and differences in<br />

human societies, as well as how we influence life on the planet. This is primarily done using visual<br />

means. http://globalis.gvu.unu.edu/<br />

How To Use <strong>Global</strong>is http://globalis.gvu.unu.edu/doc.cfm?page=help<br />

LiveShips Map (See where water vessels are located at any time, Vessel positions may be up to<br />

one hour old or incomplete.) http://www.marinetraffic.com/ais/<br />

Vessel Tracker http://www.vesseltracker.com/en/Home.html<br />

29


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Access by Topic<br />

911 Final Report<br />

Acquisition<br />

911 Commission Final Report http://vivisimo.com/911<br />

Defense Acquisition University http://www.dau.mil/<br />

Office Of Naval Research http://www.onr.navy.mil/02/<br />

Office Of The Under Secretary Of Defense http://www.acq.osd.mil/<br />

Defense Procurement And Acquisition Policy http://www.acq.osd.mil/dpap/<br />

DoD Acquisition Information http://mems.ida.org/acquisition/dodacquisition.html<br />

Afghanistan/Pakistan<br />

Map is linked to original on web for more detail.<br />

LiveLeak Afghanistan http://www.liveleak.com/c/afghanistan<br />

Afghanistan Provincial Reconstruction Team Handbook<br />

http://usacac.army.mil/cac2/call/docs/11-16/toc.asp<br />

Afghan Security Forces Order of Battle (OOB)<br />

http://www.longwarjournal.org/oob/afghanistan/index.php<br />

Opium Survey 2011 All Regions<br />

http://www.unodc.org/documents/afghanistan//Opium_Surveys/Winter_Rapid_Assessment/Winter_asses<br />

sment_Phase_12_FINAL.pdf<br />

Paramilitary Terrorist Insurgent Groups http://cryptome.org/dodi/af-insurgents.zip<br />

UN Maps Out Afghan Security Interactive Maps<br />

http://online.wsj.com/article/SB10001424052970203568004576043842922347526.html?mod=WSJ_hp_L<br />

EFTTopStories<br />

Afghanistan War Videos http://www.afghanistanwarvideos.com/the-tau-of-terrorism<br />

30


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Afghanistan Facilities http://www.globalsecurity.org/military/facility/afghanistan.htm<br />

Afghanistan Maps http://www.globalsecurity.org/military/world/afghanistan/maps.htm<br />

Kajaki Dam Afghanistan http://cryptome.org/eyeball/kajaki-dam/kajaki-dam.htm<br />

Afghanistan Special Coverage http://www.thrall.org/special/af.html<br />

Afghanistan Maps http://www.lib.utexas.edu/maps/afghanistan.html<br />

All Afghanistan News<br />

http://topics.nytimes.com/top/news/international/countriesandterritories/afghanistan/index.html?scp=1spot&sq=afghanistan&st=cse<br />

AfPak Daily Brief has terrific analysis from experts and publishes a daily brief of the latest<br />

news from the region. http://www.pbs.org/wgbh/pages/frontline/talibanlines/etc/links.html<br />

Wikileaks http://wikileaks.org/wiki/Category:Afghanistan<br />

Civil-Military Overview https://cmo.act.nato.int/Pages/CMOwelcome.aspx<br />

The Afghanistan Airport Guide<br />

http://www.the-airport-guide.com/search.php?by=country&search=Afghanistan<br />

Airports and Bases http://eyeball-series.org/af-bases/af-bases.htm<br />

Asadabad Fire Base Helicopter Landing Zone<br />

Bagram<br />

Gardez South Helicopter Landing Zone<br />

Herat<br />

Jalalabad<br />

Kabul International<br />

Kandahar<br />

Khost<br />

Kunduz<br />

Maimana<br />

Marnah Ghar<br />

Mazar I Sharif<br />

Sheberghan<br />

Shindand<br />

Tereen<br />

Pakistan Maps. I have included Pakistan because of their common border and the role being<br />

played out by the insurgents. http://www.nps.edu/Programs/CCS/Pakistan_Index.html<br />

Afghanistan Information Management Services (great source for various maps) Should be of<br />

interest to all branches. http://www.aims.org.af/root.aspx?seckeyz=39<br />

Kabul Specific Maps http://www.nps.edu/Programs/CCS/Kabul.html<br />

Afghanistan<br />

https://www.intelink.gov/sharepoint/osp/Afghanistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Afghanistan Order of Battle 2007 FOUO (listed as FOUO but yet anyone can have access to it)<br />

http://cryptome.org/dodi/afghan-battle.zip<br />

Afghanistan Terrain Analysis FOUO (can be accessed by anyone)<br />

http://cryptome.org/dodi/afghan-terrain.zip<br />

Winning In Afghanistan http://cryptome.com/0001/afghan-win.htm<br />

Africa<br />

Africa <strong>Intelligence</strong> http://www.africaintelligence.com/<br />

Business Council For Africa http://www.bcafrica.co.uk/<br />

AFRICOM Search by Country (great interactive map) http://www.africom.mil/interactiveMap.asp<br />

Civil-Military Overview https://cmo.act.nato.int/Pages/CMOwelcome.aspx<br />

AFRICOM<br />

31


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

https://www.intelink.gov/sharepoint/osp/AFRICOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

AFRICOM Command Overview (labeled FOUO but in the public domain) africom-overview.zip<br />

http://cryptome.org/dodi/africom-02.zip<br />

Terrorism and U.S. Counter-Terrorism Programs in Africa: An Overview<br />

http://www.ccc.nps.navy.mil/si/2007/Jan/piomboJan07.pdf<br />

Center For African Studies http://ica.stanford.edu/?q=afr<br />

Africa Online http://www.metrostage.com/africa_online.htm<br />

African States List http://www.metrostage.com/africa_list.htm<br />

The African Continent http://www.maryknollafrica.org/AfricaMap.htm<br />

Africa Facts http://www.maryknollafrica.org/Facts2.htm<br />

http://www.calacademy.org/exhibits/africa/exhibit/facts/index.html<br />

Index Of Maps For Africa http://www.lib.utexas.edu/maps/africa/<br />

Democracy Index http://www.economist.com/media/pdf/DEMOCRACY_INDEX_2007_v3.pdf<br />

Index Of Country Information http://geoinfo.uneca.org/sdiafrica/country%20information/<br />

The Index On Africa http://www.afrika.no/index/index.html<br />

African Studies Center http://www.africa.upenn.edu/Home_Page/Country.html<br />

Agriculture<br />

Agricultural Terrorism http://www.mipt.org/Agricultural-Terrorism.asp<br />

http://cns.miis.edu/pubs/npr/vol07/73/73casa.pdf<br />

Economic Research Service http://www.ers.usda.gov/<br />

http://www.ers.usda.gov/statefacts/<br />

http://www.usda.gov/homelandsecurity/<br />

Al Qaeda/Taliban<br />

The Jawa Report http://mypetjawa.mu.nu/archives/197125.php<br />

High-Tech Terror: Al-Qaeda’s Use of New Technology<br />

http://fletcher.tufts.edu/forum/archives/pdfs/30-2pdfs/brachman.pdf<br />

The Al Qaeda Manual http://www.disastercenter.com/terror/index.htm<br />

http://www.geocities.com/m_alu3dad4/<br />

http://www.thesmokinggun.com/archive/jihadmanual.html<br />

Documents from the Harmony Database http://www.ctc.usma.edu/harmony_docs.asp<br />

How To Be A Jihadi: Talibans Training Secrets<br />

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/08/16/wtaliban116.xml<br />

Tracking The Threat (is database of open source information about the Al Qaeda terrorist<br />

network, developed as a research project of the FMS Advanced Systems Group. Our goal is to apply new<br />

technologies and software engineering approaches to open source intelligence while providing<br />

researchers and analysts with information about Al Qaeda) http://www.trackingthethreat.com/<br />

Aljazeera<br />

Aljazeera On You Tube http://www.youtube.com/aljazeeraenglish<br />

http://english.aljazeera.net/<br />

http://english.aljazeera.net/watch_now/<br />

32


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Ammunition Plants and Depots<br />

25 Ammunition Plants http://cryptome.org/eyeball/ammo/ammo-eyeball.htm<br />

Area/International Codes<br />

Area Code Listing by Number http://www.bennetyee.org/ucsd-pages/area.html<br />

All Area Codes http://www.allareacodes.com/area_code_listings_by_state.htm<br />

Canadian Code Availability http://www.cnac.ca/mapcodes.htm<br />

Geographic Areas http://www.loc.gov/marc/geoareas/<br />

U.S. Area Codes and Time Zones<br />

http://www.nanpa.com/area_code_maps/usmaps/USA_NPA_63_2_100.jpg<br />

Area Codes Map http://www.nanpa.com/area_code_maps/ac_map_static.html<br />

http://www.nanpa.com/area_code_maps/ac_map_flash.html<br />

International Dialing Codes http://www.aglobalworld.com/cgi-local/codes.pl<br />

Armies Of The World<br />

Aviation<br />

Armed Forces Of The World<br />

http://www.strategypage.com/fyeo/howtomakewar/databases/armies/default.asp<br />

From Wikipedia http://en.wikipedia.org/wiki/Army<br />

Armies Of The World http://topgun.rin.ru/cgi-bin/texts.pl?mode=select&category=state&lng=eng<br />

Combined Arms Research Library http://www-cgsc.army.mil/carl/gateway/military_arm_int.asp<br />

Conscription And Armies Of The World http://www.c3.hu/~farkashe/english/countries.htm<br />

World Map Showing Top 10 Countries With Largest Armies In The World<br />

http://www.mapsofworld.com/world-top-ten/world-top-ten-countries-with-largest-armies-map.html<br />

List Of Countries By Size Of Armed Forces<br />

http://en.wikipedia.org/wiki/List_of_countries_by_size_of_armed_forces<br />

Rank Insignia http://hemsidor.torget.se/users/k/klix/grader_e.html<br />

The Worlds Armed Forces <strong>Link</strong>s http://www.armedforces.co.uk/linksworldarmies.htm<br />

Armed Forces of the World Discussion Board<br />

http://www.strategypage.com/militaryforums/30-14422.aspx<br />

Track Planes in Real-Time with Google Maps (we just continue to make it easier for terrorists like<br />

Al Qaeda to shoot down an aircraft. Aircraft and airports are very secure and getting inside poses a high<br />

degree of risk, however, shooting down an aircraft away from the terminal would make a statement that<br />

aviation still is not that safe.) http://planefinder.net/<br />

Airport Law Enforcement Agencies Network (ALEAN) http://www.alean.com/<br />

World Aero Data http://worldaerodata.com/<br />

Worldwide Airfield Maps http://www.airfieldmaps.co.uk/<br />

Thirty Thousand Feet http://www.thirtythousandfeet.com/airports.htm<br />

World Aeronautical Database http://www.worldaerodata.com/<br />

World Airport Database http://www.world-airport-database.com/<br />

http://www.tyzo.com/suppliers/airports.html<br />

World Airport Codes http://www.world-airport-codes.com/<br />

Airports of The World http://www.flightstats.com/go/Airport/airportsOfTheWorld.do<br />

World Airport Dirctory http://airportz.info/<br />

33


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.azworldairports.com/azworld/p2430.cfm<br />

The Airport Guide http://www.the-airport-guide.com/index.php<br />

Aviation Magazines http://www.world-newspapers.com/aviation.html<br />

Airport directory, flight planning, weather http://map.aeroplanner.com/mapping/chart/aptsel.cfm<br />

US military bases (Air Force Bases, Navy Bases, Marines Bases, Coast Guard Air Stations and<br />

Army Air Fields) all over the world. http://www.globemaster.de/bases.html<br />

Airport Search https://www.afd.scott.af.mil/<br />

Airport Information http://www.airnav.com/airports/<br />

Airport hotels, limo, quick aids http://www.quickaid.com/<br />

Flight planning & aviation weather http://www.baseops.net/<br />

Air traffic publications library http://nwp.natca.net/Administration/Documents/Airtrafficpublications/<br />

Aviation crime prevention http://www.acpi.org/<br />

Aviation weather at BASEOPS http://www.baseops.net/metro.html<br />

Defense Internet NOTAM Service https://www.notams.jcs.mil/<br />

Regulatory Support Division http://afs600.faa.gov/default.htm<br />

National Aviation Safety Data Analysis Center<br />

https://www.nasdac.faa.gov/servlet/page?_pageid=213,215&_dad=nasdac&_schema=NASDAC<br />

Interagency Airspace Coordination http://www.fs.fed.us/r6/fire/aviation/airspace/web/index.html<br />

National Air Traffic Controllers Association http://www.natca.org/<br />

National Transportation Safety Board http://www.ntsb.gov/<br />

U.S. Military Aviation http://www.globalsecurity.org/<br />

World Aeronautical Database http://www.worldaerodata.com/<br />

Airports Quick Aid http://www.quickaid.com/<br />

Airports Serving Mexican Border Region http://www.borderplanning.fhwa.dot.gov/maps.asp<br />

Pilot Getaways http://www.landings.com/<br />

FAA Notices To Airmen http://www.faa.gov/NTAP/<br />

Airport Taxi Diagrams http://www.aopa.org/asf/publications/taxi/<br />

Airport Codes Of The World http://www.photius.com/wfb2001/airport_codes_alpha.html<br />

Air Force Overviews (In this section you can find lots of information on several Air Forces. Orders<br />

of battle, databases, aircraft overviews of Armed Forces all over the world are presented here.)<br />

http://www.scramble.nl/airforces.htm<br />

Air Power Australia (includes other countries) http://www.ausairpower.net/<br />

Banking & Finance<br />

Biometrics<br />

Banking & Financial Crimes<br />

http://encyclopedia.thefreedictionary.com/banking+and+financial+crimes<br />

Financial Crimes Enforcement Network http://www.fincen.gov/index.html<br />

http://www.ncjrs.org/ondcppubs/publications/policy/99ndcsbudget/financial.html<br />

Financial Scandals http://www.ex.ac.uk/~RDavies/arian/scandals/<br />

Countering Financial Crime Risks in Information Security<br />

http://www.fsa.gov.uk/pubs/other/fcrime_sector.pdf<br />

Money Laundering and Financial Crimes http://www.state.gov/g/inl/rls/nrcrpt/2001/rpt/8487.htm<br />

Money Laundering, Terrorism and Financial Institutions<br />

http://www.civicresearchinstitute.com/moneylaundering/fedreg02.html<br />

Money Laundering http://www.moneylaundering.com/links/<br />

Transnational Threats http://www.csis.org/tnt/rc/finance.html<br />

United States Secret Service http://www.secretservice.gov/financial_crimes.shtml<br />

34


BLOGS<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Biometrics Task Force http://www.biometrics.dod.mil/<br />

Combined Arms Center http://usacac.army.mil/cac2/call/index.asp<br />

Biometrics Enterprise Center http://biometricesc.mi.army.mil/default.aspx<br />

Introduction to Biometrics http://www.biometrics.org/html/introduction.html<br />

DoD Biometrics<br />

http://www.biometrics.org/bc2007/presentations/Thu_Sep_13/Session_I/13_Dee_DOD.pdf<br />

Where Do We Biometrics Want To Go<br />

http://ec.europa.eu/research/science-society/pdf/biometrics/16-max_snijder_en.pdf<br />

Biometric Training http://biometricesc.mi.army.mil/training/default.aspx<br />

<strong>Link</strong>s to Biometric Technology Websites http://www.biometrics.org/links.htm<br />

Biometrics 101 Tutorial<br />

http://www.biometrics.dod.mil/ReferenceTutorials/Biometrics101/tabid/86/Default.aspx<br />

Biometrics Glossary<br />

http://www.biometrics.dod.mil/ReferenceTutorials/BiometricsGlossary/tabid/87/Default.aspx<br />

By David F. Carr DOD: Be wary of social media's 'loose lips'<br />

In an earlier era, “loose lips sink ships” was the military’s warning not to let even small details<br />

about military movements and operations slip in casual conversation. In contrast, social media Web sites<br />

today thrive on loose lips, making it even tougher to maintain operational security. Even the smallest<br />

details shared on social media sites can play a role in security breaches.<br />

WASHINGTON — Everyone from troops in the field to the highest brass and civilian leaders will be<br />

allowed to Twitter, blog and use Facebook and other social networking sites on the military's nonclassified<br />

computer network, the Pentagon has announced.<br />

The new policy follows a seven-month review in which the Defense Department weighed the threats and<br />

benefits of allowing the wide use of emerging Internet capabilities. It essentially seeks to manage the<br />

risks while acknowledging the Internet is proving a powerful tool for a myriad of tasks including recruiting,<br />

public relations, collaboration with a wide range of people and for communications between troops and<br />

their families.<br />

To guard security, it allows commanders to cut off access – on a temporary basis only – if that's required<br />

to safeguard a mission or reserve bandwidth for official use. The new directive also makes practices<br />

uniform across the entire department, in which different commands previously blocked certain things<br />

while others didn't. Visiting sites for pornography, gambling or hate-crime activities is still prohibited on<br />

military computers.<br />

"We need to take advantage of these capabilities that are out there – this Web 2.0 phenomena," said<br />

David M. Wennergren, deputy assistant secretary of defense for information technology. "The idea is be<br />

responsible and use these tools to help get the job done."<br />

The new directive means that YouTube, MySpace and more than a dozen sites blocked by the Pentagon<br />

in May 2007 will be unblocked, he said. The Pentagon said at the time that the use of video sites in<br />

particular was straining its network and using too much of its bandwidth. But Wennergren said Friday that<br />

the move failed to stem the use of bandwidth because people just went to alternate sites.<br />

http://www.fcw.com/Articles/2009/06/22/Operational-Security-Presentation.aspx<br />

BLOGS, like social sites, are good sources of information harvesting for intelligence purposes if<br />

you have the time and patience, especially the time. Good keyword searching will cut down on the time<br />

35


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

you spend on BLOGS if your only reason for being there is to harvest information. It is very easy to get<br />

distracted though with all the videos that appear daily and you have to be focused on the task. I think that<br />

too much information is being passed around. A good analyst, foreign or domestic, can put together<br />

enough information from BLOGS to build a good intelligence file. However, I realize that people are not<br />

going to shut them down and too many folks out there want access to them.<br />

Public <strong>Intelligence</strong> http://www.phibetaiota.net/<br />

World Blogs (One of the Web’s largest and most comprehensive directories of World<br />

Blogs, sorted by country and region.) http://www.worldpress.org/blogs.htm<br />

Top 100 Blogs http://technorati.com/pop/blogs/<br />

Fresh brewed news plus stewing views http://www.memeorandum.com/<br />

<strong>Global</strong> Politics, Economics & Ideas http://www.foreignpolicy.com/resources/bgn.php<br />

http://www.foreignpolicy.com/resources/links.php<br />

Infoshop http://www.infoshop.org/inews/index.php?topic=16<br />

Rantburg http://rantburg.com/index.php<br />

Counterterrorism http://counterterrorismblog.org/<br />

Technorati (scours the blogosphere) http://www.technorati.com/<br />

Informed Comment http://www.juancole.com/<br />

Excellent Blog on Iranian Naval Capabilities<br />

http://www.freerepublic.com/focus/f-news/1790191/posts<br />

Iranian Blogs http://www.iraniansblogs.com/<br />

Local Blogdigger http://local.blogdigger.com/index.html<br />

Google Blog Search http://blogsearch.google.com/<br />

World Blogs (One of the Web’s largest and most comprehensive directories of World Blogs, sorted by<br />

country and region.)<br />

BLOGS, like social sites, are good sources of information harvesting for intelligence purposes if you have<br />

the time and patience, especially the time. Good keyword searching will cut down on the time you spend<br />

on BLOGS if your only reason for being there is to harvest information. It is<br />

very easy to get distracted though with all the videos that appear daily and<br />

you have to be focused on the task. Personally, I think that too much<br />

information is being passed around. A good analyst, foreign or domestic,<br />

can put together enough information from BLOGS to build a good<br />

intelligence file. However, I realize that people are not going to shut them<br />

down and too many folks out there want access to them. Be careful how<br />

you use them. Once you post information to a Blog it is basically there<br />

forever.<br />

Africa<br />

Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi,<br />

Cameroon, Cape Verde, Chad, Congo, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Ivory<br />

Coast, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritius, Morocco, Mozambique,<br />

Namibia, Niger, Nigeria, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, South Africa,<br />

Swaziland, Tanzania, Togo, Tunisia, Uganda, Zambia, Zimbabwe<br />

Americas<br />

36


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Antigua and Barbuda, Argentina, Bahamas, Barbados, Belize, Bermuda, Bolivia, Brazil,<br />

British Virgin Islands, Canada, Cayman Islands, Chile, Colombia, Columbia, Costa Rica,<br />

Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Grenada, Guatemala, Guyana,<br />

Haiti, Honduras, Jamaica, Mexico, Montserrat, Nicaragua, Panama, Paraguay, Peru, Saint<br />

Kitts and Nevis, Saint Lucia, Saint Maarten, Saint Vincent and the Grenadines, Suriname,<br />

Trinidad, Trinidad and Tobago, Trinidad and Togago, Turks and Caicos, United<br />

States/<strong>Global</strong>, United States/Puerto Rico, Uruguay, Venezuela<br />

Asia-Pacific<br />

Afghanistan, Australia, Bangladesh, Cambodia, China, Cook Islands, Fiji, Hong Kong, India,<br />

Indonesia, Japan, Kazakstan, Korea, Kyrgyzstan, Malaysia, Mongolia, Myanmar, Nepal, New<br />

Zealand, Pakistan, Philippines, Singapore, South Korea, Sri Lanka, Taiwan, Thailand,<br />

Uzbekistan, Vietnam<br />

Europe<br />

Albania, Andorra, Armenia, Austria, Belarus, Belgium, Bulgaria, Chechnya, Denmark,<br />

Estonia, Finland, France, Georgia, Germany, Greece, Hungary, Ireland, Italy, Lithuania,<br />

Luxembourg, Malta, Moldova, Netherlands, Norway, Poland, Portugal, Romania, Russia,<br />

Slovenia, Spain, Trinidad and Tobago, Turkey, Ukraine, United Kingdom/Great Britain,<br />

United Kingdom/Scotland, United Kingdom/Wales<br />

Middle East<br />

Bahrain, Egypt, Iran, Iraq, Israel and the Occupied Territories, Jordan, Kuwait, Lebanon,<br />

Libya, Oman, Saudi Arabia, Sudan, Syria, United Arab Emirates, Yemen<br />

37


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Bomb Threat Stand-Off Distances<br />

Chart http://www.nctc.gov/docs/2006_calendar_bomb_stand_chart.pdf<br />

38


Bridges<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Top ten links to bridges http://www.tenlinks.com/engineering/civil/bridges.htm<br />

Bridges of the world http://glasssteelandstone.com/ByTypeBridges.html<br />

Famous bridges of the world http://www.civl.port.ac.uk/comp_prog/bridges1/<br />

http://architecture.about.com/od/famousbridges/<br />

Bridge technology http://www.fhwa.dot.gov/bridge/<br />

Steel bridges in the world http://www.sbi.se/omraden/o_dokument.asp?dId=84<br />

http://www.sbi.se/uploaded/dokument/files/Steel%20Bridges%20by%20SBI_ver3.03.pdf<br />

Bridges in 3D http://www.3dphoto.net/stereo/world/topics/bridges.html<br />

Bridges in the United States<br />

http://www.4reference.net/encyclopedias/wikipedia/Bridges_in_the_United_States.html<br />

http://encyclopedia.thefreedictionary.com/Bridges+in+the+United+States<br />

http://en.wikipedia.org/wiki/List_of_bridges_in_the_United_States<br />

Timber bridges in the U.S. http://www.tfhrc.gov/pubrds/winter97/p97wi32.htm<br />

Number Of Bridges In the U.S. (As of October 2004 there are 594,470 highway bridges in the<br />

United States. This includes all bridges of 20 foot or greater length that carry roadways open to the public.<br />

It does not include railroad bridges.) <strong>Source</strong>: November 2004 issue of Better Roads. They have been<br />

reporting these numbers, broken down by state, annually since 1979.<br />

http://www.abcdpittsburgh.org/FAQ1.htm<br />

Total Bridges by State http://www.statemaster.com/graph/trn_bri_tot_num-transportationbridges-total-number<br />

Center for Army Lessons Learned (CALL)<br />

CALL https://call2.army.mil/Login.aspx?ReturnUrl=%2fdefault.aspx<br />

Central <strong>Intelligence</strong> Agency<br />

CIA Records Search Tool http://www.fas.org/irp/cia/product/index.html<br />

The Shorthand of Experience (This true story of an exceptional spy has been reconstructed from<br />

records of the postwar debriefings of participants and witnesses to his adventures). This is the story of<br />

two men who broke nearly every rule in the spy’s handbook, and were right.<br />

http://cryptome.org/0003/cia-shorthand.pdf<br />

Interactive CIA World Fact Book<br />

http://visunetdemos.demos.ibm.com/blogsamples/factbook2/FactBookSE.html<br />

Hypnotism and Military Applications http://cryptome.org/0003/cia-hypnotism1.pdf<br />

Hypnotism and Covert Operations http://cryptome.org/0003/cia-hypnotism2.pdf<br />

CIA Torture Memos Declassified http://cryptome.org/olc-cia-torture.zip<br />

Details of 'Covered Up' CIA Flights to Poland http://cryptome.org/0001/cia-pl-flights.htm<br />

http://www.signonsandiego.com/news/2010/feb/22/details-posted-on-alleged-cia-flights-to-poland/<br />

CIA Assigned Polish Spies for Its Use in 2002 http://cryptome.org/0001/cia-pl-spies.htm<br />

The CIA Memory Hole<br />

http://www.trinicenter.com/modules.php?name=News&new_topic=85<br />

http://www.propagandamatrix.com/articles/november2006/051106Torture.htm<br />

CIA Classifies Cryptome Dossier http://cryptome.org/0002/<br />

CAMS Around the World<br />

39


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

(why would CAMS be included in this handout? Imagine being told you have to deploy to a certain<br />

country to conduct an operation. You are told the weather is 40 degrees with a heavy overcast and it is<br />

drizzling. You can only imagine an image of what it looks like. However, with a weather cam of the area<br />

the image is vivid and in real time. Most major cities around the world have cams showing certain parts of<br />

the city which can be very helpful when planning an operation. They can show areas to avoid and roads<br />

that support your equipment.)<br />

World Web Cams http://www.fisgonia.com/<br />

Live weather images http://www.weatherimages.org/weathercams/<br />

http://cirrus.sprl.umich.edu/wxnet/wxcam.html<br />

Worldwide WEB Cams http://www.leonardsworlds.com/countries.html<br />

http://skiwillie.com/cams.htm<br />

http://www.arvada.com/spider/webcams/<br />

http://www.rt66.com/ozone/cam.htm<br />

ABC7 WEB Cam http://abclocal.go.com/kabc/news/032301_FS_web_cam.html<br />

US/Worldwide Airport WEB Cams http://www.leonardsworlds.com/airports/airframe.html<br />

http://www.leonardsworlds.com/capitals/index.html<br />

EarthCam http://www.earthcam.com/<br />

EarthCam Map Search http://www.earthcam.com/mapsearch/<br />

http://search.earthcam.com/search_cam.php?offset=0&cat=WEA<br />

CAMSCAPE http://www.camscape.com/<br />

WEBCAM <strong>Directory</strong> http://members.tripod.com/~Barusa/webcams/intlwx.htm<br />

http://www.leonardsworlds.com/camera.html<br />

Railroad Cams http://www.railroaddata.com/rrlinks/Webcams/United_States/index.html<br />

WEB Cam Directories<br />

http://www.leonardsworlds.com/webcam_directories/webcam_directories.htm<br />

Weather CAMS http://www.weatherwatchers.org/wxcam/<br />

Chemical/Biological/Radiological<br />

How Terrorists Might Infect U.S. Poultry with Bird Flu<br />

http://publicintelligence.info/DHS-AvianFlu.pdf<br />

CBRNE Terrorism Newsletter http://www.cbrne-terrorism-newsletter.com/<br />

Radiation Dose Chart<br />

http://sourcesandmethods.blogspot.com/2011/04/understanding-radiation-dosage-levels.html<br />

Chemical Terrorism Fact Sheet http://cryptome.org/phosphine.pdf<br />

WMD Manual for First Responders http://cryptome.org/wmd-manual.zip<br />

Biological Attack Fact Sheet<br />

http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/BiologicalAttack.aspx<br />

Chemical Attack Fact Sheet<br />

http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/ChemicalAttack.aspx<br />

Nuclear Attack Fact Sheet<br />

http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/NuclearAttack.aspx<br />

Radiological Attack Fact Sheet<br />

http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/RadiologicalAttack.as<br />

px<br />

Chemical and Biological Defense http://www.cbiac.apgea.army.mil/<br />

http://www.cbaci.org/cbaci/index.html<br />

GLADBAD – A searchable database of databases<br />

http://www.chem.gla.ac.uk/protein/jeremy/database/DBform.html<br />

Chemical Stockpile Emergency Preparedness Plan http://emc.ornl.gov/CSEPPweb/<br />

Emergency Preparedness and Response http://www.bt.cdc.gov/<br />

40


China<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Biological and Chemical Terrorism http://www.cdc.gov/mmwr/preview/mmwrhtml/rr4904a1.htm<br />

http://www.cdc.gov/mmwr/PDF/RR/RR4904.pdf<br />

http://www.stimson.org/cbw/?SN=CB2001121259<br />

Bioterrorism http://www.academicinfo.net/terrorismbio.html<br />

Chemical Terrorism http://www.health.state.ny.us/nysdoh/bt/chemical_terrorism/chemterr.htm<br />

http://www.cidrap.umn.edu/cidrap/content/other/chem/index.html<br />

http://www.health.state.mn.us/divs/eh/emergency/chemical/index.htm<br />

http://www.unc.edu/depts/spice/chemical.html<br />

Chemical Agents http://www.bt.cdc.gov/agent/agentlistchem.asp<br />

http://cdp.dhs.gov/pdfs/agert/Chemical_Agents.pdf<br />

Responding to Chemical Terrorism http://www.opcw.org/resp/<br />

Chemical and Biological Weapons Resource Page http://www.unc.edu/depts/spice/chemical.html<br />

The most dangerous U.S. chemical facilities http://cryptome.org/chem/chem-danger.htm<br />

http://eyeball-series.org/chem/51chem-eyeball.htm<br />

Biological Agents http://cdp.dhs.gov/pdfs/agert/Biological_Agents.pdf<br />

Radiological Materials and Nuclear Weapons<br />

http://cdp.dhs.gov/pdfs/agert/Radiological_Materials.pdf<br />

Chem/Bio/Nuclear Anti Terrorism http://www.nbcnco.com/<br />

Chemical Agents http://www.bt.cdc.gov/agent/agentlistchem.asp<br />

Chemical Terrorism Wall Chart http://www.unc.edu/depts/spice/chemical.html<br />

http://www.unc.edu/depts/spice/chart.pdf<br />

http://www.unc.edu/depts/spice/bioter2.pdf<br />

Bioterrorist Agents http://www.informedsource.info/images/bioterrorism%20chart.pdf<br />

Chemical Terrorism Agents and Syndromes<br />

http://www.informedsource.info/images/chemical-terrorism.pdf<br />

Chemical and Biological Weapons Resource Page http://cns.miis.edu/research/cbw/index.htm<br />

Glossary Of BioChem Terrorism http://www.yourdictionary.com/library/terror.html#geography<br />

Chemical And Biological Weapon Site http://www.cdi.org/issues/cbw/<br />

Chemical Casualty https://ccc.apgea.army.mil/<br />

Anthrax http://www.nctc.gov/site/technical/anthrax.html<br />

Biological Threats http://www.nctc.gov/site/technical/biological_threats.html<br />

Chemical Agents http://www.nctc.gov/site/technical/chemical_agents.html<br />

Indicators of a Possible Chemical Incident<br />

http://www.nctc.gov/site/technical/chemical_incident.html<br />

Ricin http://www.nctc.gov/site/technical/ricin.html<br />

Chinese Aircraft Carrier http://www.snopes.com/photos/military/chinacarrier.asp<br />

http://www.truthorfiction.com/rumors/c/China-New-Aircraft-Carrier.htm<br />

http://www.bbc.co.uk/news/world-asia-pacific-13692558<br />

China Military Power Mashup China Powerful Military News, images and videos information<br />

http://www.china-defense-mashup.com/<br />

Chinese Stealth Aircraft Photos (Clint Eastwood where are you?)<br />

http://cryptome.org/0003/cn-stealth.pdf<br />

http://bbs.rednet.cn/thread-24610276-1-1.html<br />

Military and Security Developments Involving the People’s Republic of China 2010<br />

http://www.globalsecurity.org/military/library/report/2010/2010-prc-military-power.pdf<br />

Wikileaks http://wikileaks.org/wiki/Category:China<br />

Chinese Military Power http://www.sinodefence.com/<br />

http://www.comw.org/cmp/<br />

41


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.sinodefence.com/military/default.asp<br />

China<br />

https://www.intelink.gov/sharepoint/osp/China%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Military Power Of The People’s Republic Of China 2009<br />

http://www.defenselink.mil/pubs/pdfs/China_Military_Power_Report_2009.pdf<br />

PRC Airports And Bases http://eyeball-series.org/cn-bases/cn-bases.htm<br />

PRC Military Air Bases http://eyeball-series.org/cn-mil-air2/cn-mil-air2.htm<br />

China's Nuclear Weapons Facilities http://eyeball-series.org/prc-nukes/prc-nukes.htm<br />

This shows selected PRC nuclear weapons testing sites, research and manufacturing facilities,<br />

missile defense sites, satellite launch facilities, weapons storage areas and a submarine base.<br />

Compare to US Nuclear Weapons Facilities: http://eyeball-series.org/nwsa/nwsa-eyeball.htm<br />

http://eyeball-series.org/kumsc-eyeball/kumsc-eyeball.htm<br />

http://eyeball-series.org/pantex-eyeball.htm<br />

http://eyeball-series.org/daf-eyeball.htm<br />

http://eyeball-series.org/lanl/lanl-eyeball.htm<br />

http://eyeball-series.org/llnl/llnl-eyeball.htm<br />

http://eyeball-series.org/ornl-eyeball.htm<br />

http://eyeball-series.org/nellis-eyeball.htm<br />

http://eyeball-series.org/cnws-eyeball.htm<br />

http://eyeball-series.org/kings/kings-eyeball.htm<br />

http://eyeball-series.org/bangor-eyeball.htm<br />

http://www.atomicarchive.com/Almanac/PRCFacilities.shtml<br />

http://www.fas.org/nuke/guide/china/index.html<br />

http://www.globalsecurity.org/wmd/world/china/nuke.htm<br />

http://www.nti.org/db/china/wnwmdat.htm<br />

http://www.cdi.org/issues/nukef&f/database/chnukes.html<br />

http://www.nuclearfiles.org/menu/key-issues/nuclear-weapons/issues/facilities/chinese-nuclear-weaponsfacilities.htm<br />

Maps of China http://www.maps-of-china.com/index.shtml<br />

The China Post News http://www.chinapost.com.tw/<br />

Submarines<br />

http://www.strategypage.com/fyeo/howtomakewar/databases/submarine_database/submarines.asp<br />

China Brief http://www.jamestown.org/publications_view.php?publication_id=4<br />

http://www.jamestown.org/publications_archives.php?publication_id=4<br />

Chinese-Russian exercise with ships, tank, aircraft etc.<br />

http://video.google.com/videoplay?docid=-8842216285861816122<br />

http://video.google.com/videoplay?docid=1457349235872084447<br />

Military Power of the People’s Republic of China<br />

http://www.globalsecurity.org/military/library/report/2006/2006-prc-military-power.htm<br />

Chinese Military Power http://www.comw.org/cmp/<br />

Chinese Defence Today http://www.sinodefence.com/<br />

China Leadership Monitor http://www.hoover.org/publications/clm<br />

China Today (military weapons and equipment) http://www.chinatoday.com/arm/<br />

Chinese Air/Land/Sea Strike Missiles http://www.softwar.net/c801.html<br />

The New Chinese Air Force http://www.softwar.net/plaaf.htm<br />

Chinese Missile Page http://www.softwar.net/dongfeng.html<br />

People’s Daily Online (English version) http://english.peopledaily.com.cn/<br />

http://english.people.com.cn/rss/China.xml<br />

China Air & Naval Power http://china-pla.blogspot.com/<br />

Sino Defence http://www.sinodefence.com/<br />

China's J-10: An Imagery Analysis<br />

http://intellibriefs.blogspot.com/2008/01/chinas-j-10-imagery-analysis.html<br />

42


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Hypothetical attack on U.S. outlined by China<br />

http://www.airforcetimes.com/news/2008/01/airforce_china_strategy_080121/<br />

The Chinese SAM Network http://geimint.blogspot.com/2008/01/chinese-sam-network.html<br />

China’s Emerging Air-To-Air Missiles<br />

http://www.strategycenter.net/research/pubID.181/pub_detail.asp<br />

China’s Military Power Reports http://www.defenselink.mil/pubs/china.html<br />

China’s Cyber-Militia<br />

http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948<br />

China’s Navy Into The Wild Blue Yonder<br />

http://www.economist.com/world/asia/displaystory.cfm?story_id=11496828<br />

Chinese Nuclear Forces http://www.thebulletin.org/files/064003009.pdf<br />

China Air And Naval Power http://china-pla.blogspot.com/<br />

China Defense Today http://www.sinodefence.com/<br />

Military Aviation http://cnair.top81.cn/link.htm<br />

Collective <strong>Intelligence</strong><br />

Initiatives To Harness The Power Of Collective <strong>Intelligence</strong> http://www.gizmag.com/go/6310/<br />

Good Thinking http://www.gizmag.com/goodthinking/<br />

Are You Thinking What I’m Thinking<br />

http://technology.timesonline.co.uk/printFriendly/0,,2140-7-2400772-18670,00.html<br />

Handbook Of Collective <strong>Intelligence</strong> http://www.socialtext.net/mit-cci-hci/index.cgi<br />

Collective <strong>Intelligence</strong> Networks http://colabria.sharepointsite.net/cin/default.aspx<br />

COLLECTIVE INTELLIGENCE: Creating a Prosperous World at Peace http://www.oss.net/CIB<br />

Computer Forensics<br />

Anti-Forensics http://cryptome.org/0003/anti-forensics.pdf<br />

COFFEE (free Computer Online Forensic Evidence Extractor Tools)<br />

Incident Response Collection Report http://tools.phantombyte.com/<br />

First Responder Evidence Disk (FRED)<br />

http://www.forensicswiki.org/wiki/First_Responder%27s_Evidence_Disk<br />

Windows Forensic Toolchest http://www.foolmoon.net/security/wft/<br />

Forensic Acquisition Utilities http://www.gmgsystemsinc.com/fau/<br />

Windows Forensic Toolkit http://www.governmentsecurity.org/archive/t4532.html<br />

Windows Memory Forensics Toolkit http://forensic.seccure.net/<br />

The Forensic Toolkit (WIN NT 4.0 SP3)<br />

http://www.foundstone.com/us/resources/proddesc/forensictoolkit.htm<br />

Counterintelligence And Espionage<br />

Counterintelligence And Espionage News http://cicentre.com/<br />

Counterterrorism<br />

43


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The Counter Terrorist Magazine http://digital.ipcprintservices.com/publication/?i=62670<br />

National Counterterrorism Center http://www.nctc.gov/site/index.html<br />

Counterterrorism Calendar 2011 (free for download)<br />

http://www.nctc.gov/site/pdfs/ct_calendar_2011.pdf<br />

WayBack Machine http://www.archive.org/web/web.php<br />

International Institute For Counterterrorism http://www.ict.org.il/<br />

Countering Suicide Terrorism<br />

http://www.ict.org.il/var/119/51563-Countering%20Suicide%20Terrorism.pdf<br />

MIPT Terrorism Knowledge Base http://www.tkb.org/Home2.jsp<br />

Counterterrorism Blog<br />

http://counterterrorismblog.org/2007/08/on_isna_and_doj_response_to_fa.php<br />

Counterterrorism Websites And Centers http://counterterrorismblog.org/websites/<br />

Stormwarning’s Counterterrorism<br />

http://moonagewebdream.blogs.com/storms_counter_terrorism/technology/index.html<br />

Counterterrorism Articles<br />

http://web.archive.org/web/20041210150855/www.ci-ce-ct.com/article/showfaq.asp?fldAuto=3<br />

http://web.archive.org/web/20041208225438/www.ci-ce-ct.com/article/default.asp<br />

The Counter Terrorist http://www.thecounterterroristmag.com/<br />

The Islamic Counter Terrorism Center http://wiki.arcs.com/index.php?title=ICC<br />

National Counterterrorism Center http://www.nctc.gov/site/index.html<br />

Terrorist Document Indicators http://www.nctc.gov/site/technical/documents.html<br />

International Analyst Network http://www.analyst-network.com/news.php<br />

Country <strong>Link</strong>s/Studies<br />

Country Profiles http://www.nti.org/e_research/profiles/index.html<br />

PDF Queen http://www.pdfqueen.com/<br />

World Gazetteer http://www.world-gazetteer.com/<br />

<strong>Global</strong> Gazetteer Version 2 http://www.fallingrain.com/world/<br />

Country Studies http://www.country-studies.com<br />

http://countrystudies.us/<br />

http://reference.allrefer.com/country-guide-study/<br />

Country Analysis Briefs http://www.eia.doe.gov/cabs/index.html<br />

Wikileaks http://wikileaks.org/wiki/Category:Countries<br />

The Economist Country Briefings http://www.economist.com/countries/<br />

Recommend this awesome interactive screen saver from The Economist with country statistics<br />

http://www.economist.com/screensaver/<br />

Countries of The World With Photos http://www.theodora.com/wfb/<br />

UNDATA A World of Information (23 databases with 60 million records)<br />

http://data.un.org/<br />

Asia And The Pacific<br />

http://www.iie.com/research/researcharea.cfm?ResearchTopicID=50&ParentTopicID=7#koreas<br />

ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/<br />

News Map http://muti.co.za/static/newsmap.html<br />

NationMaster (Welcome to NationMaster, a massive central data source and a handy way to graphically<br />

compare nations. NationMaster is a vast compilation of data from such sources as the CIA World Factbook, UN, and<br />

OECD. You can generate maps and graphs on all kinds of statistics with ease.) We want to be the web's one-stop<br />

resource for country statistics on everything from soldiers to wall plug voltages.<br />

http://www.nationmaster.com/index.php<br />

StateMaster (A unique statistical database which allows you to research and compare a multitude of<br />

different data on US states. We have compiled information from various primary sources such as the US Census<br />

Bureau, the FBI, and the National Center for Educational Statistics. More than just a mere collection of various data,<br />

StateMaster goes beyond the numbers to provide you with visualization technology like pie charts, maps, graphs and<br />

scatterplots. We also have thousands of map and flag images, state profiles, and correlations.) We have stats on<br />

44


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

everything from toothless residents to percentage of carpoolers. Our database is increasing all the time, so be sure to<br />

check back with us regularly. http://www.statemaster.com/index.php<br />

Lonely Planet Guide http://www.lonelyplanet.com/<br />

About Countries http://www.alsintl.com/countries/countrylist.htm<br />

Country Facts http://www.politinfo.com/infodesk/countryfacts/<br />

World Facts http://www.travelblog.org/World/<br />

http://worldfacts.us/<br />

http://www.worldoffacts.com/<br />

http://www.worldoffacts.com/countries/<br />

International Crisis Group http://www.crisisgroup.org/home/index.cfm?l=1<br />

Ethnologue: Languages Of The World http://www.ethnologue.org/home.asp<br />

Country Assessment: Iran http://www.isis-online.org/publications/iran/index.html<br />

Country Assessment: Korean Peninsula http://www.isis-online.org/publications/dprk/index.html<br />

ISIS Publications http://www.isis-online.org/publications/index.html#country<br />

International Monetary Fund Country Information http://www.imf.org/external/country/index.htm<br />

Country Info http://www.awesomelibrary.org/Library/Local_Information/Local_Information.html<br />

Country Studies http://www.exxun.com/<br />

http://countrystudies.us/<br />

http://www.country-studies.com/<br />

http://lcweb2.loc.gov/frd/cs/cshome.html<br />

Country Profiles http://www.fundforpeace.org/programs/fsi/fsiprofiles.php<br />

http://lcweb2.loc.gov/frd/cs/profiles.html<br />

http://news.bbc.co.uk/2/hi/europe/country_profiles/<br />

http://www.fco.gov.uk/servlet/Front?pagename=<strong>Open</strong>Market/Xcelerate/ShowPage&c=Page&cid=100702<br />

9394365<br />

http://plasma.nationalgeographic.com/mapmachine/countryprofiles.html<br />

Geographic Names http://www.exxun.com/esgn/gn_geonames_1.html<br />

Country Analysis Briefs http://www.eia.doe.gov/emeu/cabs/contents.html<br />

GeoHive <strong>Global</strong> Statistics http://www.geohive.com/<br />

Nations of the World http://www.nationmaster.com/countries<br />

Country Based Search Engines http://www.philb.com/countryse.htm<br />

Asia and Eastern Europe Information and Analysis http://www.axisglobe.com/<br />

Field Support Modules http://fieldsupport.lingnet.org/index.html<br />

Iraq/Afghanistan https://www.atsc.army.mil/crc/index.asp<br />

The World Fact Book (CIA) https://www.cia.gov/cia/publications/factbook/index.html<br />

Portals to The World http://www.loc.gov/rr/international/portals.html<br />

Geo Teacher Country Studies http://home.att.net/~rmmwms/students/countrystudies.html<br />

Country Reports http://www.countryreports.org/<br />

Geographic http://www.geographic.org/<br />

International Crisis Group http://www.crisisgroup.org/home/index.cfm<br />

Center For Strategic And International Studies<br />

http://www.csis.org/component/option,com_csis_pubs/Itemid,131/<br />

Field Support Modules Language Help (This site is provided as a service by the Defense<br />

Language Institute Foreign Language Center, Presidio of Monterrey, California. It is intended to provide<br />

basic information and language support for personnel entering a new theater of operations.)<br />

http://fieldsupport.lingnet.org/<br />

South Asia Analysis Group (The objective of the group is to advance strategic analysis and<br />

contribute to the expansion of knowledge of Indian and International security and promote public<br />

understanding. In so doing, the SAAG seeks to address the decision makers, strategic planners,<br />

academics and the media in South Asia and the world at large.) http://www.saag.org/<br />

UniMaps http://unimaps.com/index.html<br />

Reuters Foundation Interactive Maps<br />

http://www.alertnet.org/map/index.htm?x=256&y=256&scale=1&bpolygon=&iso=&fillId=&ex_iso=&ex_fillId<br />

=&slevel=1&style=2<br />

Countries Of The World http://www.theodora.com/wfb/abc_world_fact_book.html<br />

Search Beat http://regional.searchbeat.com/<br />

45


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Africa <strong>Intelligence</strong> http://www.africaintelligence.com/<br />

Eurasianet http://www.eurasianet.org/index.shtml<br />

<strong>Global</strong> Research http://www.globalresearch.ca/index.php?context=home<br />

CENTCOM Area of Responsibility Interactive Map<br />

http://www.centcom.mil/sites/uscentcom2/Misc/centcom_aor.aspx<br />

<strong>Global</strong> Gazetteer http://www.fallingrain.com/world/<br />

Control Risks http://www.crg.com/<br />

TradePort http://www.tradeport.org/countries/<br />

Background Notes http://www.state.gov/www/background_notes/<br />

IMF Staff Country Reports in Full Text http://www.imf.org/external/pubs/CAT/scr.cfm<br />

Virtual Tourist http://www.virtualtourist.com/<br />

NewsNow (I placed this site here because of the regional newsfeeds on the left hand column.<br />

Example: go to regional feed and click on a country and see the news as it is happening for that<br />

area. Good site for real-time incident reporting) http://www.newsnow.co.uk/<br />

GeoCommons (A place to explore, create and share intelligent maps and geographic data. And<br />

it’s totally free! Access more than 1,500 (and counting) geodata sets on population, environment,<br />

health, education, crime, politics, traffic, employment and everything in between. Move beyond<br />

pushpins on maps to intuitive and exciting visualizations of geographic data. Create and share<br />

intelligent maps to answer questions, gain insight & make decisions.)<br />

http://www.geocommons.com/<br />

World Maps http://www.justmaps.org/<br />

UCLA International Institute http://www.international.ucla.edu/<br />

Country Files (Complete files of geographic names for geopolitical arteas)<br />

http://earth-info.nga.mil/gns/html/namefiles.htm\<br />

The Joshua Project: Mission is to convert people to Christianity. However, the site contains a<br />

wealth of information w/ respect to various peoples in the region, their respective languages and it can<br />

come with a picture so one is familiar with the dress associated with that culture.<br />

http://www.joshuaproject.net/<br />

Regional & Country Information http://www.escapeartist.com/global8/countries.htm<br />

Country Reports On Human Right Practices For 2006 Vol 1 http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=110_cong_senate_committee_prints&docid=f:33723.wais.pdf<br />

Country Reports On Human Right Practices For 2006 Vol 2 http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=110_cong_senate_committee_prints&docid=f:41618.wais.pdf<br />

Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (awesome site for the<br />

open source analyst) http://www.onstrat.com/osint/<br />

U.S. Department Of State http://www.state.gov/countries/<br />

Places Of Peace And Power http://www.sacredsites.com/middle_east/iraq/iraq.html<br />

<strong>Global</strong>is is an interactive world atlas where you decide what is to be displayed on the map.<br />

<strong>Global</strong>is aims to create an understanding for similarities and differences in human societies, as well as<br />

how we influence life on the planet. This is primarily done using visual means.<br />

http://globalis.gvu.unu.edu/<br />

How To Use <strong>Global</strong>is http://globalis.gvu.unu.edu/doc.cfm?page=help<br />

Country And Culture Studies http://www.dcswift.com/military/country.html<br />

Geography Network http://www.geographynetwork.com/<br />

Crime & Justice<br />

Oakland Crime Spotting (interactive) Map http://oakland.crimespotting.org/#dtstart=2009-11-<br />

17T23:59:59-07:00&lon=-122.270&dtend=2009-11-24T23:59:59-<br />

07:00&zoom=14&types=AA,Mu,Ro,SA,DP,Na,Al,Pr,Th,VT,Va,Bu,Ar&lat=37.806&hours=0-23<br />

International Justice Statistics http://www.ojp.usdoj.gov/bjs/ijs.htm<br />

Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/orgcrime.htm<br />

http://www.lib.msu.edu/harris23/crimjust/fedsites.htm<br />

National Alliance of Gang Investigators Associations http://www.nagia.org/mara_salvatrucha.htm<br />

46


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Mara Salvatrucha Street Gang (Al Queda's Friends)<br />

http://www.freerepublic.com/focus/f-news/1263555/posts<br />

Crime and Justice http://www.crimeandjustice.us/<br />

http://crimeandjustice.i8.com/<br />

National Statistics http://www.statistics.gov.uk/CCI/nscl.asp?ID=5004<br />

National Criminal Justice Reference Service http://www.ncjrs.org/<br />

<strong>Open</strong> <strong>Directory</strong> for Crime & Justice http://dmoz.org/Society/Issues/Crime_and_Justice/<br />

True Crime & Justice http://www.karisable.com/crime.htm<br />

Bureau of Justice Statistics http://www.ojp.usdoj.gov/bjs/<br />

http://www.ojp.usdoj.gov/bjs/glance.htm<br />

http://www.ojp.usdoj.gov/bjs/dtdata.htm<br />

Center for Crime & Justice Studies http://www.kcl.ac.uk/depsta/rel/ccjs/home.htm<br />

Crime Spider http://www.crimespider.com/<br />

Crime and Criminal Justice Web <strong>Link</strong>s http://www.crimenews2000.com/links/<br />

Missing Children WEB Sites http://www.activemostwanted.com/missingchildren.html<br />

Interpol http://www.interpol.int/<br />

<strong>Link</strong>s to Criminal Justice Resources http://www.criminaljustice-online.com/<br />

Chicago Crime Incidents Map http://gis.chicagopolice.org/<br />

SpotCrime (online source of crime information throughout the united Staes; just select the state<br />

for interactive information) http://www.spotcrime.com/<br />

Environmental Protection Agency Criminal Enforcement http://www.epa.gov/fugitives/<br />

Cryptome (controversial site but has good information)<br />

Eyeball Series http://www.cryptome.org/<br />

http://eyeball-series.org/<br />

Crytome Archive 1996 to Present http://cryptome.org/cryptome-archive.htm<br />

Critical Thinking<br />

This free web-based training is provided as an introduction to Anacapa’s scheduled and on-site<br />

courses in intelligence analysis. Upon completion of all three training modules, you may obtain a<br />

certificate of completion. Click on a link below to go to each module.<br />

http://www.anacapatraining.com/company/index.html<br />

1. Introduction to <strong>Intelligence</strong> Analysis<br />

(1 to 2 Hours)<br />

2. Data Collection Tradeoffs<br />

(2-3 Hours)<br />

3. Critical Thinking Strategies<br />

(2-3 Hours)<br />

Essentials Of Critrical Thinking http://www.free-ed.net/free-ed/TextResources/critThink_01.asp<br />

1. Critical Thinking Basics<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

47


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

2. The Anatomy and Varieties of Arguments<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

Multiple-Choice Quiz<br />

3. Clear Thinking, Critical Thinking, and Clear Writing<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

4. Credibility<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

5. Persuasion through Rhetoric: Common Devices and Techniques<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

6. More Rhetorical Devices: Psychological and Related Fallacies<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

Multiple-Choice Quiz<br />

7. More Fallacies<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

48


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

8. Deductive Arguments I: Categorical Logic Categorical Claims<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

9. Deductive Arguments II: Truth-Functional Logic<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

10. Inductive Arguments Analogical Arguments<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

11. Causal Arguments<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

12. Moral, Legal, and Aesthetic Reasoning<br />

Topic Overview<br />

What You Should Learn<br />

Frequently Asked Questions<br />

Tips on Applications<br />

Important Terms<br />

True/False Quiz<br />

Multiple-Choice Quiz<br />

49


Cuba<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Teaching Critical Thinking: Lessons From Cognitive Science<br />

http://frank.itlab.us/forgetting/teaching_critical_thinking.pdf<br />

The Critical Thinking Community http://www.criticalthinking.org/<br />

Military Air Bases And Airports http://eyeball-series.org/cu-mil-air/cu-mil-air.htm<br />

Bauta<br />

Bayamo<br />

Cabaiguán<br />

Camaguey<br />

Guáimaro Northeast<br />

Guantánamo (Cuba)<br />

Guantanamo Naval Base (US)<br />

Guane<br />

Holguín<br />

Las Tunas<br />

Manzanillo<br />

Matanzas<br />

Mayari<br />

Morón<br />

Morón Northeast<br />

Querejeta (Havana)<br />

Sagua de Tánamo<br />

San Antonio de los Baños<br />

San Luis Pinar L Rio<br />

Santa Fe<br />

Santiago de Cuba<br />

Santiago de las Vegas (Havana)<br />

Trinidad<br />

Trinidad East<br />

Villa Clara<br />

Wajay (Havana)<br />

ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/cuba.htm<br />

Cultural <strong>Intelligence</strong><br />

Foreign Language Guide http://www.design-training.com/art/foreign-language-guide.html<br />

Center For Advanced Operational Culture Training http://www.tecom.usmc.mil/caocl/<br />

Socio-Cultural AND Language Resources http://www.au.af.mil/culture/<br />

Cultural Awareness And The Military http://www.au.af.mil/au/aul/bibs/culture.htm<br />

Defense Language Institute http://www.dliflc.edu/index.html<br />

Center For Advanced Culture Learning http://www.tecom.usmc.mil/caocl/<br />

Small Wars Journal (material on cultural intelligence)<br />

http://www.google.com/custom?domains=smallwarsjournal.com&q=cultural&sitesearch=smallwarsjournal.<br />

com&sa=Search&client=pub-9082475459908859&forid=1&ie=ISO-8859-1&oe=ISO-8859-<br />

1&flav=0000&sig=jxaC0TjM5-C-<br />

A0ca&cof=GALT%3A%23008000%3BGL%3A1%3BDIV%3A%23336699%3BVLC%3A663399%3BAH%3<br />

Acenter%3BBGC%3AFFFFFF%3BLBGC%3A336699%3BALC%3A0000FF%3BLC%3A0000FF%3BT%3<br />

A000000%3BGFNT%3A0000FF%3BGIMP%3A0000FF%3BFORID%3A1&hl=en<br />

50


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The American Military Advisor: Dealing With Senior Foreign Officials In The ISLAMIC World<br />

http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB869.pdf<br />

Arabic For Dummies http://www.dmos.info/eng/Arabic%20For%20Dummies.pdf<br />

A Defence of Cultural <strong>Intelligence</strong><br />

http://www.knowledge-finder.com/psychology/defence-cultural-intelligence.html<br />

Cultural Awareness http://wrc.lingnet.org/culmil.htm<br />

A Guide to Working with People from Other Cultures<br />

http://ctb.ku.edu/tools/en/sub_section_main_1170.htm<br />

Cultural <strong>Intelligence</strong><br />

http://www.valuebasedmanagement.net/methods_earley_cultural_intelligence.html<br />

Cultural <strong>Intelligence</strong> and Modern Management<br />

http://www.1000ventures.com/ebooks/bec_ebooks_cimm.html<br />

http://www.1000ventures.com/business_guide/crosscuttings/cultural_intelligence.html<br />

http://www.bkpub.com/static/culturalintelligence.pdf<br />

Avoiding a Napoleonic Ulcer: Bridging the Gap of Cultural <strong>Intelligence</strong> (Or, Have We Focused on<br />

the Wrong Transformation?)<br />

http://www.mcu.usmc.mil/mcwar/irp/Documents/CJCS%20Essay%20-%20Smith.pdf<br />

Culture and Technologies of Control<br />

http://slash.autonomedia.org/analysis/02/11/05/1432210.shtml<br />

University of Military <strong>Intelligence</strong> http://128.196.21.240/cultural/default.asp<br />

Religion and Beliefs http://www.earthstation9.com/index.html?aircraf6.htm<br />

Cultural Studies http://www.mcia.osis.gov/culture.htm<br />

Iraqi Culture Smart Card (printable version) http://cryptome.org/iraq-culture.htm<br />

http://www.fas.org/irp/doddir/usmc/iraqsmart-0506.pdf<br />

Pew <strong>Global</strong> Attitudes Project (a series of worldwide public opinion surveys) http://pewglobal.org/<br />

Multicultural<br />

http://www.awesomelibrary.org/Classroom/Social_Studies/Multicultural/Multicultural.html<br />

Muslim American Society http://www.masnet.org/<br />

Field Support Modules http://fieldsupport.lingnet.org/afghanistan.html<br />

Iraq/Afghanistan https://www.atsc.army.mil/crc/index.asp<br />

Culture <strong>Link</strong> http://www.culturelink.org/<br />

Middle Eastern Culture http://www.shira.net/culture.htm<br />

http://www.albany.edu/history/middle-east/culture.htm<br />

<strong>Global</strong> Connections http://www.pbs.org/wgbh/globalconnections/mideast/themes/culture/<br />

Cultural Awareness Documents http://cgsc.leavenworth.army.mil/carl/resources/biblio/cultural.asp<br />

http://www.au.af.mil/au/awc/awcgate/awc-lesn.htm<br />

The Iraq Culture Smart Card http://cryptome.org/iraq-culture.htm<br />

Kwikpoint Visual Language Translators http://www.kwikpoint.com/index.html<br />

Arab Culture Comparative Cultural Patterns<br />

http://www.sagepub.com/upm-data/11712_Chapter9.pdf<br />

Languages Of The World http://www.nvtc.gov/<br />

Cultural Understanding and Language Proficiency https://www.us.army.mil/suite/portal/index.jsp<br />

The Joshua Project: Mission is to convert people to Christianity. However, the site contains a<br />

wealth of information w/ respect to various peoples in the region, their respective languages and it can<br />

come with a picture so one is familiar with the dress associated with that culture.<br />

http://www.joshuaproject.net/<br />

North Korean Short Video Clips http://www.vbs.tv/shows/north-korea/<br />

Interactive Map: Sunni And Shia : The Worlds of Islam<br />

http://www.pbs.org/wnet/wideangle/shows/iran/map.html<br />

Islamic Holy Places http://en.wikipedia.org/wiki/Category:Islamic_holy_places<br />

Online Readings In Psychology And Culture<br />

http://www.ac.wwu.edu/~culture/contents_complete.htm<br />

51


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Cyber & Information Warfare<br />

CERT Coordination Center http://www.cert.org/<br />

Information Operations http://www.au.af.mil/au/awc/awcgate/awc-info.htm<br />

Information Operations http://www.tno.nl/instit/fel/infoops/<br />

Information Warfare and Information Security on the WEB http://www.fas.org/irp/wwwinfo.html<br />

http://www.comw.org/rma/fulltext/infowar.html<br />

http://gib.squat.net/infowar/<br />

Institute for the Advanced Study of Information Warfare http://www.psycom.net/iwar.1.html<br />

infowar: Term Contexts For 'weapon'<br />

http://www.twurled-world.com/Infowar/Update2/V_infowar_TERM_weapon.htm<br />

The Information Warfare Site http://www.iwar.org.uk/<br />

Ms. Guidance: Cyber War http://www.t0.or.at/msguide/cyberwar.htm<br />

Cyber Warfare and Information Security http://securefrontiers.com/index.php?sectionID=25<br />

The Security Portal for Information System Security Professionals<br />

http://www.infosyssec.com/infosyssec/infowar1.htm<br />

Georgetown Essays on Information Warfare<br />

http://www.cs.georgetown.edu/~denning/infosec/iw-essays/<br />

Books on subject<br />

http://www.amazon.com/exec/obidos/ASIN/0275974235/102-7751075-0251322<br />

http://www.amazon.com/exec/obidos/ASIN/0072132604/102-7751075-0251322<br />

http://www.au.af.mil/au/aul/bibs/infowar/if.htm<br />

Frontline: CyberWar (How real is the threat of war in cyberspace, and what does the White House<br />

know that the rest of us don't? FRONTLINE investigates a new war using embedded malicious code,<br />

probes and pings, and other weapons aimed directly at America's power grid, water supply, and<br />

transportation systems. Examples include The Slammer (Super Bowl Sunday), Nimda (a week after 9/11),<br />

Code Red (summer 2001), and Moonlight Maze (from Russia's Academy of Science). View the entire 52<br />

minute program here in six consecutive chapters.)<br />

http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/view/<br />

China’s Cyber-Militia<br />

http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948<br />

Databases (Some Searchable)<br />

Wayback Machine (The Internet Archive is building a digital library of Internet sites and other<br />

cultural artifacts in digital form. Like a paper library, we provide free access to researchers, historians,<br />

scholars, and the general public [works extremely well with URL addresses])<br />

http://www.archive.org/index.php<br />

UNDATA A World of Information (23 databases with 60 million records)<br />

http://data.un.org/<br />

Federal Statistics http://www.fedstats.gov/<br />

Databases By Subject http://www.uflib.ufl.edu/subjects.html<br />

WEB Finding Tools http://library.nps.navy.mil/home/netsearch.htm<br />

World Basic Information Library http://wbil.fmso.osis.gov/<br />

Digital National Security Archive http://nsarchive.chadwyck.com/<br />

ProQuest http://proquest.umi.com/pqdweb<br />

http://proquest.umi.com/pqdweb?RQT=573&TS=1083434519&clientId=26841&LASTSRCHMODE=3<br />

American Religion Data Archive http://www.thearda.com/arda.asp?Show=Home<br />

Army Libraries <strong>Directory</strong> http://www.libraries.army.mil/<br />

CountryWatch http://www.countrywatch.com/<br />

Early Bird http://ebird.afis.osd.mil/<br />

Databases http://library.nps.navy.mil/home/databases.htm<br />

52


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Databases and Electronic Resources http://www.lib.monash.edu.au/databases/<br />

Databases in Military Science http://library.nps.navy.mil/home/databasesmil.htm<br />

EBSCO Support http://support.epnet.com/CustSupport/Customer/Search.aspx<br />

http://web35.epnet.com/selectdb.asp?tb=1&_ug=sid+0603E65C%2DB41B%2D4AF8%2DBB48%2D2EA7<br />

F7E7980E%40sessionmgr6+cp+1+1444&_us=dstb+DB+sm+DB+1D03&_uso=hd+False+C560&daerr=tr<br />

ue<br />

Britannica Online http://www.britannica.com/<br />

Federal Government Resources on the WEB http://www.lib.umich.edu/govdocs/federal.html?<br />

Google’s Uncle Sam http://www.google.com/unclesam<br />

Government Search http://www.queryserver.com/government.htm<br />

Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />

Libraries on the WEB http://sunsite.berkeley.edu/Libweb/<br />

FirstGov http://www.firstgov.gov/<br />

Jane’s Online Research http://online.janes.com/public/login/homeLogin.html<br />

The Educator’s Reference Desk http://www.eduref.org/<br />

Pro Fusion http://www.profusion.com/index.htm<br />

RootsWeb http://www.rootsweb.com/<br />

Government Databases http://library.stmarytx.edu/acadlib/doc/electronic/dbases.htm<br />

Government Printing Office http://www.gpoaccess.gov/<br />

Search Systems http://www.searchsystems.net/<br />

U.S. National Archives and Records Administration http://www.archives.gov/index.html<br />

National Inventory of Dams http://crunch.tec.army.mil/nid/webpages/nid.cfm<br />

Navigating the Military Internet<br />

http://cc.msnscache.com/cache.aspx?q=852058223709&lang=en-US&FORM=CVRE3<br />

Naval War College Library http://www.nwc.navy.mil/LIBDB/dblinks/ezlibRemote.htm<br />

Pentagon Library http://www.hqda.army.mil/library/databases.htm<br />

UNBISNET http://unbisnet.un.org/<br />

Periscope http://www.militaryperiscope.com/index1.shtml<br />

Reference Desk http://www.earthstation9.com/index.html?aircraf6.htm<br />

Organized Crime and Corruption Bibliographic Database Search<br />

http://www.yorku.ca/nathanson/search.htm<br />

DOD and Military Electronic Journals http://www.au.af.mil/au/aul/periodicals/dodelecj.htm<br />

The Wednesday Report - Canada's Aerospace and Defence Weekly<br />

http://twr.mobrien.com/index.shtml<br />

Direct Search http://www.freepint.com/gary/direct.htm<br />

The Invisible WEB http://www.invisible-web.net/<br />

Complete Planet http://aip.completeplanet.com/aipengines/browse?thisPage=%2Fbrowse%2Fbrowse.jsp&successPage=%2Fbrowse%2Fbrowse.jsp&error<br />

Flag=&errorMsg=&event=loadPageEvent&directPage=&directSection=4&treeQueryExpr=&treeQueryTyp<br />

e=phrase&treeQueryTarget=tree<br />

U.S. Federal Government Agencies Database http://www.lib.duke.edu/texis/uslinks/uslinks<br />

The Academic Web <strong>Link</strong> Database Project http://cybermetrics.wlv.ac.uk/database/<br />

Patent Searching http://www.bl.uk/collections/patents.html<br />

Databases On The World Wide WEB http://www.wehi.edu.au/resources/databases.html<br />

Federal Bulletin Board GPO Access http://fedbbs.access.gpo.gov/<br />

GPO Access Online http://www.gpoaccess.gov/databases.html<br />

Google Scholar http://scholar.google.com/<br />

Cold War Black Projects http://area51specialprojects.com/<br />

Find Databases http://wwwapp.cc.columbia.edu/ldpd/app/rti/index.jsp<br />

Those Dark Hiding Places http://library.rider.edu/scholarly/rlackie/Invisible/Inv_Web_Main.html<br />

Georgetown University Library http://www.library.georgetown.edu/advisor/index.cfm<br />

Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />

Government Information Databases http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html<br />

Nuclear Weapons Database http://www.cdi.org/nuclear/database/<br />

53


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Terrorism Database Project http://www.rand.org/ise/projects/terrorismdatabase/<br />

Ballistic Missiles http://www.missilethreat.com/missiles/<br />

Terrorist Attacks and Organizations Database<br />

http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/<br />

Military Factory http://www.militaryfactory.com/<br />

The Jamestown Foundation http://www.jamestown.org/<br />

Lookups (easily search over 30 databases for the information you want)<br />

http://www.melissadata.com/lookups/index.htm<br />

International Programs Center (part of the population division of the U.S. Census Bureau)<br />

http://www.census.gov/ipc/www/<br />

Sustainable World (This site has been developed to help government officials, students,<br />

researchers and others interested in development issues to find free [or at least reasonably<br />

Affordable] sources of national economic and social data online)<br />

http://www.sustainableworld.com/<br />

Searchable Terrorism Knowledge Database http://www.tkb.org/AdvancedSearch.jsp<br />

Latin America Data Base (LADB is the first Internet-based news service in English about Latin<br />

America, publishing in-depth coverage of Latin American affairs since 1986)<br />

http://ladb.unm.edu/<br />

ResearchBuzz (News about search engines, databases, and other information collections)<br />

http://www.researchbuzz.com/wp/<br />

Hudson Institute http://www.hudson.org/<br />

(Center on Islam, Democracy, and the Future of the Muslim World)<br />

http://www.futureofmuslimworld.com/<br />

Science & Technology Database http://www.stn-international.de/<br />

International Database US Census Bureau http://www.census.gov/ipc/www/idbnew.html<br />

Guide to Foreign and International Legal Databases http://www.law.nyu.edu/library/foreign_intl/<br />

The Middle East Media Research Institute http://www.memri.org/index.html<br />

<strong>Global</strong> Terrorism Analysis http://jamestown.org/terrorism/archives.php?publication_id=15<br />

The National Security Archive http://www.gwu.edu/~nsarchiv/<br />

STINET MultiSearch (STINET MultiSearch is a STINET feature intended to assist the DOD<br />

community to access pertinent scientific and technical information over a wide range of sources)<br />

http://multisearch.dtic.mil/<br />

Public STINET http://stinet.dtic.mil/<br />

Energy Files (At this site you will find over 500 databases and Web sites containing information<br />

and resources pertaining to science and technology of interest to the Department of Energy, with an<br />

emphasis on the physical sciences) http://energyfiles.osti.gov/<br />

Science Research (a free, publicly available web portal allowing access to numerous scientific<br />

journals and public science databases. It allows students, teachers, professors, researchers, and the<br />

general public to access pertinent science information quickly and easily)<br />

http://www.scienceresearch.com/search/<br />

Terrorism Monitor Archives http://www.jamestown.org/terrorism/archives.php?publication_id=9<br />

International Relations And Security Network http://www.isn.ethz.ch/<br />

Monterrey Institute Of International Studies http://www.cns.miis.edu/<br />

<strong>Directory</strong> of <strong>Open</strong> Access Journals http://www.doaj.org/<br />

Satellite Database<br />

http://www.ucsusa.org/global_security/space_weapons/satellite_database.html<br />

Search For Buildings Anywhere On Earth http://www.emporis.com/en/<br />

Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html<br />

http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />

Databases by Subject http://www-library.st-andrews.ac.uk/External/databasessubject.html<br />

http://www.co.henrico.va.us/library/DB&Web/ERpubsubj.htm<br />

http://www.uflib.ufl.edu/subjects.html<br />

USGS Map Databases http://education.usgs.gov/common/map_databases.htm<br />

BUBL LINK Catalogue: Selected Internet resources covering all academic subject areas.<br />

http://www.bubl.ac.uk/<br />

54


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Authoratory (The content of Authoratory is produced by a computer program analyzing millions<br />

of articles indexed by PubMed. The articles published by each author are carefully inspected to create a<br />

personalized report. All of the reports all available here on the Authoratory web site)<br />

http://www.authoratory.com/<br />

Telecommunications Database http://www.telcodata.us/<br />

MIPT Terrorism Knowledge Base http://www.tkb.org/Home.jsp<br />

<strong>Directory</strong> Of <strong>Open</strong> Access Journals (Welcome to the <strong>Directory</strong> of <strong>Open</strong> Access Journals. This<br />

service covers free, full text, quality controlled scientific and scholarly journals. We aim to cover all<br />

subjects and languages. There are now 2686 journals in the directory. Currently 803 journals are<br />

searchable at article level. As of today 133242 articles are included in the DOAJ service<br />

http://www.doaj.org/<br />

FedWorld http://www.fedworld.gov/<br />

The University of Michigan Library Documents Center http://www.lib.umich.edu/govdocs/<br />

The Library of Congress http://www.loc.gov/index.html<br />

International Terrorist Symbols Database http://www.adl.org/terrorism/symbols/default.asp<br />

EUROPA European Union Databases By Subject<br />

http://europa.eu/geninfo/info/guide/dbsubject/index_en.htm<br />

Government Databases By Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />

The Best Online Research Apps/Sites You’ve Never Heard Of<br />

http://oedb.org/library/features/best-online-research-sites<br />

Joint Information Systems Committee http://www.jisc.ac.uk/<br />

<strong>Global</strong> Terrorism Database http://www.start.umd.edu/data/gtd/<br />

Nation Master http://www.nationmaster.com/index.php<br />

State Master http://www.statemaster.com/index.php<br />

National Defense Mega <strong>Directory</strong> http://www.nationaldefensemegadirectory.com/<br />

Datamining Tools<br />

Defense<br />

NationMaster http://www.nationmaster.com/index.php<br />

Tools For Data Mining http://www.ncbi.nlm.nih.gov/Tools/<br />

Air Force Research <strong>Link</strong> http://www.af.mil/search/<br />

Airport Search https://www.afd.scott.af.mil/<br />

Association of the United States Army (AUSA) http://www.ausa.org/www/ILW.nsf<br />

CENTCOM http://www.centcom.mil/contactus.htm<br />

Center for Defense Information http://cdi.org/<br />

Defense Technical Information Center http://www.dtic.mil/<br />

Defense <strong>Link</strong> http://www.defenselink.mil/<br />

Defense News http://www.defensenews.com/<br />

DoD Almanac http://www.defenselink.mil/pubs/almanac/<br />

Military Resources http://www.earthstation9.com/index.html?aircraf6.htm<br />

<strong>Global</strong> Security http://www.globalsecurity.org/<br />

Military Equipment http://library.nps.navy.mil/home/equipment.htm#contents<br />

Lessons Learned http://www.au.af.mil/au/awc/awcgate/awc-lesn.htm<br />

Coast Guard http://www.uscg.mil/units.html<br />

http://www.uscg.mil/USCG.shtm<br />

55


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Demographics & Religion (See Also Religion)<br />

Religion by Location and Name http://www.adherents.com/<br />

Religions of the World http://library.thinkquest.org/28505/inde1.html<br />

http://www.bbc.net.uk/worldservice/people/features/world_religions/index.shtml<br />

http://www.wcc-coe.org/wcc/links/religs.html<br />

http://www.religioustolerance.org/worldrel.htm<br />

http://religionworld.org/religions.html<br />

U.S. Census Bureau http://factfinder.census.gov/home/saff/main.html?_lang=en<br />

American Religion Data Archive http://www.thearda.com/arda.asp?Show=Home<br />

Hartford Institute for Religion Research http://hirr.hartsem.edu/<br />

Western Religions http://www.mrdowling.com/605westr.html<br />

Religion <strong>Link</strong>s http://web.ask.com/search?q=%22demographics+and+religion%22&page=<br />

http://dir.yahoo.com/society_and_culture/religion_and_spirituality/faiths_and_practices/<br />

Major World Religions http://www.omsakthi.org/religions.html<br />

A Comparative Analysis of The Major World Religions http://www.comparativereligion.com/<br />

The Religion of The Taliban<br />

http://www.globalsecurity.org/military/library/report/2001/Deobandi_Islam.pdf<br />

Holy Qur'an Resources on the Internet http://www.quran.org.uk/<br />

A Brief Guide to Understanding Islam http://www.islam-guide.com/<br />

Salam Iran http://www.salamiran.org/<br />

Understanding Islam and Muslims http://www.islamicity.com/Mosque/uiatm/un_islam.htm<br />

Interactive Map: Sunni And Shia : The Worlds of Islam<br />

http://www.pbs.org/wnet/wideangle/shows/iran/map.html<br />

Denial and Deception<br />

Background Briefing on Enemy Denial and Deception<br />

http://www.defenselink.mil/transcripts/2001/t10242001_t1024dd.html<br />

Denial and Deception Strategy<br />

http://www.defenselink.mil/news/Oct2001/011024-D-6570C-009.pdf<br />

The Security Situation in the Taiwan Strait<br />

http://www.jinsa.org/articles/articles.html/function/view/categoryid/169/documentid/564/history/3,2360,652<br />

,169,564<br />

Department of Homeland Security<br />

The Department of Homeland Security <strong>Open</strong> <strong>Source</strong> Enterprise (DHS-OSE) has just released<br />

two new daily <strong>Open</strong> <strong>Source</strong> products to the Homeland Security Central website on Intelink-U<br />

(https://www.intelink.gov/hls) and the Homeland Security Information Network-<strong>Intelligence</strong> (https://hsinintel.dhs.gov/).<br />

With the large success of the DHS Daily Cyber Report, the DHS-OSE has started reporting open source<br />

information on medical and health related hazards, as well as human smuggling and trafficking.<br />

Respectively, these new open source products are titled: DHS Daily Infectious Diseases Report & DHS<br />

Daily Human Trafficking Report.<br />

Listed below is a short description of each:<br />

� The DHS Daily Infectious Diseases Report is collected each weekday as a summary of medical<br />

and health related hazards published from open-source information concerning the homeland.<br />

� The DHS Daily Human Trafficking Report is collected each weekday as a summary of human<br />

smuggling/trafficking related open-source information.<br />

56


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Each of these new products along with the Daily Cyber Report are available for PDF download at<br />

the above secure web addresses and are available via unclassified e-mail subscription. There are also<br />

several other new open source reports to be released that focus on:<br />

� Drug Trafficking,<br />

� Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE),<br />

� Illicit Commercial Trafficking, and<br />

� Weapons Trafficking<br />

These DHS-OSE open source products originate from Internet sources and open source<br />

information. They are unclassified products that can be widely distributed. Point of contact is Tom <strong>Link</strong> at<br />

thomas.link@dhs.gov or tom.link@ugov.gov<br />

Vehicle Guideline http://www.nbpc.net/Miscellaneous/VEHICLE_.PDF<br />

Surveillance Truck http://eyeball-series.org/dhs-truck.htm<br />

DHS Daily <strong>Open</strong> <strong>Source</strong> Infrastructure Report<br />

http://www.dhs.gov/xinfoshare/programs/editorial_0542.shtm<br />

The Department of Homeland <strong>Open</strong> <strong>Source</strong> Enterprise has launched their "Introduction to <strong>Open</strong><br />

<strong>Source</strong>" Online Training Modules to Intelink-U. https://www.intelink.gov/sites/dhs-ose/training/default.aspx<br />

Threat Assessment: Hotels<br />

https://www.ndpci.us/members/modules/dms/file_retrieve.php?function=view&obj_id=1127<br />

Department of Justice<br />

USDOJ Search Engine<br />

http://searchjustice.usdoj.gov/search?site=default_collection&client=default_frontend&output=xml_no_dtd<br />

&proxystylesheet=default_frontend&proxycustom=<br />

Department of The Treasury<br />

Specially Designated Nationals and Blocked Persons<br />

http://www.treas.gov/offices/enforcement/ofac/sdn/t11sdn.pdf<br />

http://www.treas.gov/offices/enforcement/ofac/sdn/index.shtml<br />

Directories of the World<br />

Webmaster World http://www.webmasterworld.com/forum17/<br />

Infobel http://www.infobel.com/world/default.asp<br />

International White and Yellow Pages http://www.wayp.com/<br />

Iran Online Yellow Pages http://www.iranianyellowpages.com/<br />

<strong>Link</strong>s to the World Directories http://www.leg.state.mn.us/lrl/links/direct.asp<br />

http://www.tradebusiness.com/countries/countriesa.html<br />

http://www.globalyp.com/world.htm#Bermuda<br />

http://www.infospace.com/home/white-pages/world<br />

NumberWay http://numberway.com/<br />

The <strong>Global</strong> Yellow Pages http://www.globalyp.com/<br />

World Business Directories http://web.idirect.com/~tiger/exportdr.htm<br />

Worldwide Yellow Pages http://www.cybercity-online.net/wwyp.html<br />

http://www.yellowpagesworld.com/<br />

57


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Domain Name Servers<br />

All Domains http://www.allwhois.com/<br />

WHOIS Database Search http://www.arin.net/whois/index.html<br />

Host Name to IP Address http://www.hcidata.co.uk/host2ip.htm<br />

Internet Query Tools http://www.demon.net/external/<br />

DNS Lookup http://hunterftp.hunter.com/scripts/dnslookup.html<br />

http://www.zoneedit.com/lookup.html?ad=goto&kw=nslookup<br />

DNS Stuff http://hunterftp.hunter.com/scripts/dnslookup.html<br />

http://webreference.com/cgi-bin/nslookup.cgi<br />

http://www.dnsstuff.com/<br />

Search and Register Domain Names http://namedroppers.com/<br />

Domain Name Search http://www.wizbit.net/whois2.php<br />

http://domainsearch.com/<br />

Domain Surfer http://domainsurfer.com/<br />

Domainator http://www.e-gineer.com/domainator/index.phtml<br />

Geektools http://www.geektools.com/whois.php<br />

InterNic http://www.internic.net/whois.html<br />

Multiple DNS Lookup http://www.bankes.com/nslookup.htm<br />

Webserver Search http://news.netcraft.com/<br />

Query the APNIC Whois Database http://www.apnic.net/apnic-bin/whois.pl<br />

RIPE Whois Search http://www.ripe.net/perl/whois<br />

Check Domain http://www.checkdomain.com/<br />

Super DNS Lookup http://cgibin.erols.com/ziring/cgi-bin/nsgate/gate.pl<br />

Network Administrators Guide http://www.ibiblio.org/mdw/LDP/nag/node1.html<br />

Query Tools http://www.wdi.co.uk/testTools/querytools.phtml<br />

Internet Tools http://www.wowarea.com/english/help/tools.htm<br />

Drugs and Terrorism, Drug Cartels, And Criminal Organizations<br />

At least seven major Mexican Drug Trafficking Organizations (DTOs) are primarily responsible for the $39<br />

billion drug trade that floods narcotics across the U.S.-Mexico border. These opportunistic cartels form<br />

loose alliances that are only as strong as the narcotics proceeds fueling them. The DEA refers to several<br />

as "poly drug" organizations because they traffic cocaine, marijuana, heroin, and meth.<br />

Here's a guide to the most active, and largest, cartels:<br />

Mexican Federation (Sinaloa Cartel): The Sinaloa Federation, which is also known as the Pacific Cartel<br />

or Golden Triangle Alliance, was formed in the 1970s by Mexico's four major crime syndicates. By the<br />

1990s, the cartel had grown to the size of the Colombian Medellin Cartel in its heyday and, in 2008,<br />

apparently split into several warring factions, including the Beltran-Leyva Organization. The Federation<br />

directs a large-scale transportation network for various narcotics, including shipping multi-ton quantities of<br />

cocaine from South America. Joaquin "El Chapo" Guzman Loera has been leading the cartel since 1995.<br />

Arellano-Felix Organization (Tijuana Cartel): Seven brothers and four sisters inherited the cartel from<br />

Miguel Angel Felix Gallardo, who was jailed in 1989 for the kidnapping and murder of DEA agent Enrique<br />

"Kike" Camerena Salazar, among other crimes. Earlier this year, current leaders Teodoro "El Teo" Garcia<br />

Simental, Raydel "El Muletas" Lopez Uriarte, and brother Manuel were arrested.<br />

Carrillo-Fuentes DTO (Juarez Cartel): Since the early 1990s, this cartel has controlled the smuggling<br />

corridor from Juarez-El Paso southeast to Ojinaga, Chihuaha, using extreme violence and intimidation.<br />

After the death of founder Amado Carrillo Fuentes in a Mexican hospital as a result of botched plastic<br />

58


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

surgery, brother and current leader Vicente took over. The cartel has been battling the Sinaloa Cartel,<br />

and relies on the Barrio Azteca gang in El Paso, Dallas, and Austin to distribute cocaine.<br />

Gulf Cartel: The cartel's primary areas of operation include Nuevo Laredo, Miguel Aleman, Reynosa, and<br />

Matamoros in the Mexican state of Tamaulipas. The poly drug Gulf Cartel also operates in Nuevo Leon<br />

and Michoacan and is the primary supplier of the Atlanta area.<br />

Los Zetas Cartel: As the one-time enforcers for the Gulf Cartel, the paramilitary Zetas are one of the<br />

most powerful and violent cartels in Mexico. The cartel was formed when Gulf hired a small group of<br />

deserters from the Mexican Army Special Forces that may have received counter-insurgency training at<br />

Fort Benning, Ga. The group split off and created its own cartel in early 2010.<br />

La Familia Michoacana Cartel: This unique cartel, which achieved the federal government's Kingpin<br />

Designation Act list in April 2009, began in 2004 as armed vigilantes who portrayed themselves as crime<br />

fighters, stating their goal of eradicating meth. The group's practice of placing poorly spelled notes near<br />

the decapitated heads of rivals (especially in Uruapan) is part of its propaganda campaign. The cartel<br />

exhibits religious tendencies and cult-like behavior, requiring members to join group prayer sessions and<br />

wear La Familia logos. The group now produces meth in hilly Michoacan and intelligence officials believe<br />

it pays millions a month in bribe money to politicians.<br />

Beltran-Leyva Organization: In 2008, Arturo Beltran Leyva separated from the Sinaloa Cartel and now<br />

transports multi-ton quantities of cocaine and marijuana into Arizona, California, Illinois, New York, and<br />

Texas.<br />

InSight Map: The Dangerous Journey North for Migrants<br />

http://www.insightcrime.org/component/k2/itemlist/category/330-maps<br />

Drug Related Interactive Maps http://www.insightcrime.org/<br />

The Drug Violence in Mexico http://justiceinmexico.org/resources-2/drug-violence/<br />

Blog Del Narco (WARNING – EXTREMELY GRAPHIC VIDEOS) http://www.blogdelnarco.com/<br />

Field Guide to Mexican Drug Cartels<br />

http://www.policemag.com/Channel/Gangs/Articles/2010/11/A-Field-Guide-to-Mexican-Drug-<br />

Cartels.aspx<br />

Drug Cartel Challenge Coin<br />

http://www.policemag.com/Blog/Gangs/Story/2011/01/Drug-Cartel-Badge-Recovered.aspx<br />

Street Terms - The Street Terms database contains over 2,300 street terms that refer to specific<br />

drug types or drug activity. The database is used by police officers, parents, treatment providers and<br />

others who require a better understanding of drug culture.<br />

http://www.whitehousedrugpolicy.gov/streetterms/<br />

Los Narcos (has not been updated) http://drugcartelinfo.blogspot.com/<br />

PROJECT GUNRUNNER A Cartel Focused Strategy September 2010 (UNCLASSIFIED//LAW<br />

ENFORCEMENT SENSITIVE) http://msnbcmedia.msn.com/i/msnbc/sections/news/Cartel_Strategy.pdf<br />

Tracking Mexico's Drug Cartels http://www.stratfor.com/theme/tracking_mexicos_drug_cartels<br />

Narco Mexico http://narcocartels.blogspot.com/<br />

National Threat Assessments http://www.justice.gov/ndic/topics/ndtas.htm#Top<br />

Drug Cartel Facts: Drug cartels are criminal organization developed with the primary purpose of<br />

promoting and controlling drug trafficking operations. They range from loosely managed<br />

agreements among various drug traffickers to formalized commercial enterprises…<br />

http://www.freebase.com/view/en/drug_cartel<br />

Mexican Drug Cartels In The United States<br />

http://www.cnn.com/interactive/2009/05/world/map.mexican.cartels/index.html<br />

The Southern Front (The U.S.Border on the Mexico border is divided into 9 sectors. Click on each<br />

sector for more detailed information.) http://www.foxnews.com/hannity/sfmap/<br />

Drug Cartels and Other Organized Crime Groups<br />

http://www.drugstory.org/drug_traffic/cartel_organized.asp<br />

The Narco News Bulletin (I would treat this one lightly, credibility is suspect)<br />

59


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.narconews.com/<br />

Drug War Clock http://www.drugsense.org/wodclock.htm<br />

Drugs and Terrorism: A New Perspective (dated but useful)<br />

http://www.dea.gov/pubs/intel/02039/02039.html<br />

How Drug Prohibition Finances and Otherwise Enables Terrorism<br />

http://www.cfdp.ca/eoterror.htm<br />

How the Drug War in Afghanistan Undermines America’s War on Terror<br />

http://www.cato.org/pubs/fpbriefs/fpb84.pdf<br />

The <strong>Link</strong>s Between Drug Prohibition and Terrorism http://www.cfdp.ca/terror.htm<br />

Useful Sites http://faculty.maxwell.syr.edu/levitsky/useful_websites.htm<br />

Afghanistan Drugs and Terrorism http://wwwc.house.gov/international_relations/108/91798.pdf<br />

Crime, Drug Prohibition and Terrorism: An Inevitable Convergence http://www.narcoterror.org/<br />

Mini Submarine http://www.saag.org/%5Cpapers14%5Cpaper1312.html<br />

Common Sense for Drug Policy http://www.csdp.org/news/news/colombia.htm<br />

The Real Drug Lords http://www.serendipity.li/cia/blum1.html<br />

Mexico Fights US Drug War http://www.csdp.org/news/news/mexico.htm<br />

The <strong>Global</strong>ization Of The Drug Trade http://www.unesco.org/most/sourdren.pdf<br />

Drugs And Criminal Organizations http://www.interpol.int/Public/Drugs/default.asp<br />

The Media Awareness Project - A worldwide network dedicated to drug policy reform. We inform<br />

public opinion and promote balanced media coverage. http://mapinc.org/<br />

Drug Smuggling Techniques/Methods<br />

You can hide drugs up your anus or vagina but a good customs agent will find them if<br />

they’re suspicious. There are also experts who make a living packing suitcases and<br />

rucksacks. It is possible to do it in a way that doesn’t show up on x-rays and that feels<br />

genuinely like part of the baggage. It’s an acquired skill however and the customs boys<br />

know exactly what to look for. Another popular method is to buy platform shoes and cut<br />

out a space in the heels. This is hardly original but if you decide to try this please at least<br />

get used to wearing the things first. You’ll look a little conspicuous overbalancing as you<br />

walk through the airport.<br />

Narco Subs http://www.wibw.com/internationalnews/headlines/97515289.html<br />

http://af11.wordpress.com/2010/06/30/narco-subs-latest-in-evolution-of-drug-smuggling-methods/<br />

http://articles.cnn.com/2010-06-29/world/vbs.colombian.narcosubs_1_colombian-navy-traffickerssmuggling?_s=PM:WORLD<br />

http://militarytimes.com/blogs/scoopdeck/2010/07/06/will-new-long-range-narco-subs-change-the-game/<br />

http://www.chron.com/disp/story.mpl/world/7081395.html<br />

http://www.militaryphotos.net/forums/showthread.php?188255-Narco-subs-(drug-runners)-thread<br />

http://covertshores.blogspot.com/2010/06/narco-submarines-torpedoes-and-semi.html<br />

http://afp.google.com/article/ALeqM5idRpyWrlCB67LHzjut5kSMOyDARw<br />

http://insightcrime.org/insight-latest-news/item/1618-colombia-seizes-2-narco-submarines-in-a-week<br />

Cocaine Submarines – Great video by National Geographic on cocaine submarines.<br />

http://www.documentarytube.com/cocainesubmarines?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+DocumentaryTub<br />

e+%28Documentary+Tube%29<br />

Colombian traffickers are using a new secret weapon smuggling cocaine north – drug submarines.<br />

Up to 30 meters long and almost impossible to detect, are capable of delivering several tons of cocaine in<br />

one shipment. Dozens of submarines are believed to be operating between the coasts of Colombia and<br />

Mexico, and police estimate that another 70 will be built next year alone. NGC is U.S. Drug Enforcement<br />

Agency and the Colombian military agents in search of drug submarine construction in some of the most<br />

60


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

remote jungles of the planet. Here, where the malaria-infested mosquitoes swarm narco-generals and<br />

heavy hand of the local population, there are at least 300 known cocaine laboratories and finished<br />

countless drug submarines and their factories. In hard-fought war against drug trafficking, an estimated<br />

catch comes in: a surprisingly sophisticated sub built by hand in the jungle.<br />

Mexican Drug Cartels Reach Into The U.S.<br />

Mexico Under Seige: The Drug War at Our Doorstep http://projects.latimes.com/mexico-drug-war/#/its-awar<br />

Maps are interactive hyperlinked<br />

61


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Areas of cartel influence and dispute<br />

62


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Drug cartels moving into the US<br />

63


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Mexico’s Drug Killings<br />

http://online.wsj.com/article/SB10001424052748704288204575362862267177490.html?mod=<br />

WSJ_hpp_LEFTTopStories#project%3DMEXDRUGWARS0912%26articleTabs%3Dinteractive<br />

Drug Killings in Mexico (Annual Totals)<br />

2006 Drug Killings by State<br />

Total Number of Drug Killings [ image| methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2007 Drug Killings by State<br />

Total Number of Drug Killings [ image| methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2008 Drug Killings by State (as of June 27, 2008)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2008 Drug Killings by State (as of August 29, 2008)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2008 Drug Killings by State (as of October 31, 2008)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2008 Drug Killings by State (as of December 26, 2008)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

64


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

2009 Drug Killings by State (as of February 27, 2009)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2009 Drug Killings by State (as of May 1, 2009)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2009 Drug Killings by State (as of July 3, 2009)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2009 Drug Killings by State (as of August 28, 2009)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2009 Drug Killings by State (as of October 30, 2009)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2009 Drug Killings by State (as of December 31, 2009)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2010 Drug Killings by State (as of April 30, 2010)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2010 Drug Killings by State (as of July 2, 2010)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2010 Drug Killings by State (as of September 3, 2010)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2010 Drug Killings by State (as of November 3, 2010)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

2010 Drug Killings by State (as of December 31, 2010)<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

Drug Killings in Mexico (Bi-monthly)<br />

January through February 2008<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

March through April 2008<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

May through June 2008<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

July through August 2008<br />

Total Number of Drug Killings [ image | methodology ]<br />

65


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

September through October 2008<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

November through December 2008<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

January through February 2009<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

March through April 2009<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

May through June 2009<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

July through August 2009<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

September through October 2009<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

November through December 2009<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

January through February 2010<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

March through April 2010<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings<br />

[ image | methodology ]<br />

May through June 2010<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

July through August 2010<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

September through October 2010<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

November through December 2010<br />

Total Number of Drug Killings [ image | methodology ]<br />

Proportion and Percentage of Drug Killings [ image | methodology ]<br />

66


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Drug Trafficking Through Central America (Great Interactive Map)<br />

http://www1.stratfor.com/images/interactive/Central_american_roads.htm<br />

67


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Economic/Financial<br />

Agora Financial's 5 Minute Forecast http://www.agorafinancial.com/5min/<br />

Behind Enemy Lines http://realestateandhousing2.blogspot.com/<br />

Bespoke Investment Group http://bespokeinvest.typepad.com/<br />

Clusterf*ck Nation http://jameshowardkunstler.typepad.com/<br />

Depression2.tv http://www.depression2.tv/d2/<br />

ETF Digest http://www.etfdigest.com/davesDaily.php<br />

Financial Armageddon http://www.financialarmageddon.com/<br />

Fund My Mutual Fund http://www.fundmymutualfund.com/<br />

Interest Rate Roundup http://interestrateroundup.blogspot.com/<br />

Jim Sinclair's Mineset http://www.jsmineset.com/<br />

Kitco.com (Contributed Commentaries) http://www.kitco.com/ind/index_date.html<br />

Mish's <strong>Global</strong> Economic Analysis http://globaleconomicanalysis.blogspot.com/<br />

Money and Markets http://www.moneyandmarkets.com/index.php<br />

Of Two Minds http://www.oftwominds.com/blog.html<br />

Patrick.net http://patrick.net/housing/crash.html<br />

Red Hot Resources http://www.redhotresources.blogspot.com/<br />

Roseman Eruptions http://rosemanblog.sovereignsociety.com/<br />

The Real Deal http://realdealfinancial.blogspot.com/<br />

24hGOLD http://www.24hgold.com/default.aspx<br />

Seeking Alpha http://seekingalpha.com/<br />

El Paso <strong>Intelligence</strong> Center (EPIC)<br />

El Paso <strong>Intelligence</strong> Center (EPIC) http://www.justice.gov/dea/programs/epic.htm<br />

Tattoos Associated with the Barrio Azteca Gang<br />

http://info.publicintelligence.net/mexicoconsulateattacks.pdf<br />

Blue Meth http://info.publicintelligence.net/EPICBlueMeth.pdf<br />

E-Mail Lookups<br />

411 Locate http://www.411locate.com/index1.htm<br />

AnyWho http://anywho.com/<br />

Search Detective http://www.searchdetective.net/<br />

InfoSpace http://www.infospace.com/home/white-pages/reverse-email<br />

Email Address <strong>Link</strong>s http://www.emailaddresses.com/email_lookup_large.htm<br />

http://www.nedsite.nl/search/people.htm#email<br />

http://www.infobel.com/teldir/teldir.asp?page=/eng/more/email<br />

Reverse Lookup and Email Search http://www.freeality.com/finde.htm<br />

http://www.searchdetective.net/email.html<br />

MetaEmailSearchAgent http://mesa.rrzn.uni-hannover.de/<br />

PeopleSearchNet<br />

http://peoplesearch.net/peoplesearch/peoplesearch_reverse_email_address.html<br />

The Ultimate Email <strong>Directory</strong> http://theultimates.com/email/<br />

World Email http://www.worldemail.com/<br />

68


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Embassies of the World<br />

Energy<br />

<strong>Directory</strong> of Arab embassies and consulates in London<br />

http://www.arabcentre.co.uk/arab-embassy.aspx<br />

World Embassy Database http://www.tyzo.com/planning/embassies.html<br />

Embassy of the Republic of Armenia http://www.armeniaemb.org/<br />

Websites of U.S. Embassies and Consulates http://usembassy.state.gov/<br />

Turkish Embassies in America and World http://www.turkish-media.com/en/us_tr_embassies.htm<br />

Index of Foreign Embassies in Australia<br />

http://www.info.dfat.gov.au/Info/WebProtocol/WebProtocol.nsf/homeforma?openform&D<br />

Embassy Search http://www.embassiesabroad.com/search.cfm<br />

Embassies of the World http://www.countriesandcities.com/embassies/<br />

EmbassyWorld http://www.embassyworld.com/embassy/inside_usa.htm<br />

http://www.embassyworld.com/embassy/directory.htm<br />

http://www.embassyworld.com/<br />

http://www.escapeartist.com/embassy1/embassy1.htm<br />

Embassies and Consulates http://dir.yahoo.com/Government/Embassies_and_Consulates/<br />

http://www.dfait-maeci.gc.ca/world/embassies/menu-en.asp<br />

Foreign Embassies of Washington, D.C. http://www.embassy.org/embassies/<br />

Chiefs of State and Cabinet Members of Foreign Governments<br />

http://www.cia.gov/cia/publications/chiefs/<br />

http://www.lawresearch.com/v2/global/cichiefs.htm<br />

http://www.chame.com.br/world/chiefs/index.html<br />

Foreign Governments http://www.library.northwestern.edu/govpub/resource/internat/foreign.html<br />

http://www.lib.umich.edu/govdocs/foreign.html<br />

http://www.gksoft.com/govt/<br />

http://www.diplomaticnet.com/uk/ministries/paises/<br />

The Oil Drum (discussions about energy and our future. ) http://theoildrum.com/<br />

<strong>Global</strong> Energy Network Institute http://www.geni.org/globalenergy/index2.shtml<br />

Center for <strong>Global</strong> Energy Studies http://www.cges.co.uk/<br />

Energy Central http://www.energycentral.com/<br />

Energy <strong>Intelligence</strong> http://www.energyintel.com/<br />

Electric Power Research Institute http://www.epri.com/<br />

Energy Market Maps http://cryptome.sabotage.org/energy-eyeball.htm<br />

http://www.eia.doe.gov/emeu/reps/eimap/ei_contents.html<br />

California On-Line Energy Maps http://www.energy.ca.gov/maps/index.html<br />

Department of Nuclear Energy<br />

http://www.iaea.org/worldatom/Programmes/Nuclear_Energy/index.html<br />

Databases and Directories http://www.platts.com/Databases%20&%20Directories/<br />

Renewable Energy Projects http://www.crest.org/index.html<br />

The Coming <strong>Global</strong> Energy Crisis http://www.energycrisis.org/<br />

U.S. Department of Energy http://www.ciac.org/ciac/<br />

World Energy Council http://www.worldenergy.org/wec-geis/<br />

Energy Review http://archive.wn.com/2004/07/21/1400/energyreview/<br />

Fauxtography a term used to describe instances of photojournalism (most coming from sources<br />

in the Middle East) in which photos have been either misrepresented by staging or other means, or<br />

69


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

manipulated with computer software. <strong>Source</strong>:<br />

http://mediamythbusters.com/index.php?title=Fauxtography<br />

Federal Government<br />

Bureau of Indian Affairs http://www.doi.gov/bureau-indian-affairs.html<br />

Department of Agriculture http://www.usda.gov/wps/portal/usdahome<br />

Department of Defense http://www.defenselink.mil/<br />

Department of Commerce http://www.commerce.gov/<br />

Department of Education http://www.ed.gov/index.jhtml<br />

Department of Emergency Management http://www.snodem.org/training/<br />

Department of Health and Human Services http://www.dhhs.gov/<br />

Department of Labor http://www.dol.gov/<br />

Department of State http://www.state.gov/<br />

Department of the Treasury http://www.ustreas.gov/<br />

Department of Veterans Affairs http://www.va.gov/<br />

Department of Homeland Security http://www.dhs.gov/dhspublic/<br />

Department of the Interior http://www.doi.gov/<br />

Department of Justice http://www.usdoj.gov/<br />

Department of Transportation http://www.usdoj.gov/<br />

Energy Information Agency http://www.eia.doe.gov/<br />

Department of Energy http://www.doe.gov/engine/content.do<br />

Food and Drug Administration http://www.fda.gov/<br />

Federal Aviation Administration http://www.faa.gov/<br />

Federal Emergency Management Agency http://www.fema.gov/<br />

White House http://www.whitehouse.gov/<br />

<strong>Link</strong>s to Government WEB Sites http://www.fedworld.gov/gov-links.html<br />

http://www.fedworld.gov/gov-links2.html<br />

http://www.lib.lsu.edu/gov/fedgov.html<br />

http://www.nvcc.edu/alexandria/library/instruction/esl/esl007/government.htm<br />

http://www.lib.lsu.edu/gov/alpha<br />

http://www.nwc.navy.mil/library/4Resources/GovtHomPage.htm<br />

Minerals Management Service http://www.mms.gov/<br />

Nuclear Regulatory Commission http://www.nrc.gov/<br />

Government Search http://www.queryserver.com/government.htm<br />

http://www.searchgov.com/<br />

The Federal WEB Locator http://www.infoctr.edu/fwl/<br />

Citizenship and Immigration Services http://uscis.gov/graphics/index.htm<br />

Office of Management and Budget http://www.whitehouse.gov/OMB/<br />

Government Executive http://www.govexec.com/<br />

First Gov (US Government official web site) http://www.firstgov.gov/<br />

Complete U.S. Federal Government Agencies <strong>Directory</strong> (Hierarchical)<br />

http://www.lib.lsu.edu/gov/tree<br />

Complete U.S. Federal Government Agencies <strong>Directory</strong> (Alphabetical)<br />

http://www.lib.lsu.edu/gov/alpha<br />

70


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Gangs (includes gangs in the Military)<br />

L.A. County Sheriff Improvised/Disguised Weapons Guide<br />

http://publicintelligence.info/LA-DisguisedWeapons.pdf<br />

New York City Police Department The Gang Manual<br />

http://publicintelligence.info/NYPDGANGMANUAL.PDF<br />

Bronx Bloods Members Communicating Through PlayStation Network (NOTE: Classification for<br />

this is U/LES, however it is obtained on the web) http://publicintelligence.info/FBI-BloodsPSN.pdf<br />

Texas Gang Threat Assessment 2010 http://www.insightcrime.org/investigations/governmentmultilaterals/item/1009-texas-department-of-public-safety-texas-gang-threat-assessment-2010<br />

Interpreting Gangster Clothing<br />

http://www.policemag.com/Channel/Gangs/PhotoGallery/2010/02/Gangster-Clothing.aspx<br />

Gangs in The Military (According to the FBI, 15,000 men and women in the U.S. military have ties<br />

to notorious American gangs such as MS-13, the Crips, the Bloods, and the Gangster Disciples.)<br />

http://www.policemag.com/Videos/Channel/Gangs/2011/01/Gangs-In-the-Military-Part-1.aspx<br />

Gang tattoos are an excellent tool for law enforcement and corrections officers to use to identify<br />

known or suspected gang members. This gallery includes examples of tattoos worn by predominanly<br />

Hispanic gangs such as the Mexican Mafia, MS-13, and the Latin Kings. The number "13" is used<br />

because M (or La Eme) is the thirteenth letter of the alphabet and is used to signify the Mexican Mafia,<br />

which uses Sureños—gangs that swear allegiance to the Mexican Mafia—to carry out its orders from<br />

prison. http://www.policemag.com/Channel/Gangs/PhotoGallery/2009/08/Gang-Tattoos-Hispanic.aspx<br />

Latin King’s Gang Signs Video<br />

http://www.policemag.com/Videos/Channel/Gangs/2010/09/Latin-King-s-Gang-Signs.aspx<br />

Tattoos Associated with the Barrio Azteca Gang<br />

http://info.publicintelligence.net/mexicoconsulateattacks.pdf<br />

Investigating Gang Homicides - A gang murder investigation requires your best detective skills to<br />

solve the crime and protect the witnesses.<br />

http://www.policemag.com/Channel/Gangs/Articles/2010/10/Investigating-Gang-Homicides.aspx<br />

Gangs United (if there was reason to be concerned, what is now happening in S. Texas is more<br />

disturbibg) http://threatswatch.org/rapidrecon/2010/11/gangs-united/<br />

Gang Book<br />

https://docs.google.com/viewer?a=v&pid=gmail&attid=0.1&thid=12c6ec4f372a0a0d&mt=applicati<br />

on/pdf&url=https://mail.google.com/mail/?ui%3D2%26ik%3D00892a2f0d%26view%3Datt%26th%<br />

3D12c6ec4f372a0a0d%26attid%3D0.1%26disp%3Dattd%26zw&sig=AHIEtbR3U6DArH21pObsw<br />

vl2qri4qR6f-w&pli=1<br />

The Barrio Azteca Trial and the Prison Gang-Cartel Interface<br />

http://www.stratfor.com/weekly/20081119_barrio_azteca_trial_and_prison_gang_cartel_interface<br />

Gangs In The U.S. http://www.accuracyproject.org/GangAcronyms-US.html<br />

Gangs Northwest Gangs: This website was made to give general information on street gang<br />

activity in the Northwest region of the United States. http://www.nwgangs.com/8001.html<br />

Gang Graffiti Photos http://www.flickr.com/photos/northwestgangs/<br />

Mapping Gang Related Activity In North America http://gangs.globalincidentmap.com/home.php<br />

Know Gangs: Recent Gang Videos http://www.knowgangs.com/gang_resources/menu.php<br />

http://www.knowgangs.com/<br />

All Crip Gangs in Los Angeles County http://www.streetgangs.com/crips/index.html<br />

Organized Crime Web <strong>Link</strong>s http://www.yorku.ca/nathanson/<strong>Link</strong>s/links.htm<br />

Gangs 101 http://www.lincolnnet.net/users/lrttrapp/block/gangs101.htm<br />

Gangs Or Us http://www.gangsorus.com/<br />

71


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Gangs http://www.geocities.com/Athens/4111/nogangs.html<br />

http://www.angelfire.com/biz4/stopvarriowar/gps.html<br />

Gang <strong>Intelligence</strong> Unit<br />

http://www.charmeck.org/Departments/Police/About+Us/Departments/Gang+<strong>Intelligence</strong>+Unit.htm<br />

Motorcycle Gangs Or Mafia http://www.nagia.org/Motorcycle_Gangs.htm<br />

Organized Crime And Political Corruption http://www.ipsn.org/<br />

Gangs Before Thrasher http://gangresearch.net/Archives/UIC/Courses/history/beforethrash.html<br />

Gang Research http://gangresearch.net/<br />

http://www.uic.edu/orgs/kbc/<br />

http://tigger.uic.edu/~huk/Gang%20History/Citygangs.html<br />

http://www.ericdigests.org/pre-9216/gangs.htm<br />

Gangs Around The World http://www.uic.edu/orgs/kbc/gangresources/Intgangs.html<br />

http://gangresearch.net/<strong>Global</strong>ization/regions/intgangs.html<br />

Identifying Gang Members http://www.polksheriff.org/library/gangs/identifying.html<br />

Gang Symbols/Signs http://www.velocity.net/~acekc/gangsymbols.htm<br />

http://www.velocity.net/~acekc/gangsign.htm<br />

http://ga.essortment.com/gangsignsands_reyp.htm<br />

Gang Awareness http://www.sanantonio.gov/sapd/pdf/Awareness.pdf<br />

Gang Handbook http://www.gov.mb.ca/justice/safe/gangproof/ganghandbook2004.pdf<br />

Gangs In Texas http://www.oag.state.tx.us/AG_Publications/pdfs/97gang.pdf<br />

Clantone 14 http://www.clantone.net/mainpage.html<br />

Gangs Speak For Themselves http://tigger.uic.edu/~huk/Gang%20History/Gangs.html<br />

All Blood Gangs In Los Angeles County http://www.streetgangs.com/bloods/<br />

Crips http://www.streetgangs.com/crips/<br />

Hispanic Gangs In Los Angeles County http://www.streetgangs.com/hispanic/<br />

Asian Gangs In Los Angeles County http://www.streetgangs.com/asian/<br />

18 th Street Gang http://www.streetgangs.com/18thstreet.html<br />

Territory Maps of Gangs in Los Angeles http://www.streetgangs.com/maps/<br />

Female Gangs In America http://www.uic.edu/orgs/kbc/Female.html<br />

http://www.angelfire.com/theforce/gps0/FemaleGangs.html<br />

Street Gang Websites & Related <strong>Link</strong>s http://www.angelfire.com/biz4/stopvarriowar/gps.html<br />

Know Gangs http://www.knowgangs.com/gang_001.htm<br />

Mara Salvatrucha http://www.the-solution.org/ms13.htm<br />

http://home.comcast.net/~jackhydn1/structure.htm<br />

http://www.islandpacket.com/news/local/story/5711073p-5115080c.html<br />

http://www.flickr.com/photos/brianwisconsin/search/tags:MS-13/<br />

http://www.rockawave.com/news/2005/0708/Front_Page/003.html<br />

http://home.comcast.net/~jackhydn1/FFXPolicePres.pdf<br />

Gang Prevention Publications<br />

http://www.dojconnect.com/docs/resources/Gang_Prevention_Resources.pdf<br />

Gang Profiles http://cryptome.org/13gangs.htm<br />

Gang and Security Threat Group Awareness http://www.dc.state.fl.us/pub/gangs/index.html<br />

The Psychology of Criminal Behaviour http://www.athabascau.ca/courses/crjs/360/index.html<br />

Bloods And Crips http://www.dc.state.fl.us/pub/gangs/la.html<br />

Street Gangs: A Dead End http://www.fmuniv.edu/urbanaffairs/Street%20Gangs.pdf<br />

The Reality Of Gangs http://www.ncpc.org/cms/cms-upload/ncpc/files/gangs.pdf<br />

Youth Gangs http://www.ed.gov/admins/lead/safety/training/gangs/day1_pdf.pdf<br />

Gangs Or Us http://www.gangsorus.com/graffiti.html<br />

2005 National Gang Threat Assessment<br />

http://www.stripes.com/07/feb07/gangs/2005_NAGIA_Assessment.pdf<br />

Review Of Gang Activity Affecting The Army<br />

http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf<br />

Gang-Related Activity in the US Armed Forces Increasing<br />

http://www.stripes.com/07/feb07/gangs/ncis_gangs.pdf<br />

Gangs In The Military Video http://www.militaryspot.com/videos/video72.htm<br />

Gang Activity In The U.S. Military http://usmilitary.about.com/od/justicelawlegislation/a/gangs.htm<br />

72


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Gang Signs http://zimmer.csufresno.edu/~haralds/htmlfiles/gang-signs.html<br />

Gangs Spreading In The Military<br />

http://www.cbsnews.com/stories/2007/07/28/eveningnews/main3107316.shtml?source=RSSattr=HOME_<br />

3107316<br />

Gang Related Activity In The Armed Forces<br />

http://militarytimes.com/static/projects/pages/ngic_gangs.pdf<br />

Gang Activity Threat Assessment http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf<br />

List Of California Street Gangs http://en.wikipedia.org/wiki/List_of_California_street_gangs<br />

Gang Signal http://en.wikipedia.org/wiki/Gang_signal<br />

Gang Awareness Guide http://www.state.nj.us/oag/gang-signs-bro.pdf<br />

Gang Hand Signs from Gang Members<br />

http://www.hiphopmusicclassic.com/Gang-Hand-Signs-from-Gang-Members.html<br />

<strong>Global</strong> Incidents Interactive Maps<br />

Maersk – Track ships in real time. (we certainly do make it easy for pirates!)<br />

http://www.maerskfleet.com/#live-map<br />

Ship Tracking http://www.sailwx.info/shiptrack/shiplocations.phtml<br />

Ships Map http://www.marinetraffic.com/ais/<br />

http://www.boat-project.com/cruises/ais.php<br />

VesselTracker http://www.vesseltracker.com/en/Googleearth.html<br />

http://www.digital-seas.com/<br />

Forgotten Conflicts http://www.msnbc.msn.com/id/28584056/ns/world_news/<br />

A <strong>Global</strong> Display of Terrorism and Other Suspicious Activity (requires a paid subscription)<br />

http://www.globalincidentmap.com/map.php<br />

North American Hazmat Situations and Deployments Map<br />

http://hazmat.globalincidentmap.com/map.php<br />

Displaying Actual and Suspected Cases of H1N1 North American Influenza<br />

http://outbreaks.globalincidentmap.com/home.php<br />

Gang Activity and Arrests http://gangs.globalincidentmap.com/home.php<br />

Canadian/Mexican/USA Border Security Incidents http://border.globalincidentmap.com/<br />

Domestic Terrorism Tracking System (requires a paid subscription)<br />

http://www.domesticterrormap.com/<br />

Displaying Amber Alerts Nationwide http://amberalerts.globalincidentmap.com/home.php<br />

Presidential Threat Map http://president.globalincidentmap.com/<br />

Continuously Updated <strong>Global</strong> Display of Aviation Incidents and Accidents<br />

http://aviation.globalincidentmap.com/<br />

Continuously Updated Display of Major Drug Interdictions http://drugs.globalincidentmap.com/<br />

<strong>Global</strong> Threats/Conflict<br />

Conflict, Security, and Development 2011<br />

http://wdr2011.worldbank.org/sites/default/files/WDR2011_Overview.pdf<br />

Threats Watch http://threatswatch.org/<br />

Conflict Map (Great interactive maps for various subjects)<br />

http://nobelprize.org/educational_games/peace/conflictmap/<br />

Forgotten Conflicts http://www.msnbc.msn.com/id/28584056/ns/world_news/<br />

Exploring <strong>Global</strong> Conflict http://www.uwm.edu/Dept/CIS/conflict/congeneral.html<br />

<strong>Global</strong> Threats and Challenges http://www.ceip.org/files/projects/npp/resources/dia020701.htm<br />

73


Google<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.fas.org/irp/congress/1997_hr/s970205d.htm<br />

http://www.fas.org/irp/congress/2002_hr/031902wilson.pdf<br />

<strong>Global</strong> Trends 2015 http://www.odci.gov/cia/reports/globaltrends2015/index.html<br />

Identity Fraud: A Critical National and <strong>Global</strong> Threat<br />

http://www.lexisnexis.com/presscenter/hottopics/ECIReportFINAL.pdf<br />

Threat Assessments http://www.ceip.org/files/nonprolif/resources/intelligence.asp<br />

http://www.ceip.org/files/nonprolif/templates/article.asp?NewsID=5022<br />

National Threat Assessment Center http://www.secretservice.gov/ntac.shtml<br />

World Threats http://www.worldthreats.com/<br />

Hot Spots Around The Globe<br />

http://www.cnn.com/interactive/maps/world/fullpage.global.conflict/world.index.html<br />

The World At War: Current Conflicts http://www.globalsecurity.org/military/world/war/index.html<br />

Inventory Of Conflict And Environment<br />

http://www.american.edu/projects/mandala/TED/ice/iceall.htm<br />

Google Earth http://earth.google.com/<br />

French Alternative to Google Earth http://www.geoportail.fr/<br />

Google Alerts (Don’t waste time on searches when Google can do it for you. Type in the<br />

keywords or phrases and get the results as they occur or once a day) http://www.google.com/alerts<br />

Google Answers (Ask a question, set a price get an answer) http://answers.google.com/answers/<br />

Catalogs (Search and browse mail-order catalogs) http://catalogs.google.com/<br />

Directories (Browse the web by topic) http://www.google.com/dirhp<br />

Froogle (Shop smarter with Google) http://froogle.google.com/<br />

Groups (Create mailing lists and discussion groups)<br />

http://groups-beta.google.com/grphp?hl=en&tab=wg<br />

Images (Search for images on the web) http://www.google.com/imghp?hl=en&tab=wi<br />

Labs (Try out new Google products) http://labs.google.com/<br />

Local (Find local businesses and services) http://local.google.com/<br />

Maps (View maps and get directions) http://maps.google.com/<br />

News (Search thousands of news stories) http://news.google.com/nwshp?hl=en&gl=us<br />

Print (Search the full text of books) http://print.google.com/<br />

Scholar (Search scholarly papers) http://scholar.google.com/<br />

Special Searches (Search within specific topics)<br />

http://www.google.com/intl/en/options/specialsearches.html<br />

University Search (Search a specific school's website)<br />

http://www.google.com/intl/en/options/universities.html<br />

WEB Search Features (Do more with search) http://www.google.com/help/features.html<br />

A 3D interface to the planet http://earth.google.com/<br />

Blog Search http://blogsearch.google.com/<br />

Simply Google http://www.usabilityviews.com/simply_google.htm<br />

Search Mash http://www.searchmash.com/<br />

Google Hacks And Others<br />

Google Hacks Book Online<br />

http://richardsprague.blogspot.com/2007/01/complex-google-searches.html<br />

Safari Tech Books Online (Why buy them when you can read them online)<br />

http://proquest.safaribooksonline.com/?uicode=califa<br />

Hack Public Records http://tuvutayik.blogspot.com/2007/01/hack-ga-public-records-search.html<br />

74


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Googling Your Dinner http://www.amgeekwilltravel.com/?p=162<br />

55 Ways To Have Fun With Google http://www.55fun.com/<br />

Free Copy http://www.55fun.com/book.pdf<br />

Google Hacking Mini Guide<br />

http://www.informit.com/articles/printerfriendly.asp?p=170880&rl=1p=170880&rl=1<br />

Computer Science Reference Books<br />

http://shahid-tutesworld.blogspot.com/2007/01/hacking-section.html<br />

Ten Government Hacks<br />

http://www.hackszine.com/blog/archive/2007/01/10_government_hacks.html<br />

Hacks<br />

http://www.hackszine.com/blog/archive/2007/01/map_your_books.html?CMP=OTC-7G2N43923558<br />

Download Free MP3 http://www.indiecom.net/node/166<br />

Google Hacks http://www.hackemate.com.ar/textos/O'Reilly%20books/O'Reilly%20-<br />

20Google%20Hacks,%201st%20Edition.pdf<br />

Programming For You http://programming4you.wordpress.com/2007/02/13/google-hacks/<br />

Exploring Google’s Hidden Features<br />

http://www.informit.com/articles/printerfriendly.asp?p=675528&rl=1<br />

Free E-Books http://mohitarnold.blogspot.com/2007/03/free-e-books.html<br />

http://ebook.blogfa.com/8603.aspx<br />

Google Hacks E-Books<br />

http://www.news.youmule.com/2007/04/01/pc-technician-street-smarts-and-google-hacks-ebooks/<br />

Google Hacks N Stuff http://raaff.gempax.net/?p=46<br />

2600 The Hacker Quarterly http://www.2600.com/<br />

PGP Documents http://www.menet.umn.edu/docs/software/pgp/pgp.html<br />

PGP4Dummies http://www.zabalaza.net/pgp/pgp4dummies.pdf<br />

Hamas<br />

Hamas On You Tube http://www.youtube.com/user/PaldfTV<br />

Hate Groups<br />

The Hate <strong>Directory</strong> (Hate groups on the internet) http://www.hatedirectory.com/<br />

http://www.hatedirectory.com/hatedir.pdf<br />

Hate Groups Interactive Map http://www.splcenter.org/get-informed/hate-map<br />

75


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Hezbollah<br />

Hezbollah cracked the code<br />

http://www.newsday.com/news/nationworld/world/ny-wocode184896831sep18,0,3091818.story?coll=nyworld-promo<br />

Hizbollah And The Lebanese Crisis http://www.gees.org/documentos/Documen-02610.pdf<br />

Homeland Security (See Also Department of Homeland Security)<br />

Homeland Security Network News<br />

https://webmail.us.army.mil/attach/text/html?sid=&mbox=INBOX&charset=escaped_unicode&uid=22489&<br />

number=2&process=js&filename=text/html<br />

http://www.homelandsecuritynet.com/<br />

Homeland Security Digital Library https://www.hsdl.org/<br />

HomeLand Security Today http://hstoday.us/<br />

Gateway to Homeland Security http://www.au.af.mil/au/awc/awcgate/awc-hmld.htm<br />

Brookings Institution Project on Homeland Security<br />

http://www.brook.edu/dybdocroot/fp/projects/homeland/homeland.htm<br />

Center for State Homeland Security<br />

http://www.cshs-us.org/CSHS/cshs.nsf/Main/CounterTerrorismReports<br />

Department of Homeland Security http://www.dhs.gov/dhspublic/<br />

Are You Ready? http://www.fema.gov/areyouready/<br />

GAO Homeland Security http://www.gao.gov/docsearch/featured/homelandsecurity.html<br />

Homeland Security Monitor http://www.homelandsecuritymonitor.com/index.htm<br />

State Homeland Security WEB Sites http://www.nga.org/cda/files/HOMESECSTRUCTURES.PDF<br />

http://www.nga.org/center/security/<br />

Homeland Security Guidelines http://cryptome.org/homesec-kyagb.htm<br />

Homeland Security Weekly http://www.homelandsecurityweekly.com/lastissue.html<br />

National Homeland Security Knowledge Bas http://www.twotigersonline.com/resources.html<br />

The Heritage Foundation http://www.heritage.org/Research/HomelandDefense/index.cfm<br />

Online References and Resources http://chppm-www.apgea.army.mil/HomelandSecurity/<br />

http://www.globalsecurity.org/security/index.html<br />

Department of Homeland Security Spy Vehicle http://cryptome.org/dhs-truck.htm<br />

Homeland Security Online http://www.hitechcj.com/homelandsecurity/<br />

Homeland Security Solutions International http://www.homelandsecurityssi.com/<br />

Human Trafficking<br />

76


HUMINT<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Ending Modern Day Slavery<br />

http://thecnnfreedomproject.blogs.cnn.com/2011/07/29/a-profitable-enterprise/<br />

Human Trafficking Search http://www.humantraffickingsearch.net/<br />

Trafficking Protection Act of 2000 http://www.state.gov/g/tip/rls/tiprpt/2004/<br />

Campaign Against the Trafficking of Women and Girls<br />

http://www.hrw.org/about/projects/traffcamp/intro.html<br />

Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/human.htm<br />

Facts About Human Trafficking http://www.state.gov/r/pa/ei/rls/33109.htm<br />

http://www.worldrevolution.org/guidepage/humantrafficking/overview<br />

Human Trafficking and Modern-Day Slavery http://www.gvnet.com/humantrafficking/<br />

http://www.polarisproject.org/polarisproject/<br />

http://www.acf.dhhs.gov/trafficking/<br />

http://www.unodc.org/unodc/en/trafficking_human_beings.html<br />

A WEB <strong>Source</strong> for Combating Human Trafficking http://humantrafficking.org/<br />

Children and Human Trafficking http://www.interpol.int/Public/THB/default.asp<br />

United Nations: Trafficking<br />

http://www.unodc.org/unodc/en/publications/publications_trafficking.html<br />

Responses to Human Trafficking http://usinfo.state.gov/journals/itgic/0603/ijge/ijge0603.htm<br />

Trafficking <strong>Link</strong>s http://www.unodc.org/unodc/en/trafficking_links.html<br />

Interactive Map: Human Trafficking Worldwide<br />

http://www.pbs.org/wnet/wideangle/shows/dying/map_albania.html<br />

People Smuggling http://www.interpol.int/Public/THB/PeopleSmuggling/Default.asp<br />

Trafficking https://www.atsc.army.mil/crc/Trafflicking/index.htm<br />

Trafficking In Human Beings http://www.interpol.int/Public/THB/default.asp<br />

HUMan INTelligence http://en.wikipedia.org/wiki/HUMINT<br />

White Paper 1997 http://www.fas.org/irp/doddir/army/wht-ppr.htm<br />

Identity Theft<br />

What to do if you are a victim of identity theft? Place a fraud alert on your credit reports by<br />

notifying all credit reporting agencies.<br />

Experian P. O. Box 9532, Allen, TX 75013-9595 Tel: 888-397-3742<br />

Equifax P. O. Box 740241, Atlanta, GA 30374-0241 Tel: 800-685-1111<br />

Trans Union P. O. Box 6790, Fullerton, CA 92834 Tel: 800-680-7289<br />

Innovis Data Solutions P.O. Box 1534, Columbus, OH Tel: 877-261-7685<br />

Identity Theft and Terrorism http://www.privacymatters.com/identity-theft-information/identitytheft-and-terrorism.aspx<br />

Credit Card Fraud http://www.identity-theft-help.us/credit.card.fraud.htm<br />

How To Commit Credit Card Fraud http://www.clean-credit.us/identity-theft-how.htm<br />

http://www.identity-theft-help.us/how.to.commit.fraud%20.htm<br />

77


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.identity-theft-help.us/how.to.commit.identity.theft%20.htm<br />

Identity Theft: A Quiz for Consumers http://www.usdoj.gov/criminal/fraud/idquiz.pdf<br />

Identity Theft and Fraud http://www.usdoj.gov/criminal/fraud/idtheft.html<br />

Identity Theft Resources http://www.privacyrights.org/identity.htm<br />

Identity Theft Prevention and Survival http://www.identitytheft.org/<br />

Take Charge: Fighting Back Against Identity Theft<br />

http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm<br />

Identity Theft in The U.S<br />

http://www.cnn.com/interactive/us/0516/map.state.theft.rankings/frameset.exclude.html<br />

http://www.cnn.com/interactive/us/0516/map.state.theft.rankings/frameset.exclude.html<br />

Image, Audio, Video Finder<br />

PureVideo http://www.purevideo.com/<br />

Webseek http://persia.ee.columbia.edu:8008/<br />

Image Seeker http://corbis.ltutech.com/<br />

Google Image Search http://www.google.com/imghp?hl=en&tab=wi<br />

Ditto http://www.ditto.com/<br />

NASA http://nix.nasa.gov/<br />

Jupiter Images http://www.jupiterimages.com/en/<br />

Singing Fish http://search.singingfish.com/sfw/home.jsp<br />

Flickr http://www.flickr.com/<br />

Middle East Media Research Institute http://www.memritv.org/subjects.asp<br />

The MEMRI Economic NBlpog http://www.memrieconomicblog.org/<br />

http://www.memri.org/<br />

Webshots http://webshots.com/<br />

Excellent Video Clips From The Middle East http://memritv.org/default.asp<br />

PureVideo http://www.purevideo.com/<br />

YouTube http://youtube.com/<br />

GoogleVideo http://video.google.com/<br />

Daily Motion http://www.dailymotion.com/us<br />

Myspace http://myspace.com/<br />

Stage6 http://stage6.divx.com/<br />

Metacafe http://www.metacafe.com/<br />

Break http://break.com/<br />

Metatube http://www.metatube.net/<br />

Yahoo Video http://video.yahoo.com/<br />

Ifilm http://www.ifilm.com/<br />

Educate Earth http://www.educatedearth.net/index.php<br />

StupidVideos http://stupidvideos.com/<br />

FileCabinet http://filecabi.com/<br />

Hi5 http://hi5.com/<br />

Pandora http://pandora.com/<br />

MTV http://www.mtv.com/<br />

PhotoBucket http://photobucket.com/<br />

OnAirToday (a collection of latest feeds from various sources. More feeds).. http://www.onairtoday.com/<br />

Flixxy http://www.flixxy.com/<br />

Zoomr : Recent startup that is shaping up to take on Flickr. Have just announced they will be<br />

increasing monthly limits on free and paid accounts to more than what Flickr offers.<br />

Vmix : Founded by the people behind MP3.com, Vmix offers photo and video sharing along with<br />

the ability to create you own slideshows. A busy-looking site that seems to have quite a bit of traffic.<br />

78


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Flickr : The daddy of photo-sharing sites, the first in the breed of web 2.0 photo sites, allows you<br />

to create galleries, tag photos etc. The biggest in terms of traffic and was acquired by Yahoo.<br />

Fotki : Founded in 1998 Fotki has been around for ages in relation to a lot on this list, it offers a<br />

range of services such as photo-sharing, photo-printing, photo-selling and blogging.<br />

Fotolog : Large photo blogging community - claims to have a staggering 1.5 billion page views<br />

and receive over 20 million unique visitors per month which is backed up by its alexa ranking of 33.<br />

Fototopic : Another site that has been around a few years; since 1999. Offers gallery services and<br />

also prints and your photos on to various gifts within their store.<br />

Glowfoto : A basic photo sharing site that offers galleries and the option to upload via mobile<br />

phone. 25million photos have been uploaded by 73k users so far.<br />

MyPhotoAlbum : Photo sharing with the usual features and also offers printing; currently offering<br />

15 free prints to new users. Has had 32million photos uploaded so far.<br />

Panoramio : Photo storage and a mapping feature via a mashup with google maps. Each photo<br />

gets linked with the place it was taken. 2GB storage included for free.<br />

Ringo : No, not the beatle but a rather smart-looking site which combines photo sharing with<br />

social networking. Every week you get your friends newest photos and comments delivered to you. One<br />

of the better-looking sites.<br />

Zoomonga : A nice-looking site but the rather stingy 20mb of uploads per month on the free plan<br />

could be why it doesnt look exactly busy.<br />

Webshots : Another huge site owned by Cnet. Provides the usual photo sharing features plus a<br />

desktop utility for organising photos, prints on gifts etc.<br />

Photobucket : The favourite of myspace users, provides free and paid accounts for image hosting<br />

and video hosting along with the ability to create a flash slideshow. Have harnessed viral marketing to a<br />

tee and provide most of the image hosting for myspace and other social networks.<br />

PBase : Not the easiest on the eye but seems to have gained huge traffic since it was established<br />

in 1999. Very basic features and a huge member’s forum.<br />

OrangePics : A basic site that emphasizes ease of use and safety of your photos. Currently<br />

offering your first full year for free, after which is an annual charge of $24.95.<br />

Phanfare : Offers unlimited storage for a monthly fee of $6.95 to host your photos and video clips.<br />

Also provides downloadable organisation software.<br />

SmugMug : Really nicely designed site that offers accounts from $59.95 per year with a free trial.<br />

The user galleries are nice to look at and you can include video in these.<br />

Dropshots : Front end looks nice and clean and the features are up to scratch but viewing the<br />

sample gallery lets the site down - cluttered and ugly.<br />

Slide : Another site that has taken advantage of myspace to create viral marketing. Users upload<br />

photos and create slideshows using the editor and then post them to their profile or blog etc. Controls are<br />

nice and easy to use, will do well unless myspace bring out their own slideshow tools.<br />

Photosite : Provides photo sharing but you get the impression the site is more about selling prints<br />

and gifts than that. looks a touch too corporate although the drag and drop tools sound impressive.<br />

23HQ : Nice site which provides completely free accounts, basic features such as galleries,<br />

tagging and photogroups; where you can form your own community of friends and chat and share each<br />

other’s photos.<br />

Kodak Gallery : Goes under the name of a photo sharing site but looks very corporate and set up<br />

to flog merchandise rather than provide a nice website experience.<br />

Zoto : Nice site with good features such as geo-tagging, photo blogging and the usual community<br />

features such as browsing by interest. Free version with the option to upgrade to a pro account for $24.95<br />

per year.<br />

Snapfish : Another corporate site run by Hewlett Packard, offers photo sharing and digital prints<br />

of your snaps.<br />

Flukiest : Photo, Video and music sharing with the ability to upload via mobile phone or a<br />

personalised Flukiest email address.<br />

Imagestation : Sonys photo sharing offering, much better looking the Kodaks or HPs. Usual<br />

features with printing options but also the ability to upload via your psp.<br />

PictureTrail : Another site that is combining photo sharing and social networking. Provides<br />

myspace style customisable profiles and some nice flash widgets to create 3d cubes of your photos, heart<br />

shapes, slideshows, screensavers and loads more bits and bobs.<br />

79


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Hello : Great domain and Googles offering which is designed to work in tandem with their picasa<br />

image organising software which they acquired. Picasa is great piece of software and helps you find<br />

pictures you had long forgotten about. it seems that hello allows you to send images to your friends like<br />

and instant messager or to your blogger blog.<br />

Parazz : Parazz is a nifty looking site which offers drag and drop uploading, slideshow creation<br />

with the option to add a soundtrack, camera phone uploads and a colour theme editor. They provide a<br />

free version or pro version for $29 a year.<br />

Zeec : Clean looking site with nice user galleries, offers the choice of uploading via your pc or<br />

mac with their software or via mobile phone.<br />

Funtigo : A site offering photo scrapbooks, users can deesign each album or Web page the way<br />

you they like by adding text, backgrounds, clipart and animated text to their pages. Nice features and as<br />

myspace found out, people like to customise their pages.<br />

IMINT<br />

GEOINT Online (A website that is unifying existing NGA web-based capabilities for online, ondemand<br />

discovery of and access to geospatial intelligence (GEOINT) content, services, expertise, and<br />

support. GEOINT Online is an element of the strategy to transform NGA from solely a product producer<br />

to a GEOINT Services Provider with integrated access to GEOINT content, services, expertise and<br />

support.)<br />

https://www.geoint-online.net/_layouts/NGA/GO/Logon/logon.aspx?<strong>Source</strong>=https://www.geoint-online.net/<br />

IMINT And Analysis (<strong>Open</strong> source military analysis, strategic thinking, and Google Earth imagery<br />

interpretation) http://geimint.blogspot.com/<br />

Imagery <strong>Intelligence</strong> Part I and II http://dataink.blogspot.com/2007/03/imagery-intelligence.html<br />

http://dataink.blogspot.com/2007/10/imagery-intelligence-part-ii.html<br />

IMINT 101 Introduction To Imagery <strong>Intelligence</strong> http://ftp.fas.org/irp/imint/imint_101.htm<br />

Do It Yourself Imagery Analysis<br />

http://geimint.blogspot.com/2008/01/effective-searching-in-google-earth.html<br />

HUMINT, IMINT, MASINT, SIGINT, <strong>OSINT</strong>: Finding What Shouldn’t Be Found<br />

http://risrecbooks.blogspot.com/2008/02/humint-imint-masint-sigint-osint.html<br />

Satellite Sensors (Learn more about each sensor and view sample satellite imagery)<br />

ALOS<br />

ASTER<br />

CARTOSAT-1<br />

CBERS-2<br />

FORMOSAT-2<br />

GeoEye-1<br />

IKONOS<br />

LANDSAT 7<br />

QuickBird<br />

SPOT-5<br />

WorldView-1<br />

Counter IMINT: The Syrian Deception<br />

http://verificationthoughts.blogspot.com/2008/05/syrian-deception.html<br />

Army Geospatial Center http://www.agc.army.mil/<br />

Information Dominance/Operations<br />

Information Operations Air Force Doctrine<br />

http://www.dtic.mil/doctrine/jel/service_pubs/afdd2_5.pdf<br />

INFORMATION OPERATIONS: Putting the ‘I” Back Into DIME (Army SSI Monograph)<br />

80


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=642<br />

Improvised Explosive Devices<br />

Including Explosively Formed Projectiles/Improvised Rocket Assisted Mortars<br />

Indicators and Warnings for Homemade Explosives (FOUO – Publicly available)<br />

http://www.scribd.com/doc/51604956/Indicators-and-Warnings-for-Homemade-Explosives-USA-2007<br />

UPS Printer Bomb Plot<br />

http://occident.blogspot.com/2010/11/third-issue-of-inspire-magazine-from-al.html<br />

List of Explosive Materials http://cryptome.org/0002/atf111710.htm<br />

Strategic Influence of the Improvised Explosive Device http://cryptome.org/0002/auag-ied.htm<br />

IED Defeat (The mission of the BCKS IED-Defeat Community of Practice is to facilitate<br />

collaborative discussions and sharing of knowledge to defeat the IED threat.)<br />

https://forums.bcks.army.mil/secure/communitybrowser.aspx?id=131710&lang=en-US<br />

IED Fact Sheet http://www.nae.edu/15081.aspx<br />

Videos On YouTube http://www.youtube.com/watch?v=PEsReCOcAyM&feature=related<br />

Improvised Rocket Assisted Mortars/Munitions<br />

http://www.longwarjournal.org/archives/2008/06/mahdi_army_uses_flyi.php<br />

http://www.defensereview.com/modules.php?name=News&file=article&sid=1153<br />

http://en.wikipedia.org/wiki/Lob_bomb<br />

http://holgerawakens.blogspot.com/2008/07/who-is-using-improvised-rocket-assisted.html<br />

General Information http://www.securitydriver.com/aic/stories/article-114.html<br />

http://www.securitydriver.com/aic/<br />

http://www.bombshock.com/fronts/explosive.html<br />

http://en.wikipedia.org/wiki/Improvised_explosive_device<br />

http://www.globalsecurity.org/military/intro/ied.htm<br />

http://www.globalsecurity.org/military/intro/ied-iraq.htm<br />

IEDs and Convoy Protection http://security.lifesafety.ca/2004articles/2004sec0048.htm<br />

IED: A weapons Profile http://www.defense-update.com/features/du-3-04/IED.htm<br />

Miscellaneous Explosives used as IEDs http://www.emergency.com/explosives-misc.htm<br />

Overseas Bomb Threat Awareness http://www.state.gov/m/ds/rls/rpt/19726.htm<br />

Potential Indicators of Threats Involving Vehicle Borne IEDs<br />

http://www.iwar.org.uk/homesec/resources/dhs-bulletin/vbieds.htm<br />

http://www.emergency.com/2004/Potential_Indicators_VBIEDS_files/frame.htm<br />

http://www.usembassyjakarta.org/consular/vbied_vehicles.html<br />

The Mechanics of a Living Bomb http://www.waronline.org/en/terror/suicide.htm<br />

Threat Resolution http://www.trltd.com/iedd.php<br />

Security Advice http://www.mi5.gov.uk/output/Page268.html<br />

Potential Indicators http://www.iwar.org.uk/homesec/resources/dhs-bulletin/vbieds.htm<br />

Terrorist IED Handbook http://www.williambowles.info/articles/app_e.pdf<br />

Tanks Take A Beating http://www.combat-diaries.co.uk/diary25/diary25military.htm<br />

Explosives http://cdp.dhs.gov/pdfs/agert/Explosive_Devices.pdf<br />

Recognizing Explosive Devices http://cryptome.org/ieds.htm<br />

http://cryptome.org/ieds.pdf<br />

Common Chemicals As Precursors Of Improvised Explosive Devices: The Challenges Of<br />

Defeating Domestic Terrorism<br />

http://www.mipt.org/pdf/NPS-Thesis-Common-Chemicals-Precursors.pdf<br />

Explosive Applications for Industry and Defense<br />

http://www.engineersaustralia.org.au/shadomx/apps/fms/fmsdownload.cfm?file_uuid=E8FD073B-9386-<br />

FFB8-C9EA-478E5D773DBD&siteName=ieaust<br />

Soft Recovery of Explosively Formed Penetrators<br />

http://www.dtic.mil/ndia/22ndISB2005/thursday/lambert2.pdf<br />

81


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

TM 31-210 Improvised Munitions Handbook http://cryptome.org/tm-31-210.htm<br />

IED Subjects On MyIntelink<br />

https://www.intelink.gov/search/default.aspx?targetPage=%2Fsearch%2Fdefault.aspx&q=Improvised+ex<br />

plosive+devices+ppt&btnSearch=Search&intelSite=www.intelink.gov%2Fblogs&intelSite=www.intelink.go<br />

v%2Fdiscussion&intelSite=www.intelink.gov%2Fwiki&intelSite=www.intelink.gov%2Finteldocs&intelSiteOt<br />

her=true<br />

DAIIS IED Products<br />

https://www.intelink.gov/sharepoint/Products/Forms/AllItems.aspx?RootFolder=%2fProducts%2fIED&Vie<br />

w=%7b78903FCC%2dEE86%2d4CCD%2d9F3A%2d467033F9F41B%7d<br />

IED Trigger http://cryptome.org/ied-trigger.htm<br />

IEDs The Technology http://www.ndrf.dk/documents/groupp/SS05-Dullum.pdf<br />

IED/EFP Articles Of Interest http://blog.wired.com/defense/2007/09/mrap-v-superbom.html<br />

The Struggle To Defeat Roadside Bombs<br />

http://www.washingtonpost.com/wp-srv/world/specials/leftofboom/index.html?hpid=topnews<br />

LiveLeak (good source for IED/EFP videos) http://www.liveleak.com/<br />

Bomb Threat Stand Off Distances http://www.nctc.gov/site/technical/bomb_threat.html<br />

Plastic Explosives http://www.nctc.gov/site/technical/plastic_explosives.html<br />

<strong>Intelligence</strong> Disciplines<br />

List of <strong>Intelligence</strong> Gathering Disciplines<br />

http://en.wikipedia.org/wiki/List_of_intelligence_gathering_disciplines<br />

Military <strong>Intelligence</strong> Disciplines https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/10536-<br />

1/FM/2-<br />

0/chap5.htm;jsessionid=1qxjKkqWHmdBk1QyZNDyvG0mqFs2zChgycs11LjVl5dqH4jM7DFz!997318943<br />

<strong>Intelligence</strong> Resources<br />

<strong>Intelligence</strong> Online http://www.intelligenceonline.com/<br />

<strong>Intelligence</strong> Tradecraft And Analysis http://jiox.blogspot.com/<br />

<strong>Intelligence</strong> Resources http://www.intelligenceisthefuture.com/resources.htm<br />

Studies in <strong>Intelligence</strong> http://www.cia.gov/csi/studies/vol50no2/html_files/index.html<br />

The <strong>Intelligence</strong> Officer’s Bookshelf<br />

http://www.cia.gov/csi/studies/vol50no2/html_files/Bookshelf_10.htm<br />

Police <strong>Intelligence</strong> Operations http://www.fas.org/irp/doddir/army/fm3-19-50.pdf<br />

World Check – Reducing Risk Through <strong>Intelligence</strong> http://www.world-check.com/<br />

<strong>Intelligence</strong> Journals<br />

http://www.columbia.edu/cu/lweb/indiv/lehman/guides/intell.html#background<br />

International <strong>Intelligence</strong> Agencies<br />

Interactive Map of All World’s <strong>Intelligence</strong> Agencies<br />

http://sourcesandmethods.blogspot.com/2010/07/interactive-map-of-all-of-worlds.html<br />

International Government <strong>Intelligence</strong> Agencies<br />

http://members.tripod.com/spylopedia/ind-intlagen.htm<br />

International <strong>Link</strong>s http://www.route66patrol.com/INTLINKS.htm<br />

MILNET: <strong>Intelligence</strong> Agencies by Function http://www.milnet.com/iagency.htm<br />

World <strong>Intelligence</strong> and Security Agencies http://www.fas.org/irp/world/index.html<br />

82


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

List of <strong>Intelligence</strong> Agencies http://www.sagal.com/ajax/<br />

http://www.loyola.edu/dept/politics/intel.html<br />

Internet Privacy and Security<br />

Interpol<br />

Ad-Aware http://www.lavasoft.de/software/adaware/<br />

Analyzer http://analyzer.polito.it/30alpha/<br />

Bugnosis http://www.bugnosis.org/<br />

Cybercrime http://www.cybercrime.gov/<br />

CERT http://www.cert.org/<br />

Hacker and Spyware Protection http://www.looknstop.com/En/index2.htm<br />

Email Security and Privacy http://www.stealthmessage.com/<br />

Home Network Security http://www.cert.org/tech_tips/home_networks.html<br />

Privacy and Security http://www.markusjansson.net/eienbid.html<br />

Lavasoft http://www.lavasoftusa.com/<br />

Leak Test http://grc.com/lt/leaktest.htm<br />

Setting up Security Zones http://www.microsoft.com/windows/ie/using/howto/security/setup.mspx<br />

Shields Up http://grc.com/su-firewalls.htm<br />

Anti Spyware Tools http://www.spychecker.com/home.html<br />

Spyware Reviews http://removespyware.net/<br />

Guide to Online Privacy http://www.cdt.org/privacy/guide/basic/topten.html<br />

Virus List http://www.viruslist.com/en/index.html<br />

WebWasher http://www.webwasher.com/<br />

Snooper http://snoop.cdt.org/<br />

Security Advisers http://www.wilders.org/<br />

Spyware and Adware Removal http://www.paretologic.com/xoftspy/lp/14/<br />

Top Secret Software http://www.topsecretsoftware.com/index.html<br />

Interpol Home Page http://www.interpol.int/<br />

Interpol Wanted Terrorism http://www.interpol.int/Public/Wanted/Search/Recent.asp<br />

Iran/Iranian Military<br />

Natanz Uranium Enrichment Complex, Iran, 2002-2010<br />

http://cryptome.org/eyeball/natanz/natanz.htm<br />

http://publicintelligence.net/iran-nuclear-site-natanz-uranium-enrichment-site/<br />

Iran’s Naval Forces http://www.fas.org/irp/agency/oni/iran-navy.pdf<br />

Iran's Nuclear Program: Status, Risks, and Consequences<br />

http://www.nae.edu/Publications/TheBridge/Archives/19804/19819.aspx<br />

Military Power of Iran 2010<br />

http://media.washingtontimes.com/media/docs/2010/Apr/20/Iran_Military_Report.pdf<br />

Iranian Military Video http://www.iranian.com/main/2010/jan/iranian-military<br />

Iran’s Military Capabilities http://ezinearticles.com/?Irans-Military-Capabilities&id=348597<br />

Iran Military Guide http://www.globalsecurity.org/military/world/iran/index.html<br />

Wikileaks http://wikileaks.org/wiki/Category:Iran<br />

Iran https://www.intelink.gov/sharepoint/osp/Iran%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

83


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Imperial Iranian Ground Forces http://www.sarbazan.com/iigf.htm<br />

http://www.sarbaz.org/<br />

Iranian Army http://encyclopedia.thefreedictionary.com/Iranian+Army<br />

Iranian Army Order Of Battle http://encyclopedia.thefreedictionary.com/Iranian+Army<br />

Missiles http://www.sarbaz.org/homepage2.htm<br />

Iran Nuclear Resources http://www.parstimes.com/INR.html<br />

Iran’s Ballistic Missiles (interactive) http://www.msnbc.msn.com/id/6559399<br />

Iranian Military http://www.travelblog.org/World/ir-mil.html<br />

http://www.saaye.com/files/csis/<br />

Country Assessment: Iran http://www.isis-online.org/publications/iran/index.html<br />

Iran’s Nuclear Facilities http://www.globalsecurity.org/wmd/world/iran/nuke-fac.htm<br />

http://cns.miis.edu/pubs/reports/pdfs/iranrpt.pdf<br />

http://www.atomicarchive.com/Almanac/IranFacilities_static.shtml<br />

Order of Battle http://www.exisle.net/mb/index.php?showtopic=34883.<br />

http://www.exisle.net/mb/lofiversion/index.php/t34883.html<br />

Iran Military Forum http://www.network54.com/Forum/391461/<br />

http://www.iranmilitaryforum.com/<br />

Tehran and Bushehr Nuclear Reactors http://cryptome.org/tnrc/tnrc-eyeball.htm<br />

Iran’s Nuclear Facilities http://cns.miis.edu/pubs/reports/pdfs/iranrpt.pdf<br />

http://www.nti.org/e_research/profiles/3119_3120.html<br />

http://www.nti.org/e_research/profiles/Iran/index.html<br />

WMD Related Facilities (cut and paste geographic coordinates into google earth for good<br />

locations of facilities) http://www.johnstonsarchive.net/nuclear/iranmap.html<br />

Iran Resources http://www.aftabdaily.net/<br />

Irans Nuclear Network http://www.msnbc.msn.com/id/6979727/<br />

Iranian Nuclear Facilities http://www.globalsecurity.org/wmd/world/iran/nuke-fac.htm<br />

Iranian Nuclear Facilities Video<br />

http://www.farsitube.com/videos/Political/Iranian_Nuclear_Facilities<br />

Iranian Warships http://www.globalsecurity.org/military/world/iran/ships.htm<br />

Naval Bases http://www.globalsecurity.org/military/world/iran/navy-base.htm<br />

Excellent Blog on Iranian Naval Capabilities<br />

http://www.freerepublic.com/focus/f-news/1790191/posts<br />

Iran Defence http://www.irandefence.net/showthread.php?t=4808<br />

How Iran Would Apply its Assymetric Naval Warfare Doctrine in The Future Conflict<br />

http://www.marshallcenter.org/site-graphic/lang-en/page-occpapers-research-<br />

1/static/xdocs/research/static/occpapers/occ-paper_10-en.pdf<br />

Ammunition And Metallurgy Industries Group http://www.diomil.ir/en/amig.aspx<br />

Spy Photos Reveal 'Secret Launch Site' For Iran's Long-Range Missiles<br />

http://www.timesonline.co.uk/tol/news/world/middle_east/article3724048.ece<br />

<strong>Open</strong> <strong>Source</strong> Readings On Iran<br />

http://uskowioniran.blogspot.com/2008/04/open-source-readings-on-iran.html<br />

Tehran Nuclear Research Center<br />

http://www.globalsecurity.org/wmd/world/iran/tehran-tnrc.htm<br />

Satellite Imagery of the Tehran Nuclear Research Center<br />

http://www.globalsecurity.org/wmd/world/iran/tehran-tnrc-imagery.htm<br />

Esfahan / Isfahan Nuclear Technology Center N32°40' E51°40'<br />

http://www.fas.org/nuke/guide/iran/facility/esfahan.htm<br />

Nuclear Program Of Iran http://en.wikipedia.org/wiki/Nuclear_program_of_Iran<br />

Nuclear Facilities http://www.nti.org/e_research/profiles/Iran/3119_3268.html<br />

Iran Special Collection http://cns.miis.edu/research/iran/index.htm<br />

Iran Nuclear Resources http://www.parstimes.com/INR.html<br />

84


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Iran’s Nuclear Sites http://www.nti.org/e_research/profiles_pdfs/Iran/iran_nuclear_sites.pdf<br />

85


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

86


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.google.com/hostednews/afp/article/ALeqM5hnl-<br />

YPuDmONcoBmmS8_G91LxdryA?docId=CNG.041943dc452c61a507ee986061b49f<br />

2d.f21<br />

Iraninan Websites<br />

Kamangir.net http://kamangir.net/<br />

<strong>Link</strong>s To Iranian Websites http://clibrary.um.ac.ir/iranianwebsites.htm<br />

http://www.birmingham.gov.uk/GenerateContent?CONTENT_ITEM_ID=24062&CONTENT_ITEM_TYPE=<br />

0&MENU_ID=260<br />

Toronto Iranians http://www.torontoiranians.com/modules/mylinks/<br />

Iranian <strong>Link</strong> http://www.angelfire.com/pe/iran/<br />

Excellent Blog on Iranian Naval Capabilities<br />

http://www.freerepublic.com/focus/f-news/1790191/posts<br />

Iranian Blogs http://www.iraniansblogs.com/<br />

87


Iraq<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

LiveLeak Iraq http://www.liveleak.com/c/iraq<br />

Iraq Provincial Reconstruction Team Handbook<br />

http://usacac.army.mil/cac2/call/docs/11-03/toc.asp<br />

Iraqi Order of Battle June 2010<br />

http://www.understandingwar.org/files/IraqOrbat_DecthruJune.pdf<br />

Wikileaks http://wikileaks.org/wiki/Category:Iraq<br />

Iraq<br />

https://www.intelink.gov/sharepoint/osp/Iraq%20%20<strong>OSINT</strong>%20Library/Forms/AllItems.aspx<br />

Iraq Blogs http://www.hereinreality.com/iraq_blogs.html<br />

http://www.progressiveaustin.org/blogs.htm<br />

Iraqi Airfields http://www.globalsecurity.org/military/world/iraq/airfields.htm<br />

Iraq’s 55 Most Wanted<br />

http://www.globalsecurity.org/wmd/library/news/iraq/2003/030411-d-6570c-001.pdf<br />

http://www.globalsecurity.org/wmd/library/news/iraq/2003/030411-d-6570c-002.pdf<br />

http://www.globalsecurity.org/wmd/library/news/iraq/2003/iraq-030412-centcom03.htm<br />

http://www.globalsecurity.org/wmd/library/news/iraq/2003/05/iraq-030515-centcom_top55.htm<br />

Target Iraq http://www.globalsecurity.org/military/ops/iraq.htm<br />

The Iraqi Resistance (very controversial sites, you may be offended)<br />

http://www.albasrah.net/images/moqawama/index1.htm<br />

http://www.albasrah.net/<br />

Iraq Daily http://www.iraqdaily.com/<br />

Future of Iraq Portal http://www.justinalexander.net/iraq/index.html<br />

U.S. Military Facilities in Iraq http://www.globalsecurity.org/military/facility/iraq-intro.htm<br />

Iraqi Insurgent Sniper Training http://www.military.com/ppt/iraqi_insurgent_sniper_training.htm<br />

OIF Items of Interest http://www.psywarrior.com/OpnIraqiFreedomcont1.html<br />

http://www.psywarrior.com/OpnIraqiFreedomcont2.html<br />

http://www.psywarrior.com/OpnIraqiFreedomcont3.html<br />

Iraq War News http://www.indybay.org/international/iraq/<br />

Iraq Watch http://www.iraqwatch.org/index.html<br />

Jihad in Iraq: Hope and Dangers<br />

https://www.opensource.gov/portal/server.pt/gateway/PTARGS_0_0_200_240_51_43/http%3B/apps.ope<br />

nsource.gov%3B7011/opensource.gov/content/Display/4727998/GMP20040728000229001.pdf<br />

The Fight For Iraq: A Regional Powerplay http://www.msnbc.msn.com/id/17722026<br />

U.S. Embassy Iraq http://eyeball-series.org/usemb-iq/usemb-iq.htm<br />

Multi National Security Transition Command - Iraq The Multi-National Security Transition<br />

Command - Iraq (MNSTC-I) Mission is to assist the Iraqi Government in the development, organization,<br />

training, equipping, and sustainment of Iraqi Security Forces (ISF) and ministries capable of defeating<br />

terrorism and providing a stable environment in which representative government, individual freedom, the<br />

rule of law, and the free market economy can evolve and which, in time, will contribute to Iraq's external<br />

security and the security of the Gulf Region. http://www.mnstci.iraq.centcom.mil/<br />

Alive In Baghdad http://www.aliveinbaghdad.org/<br />

An Introduction To The Country And People<br />

http://www.globalsecurity.org/military/library/report/2003/iraq-intro-handbook_usmc-dec2003.pdf<br />

Humanitarian Information Center For Iraq<br />

http://www.humanitarianinfo.org/iraq/psw_satellites/mosul/index.asp<br />

Special Inspector General For Iraq Reconstruction<br />

http://www.sigir.mil/reports/QuarterlyReports/Oct07/pictures.aspx<br />

Iraqi Army http://en.wikipedia.org/wiki/Iraqi_Army<br />

Sacred Sites Of Iraq http://www.sacredsites.com/middle_east/iraq/iraq.html<br />

88


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Islam/Islamic Websites<br />

World Almanac of Islamism http://almanac.afpc.org/<br />

Islam By Country http://www.thefullwiki.org/Islam_by_country<br />

Resource <strong>Link</strong>s on Islam and Christianity http://www.answering-islam.org/links.html<br />

Answering Islam http://www.answering-islam.org/index.html<br />

Islam and Terrorism http://www.answering-islam.org/Terrorism/index.html<br />

<strong>Global</strong> Muslim Population http://pewforum.org/docs/?DocID=451<br />

<strong>Directory</strong> Of Islamic Websites http://www.islamicsites.com/<br />

http://www.mathaba.net/www/islamic/index.shtml<br />

Top Islamic Sites http://www.topislamicsites.com/<br />

<strong>Link</strong>s For Muslim Children http://www.islamicgarden.com/page1002.html<br />

Radical Islamic Sites http://www.threeworldwars.com/f/radical-islamic-websites.htm<br />

General Islamic Sites http://islamicwell.com/general_articles.htm<br />

Sites Of Interest http://www.convertstoislam.com/Sites/sites.html<br />

Hudson Institute (Center on Islam, Democracy, and the Future of the Muslim World)<br />

http://www.futureofmuslimworld.com/<br />

Virtually Islamic http://virtuallyislamic.blogspot.com/<br />

Islam Online http://www.islamonline.net/english/index.shtml<br />

Islam Undressed http://www.islamundressed.com/<br />

IslamiCity http://www.islamicity.com/<br />

Middle East Media Research Institute http://www.memri.org/<br />

Islamic Heraldry<br />

Introduction To Islamic Heraldry<br />

http://freepages.family.rootsweb.ancestry.com/~heraldry/oldpage_islam.html<br />

http://users.panola.com/AAGHS/manluk.html<br />

The American Military Advisor: Dealing With Senior Foreign Officials In The ISLAMIC World<br />

http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB869.pdf<br />

Islamic Terror Groups<br />

Islamic Terorism http://en.wikipedia.org/wiki/Islamic_terrorism<br />

Islamic Terrorr Groups (Pacific)<br />

Law Enforcement Guide For Identifying Potential Violent Terrorists In The<br />

Asia-Pacific Region https://www.intelink.gov/Reference/301MI/20060518.pdf<br />

Islamic Terror Groups (USA)<br />

Islamic Fundamentalist Networks in the United States http://www.esuhistoryprof.com/mapof.htm<br />

89


Israel<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Jerusalem Center for Public Affairs http://www.jcpa.org/JCPA/index.asp<br />

Middle Eastern Strategic Threats Interactive Map<br />

http://www.jcpa.org/JCPA/Templates/showpage.asp?DBID=&LNGID=&TMID=84&FID=550&PID=0<br />

Maps of Israel http://www.embassyworld.com/maps/Maps_Of_Israel.html<br />

Israeli War Criminals http://cryptome.org/0002/il-war-criminals.htm<br />

il-war-criminals.htm<br />

Israel’s Top Secret Base Exposed on Facebook<br />

http://www.themedialine.org/news/news_detail.asp?NewsID=29330<br />

Wikileaks http://wikileaks.org/wiki/Category:Israel<br />

http://wikileaks.org/wiki/Category:Israel_and_Occupied_Territories<br />

Nuclear Weapons http://www.fas.org/nuke/guide/israel/nuke/<br />

http://nuclearweaponarchive.org/Israel/index.html<br />

Israel/Palestine<br />

https://www.intelink.gov/sharepoint/osp/Israel%20%20Palestine%20<strong>OSINT</strong>%20Products/Forms/AllItems.<br />

aspx<br />

Israel's Dimona Nuclear Weapons Factory In 3D, and other Israeli videos<br />

http://www.youtube.com/watch?v=bbjgDERSuiI<br />

New Weapon To Get Terrorists http://www.youtube.com/watch?v=iv7Kn0mOTsE&feature=related<br />

Israeli Blogs http://www.ringsurf.com/ring/ilblogs/<br />

http://judaism.about.com/od/israeliblogs/Israeli_Blogs.htm<br />

Israeli Special Forces http://www.isayeret.com/<br />

Israeli Military Facilities http://cryptome.org/idf/idf-eyeball.htm<br />

Soreq Nuclear Research Center http://cryptome.org/soreq-eyeball.htm<br />

Israel Signal Facilities http://cryptome.org/ilsig-eyeball.htm<br />

Gaza Strip http://www.lib.utexas.edu/maps/middle_east_and_asia/gaza_strip_may_2005.jpg<br />

http://cryptome.org/kerem/kerem-eyeball.htm<br />

Israel <strong>Intelligence</strong> Agencies http://www.fas.org/irp/world/israel/index.html<br />

Mossad http://www.mossad.gov.il/Mohr<br />

Mossad English Version<br />

http://www.mossad.gov.il/Mohr/MohrTopNav/MohrEnglish/MohrAboutUs/<br />

Jerusalem Center for Public Affairs http://www.jcpa.org/brief/brief-list.htm#te<br />

Israeli Air Force <strong>Intelligence</strong> Unit http://video.google.com/videoplay?docid=279277445708481896<br />

Israel/Lebanon Conflict http://www.gearthblog.com/blog/archives/2006/07/israellebanon_c.html<br />

Israel/Palestinian ProCon http://www.israelipalestinianprocon.org/<br />

Israel Science And Technology<br />

http://www.science.co.il/Transportation-Companies.asp?s=software<br />

Israel Defense Forces<br />

http://www.sap.com/platform/netweaver/pdf/CS_Israeli_Defense_Forces.pdf<br />

Export And International Cooperation Institue<br />

http://www.export.gov.il/Eng/_Articles/Article.asp?ArticleID=3363&CategoryID<br />

What Would An Israeli Ground Invasion Look Like<br />

http://www.mcculloughsite.net/stingray/2006/07/17/what-would-an-israeli-ground-invasion-look-like.php<br />

Gisrael Digital Mapping http://www.gisrael.co.il/<br />

Israeli Torture Prison http://eyeball-series.org/facility-1391/facility-1391.htm<br />

General Israeli Military & Weapons Articles http://www.nogw.com/ilweapons.html<br />

Israeli/Palestinian Order of Battle http://imeu.net/news/article0015300.shtml<br />

90


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The Secret Arsenal of The Jewish State 2003 (interactive graphic) Best to type the link into the URL<br />

box. Will not function by clicking on it.<br />

http://www.islamonline.net/Arabic/Media/2003/03/article1.shtml<br />

Type link directly into URL box; clicking will not function http://www.nogw.com/ilweapons.html<br />

Despite Israel's refusal to acknowledge its nuclear weapons status, its secret arsenal is an open secret<br />

that Israeli policy makers don't go out of their way to deny. From its beginnings in the mid-1960s, Israel's<br />

program has developed into one that rivals those of larger powers like France and Britain. Here, based on<br />

interviews with U.S. intelligence officials and nuclear experts, is a portrait of Israel's strategic weapons<br />

programs. http://www.sweetliberty.org/issues/israel/strategic/index.shtml<br />

Click on a symbol or location for more about Israel's secret arsenal.<br />

Mideast endgame: an interactive guide<br />

91


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Israel's Nuclear Facilities http://www.atomicarchive.com/Almanac/IsraeliFacilities_static.shtml<br />

92


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The following sites can be found in Google Earth or Bing Maps 3D by copying and pasting the latitudes<br />

and longitudes into the search box.<br />

Negev Nuclear Research Center, Dimona<br />

Negev Nuclear Research Center. Plutonium production and extraction facilities, along with other<br />

weapons-related infrastructure.<br />

31.001504°N, 35.146723°E<br />

Eilabun<br />

Eilabun is Israel's second weapons storage facility. Tactical nuclear shells and land mines are<br />

among its contents.<br />

32.760226°N, 35.412077°E<br />

Kfar Zekharya<br />

Suspected nuclear missile base and bomb storage storage facility.<br />

31.766267°N, 34.88142°E<br />

Nahal Soreq<br />

Soreq is the equivalent of the U.S. national weapons laboratories. The lab handles weapons design<br />

and construction as well as research.<br />

31.766267°N, 34.88142°E<br />

Yodefat<br />

Suspected nuclear weapons assembly facility.<br />

32.85093°N, 35.27916°E<br />

Tirosh<br />

Reportedly one of two Israeli nuclear weapons storage facilities. It is speculated that that Tirosh is<br />

the strategic weapons storage site, while Eilabun is the tactical weapons storage site.<br />

31.751963°N, 34.863524°E<br />

Rafael<br />

Rafael has been responsible for the actual assembly of Israeli nuclear weapons.<br />

32.889534°N, 35.09119°E<br />

93


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Language Training<br />

Foreign Service Institute Free Online Language Training<br />

http://fsi-language-courses.org/Content.php<br />

Language/Web Site Translators Online (In Other Words)<br />

Free Translation Sites<br />

http://www1.ncaa.org/membership/enforcement/amateurism/international/translation<br />

http://www.humanitas-international.org/newstran/more-trans.htm<br />

Translation Sites http://www.lib.utexas.edu/refsites/dictionaries.html<br />

Translation Web Sites<br />

http://www.birmingham.gov.uk/GenerateContent?CONTENT_ITEM_ID=18591&CONTENT_ITEM_TYPE=<br />

0&MENU_ID=260<br />

<strong>Link</strong>s To Online Translators http://www.omniglot.com/links/translation.htm<br />

Omniglot: Writng Systems And Languages Of The World http://www.omniglot.com/<br />

Free Translation http://www.freetranslation.com/<br />

Online Translator http://www.online-translator.com/text.asp?lang=en<br />

World Lingo http://www1.worldlingo.com/en/products_services/worldlingo_translator.html<br />

FreeLang http://www.freelang.net/<br />

Law Enforcement Support<br />

AELE Law Enforcement http://www.aele.org/<br />

Search the Library of Case Summaries (AELE has a free search tool covering more than 30,000<br />

case summaries, since 1975) http://www.aele.org/htdig/common/search.html<br />

Espanol For Law Enforcement (Course Goal: To attain a working knowledge of the Spanish<br />

language and apply that knowledge to law enforcement situations.)<br />

http://www.espanolforlawenforcement.gov/<br />

Crime Spider - For almost 10 years Crime Spider has looked for the best crime and law<br />

enforcement sites and categorized topics so you don't have to sort through hundreds of sites to find the<br />

one that fits the bill. You can easily find the information you want at Crime Spider. Whether you are doing<br />

research on criminalistics, forensic anthropology, FBI, unsolved murders, homicide investigation<br />

techniques, child abuse, domestic violence, the death penalty, terrorism, criminal justice, law and courts,<br />

behavioral profiling, gang violence, juvenile crime, missing persons, serial killers or mass murderers,<br />

criminals, police, crime scene photos, we can help you find the crime information you want. We also have<br />

tips for people searches and protecting your privacy as well as features on specific topics of interest to<br />

crime and law enforcement professionals, such as links to police jobs sites and crime scene investigation<br />

supplies. http://www.crimespider.com/<br />

Shield 4492: Search, Find, Investigate (more than 1,600 links to free open source Internet sites<br />

that are useful in developing investigative leads, identifying assets and conducting research. Please read<br />

disclaimer) http://www.shield4492.com/<br />

Law Enforcement Spy Guide http://cryptome.org/le-spy-guide.zip<br />

FaceBook Law Enforcement Spy Guides<br />

http://publicintelligence.net/confidential-facebook-law-enforcement-subpoena-guides-2007-2010/<br />

94


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Lessons Learned<br />

Marine Corps Center For Lessons Learned https://www.mccll.usmc.mil/<br />

https://www.mccll.usmc.mil/index.cfm?disp=links.cfm<br />

Library Resources<br />

World Category User http://www.worldcat.org/<br />

In this video you'll learn how to create a List on WorldCat.org and get some good ideas on fun<br />

things to do with WorldCat Lists. http://www.youtube.com/watch?v=vos5ivBeZ5c<br />

WorldCat Facebook Application. This Facebook Application gives you access to WorldCat<br />

searches and user-created lists from personalized pages within your Facebook account. The application<br />

includes a Home screen with WorldCat search box, as well as quick links to WorldCat searches based on<br />

topics listed in your Facebook profile as personal interests. The application also includes:<br />

a built-in advanced WorldCat search<br />

a panel that allows you to invite other Facebook friends to install WorldCat<br />

a "Something to Read" panel that displays books recently added to WorldCat lists<br />

a "Favorite WorldCat Lists" panel where you can track your own lists or those of other WorldCat users<br />

http://www.worldcat.org/toolbars/default.jsp<br />

American Library Association http://www.ala.org/ala/iro/intlassocorgconf/libraryassociations.htm<br />

Virtual Law Library http://www.chanrobles.com/lawlib1.htm<br />

The Library Index Worldwide http://www.libdex.com/country.html<br />

http://www.libdex.com/<br />

Libraries and Catalogs Worldwide http://www.library.upenn.edu/catalogs/worldwide.html<br />

Libraries Around the World http://alexandra.di.uoa.gr/NewSite/<strong>Link</strong>s/TT/OtherLibraries.html<br />

http://journalfinder.uncg.edu/uncg/worldlibs.asp<br />

http://www.librarytechnology.org/libwebcats/<br />

http://www.libraryspot.com/libraries/nationallibraries.htm<br />

http://www.ifla.org/VI/2/p2/national-libraries.htm<br />

http://library.usask.ca/catalogs/world.html<br />

Library Servers http://sunsite3.berkeley.edu/Libweb/<br />

Virtual Library http://www.iisg.nl/~w3vl/<br />

http://vlib.org/<br />

Museums Around the World http://vlmp.museophile.com/world.html<br />

Virtual Library Museum Pages http://vlmp.museophile.com/<br />

New York Public Library Digital Gallery http://digitalgallery.nypl.org/nypldigital/index.cfm<br />

Awesome Library http://www.awesomelibrary.org/<br />

Center For Research Libraries (The Center for Research Libraries (CRL) is a consortium of North<br />

American universities, colleges and independent research libraries. The consortium acquires and<br />

preserves newspapers, journals, documents, archives and other traditional and digital resources<br />

for research and teaching) http://www.crl.edu/content.asp?l1=1<br />

Library Search Engines http://www.allsearchengines.com/libraries.html<br />

LibraryThing http://www.librarything.com/<br />

<strong>Link</strong> Analysis Tools/Software<br />

95


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Liquefied Natural Gas Facilities<br />

Liquefied Natural Gas Facilities http://eyeball-series.org/lng/lng-eyeball.htm<br />

Liquefied Natural Gas Facilities in The U.S. http://www.ferc.gov/industries/lng.asp<br />

Major Commands (MACOMS)<br />

AFRICOM http://www.africom.mil/<br />

EUCOM http://www.eucom.mil/english/index.asp<br />

SOUTHCOM http://www.southcom.mil/appssc/index.php<br />

PACOM http://www.pacom.mil/index.shtml<br />

CENTCOM http://www.centcom.mil/<br />

CENTCOM Area of Responsibility Interactive Map<br />

http://www.centcom.mil/en/countries/aor/<br />

SOCOM http://www.socom.mil/<br />

STRATCOM http://www.stratcom.mil/<br />

TRANSCOM http://www.transcom.mil/<br />

FORSCOM http://www.forscom.army.mil/<br />

Army Medical Dept AMEDD http://www.armymedicine.army.mil/<br />

Eighth US Army http://8tharmy.korea.army.mil/<br />

Space and Missile Defense Command USASMDC<br />

http://www.army.mil/info/organization/unitsandcommands/commandstructure/smdc/<br />

Third US Army/US Army Forces Central Command http://www.arcent.army.mil/<br />

INSCOM http://www.inscom.army.mil/Default.aspx?text=off&size=12pt<br />

Army Material Command AMC<br />

http://www.army.mil/info/organization/unitsandcommands/commandstructure/amc/<br />

Military District of Washington http://www.mdw.army.mil/<br />

US Army Pacific UARPAC<br />

http://www.army.mil/info/organization/unitsandcommands/commandstructure/usarpac/<br />

US Army Readiness Command USAREC http://www.usarec.army.mil/<br />

US Army Training and Doctrine TRADOC<br />

http://www.army.mil/info/organization/unitsandcommands/commandstructure/tradoc/<br />

Surface Deployment and Distribution Command SDDC (formerly Military Traffic Management<br />

Command) http://www.sddc.army.mil/Public/Home<br />

Installation Management Command (IMCOM) http://www.imcom.army.mil/hq/about/news/<br />

Sheppard Air Force Base http://www.sheppard.af.mil/news/socialmedia/index.asp<br />

Marine Corps http://marines.dodlive.mil/social-media/<br />

http://www.marines.mil/usmc/Pages/SocialMedia.aspx<br />

Military Health System http://www.health.mil/2011MHSConference/socialmedia.aspx<br />

Map is <strong>Link</strong>ed to Defenselink.com<br />

96


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

97


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Mapping and Related Material<br />

Geo Names https://www.geonames.org/<br />

Shaded Relief https://www.shadedrelief.com/<br />

Relief Shading http://www.reliefshading.com/<br />

Where Am I? How to determine latitude and longitude given a street address, city, state, province,<br />

territory, country or whatever. http://www.hmssurprise.org/Resources/whereami.html<br />

http://www.ajmsoft.com/geocode.php<br />

http://stevemorse.org/jcal/latlon.php<br />

Tactical Digital Hologram (This map with use of a flashlight or other light source brings out a 3D<br />

image of the terrain) http://www.peostri.army.mil/PRODUCTS/TDH/<br />

Free Relief Maps for Google Maps (Maps-For-Free has produced a nice Google Maps application<br />

that lets you view a number of relief map layers. Not only can you use the application to view the relief<br />

maps you can add them to your own Google Maps. Maps-For-Free offers free relief maps and other<br />

additional layers which can easily be integrated into your own Google Map projects)<br />

http://www.maps-for-free.com:80/<br />

Wikimapia http://www.wikimapia.org/<br />

Free Geography Tools http://freegeographytools.com/<br />

Maps Compare (Maps Compare is a website with four different on-line map services on one page.<br />

The site places Google Maps, the Google Earth browser plugin, Yahoo Maps and Bing Maps beside each<br />

other, which can be quite useful if you want to compare the map coverage provided by each provider in<br />

different locations) http://geshout.com/mapscompare/all.php<br />

Buncha Maps (Map comparison sites always seem to be very popular. One of the most popular<br />

searches on Google Maps Mania seems to be for sites that let you view the different online map providers<br />

side-by-side. Buncha Maps is a new application that lets you view Google Maps, Bing Maps, ESRI Maps<br />

and OSM all in the same window. Actions in all four maps are synchronised, so if you pan and zoom in<br />

any of the maps the other maps will also show the selected view) http://swingley.appspot.com/maps/four<br />

Dual Maps (Dual Maps is a map creation tool that allows anybody to make an embeddable map<br />

that includes a Google Map, a Google Maps Street View and a Virtual Earth Bird's Eye view of the same<br />

location. You can choose between the various options of either map service, which means you can have<br />

98


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

the Google satellite view alongside Virtual Earth's Bird's Eye view or the satellite/aerial View in both maps<br />

etc) http://www.mashedworld.com:80/DualMaps.aspx<br />

World Gazetteer http://www.world-gazetteer.com/<br />

Afghanistan Information Management Services http://www.aims.org.af/root.aspx?seckeyz=39<br />

Map Resources http://www.ndu.edu/library/Map/map.cfm<br />

Quick Maps http://www.theodora.com/maps/<br />

Le Monde Diplomatique English Edtion Maps http://mondediplo.com/maps/<br />

US Geological Survey manages and distributes many kinds of maps. The following links provide a<br />

wealth of information about USGS maps.<br />

Army Geospatial Center http://www.agc.army.mil/<br />

Information about the many kinds of US Geological Survey maps available is at<br />

http://erg.usgs.gov/isb/pubs/booklets/usgsmaps/usgsmaps.html#Top<br />

Information about US Geological Survey topographic (topo) map symbols is at<br />

http://erg.usgs.gov/isb/pubs/booklets/symbols/<br />

An explanation of map scale is at http://erg.usgs.gov/isb/pubs/factsheets/fs01502.html<br />

Information about US Geological Survey topographic map standards is at<br />

http://nationalmap.gov/gio/standards/<br />

More information about map datums on USGS topographic maps is available at the following<br />

links: http://geology.er.usgs.gov/eespteam/GISLab/Cyprus/datums.htm<br />

http://www.ngs.noaa.gov/faq.shtml#WhatNAD<br />

USGS Store http://store.usgs.gov/b2c_usgs/b2c/start/(xcm=r3standardpitrex_prd)/.do<br />

Geospatial Data Navigator (password required) https://gdn.geointel.nga.mil/gdn/gdn.cgi?<br />

Army Geospatial Center http://www.agc.army.mil/tio/index.html<br />

GIS For Dummies http://www.dmos.info/eng/GIS%20For%20Dummies.pdf<br />

GIS Internet Resources http://www.agc.army.mil/gis/<br />

Soviet Maps http://www.sovietmaps.com/index.htm<br />

Maps Of War http://www.mapsofwar.com/<br />

Maps and Driving Directions http://www.reverse-lookup.com/maps.htm<br />

Maps and References http://www.cgrer.uiowa.edu/servers/servers_references.html<br />

CIA World Fact Book http://www.odci.gov/cia/publications/factbook/<br />

Leading source of land information. Note: Learn to use this one and you’ll be quite impressed.<br />

http://edcwww.cr.usgs.gov/<br />

Free Aerial Maps. Note: Learn to use and you’ll get great results.<br />

http://www.sightquest.com/travel/free-aerial-maps-3838.htm<br />

Free GIS http://freegis.org/<br />

ESRI ArcGIS http://www.esri.com/<br />

Free Books On GIS Best Practices http://www.esri.com/showcase/best-practices/index.html<br />

GIS in the Earth Sciences & Map Library http://www.lib.berkeley.edu/EART/gis.html<br />

Latitude/Longitude Distance Calculation http://jan.ucc.nau.edu/~cvm/latlongdist.html<br />

Latitude-Longitude of US Cities http://www.realestate3d.com/gps/latlong.htm<br />

Maps of Countries and Territories http://www.sitesatlas.com/Maps/index.htm<br />

The Map Library http://www.un.org/depts/dhl/maplib/maplib.htm<br />

What do Map Scales Represent http://id.water.usgs.gov/reference/map_scales.html<br />

MapMachine http://plasma.nationalgeographic.com/mapmachine/<br />

Mapquest http://www.mapquest.com/<br />

Map Resources http://www.ndu.edu/library/maps.html<br />

Maps Around the World http://maps.searchking.com/<br />

All The Worlds Maps http://www.embassyworld.com/maps/maps.html<br />

Perry-Castañeda Library Map Collection http://www.lib.utexas.edu/maps/<br />

http://www.lib.utexas.edu/maps/map_sites/map_sites.html<br />

MAPTECH http://mapserver.maptech.com/homepage/index.cfm<br />

Mileage Calculator http://www.symsys.com/~ingram/mileage/index.php<br />

Online Maps to Everywhere http://www.multimap.com/<br />

Quick Maps http://www.theodora.com/maps/abc_world_maps.html<br />

Map Centre http://www.reliefweb.int/rw/rwb.nsf/doc114?<strong>Open</strong>Form<br />

Terraserver http://www.terraserver.com/<br />

99


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Spot Image http://www.spot.com/html/SICORP/_401_.php<br />

Topozone http://www.topozone.com/default.asp<br />

United Nations cartographic Section http://www.un.org/Depts/Cartographic/english/htmain.htm<br />

Maporama http://www.maporama.com/share/<br />

World Atlas http://www.worldatlas.com/<br />

What’s Your Latitude/Longitude<br />

http://www.studyworksonline.com/cda/content/explorations/0,,NAV2-5_SEP374,00.shtml<br />

3D Contour Maps http://field.hypermart.net/<br />

<strong>Link</strong>s to Map Resources (no longer updated but still useful)<br />

http://monarch.gsu.edu/jcrampton/maps<br />

Google Maps http://maps.google.com/<br />

TerraServer-USA http://www.terraserver.microsoft.com/<br />

GlobeXplorer http://www.globexplorer.com/<br />

Space Imaging http://spaceimaging.com/<br />

The World Of Maps http://www.maps.ethz.ch/<br />

National Map Viewer http://nationalmap.gov/<br />

http://nmviewogc.cr.usgs.gov/viewer.htm<br />

DigitalGlobe http://www.digitalglobe.com/<br />

GIS Software http://www.gisdevelopment.net/downloads/gis/index.htm<br />

Superpages http://yellowpages.superpages.com/yp.basic.jsp?<br />

TerraFly http://www.terrafly.com/<br />

Mapper http://mapper.acme.com/<br />

Comet Web Search http://search.starware.com/<br />

Traffic Reports For 60 Cities<br />

http://autos.msn.com/everyday/trafficreport.aspx?metro=PHX&src=QL<br />

Earth Satellite Corporation http://www.mdafederal.com/home<br />

National Geographic Map Machine http://plasma.nationalgeographic.com/mapmachine/<br />

Windows Live Local http://local.live.com/<br />

Online Map Creation http://www.aquarius.geomar.de/omc/<br />

Planiglobe Beta http://www.planiglobe.com/omc_set.html<br />

Mapquest Complete List Of Maps http://www.mapquest.com/atlas/main.adp?region=index<br />

ReliefWeb http://www.reliefweb.int/mapc/<br />

http://www.reliefweb.int/rw/rwb.nsf/doc114?<strong>Open</strong>Form<br />

National Guard DMS Portal http://ngbcdmaps.gtri.gatech.edu/<br />

Earth Browser http://www.earthbrowser.com/index.html<br />

Reference Maps http://www.exxun.com/exon/rm__index.html<br />

Flash Earth http://www.flashearth.com/<br />

Maps of the world (3,728 country maps) http://maps.nationmaster.com/<br />

Gheos World Guide (click on gheos world guide) http://gheos.com/atlas/<br />

Maps Of War (Interactive) http://www.mapsofwar.com/ind/imperial-history.html<br />

Digital Ortho Image Center For Kentucky http://kymartian.ky.gov/doqq/<br />

Mapserver.Maptech<br />

http://mapserver.maptech.com/homepage/index.cfm?CFID=3094259&CFTOKEN=52789276<br />

Geo Community http://www.geocomm.com/<br />

<strong>Open</strong> <strong>Source</strong> Center Map Library https://www.intelink.gov/maps/<br />

National Geospatial-<strong>Intelligence</strong> Agency http://nga-earth.org/<br />

Web Based Access And Retrieval Port https://warp.nga.mil/<br />

PlanetData http://www.planetdata.net/map/<br />

UniMaps http://unimaps.com/index.html<br />

Europe Atlas http://euratlas.com/<br />

UniMaps <strong>Link</strong>s. High detail maps showing language distribution in Africa, Europe, Latin America,<br />

Canada and the Basque country. http://www.muturzikin.com/en.html<br />

UniMaps <strong>Link</strong>s. Maps and commentaries of most countries, historic and current.<br />

http://www.zum.de/whkmla/index.html<br />

Reuters Foundation Interactive Maps<br />

100


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.alertnet.org/map/index.htm?x=256&y=256&scale=1&bpolygon=&iso=&fillId=&ex_iso=&ex_fillId<br />

=&slevel=1&style=2<br />

MultiMap http://www.multimap.com/map/places.cgi<br />

ReliefWeb http://www.reliefweb.int/rw/rwb.nsf/doc114?<strong>Open</strong>Form<br />

USGS Map Databases http://education.usgs.gov/common/map_databases.htm<br />

Maps And Geospatial Information http://www.library.cornell.edu/olinuris/ref/maps/map.htm<br />

ArcGis Explorer http://www.esri.com/software/arcgis/explorer/index.html<br />

GeoEye http://www.geoeye.com/default.htm<br />

<strong>Open</strong> <strong>Source</strong> Center Map Library https://www.intelink.gov/maps/<br />

GeoCommons (A place to explore, create and share intelligent maps and geographic data. And<br />

it’s totally free! Access more than 1,500 (and counting) geodata sets on population, environment,<br />

health, education, crime, politics, traffic, employment and everything in between. Move beyond<br />

pushpins on maps to intuitive and exciting visualizations of geographic data. Create and share<br />

intelligent maps to answer questions, gain insight & make decisions.)<br />

http://www.geocommons.com/<br />

World Maps http://www.justmaps.org/<br />

Interactive World Map<br />

http://images.google.com/imgres?imgurl=http://www.nationsonline.org/maps/continents_map_sm.jpg&img<br />

refurl=http://www.nationsonline.org/oneworld/small_continents_map.htm&h=306&w=603&sz=76&hl=en&s<br />

tart=20&um=1&tbnid=u8U7ZseNhY3BoM:&tbnh=69&tbnw=135&prev=/images%3Fq%3Dworld%2Bmap<br />

%26start%3D18%26ndsp%3D18%26svnum%3D10%26um%3D1%26hl%3Den%26newwindow%3D1%2<br />

6safe%3Dactive%26sa%3DN<br />

ExpertGPS http://www.expertgps.com/<br />

MultiMap http://www.multimap.com/<br />

Introduction To Geographic Names http://gnswww.nga.mil/geonames/GNS/index.jsp<br />

http://earth-info.nga.mil/gns/html/namefiles.htm<br />

My Facts Page Atlas And Maps http://www.refdesk.com/factmaps.html<br />

Nation Master: Maps Of The World http://maps.nationmaster.com/<br />

Humanitarian Information Center For Iraq<br />

http://www.humanitarianinfo.org/iraq/psw_satellites/mosul/index.asp<br />

Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (awesome site for the<br />

open source analyst) http://www.onstrat.com/osint/<br />

Marine Corps<br />

One-Eight Basetrack is an experimental media project, tracking the deployment of 1/8 – 1st<br />

Battalion, Eighth Marines, throughout the duration of their deployment to southern Afghanistan. A small<br />

team of mobile media operators is embedded with the battalion, transmitting their reports and reflections<br />

from Helmand province as they travel across the battalion’s area of operations.<br />

http://googlemapsmania.blogspot.com/2011/08/follow-eighth-marines-on-googlemaps.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+GoogleMapsMania+<br />

%28Google+Maps+Mania%29<br />

http://basetrack.org/<br />

Marine Corps <strong>Intelligence</strong> and Security Doctrine http://www.fas.org/irp/doddir/usmc/index.html<br />

Medical <strong>Intelligence</strong><br />

Disaster Preparedness Capacity Map http://preparedness.interaction.org/map<br />

Swine Flu Pandemic Interactive Map http://www.edutube.org/interactive/swine-flu-pandemicinteractive-map<br />

Find Flu Shots Near You http://www.pandemicflu.gov/whereyoulive/index.html<br />

101


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Visual Medical Dictionary (mapping drug-disease relationships)<br />

http://www.curehunter.com/public/dictionary.do<br />

Centers For Disease Control and Prevention http://www.cdc.gov/<br />

Country Medical Briefings http://www.who.int/countries/en/<br />

Timeline of influenza A( H1N1) cases<br />

http://www.who.int/csr/disease/swineflu/interactive_map/en/index.html<br />

Maps and Atlases: Public Health Maps http://library.humboldt.edu/~rls/geospatial/pubhealth.htm<br />

<strong>Global</strong> Network of Neglected Tropical Diseases<br />

http://www.usatoday.com/news/health/swine-flu-map-timeline.htm<br />

http://www.sabin.org/map/4<br />

Tracking The <strong>Global</strong> Spread of Swine Flu<br />

http://www.usatoday.com/news/health/swine-flu-map-timeline.htm<br />

Tracking Swine Flu Cases Worldwide<br />

http://www.nytimes.com/interactive/2009/04/27/us/20090427-flu-update-graphic.html<br />

<strong>Global</strong> Atlas of Infectious Diseases http://gamapserver.who.int/<strong>Global</strong>Atlas/home.asp<br />

http://gamapserver.who.int/<strong>Global</strong>Atlas/InteractiveMap/MainFrame2.asp<br />

Diseases: Ignored <strong>Global</strong> Killers<br />

http://www.globalissues.org/article/218/diseases-ignored-global-killers<br />

<strong>Global</strong> Diseas Alert Map http://www.healthmap.org/en<br />

Outbreaks <strong>Global</strong> Incident Map http://outbreaks.globalincidentmap.com/home.php<br />

PandemicFlu http://www.pandemicflu.gov/<br />

Pandemic Influenza Watchboard http://fhp.osd.mil/aiWatchboard/<br />

Health Map <strong>Global</strong> Disease Alert Map http://www.healthmap.org/en<br />

Common Infectious Diseases Worldwide http://www.infoplease.com/ipa/A0903696.html<br />

Travelers’ Health http://www.cdc.gov/travel/destinat.htm<br />

http://www.cdc.gov/travel/<br />

Third World Traveler http://www.thirdworldtraveler.com/Disease/diseases.html<br />

Health Informatics World Wide http://www.hiww.org/<br />

Medical World Search http://www.mwsearch.com/<br />

Virtual Naval Hospital http://www.vnh.org/<br />

World Health Organization http://www.who.int/en/<br />

Armed Forces Medical <strong>Intelligence</strong> Center (AFMIC) http://www.afmic.osis.gov/osis/afmic.html<br />

http://www.afmic.detrick.army.mil/<br />

<strong>Global</strong> Health Facts http://www.globalhealthfacts.org/<br />

Medical World Search http://www.mwsearch.com/<br />

Medical http://www.awesomelibrary.org/Library/Reference_and_Periodicals/Medical/Medical.html<br />

Avian Bird Flu Information http://www.emergencyemail.org/avianbirdfluresources.asp<br />

From Wikipedia http://en.wikipedia.org/wiki/Armed_Forces_Medical_<strong>Intelligence</strong>_Center<br />

Medical <strong>Intelligence</strong> (Air Force) http://www.phsource.us/PH/MI/index.htm<br />

Infectious Diseases http://usamriid.detrick.army.mil/<br />

Centers For Disease Control http://www.cdc.gov/<br />

PubMed is a service of the U.S. National Library of Medicine that includes over 16 million<br />

citations from MEDLINE and other life science journals for biomedical articles back to the 1950s. PubMed<br />

includes links to full text articles and other related resources.<br />

http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?DB=pubmed<br />

Madigan Medical Library http://www.mamc.amedd.army.mil/medlib/ml_hmeindex.asp<br />

National Library Of Medicine http://www.nlm.nih.gov/<br />

Medical Handbook and Instructions For Operational Medic<br />

http://www.tacmed.dk/EngMOTPRT.pdf<br />

Military Magazines<br />

Military Magazines http://www.world-newspapers.com/military.html<br />

102


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Asian Military Review (Asian Military Review is an ABC audited publication that is read and<br />

discussed by most of the key decision makers and advisors to militaries in Asia-Pacific. Since 1993, it has<br />

become widely recognised as an authoritative provider of unbiased and objective information to its Asian<br />

readership comprising of military, government, industry and academia.)<br />

http://www.asianmilitaryreview.com/<br />

Joint Forces Quarterly http://www.ndu.edu/inss/Press/NDUPress_JFQ_List.htm<br />

Your Magazines Anytime Anywhere<br />

http://www.qmags.com/default.asp?sessionID=47263C12BECA1CEDF070E73F4<br />

The World Guide To Aircraft Magazines http://www.aeroflight.co.uk/mags/worldmag.htm<br />

Periscope http://www.militaryperiscope.com/index1.shtml<br />

Military Operations in Urban Terrain (MOUT)<br />

Irregular Warfare Center http://www.irregularwarfare.org/Concepts.html<br />

Small Wars Council http://council.smallwarsjournal.com/<br />

Center For Army Lessons Learned http://call.army.mil/<br />

http://www.inscom.osis.gov/ngic/NGIC-1122-0062-01/ART5.htm<br />

Close Combat in The Urban Environment<br />

http://www.globalsecurity.org/military/library/report/2001/closecombat2.ppt#1<br />

Military Operations In Urban Terrain<br />

http://www.inscom.osis.gov/ngic/NGIC-1122-0062-01/ART4.htm<br />

http://www.globalsecurity.org/military/ops/mout.htm<br />

The MOUT Homepage http://www.geocities.com/Pentagon/6453/techa.html<br />

Theater of Urban Warfare<br />

http://www.globalsecurity.org/org/news/2003/030328-urbanwarfare01.htm<br />

Urban Operations: A Historical Casebook<br />

http://www.globalsecurity.org/military/library/report/2002/urbanoperationsintro.htm<br />

Urban Battle Fields of South Asia Lessons Learned from Sri Lanka, India, and Pakistan<br />

http://www.rand.org/pubs/monographs/2004/RAND_MG210.pdf<br />

Small Wars Journal (lots of reference material on MOUT) http://www.smallwarsjournal.com/<br />

The Urban Operations Journal http://urbanoperations.8media.org/<br />

Street Smart: <strong>Intelligence</strong> Preparation of the Battlefield for Urban Operations<br />

http://www.rand.org/pubs/monograph_reports/MR1287/index.html<br />

Small Wars Center of Excellence http://www.smallwars.quantico.usmc.mil/sw_manual.asp<br />

Small Wars Registered User http://www.smallwars.quantico.usmc.mil/RegsiteredUser.pdf<br />

Unrestricted Warfare http://www.jhuapl.edu/urw_symposium/pages/proceedings.htm<br />

Irregular Warfare Special Study<br />

http://merln.ndu.edu/archive/DigitalCollections/IrregWarfareSpecialStudy.pdf<br />

Irregular Warfare Specialty Track http://www.usma.edu/dmi/irregular_warfare.htm<br />

A Ner Era Of Irregular Warfare<br />

http://www.usma.edu/dmi/IWmsgs/A%20Canadian%20Perspective%20of%20Irregular%20Warfare.pdf<br />

Irregular Military http://en.wikipedia.org/wiki/Irregular_military<br />

The U.S. Army And Irregular Warfare http://www.wooster.edu/history/jgates/book-contents.html<br />

History Of Irregular Warfare<br />

http://www.sais-jhu.edu/programs/ir/strategic/courses/docs/irregular_warfare_syllabus.pdf<br />

Some Thoughts On Irregular Warfare https://www.cia.gov/csi/studies/96unclass/iregular.htm<br />

Complex Irregular Warfare<br />

http://www.fpri.org/enotes/20060106.military.hoffman.complexirregularwarfare.html<br />

Small Wars Journal http://smallwarsjournal.com/index.php<br />

Small Wars Journal Research <strong>Link</strong>s http://smallwarsjournal.com/research/#OnlineJournalFree<br />

Minimanual Of The Urban Guerilla http://news.skilluminati.com/?p=33<br />

Chinese Report On Unrestricted Warfare http://news.skilluminati.com/?p=14<br />

Counterinsurgency Army Web Page<br />

103


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

https://www.us.army.mil/suite/page/451386?c=YmVuLmJlbmF2aWRlcw==<br />

Unrestricted Wrafare Symposium 2007<br />

http://www.jhuapl.edu/urw_symposium/pages/proceedings/2007/chapters/URW%202007%20Book.pdf<br />

http://www.jhuapl.edu/urw_symposium/pages/proceedings2007.htm<br />

Unrestricted Warfare http://www.cryptome.org/cuw.htm<br />

Small Wars And Low Intensity Conflicts Currently Taking Place Throughout The World<br />

http://www.smallwars.quantico.usmc.mil/sw_today.asp<br />

Militia Groups<br />

Note: Many links are very much inactive or have been discontinued, however, a good keyword<br />

searh with the listed names will turn out excellent results.<br />

Rise in Militia Groups http://www.breitbart.com/article.php?id=D9A140QG0&show_article=1<br />

Militias by State http://www.mathaba.net/www/militia/index.shtml<br />

http://www.indexoftheweb.com/Patriot/Militia.htm<br />

Militia <strong>Link</strong>s http://www.angelfire.com/ny3/captbly/militia.html<br />

Missile Threat<br />

Missile Proliferation http://www.fas.org/irp/threat/missile/index.html<br />

Missile Threat http://missilethreat.com/<br />

Missile Database http://www.missilethreat.com/missiles/<br />

Missile Index (database of world's missile systems) http://missile.index.ne.jp/en/<br />

Muslim Brotherhood<br />

Official Web Site in English http://www.ikhwanweb.com/articles.php?pid=10005<br />

Muslim Brotherhood Movement Homepage http://www.ummah.net/ikhwan/<br />

Muslim Brotherhood in Syria: http://www.jimsyr.com/<br />

Muslim Brotherhood in Jordan: http://www.ikhwan-jor.org/<br />

Muslim Brotherhood Unspec: www.angelfire.com/mac/ikhwan/<br />

Muslim Brotherhood discussion forum Unspec:<br />

http://www.ikhwan.net/vb/forumdisplay.php?s=&forumid=16<br />

Muslim Brotherhood in Cairo: http://www.dayra23.com/<br />

Muslim Brotherhood Unspec: http://www.ikhwanonline.com/<br />

Muslim Brotherhood in English: http://www.ikhwanweb.com<br />

Libyan site affiliated with the Muslim Brotherhood: http://www.almukhtar.org/index.cfm<br />

Word Worker’s Organization (global communist group) http://www.iraqresistance.net/<br />

Muslim Access http://www.muslimaccess.com/<br />

The Muslim Brotherhood English Web Site<br />

http://www.ikhwanweb.com/Home.asp?zPage=Systems&System=PressR&Lang=E<br />

Muslim Brotherhood From Wikipedia http://en.wikipedia.org/wiki/Muslim_Brotherhood<br />

Hamas And The Muslim Brotherhood<br />

http://www.israelipalestinianprocon.org/bin/procon/procon.cgi?database=5%2dQ%2dSubs%2edb&comm<br />

and=viewone&id=13&op=t<br />

Radical Islam Videos<br />

http://uk.youtube.com/results?search_query=dispatches+undercover+mosque<br />

104


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

National/International Most Wanted WEB Sites<br />

Active Most Wanted http://activemostwanted.com/<br />

Most Wanted Criminal http://musician.8k.com/<br />

America’s Most Wanted http://www.amw.com/<br />

Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/fedsites.htm<br />

Interpol http://www.interpol.int/<br />

Interpol National Wanted WEB Site http://www.interpol.int/Public/Wanted/Fugitives/<strong>Link</strong>s.asp<br />

Most Wanted <strong>Link</strong>s http://dir.yahoo.com/Society_and_Culture/Crime/Law_Enforcement/Wanted/<br />

Most Wanted and Crime Stoppers http://www.officer.com/wanted.htm<br />

The Worlds Most Wanted http://www.mostwanted.org/<br />

Ten Most Wanted http://www.fbi.gov/wanted/topten/fugitives/fugitives.htm<br />

Most Wanted Terrorists http://www.fbi.gov/wanted/terrorists/fugitives.htm<br />

Crime Alert http://www.fbi.gov/wanted/alert/alert.htm<br />

National Security Agency (NSA) http://www.nsa.gov/<br />

NSA $3.2B Expansion for CyberWar http://publicintelligence.net/nsa-site-m-cybercom/<br />

Newspapers Around The World<br />

ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/<br />

News Voyager http://newspaperlinks.net/voyager.cfm<br />

Newspapers - USA And Worldwide http://www.refdesk.com/paper.html<br />

United States Newspapers http://www.50states.com/news/<br />

NEWSEUM The Newseum displays these daily newspaper front pages in their original, unedited<br />

form. Some front pages may contain material that is objectionable to some visitors. Viewer discretion is<br />

advised. http://www.newseum.org/todaysfrontpages/default.asp<br />

Pakistan Daily Times http://www.dailytimes.com.pk/default.asp?date=7/31/2008<br />

Asia Times http://www.atimes.com/<br />

The Paperboy http://www.thepaperboy.com/<br />

Newspapers 24 http://www.newspapers24.com/<br />

Newspaper Index http://www.newspaperindex.com/<br />

Find Nespapers http://www.findnewspapers.com/<br />

Today’s Front Pages (interactive) http://www.newseum.org/todaysfrontpages/flash/default.asp<br />

The Internet Public Library http://www.ipl.org/div/news/<br />

Newspapers of the World http://www.actualidad.com/<br />

http://www.geocities.com/~oberoi/newspapr.html<br />

Newspapers on the Worldwide WEB http://www.gt.kth.se/publishing/news.html<br />

USA and Worldwide http://www.refdesk.com/paper.html<br />

Newspapers http://www.newspapers.com/<br />

http://www.pressdisplay.com/pressdisplay/viewer.aspx<br />

Online Newspapers http://www.onlinenewspapers.com/<br />

World Newspapers http://www.world-newspapers.com/<br />

Aljazeera http://english.aljazeera.net/<br />

Aljazeera In English http://english.aljazeera.net/HomePage<br />

News And Audio In 33 Languages http://www.bbc.co.uk/worldservice/languages/<br />

ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/<br />

Newsmap is an application that visually reflects the constantly changing landscape of the Google<br />

News news aggregator. http://www.marumushi.com/apps/newsmap/newsmap.cfm<br />

105


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Nongovernment Organizations (NGOs)<br />

Search for organisations in our database of 393 AlertNet member organisations from 92<br />

countries. http://www.alertnet.org/member_directory.htm<br />

North Korea/Korean Military<br />

North Korea Profile http://www.nti.org/e_research/profiles/NK/index.html<br />

Lost world: Scenes from North Korea's closed society<br />

http://www.independent.co.uk/news/world/asia/lost-world-scenes-from-north-koreas-closed-society-<br />

2332102.html<br />

North Korea Web Page http://www.korea-dpr.com/<br />

Multimedia: North Korea in 2011 To coincide with the launch of our new blog on North Korea,<br />

Crisis Group has produced a multimedia presentation that looks at the history and current state of the<br />

"Hermit Kingdom". The presentation features an audio slideshow with fascinating and rare pictures from<br />

inside North Korea and commentary by Daniel Pinkston, Crisis Group's North East Asia Deputy Project<br />

Director. You can also explore the country's history, economy and military through background texts,<br />

interactive timelines and maps.<br />

http://www.crisisgroup.org/en/publication-type/multimedia/interactive-north-korea.aspx<br />

http://www.crisisgroup.org/en/publication-type/blogs/strong-and-prosperous/south-korean-ballistic-missileranges.aspx<br />

North Korean Attack on Yeonpyeong Island<br />

http://web.stratfor.com/images/asia/DigitalGlobe_North_Korean_Attack_11-.23.pdf<br />

nderground Airfields http://geimint.blogspot.com/2010/07/underground-airfieldsdprk.html<br />

Online Spies Spot North Korea’s Underground Airfields<br />

http://www.wired.com/dangerroom/2010/07/online-spies-spot-north-koreas-undergroundairfields/#ixzz0ti6gIDZf<br />

North Korea's Choice: Bombs over Electricity<br />

http://www.nae.edu/Publications/TheBridge/Archives/19804/19821.aspx<br />

North Korea Uncovered With Google Earth<br />

http://www.nkeconwatch.com/north-korea-uncovered-google-earth/<br />

North Korea<br />

https://www.intelink.gov/sharepoint/osp/North%20Korea%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

North Korea’s Secrets http://www.gadling.com/2009/06/01/phd-student-curtis-melvin-usesgoogle-maps-to-uncover-north-kore/<br />

List of North Korean Airports http://www.ourairports.com/countries/KP/airports.html<br />

North Korean Military Airbases http://eyeball-series.org/nk-mil-air/nk-mil-air.htm<br />

South of Anch'ang-ni<br />

North of Changch'an-ni<br />

Chông-ch'on<br />

Hwangju-up<br />

Kaech'on-up<br />

West of Kangdong-up<br />

Kusong<br />

Kwanso-ri<br />

Orang-up<br />

106


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

P'abal-li<br />

Pangp'o-ri<br />

North of Pyongyang<br />

North of Samjiyon-up<br />

North of Sanbon-dong<br />

Sindangan-dong<br />

Sinuiju<br />

Southwest of Sinp'yông-ni<br />

Toran-gol<br />

Wonsan<br />

Yongang-ni<br />

North of Yonghung-ni<br />

South of Yonghung-ni<br />

North Korean Homepage http://www.korea-dpr.com/<br />

Capability Analysis of North Korean Special Forces<br />

http://www.drc-jpn.org/AR-6E/fujimoto-e02.htm<br />

Korean Peninsula http://www.ceip.org/files/nonprolif/countries/country.asp?ID=5&country=korea<br />

North Korean Tactics http://www.globalsecurity.org/wmd/library/news/dprk/2001/korea.pdf<br />

North Korean Special Weapons Guide http://fas.org/nuke/guide/dprk/<br />

North Korean Special Forces http://www.specwarnet.com/asia/NKSF.htm<br />

Military of North Korea<br />

http://www.absoluteastronomy.com/encyclopedia/M/Mi/Military_of_North_Korea.htm<br />

Country Assessment: Korean Peninsula http://www.isis-online.org/publications/dprk/index.html<br />

North Korea Missile Launch Furor http://cryptome.org/dprk-furor/dprk-eyeball.htm<br />

Google Earthing The North Korean Military<br />

http://www.radioopensource.org/google-earthing-the-north-korean-military/<br />

North Korean Military Guide http://www.globalsecurity.org/military/world/dprk/<br />

North Korean Military Capabilities<br />

http://militaryhistory.about.com/od/currentconflicts/a/koreanmilitary_2.htm<br />

North Korean News http://www.kcna.co.jp/index-e.htm<br />

North Korean Nuclear Test Sites<br />

http://web.stratfor.com/images/asia/map/N_Korea-Nuke-test-5.jpg<br />

http://cryptome.org/dprk-test.htm<br />

The Nuclear-Armed Planet http://www.msnbc.msn.com/id/12269198/<br />

State Department Notes http://www.state.gov/r/pa/ei/bgn/2792.htm<br />

Background Note North Korea<br />

http://militaryhistory.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=militaryhistory&cdn=education&t<br />

m=12&gps=115_9_1148_694&f=10&tt=14&bt=0&bts=0&zu=http%3A//www.state.gov/r/pa/ei/bgn/2792.ht<br />

m<br />

North Korea Special Weapons Guide<br />

http://militaryhistory.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=militaryhistory&cdn=education&t<br />

m=159&gps=155_5_1148_694&f=10&tt=14&bt=0&bts=0&zu=http%3A//www.fas.org/nuke/guide/dprk/inde<br />

x.html<br />

Short Video Clips http://www.vbs.tv/shows/north-korea/<br />

North Korea On The Precipe Of Famine<br />

http://www.petersoninstitute.org/publications/pb/pb08-6.pdf<br />

The North Korean Food Crisis http://www.iie.com/events/event_detail.cfm?EventID=70<br />

North Korea Special Collection http://cns.miis.edu/research/korea/<br />

Yongbyon Nuclear Scientific Research Center<br />

http://en.wikipedia.org/wiki/Yongbyon_Nuclear_Scientific_Research_Center<br />

Nuclear Weapons Program http://www.fas.org/nuke/guide/dprk/nuke/index.html<br />

107


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Nuclear Overview http://www.nti.org/e_research/profiles/NK/Nuclear/index.html<br />

Country Assessments: Korean Peninsula http://www.isis-online.org/publications/dprk/index.html<br />

Nuclear Power Plants and WMD Series (Cryptome)<br />

nuclear-protest.htm Nuclear Protest Photos April 10, 2011<br />

daiichi-photos5.htm Fukushima Daiichi Nuclear Plant Photos 5 April 9, 2011<br />

npp-seismic.zip Seimic Isolation of Nuclear Power Plants April 9, 2011 (1.4)<br />

daiichi-assess.pdf Fukushima Daiichi Reactors Condition Assessment April 7, 2011<br />

iaea-ns-g-1-6.pdf Safety Guide for Seismic Design of Nuke Plants April 7, 2011<br />

daiichi-photos4.htm Fukushima Daiichi Nuclear Plant Photos 4 April 6, 2011<br />

nuke-disassembly.zip Taking Apart a Nuclear Bomb April 6, 2011 (5.2MB)<br />

fp-npp.zip Fire Protection of Nuclear Power Plants April 6, 2011 (1MB)<br />

DIY Nuke (offsite) How To Build A Nuclear Bomb April 6, 2011<br />

daiichi-photos3.htm Fukushima Daiichi Nuclear Plant Hi-Res Photos 3 April 5, 2011<br />

ge-bwr6.zip General Electric Boiling Water Reactor-Daiichi April 4, 2011 (7.2MB)<br />

daiichi-photos2.htm Fukushima Daiichi Nuclear Plant Hi-Res Photos 2 April 3, 2011<br />

daiichi-photos.htm Fukushima Daiichi Nuclear Plant Hi-Res Photos April 2, 2011<br />

fukushima-areva.zip Steps of the Fukushima Daiichi Incident by Areva April 1, 2011 (3.7MB)<br />

japan-npp.htm Japan Nuclear Power Plants Eyeball April 1, 2011<br />

gao-11-447r.htm Federal Reserve Banks InfoSys Controls Need Fix March 31, 2011<br />

isfsi-security.pdf US Nuclear Spent Fuel Storage Security March 30, 2011 (410KB)<br />

isfsi-eyeball.htm US Nuclear Spent Fuel Storage Casks Eyeball March 24, 2011<br />

jnpp-safety.zip Japan Nuclear Power Station Safety Design March 17, 2011 (2.4MB)<br />

108


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Guide (offsite) Responding to a Nuclear Emergency March 17, 2011<br />

NISA GOV (offsite) Japan Nuclear and Industrial Safety Agency March 17, 2011<br />

JNES NGO (offsite) Japan Nuclear Energy Safety Organization March 17, 2011<br />

GE Hot Rods (offsite) General Elctric Spent Nuclear Fuel Rods Threat March 16, 2011<br />

DG JP (offsite) Digital Globe Images of Japan Quake Damage March 15, 2011<br />

Megadeath (offsite) Reducing Consequences of Nuclear Detonation March 11, 2011<br />

secnav-5510-35b.pdf Navy Nuclear Weapons Personnel Reliability March 3, 2011 (361KB)<br />

HBG-TENPP.pdf HBGary Targeting Exelon Nuclear Power Plant February 13, 2011<br />

NPP (offsite) Nuclear Power Reactor Inspections 12/27/2010 February 4, 2011<br />

nw-council.pdf Megadeath Nuclear Weapons Council December 25, 2010<br />

nw-effects.pdf Megadeath Nuclear Weapons Effects December 25, 2010<br />

nw-survive.pdf Megadeath Nuclear Weapons Effects Survivabilty December 25, 2010<br />

nw-info.pdf Megadeath Nuclear Weapons Info Classification December 25, 2010<br />

doe-452-z.pdf Control of Megadeath Nuclear Weapons Data December 25, 2010<br />

cnwdi.pdf Control of Megadeath Nuclear Weapons Design Info December 25, 2010<br />

dnfsb122710.pdf Hazards of Nuclear Weapons Waste Storage December 24, 2010<br />

nrc120110.pdf NRC Sets Nuclear Info Safeguards for Toshiba November 30, 2010<br />

wmd-risks.pdf Nuclear Weapons Disassembly Risks 2010 September 21, 2010<br />

doe072710.htm Compensation for Nuclear Damage July 28, 2010<br />

mega-kill.zip Nuclear Weapon Effects July 20, 2010 (2.1MB<br />

A-bomb (offsite) Touring US Atomic Bomb Facilities Photos July 15, 2010<br />

Chernobyl (offsite) Touring Chernobyl Facilities Photos July 15, 2010<br />

dodi-3150-10.pdf DoD Response to US Nuclear Weapon Incidents July 3, 2010<br />

opnav-8110-18c.zip Navy Nuclear Weapons System Safety Program July 2, 2010 (5.5MB)<br />

secnav-5710-28.pdf Navy Compliance with US-IAEA Nuke Safeguards July 2, 2010<br />

nuke-sites.htm US IAEA-Declared Nuclear Sites Eyeball June 4, 2009<br />

nuke-air.htm Nuclear Weapons Air Shipment Eyeball December 26, 2008<br />

alert-nukes.htm Alert Nuclear Weapons Storage Facilities Eyeball November 20, 2008<br />

nuke-offshore.htm US Nuclear Weapons Storage Offshore Eyeball August 23, 2008<br />

pantex-gertie.htm Pantex Gravel Gertie Eyeball August 19, 2008<br />

prc-nukes.htm China's Nuclear Weapons Facilities Eyeball May 28, 2008<br />

syrian-site.htm Syrian Alleged and North Korean Reactors April 26, 2008<br />

negev-eyeball.htm Negev Nuclear Research Center Eyeball January 12, 2008<br />

pantex-birdseye.htm Pantex Nuclear Warhead Facility Birdseye January 6, 2007<br />

juragua-eyeball.htm Cuban Juragua Nuclear Power Plant Eyeball November 24, 2007<br />

turkey-birdseye.htm Turkey Point Nuclear Power Plant Birdseye November 23, 2007<br />

peach-npp.htm Peach Bottom Atomic Power Plant Birdseye November 11, 2007<br />

sequoyah-npp.htm Sequoyah Nuclear Power Plant Birdseye November 11, 2007<br />

pilgrim-npp.htm Pilgrim Nuclear Power Plant Birdseye November 11, 2007<br />

fitz-birdseye.htm Fitzpatrick Nuclear Power Plant Birdseye August 4, 2007<br />

boomer-refit.htm Nuclear Boomer Refit Birdseye June 30, 2007<br />

san-onofre-npp.htm San Onofre Nuclear Power Plant Birdseye December 16, 2006<br />

nwsa-eyeball.htm Nuclear Weapon Storage Areas Eyeball Update November 27, 2006<br />

chornobyl-npp.htm RU Chornobyl Nuclear Power Plant Eyeball November 13, 2006<br />

kursk-npp.htm RU Kursk Nuclear Power Plant Eyeball November 13, 2006<br />

ignalina-npp.htm RU-LT Ignalina Nuclear Power Plant Eyeball November 13, 2006<br />

smolensk-npp.htm RU Smolensk Nuclear Power Plant Eyeball November 13, 2006<br />

st-pete-npp.htm RU St Petersburg Nuclear Power Plant Eyeball November 13, 2006<br />

lesnoy.htm Russian Lesnoy Nuclear Complex Eyeball November 8, 2006<br />

seversk.htm Russian Seversk Nuclear Complex Eyeball November 7, 2006<br />

ozersk.htm Russian Ozersk Nuclear Complex Eyeball November 7, 2006<br />

dprk-test.htm North Korea Nuclear Test Site Eyeball Revised October 14, 2006<br />

lanl-eyeball.htm Los Alamos National Laboratory Eyeball Update September 13, 2006<br />

bangor-eyeball.htm Bangor Submarine Base-Nuclear Weapons Storage August 31, 2006<br />

kings-eyeball.htm Kings Bay Submarine Base-Nuclear Weapons Storage August 31, 2006<br />

109


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

tnrc-eyeball.htm Tehran and Bushehr Nuclear Reactors Eyeball August 25, 2006<br />

soreq-eyeball.htm Eyeballing Israel Soreq Nuclear Research Center June 27, 2006<br />

npp2-eyeball.htm Eyeballing US Nuclear Plants and Facilities 2 June 16, 2006<br />

perry-birdseye.htm Perry Nuclear Power Plant Birdseye February 22, 2006<br />

indian-birdseye.htm Indian Point Nuclear Generating Station Birdseye February 21, 2006<br />

tmi-birdseye.htm Three Mile Island Nuclear Power Plant Birdseye February 21, 2006<br />

62npp-eyeball.htm Eyeballing 104 Nuclear Reactors/63 Power Plants January 17, 2006<br />

kumsc-birdseye.htm Kirtland Nuclear Storage Complex Birdseye December 25, 2005<br />

kumsc2-eyeball.htm Eyeballing Kirtland Nuclear Weapons Storage 2004 August 20, 2005<br />

mcg-nps-eyeball.htm Eyeballing McGuire Nuclear Power Station March 2, 2005<br />

dresden-eyeball.htm Eyeballing Dresden Nuclear Power Plant March 1, 2005<br />

braid-eyeball.htm Eyeballing Braidwood Generating Station March 1, 2005<br />

salem-eyeball.htm Eyeballing Salem-Hope Creek Nuclear Power Plant February 28, 2005<br />

oyster-eyeball.htm Eyeballing Oyster Creek Nuclear Power Station February 28, 2005<br />

barkbig-eyeball.htm Big Eyeballing Barksdale Nuclear Weapons Storage May 1, 2004<br />

gray-eyeball.htm Eyeballing Gray AFB Nuclear Weapons Storage Area April 10, 2004<br />

bark-eyeball.htm Eyeballing the Barksdale AFB Nuclear WSA December 14, 2003<br />

nuke-fuze.htm Nuclear Weapons Arming and Fuzing August 31, 2003<br />

laken-eyeball.htm Eyeballing US Nuclear Weapons Storage in Britain July 28, 2003<br />

dnws-eyeball.htm Eyeballing Defense Nuclear Weapons School January 3, 2003<br />

wipp-eyeball.htm Eyeballing the WIPP Nuclear Waste Target September 9, 2002<br />

daf-eyeball.htm Eyeballing Nuclear Device Assembly Facilities August 12, 2002<br />

hanford-eyeball.htm Eyeballing Hanford Nuclear Reservation July 9, 2002<br />

pantex-eyeball.htm Eyeballing Pantex Nuclear Warhead Plant June 26, 2002<br />

nwsa-eyeball.htm US Nuclear Weapons Storage Areas June 17, 2002<br />

nellis-eyeball.htm Eyeballing Nellis Nuclear Weapons Storage Area June 14, 2002<br />

dcnpp-eyeball.htm Eyeballing the Diablo Canyon Nuclear Power Plant June 7, 2002<br />

ccnpp-eyeball.htm Eyeballing Calvert Cliffs Nuclear Power Plant June 7, 2002<br />

pnpp-eyeball.htm Eyeballing the Pilgrim Nuclear Power Plant June 7, 2002<br />

mnpp-eyeball.htm Eyeballing the Millstone Nuclear Power Plant June 7, 2002<br />

snpp-eyeball.htm Eyeballing the Seabrook Nuclear Power Plant June 7, 2002<br />

ornl-eyeball.htm Eyeballing Oak Ridge National Laboratory July 21, 2002<br />

llnl-eyeball.htm Eyeballing Lawrence Livermore National Lab May 21, 2002<br />

ymp-eyeball.htm Eyeballing the Yucca Mountain Project May 10, 2002<br />

nts-eyeball.htm Eyeballing the Nevada Nuclear Test Site April 28, 2002<br />

anl-eyeball.htm Eyeballing Argonne National Laboratory April 28, 2002<br />

ipngs-eyeball.htm Eyeballing Indian Point Nuclear Generating Sta. April 28, 2002<br />

The Cryptome Eyeball Series began in March 2002<br />

Compilation below in progress<br />

tp-terr.htm TerrPanel on WMD Terrorism (Full HTML 314K) December 18, 1999<br />

tp-terr.zip TerrPanel on WMD Terrorism (Full Zipped 108K) December 18, 1999<br />

tp-terr-pt2.htm TerrPanel Report on Domestic WMD Terrorism Pt2 December 18, 1999<br />

tp-terr-pt1.htm TerrPanel Report on Domestic WMD Terrorism Pt1 December 17, 1999<br />

wmdp112699.txt WMD Terrorism Panel Meet November 26, 1999<br />

HM (offsite) Nuclear Weapons Secrecy /SA November 17, 1999<br />

hasc102699.htm Mini Nuke Sabotage October 27, 1999<br />

Nukes (offsite) US Stored Nuclear Weapons in Many Nations October 20, 1999<br />

doe101599.txt Secret Nuke Meet, DE U-235 to CN October 15, 1999<br />

srb090199.htm Samuel Berger on Curbing WMD September 2, 1999<br />

wmdp082399.htm WMD Terrorism Panel Meeting August 23, 1999<br />

onns081699.txt Access to Classified and Special Nuclear Info August 16, 1999<br />

nrc072999.txt Digital Nuke Safety Workshop July 29, 1999<br />

hr1555-yak3.txt Senate Debate on Intel 2000/Nuclear Security July 23, 1999<br />

110


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

hr1555-amend.txt Agency for Nuclear Stewardship July 23, 1999<br />

smallpox-wmd.htm The Demon in the Freezer: Smallpox Bioterror July 17, 1999<br />

nrc071699.htm Safety of Nuke Digital Systems July 16, 1999<br />

wmd-curb Urge WMD Curb July 15, 1999<br />

Terr Panel (offsite) Panel on Domestic WMD Terrorism June 8, 1999<br />

rudocs-gertz.htm Top Secret US Reports on Russian Nuclear Defense May 31, 1999<br />

s1059-393-94.txt Senators Jaw Spying/Nuke Threats May 28, 1999<br />

fbi-wmd.htm FBI on WMD Combat April 30, 1999<br />

cia-wmd.htm CIA on WMD Proliferation April 30, 1999<br />

doe040199.txt Nuclear Safety Plan, Right April 1, 1999<br />

wmd-panel.htm WMD, Inc. Launched April 6, 1999<br />

nrc032999.txt Nuclear Emergency Plans March 29, 1999<br />

uk-nuke.htm UK Atomic Weapons Site Redevelopment February 9, 1999<br />

cia020299.htm CIA's Tenet on WMD, Russia, China, North Korea February 6, 1999<br />

nuke-y2k.htm Nukes Need Y2K TLC December 4, 1998<br />

wjc111298.htm Clinton Letter on WMD November 13, 1998<br />

doe100798.txt Secret Hazards at the Pantex Nuke Farm October 7, 1998<br />

dwmd98.htm Conference Report on Defense Against WMD 98 Act October 2, 1998<br />

RAID (offsite) WMD Response Team Locations Ocotber 1, 1998<br />

hr3616-14.txt Defense Against WMD Act of 1998 September 24, 1998<br />

doe090998.txt Nuke Hazards Meets September 9, 1998<br />

nrc080398.txt Access to Classified Nuclear Information (102K) August 3, 1998<br />

wmd-export.htm Tightening Weapons Export Controls July 29, 1998<br />

hd105-271.htm Report to Congress on Proliferation of WMD July 15, 1998<br />

iaea060198.htm IAEA Says Iraq Nuclear File Not Closed June 22, 1998<br />

dod-rra-wmd.htm DoD on Regional Rapid Assessment of WMD May 22, 1998<br />

nrc050798.txt NRC Fees for Personnel Investigations May 7, 1998<br />

nrc042398.txt IEEE Safety Criteria for Nuke Plants April 23, 1998<br />

nrc040698.txt AF TRIGA Reactor April 6, 1998<br />

dod-wmd DoD Policy: Weapons of Mass Destruct (offsite) March 28, 1998<br />

nuke-future Spread of WMD and US Nuclear Strategy (132K) March 18, 1998<br />

disarm-nukes Nuclear Weapons Abolition Campaign (offsite) March 15, 1998<br />

wmd-lugar.txt Sen Lugar: Combating WMD March 14, 1998<br />

bpm021198.txt US-IAEA Nuclear Safeguards Agreement February 11, 1998<br />

nrc012898.txt Nuke Plant to North Korea February 5, 1998<br />

nrc012998.txt Generic Letter on Y2K Readiness for Nuke Plants January 29, 1998<br />

pd98-10.htm Prez OKs China's Nuclear Controls January 16, 1998<br />

mercier.htm Terrorists, WMD, and the US Army Reserve January 6, 1998<br />

doe010298.htm Defense Nuclear Facilities Safety Plan January 2, 1998<br />

wmd-combat.htm Commission on Combating Weapons of Mass Death December 20, 1997<br />

nsam-160.htm PK Crypto: Permissive <strong>Link</strong> for Nuclear Weapons December 17, 1997<br />

fbi-wmd.htm FBI Response to Weapons of Mass Destruction December 10, 1997<br />

dod-domprep.htm Domestic Preparedness for WMD Terrorism (113K) December 1, 1997<br />

ndp-wmd.htm Panel Says Defense Should Focus On WMD Terrorism November 29, 1997<br />

nuke-sec.htm News Report: Nuclear Weapons Labs Security November 8, 1997<br />

rced-97-229.txt GAO Report: Nuclear Weapons Labs Security (122K) November 8, 1997<br />

dnfsb102197.txt Defense Nuclear Facilities Safety Board FOIA October 21, 1997<br />

hanford.htm Report on Hanford Nuke Waste Fiasco August 19, 1997<br />

emp-merkle.htm Non-Nuclear EMP: Threat to Military July 20, 1997<br />

doe060497-2.txt Nuclear Explosives Personnel Assurance Program June 5, 1997<br />

wmd022797.txt WMD Report March 14, 1997<br />

no111496.txt POTUS on Proliferation of WMD March 14, 1997<br />

wmd092796.txt WMD Report March 14, 1997<br />

wmd092995.txt WMD Report March 14, 1997<br />

wmd060995.txt WMD Report March 14, 1997 (108K)<br />

wmd100694.txt WMD Report March 14, 1997<br />

111


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

taggants.htm NRC on Tagging Explosives January 24, 1997<br />

Nuclear Reactors and Storage and Other Items of Interest<br />

Nuclear Threat Initiative http://www.nti.org/index.php<br />

Natanz Uranium Enrichment Complex, Iran, 2002-2010<br />

http://cryptome.org/eyeball/natanz/natanz.htm<br />

http://publicintelligence.net/iran-nuclear-site-natanz-uranium-enrichment-site/<br />

Plutonium Secretly Secured http://cryptome.org/eyeball/kurchatov/kurchatov.htm<br />

http://cryptome.org/eyeball/bn-350/bn-350.htm<br />

Search and Access 24M Nuclear Waste Documents http://www.lsnnet.gov/home.aspx?pg=home<br />

Archive of Nuclear Data http://www.nrdc.org/nuclear/nudb/datainx.asp<br />

http://www.nrdc.org/search.asp?cof=FORID%3A11&ie=UTF-<br />

8&q=nuclear&cx=001024953138106184952%3Alevppyfplwy&hq=-inurl%3Ahttps&t=iframe#851<br />

How many people live near a nuclear power plant in the USA?<br />

http://opendata.zeit.de/nuclear-reactors-usa/#/en/<br />

Find a Reactor Near You http://tools.voanews2.com/nuclear_reactors/<br />

The World’s Nuclear Power Reactors Interactive Map http://www.netgis.de/atom_gmaps/<br />

http://maptd.com/map/earthquake_activity_vs_nuclear_power_plants/<br />

Lance Nuclear Missile Handbook lance-guide.zip<br />

Nuclear Sites Declaration nuke-sites.zip<br />

Israel's Dimona Nuclear Weapons Factory In 3D http://www.youtube.com/watch?v=bbjgDERSuiI<br />

The Virtual Nuclear Tourist (Includes Individual State Maps of Nuclear Waste Transportation<br />

Routes) http://www.nucleartourist.com/<br />

Peach Bottom Atomic Power Plant http://eyeball-series.org/peach-npp/peach-npp.htm<br />

Sequoyah Nuclear Power Plant http://eyeball-series.org/sequoyah-npp/sequoyah-npp.htm<br />

Pilgrim Nuclear Power Plant http://eyeball-series.org/pilgrim-npp/pilgrim-npp.htm<br />

Turkey Point Nuclear Power Plant http://eyeball-series.org/turkey/turkey-birdseye.htm<br />

Cuban Juragua Nuclear Power Plant http://eyeball-series.org/juragua/juragua-eyeball.htm<br />

Pantex Nuclear Warhead Facility Birdseye<br />

http://eyeball-series.org/pantex-birdseye/pantex-birdseye.htm<br />

Negev Nuclear Research Center http://eyeball-series.org/negev-eyeball/negev-eyeball.htm<br />

Alert Nuclear Weapons Storage Facilities http://eyeball-series.org/alert-nukes/alert-nukes.htm<br />

Nuclear Weapons Air Shipment http://eyeball-series.org/nuke-air/nuke-air.htm<br />

China's Nuclear Weapons Facilities http://eyeball-series.org/prc-nukes/prc-nukes.htm<br />

US Nuclear Weapons Storage Offshore http://eyeball-series.org/nuke-offshore/nuke-offshore.htm<br />

Barksdale Air Force Base Nuclear Weapons Storage Area<br />

http://eyeball-series.org/barkbig-eyeball.htm<br />

63 US Nuclear Power Plants http://cryptome.org/npp/62npp-eyeball.htm<br />

Indian Point Nuclear Generating Station http://eyeball-series.org/ipngs-eyeball.htm<br />

Pantex Plant http://eyeball-series.org/pantex-eyeball.htm<br />

Barksdale Air Force Base WSA http://eyeball-series.org/bark-eyeball.htm<br />

Calvert Cliffs Nuclear Power Plant http://eyeball-series.org/ccnpp-eyeball.htm<br />

Defense Nuclear Weapons School (DNWS) http://eyeball-series.org/dnws-eyeball.htm<br />

Diablo Canyon Nuclear Power Plant http://eyeball-series.org/dcnpp-eyeball.htm<br />

Gray Air Force Base Storage http://eyeball-series.org/gray-eyeball.htm<br />

Hanford Nuclear Material Processing http://eyeball-series.org/hanford-eyeball.htm<br />

Kirtland Underground Storage http://cryptome.org/kumsc-eyeball.htm<br />

http://cryptome.org/kumsc2-eyeball.htm<br />

Los Alamos National Laboratory http://cryptome.org/lanl/lanl-eyeball.htm<br />

Millstone Nuclear Power Plant http://eyeball-series.org/mnpp-eyeball.htm<br />

Nellis Air Force Base http://eyeball-series.org/nellis-eyeball.htm<br />

Waste Isolation Pilot Plant http://eyeball-series.org/wipp-eyeball.htm<br />

112


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Pilgrim Nuclear Power Plant http://eyeball-series.org/pnpp-eyeball.htm<br />

Seabrook Nuclear Power Plant http://eyeball-series.org/snpp-eyeball.htm<br />

US Nuclear Weapons Storage in Britain http://eyeball-series.org/laken-eyeball.htm<br />

Nukedump http://cryptome.org/nukedump.jpg<br />

International Nuclear Safety Center http://www.insc.anl.gov/pwrmaps/map/world_map.php<br />

List of Power Reactor Units http://www.nrc.gov/reactors/operating/list-power-reactorunits.html<br />

http://www.eia.doe.gov/cneaf/nuclear/page/at_a_glance/reactors/states.html<br />

Nuclear Guide http://wn.com/s/nuclearguide/index.html<br />

US Nuclear Reactors<br />

http://www.eia.doe.gov/cneaf/nuclear/page/at_a_glance/reactors/nuke1.html<br />

Dresden Nuclear Power Plant http://cryptome.org/dresden-eyeball.htm<br />

Braidwood Nuclear Power Plant http://cryptome.org/braid-eyeball.htm<br />

Salem-Hope Creek Nuclear Power Plant http://cryptome.org/salem-eyeball.htm<br />

Oyster Creek Nuclear Power Station http://cryptome.org/oyster-eyeball.htm<br />

McGuire Nuclear Power Station http://cryptome.org/mcg-nps-eyeball.htm<br />

Braidwood Generating Station http://cryptome.org/braid-eyeball.htm<br />

Selected US Nuclear Power Plants and Facilities http://cryptome.org/npp2/npp2-eyeball.htm<br />

Kirtland Nuclear Storage http://eyeball-series.org/kumsc-birdseye.htm<br />

<strong>Global</strong> Stocks of Nuclear Explosive Materials<br />

http://www.isis-online.org/global_stocks/end2003/tableofcontents.html<br />

Nuclear Weapons Programs Worldwide: An Historical Overview<br />

http://www.isis-online.org/mapproject/introduction.html<br />

Nevada Test Site http://cryptome.org/nts-eyeball.htm<br />

Knolls Atomic Power Laboratory http://cryptome.org/kapl-eyeball.htm<br />

Bettis Atomic Power Laboratory http://cryptome.org/bettis-eyeball.htm<br />

International Nuclear Safety Center (maps of reactors around the world) http://www.insc.anl.gov/<br />

World Information Service on Energy (world nuclear fuel facilities)<br />

http://www.wise-uranium.org/index.html<br />

Proliferation News and Resources http://www.carnegieendowment.org/npp/<br />

(includes deadly maps) http://www.carnegieendowment.org/static/npp/deadlymaps.cfm<br />

Nevada Test Site for Divine Strake http://cryptome.org/nts/nts-eyeball.htm<br />

Three Mile Island http://cryptome.org/tmi-birdseye.htm<br />

Nuclear Security Advisory Council http://www.ransac.org/<br />

Nuclear Threat Initiative http://www.nti.org/<br />

Atomic Archive http://www.atomicarchive.com/<br />

Soreq Nuclear Research Center http://cryptome.org/soreq-eyeball.htm<br />

Selected US Nuclear Power Plants and Facilities http://eyeball-series.org/npp2/npp2-eyeball.htm<br />

Naval Submarine Base Kings Bay and Nuclear Weapons Storage Area<br />

http://eyeball-series.org/kings-eyeball.htm<br />

Bangor Submarine Base Kings Bay and Nuclear Weapons Storage Area<br />

http://eyeball-series.org/bangor-eyeball.htm<br />

Nuclear Weapons http://www.johnstonsarchive.net/nuclear/index.html<br />

Atomic Archive http://www.atomicarchive.com/index.shtml<br />

The Nuclear-Armed Planet http://www.msnbc.msn.com/id/12269198/<br />

San Onofre Nuclear Power Plant http://cryptome.org/san-onofre/san-onofre-npp.htm<br />

The Atomic Bomb Website http://www.vce.com/grable.html<br />

Fitzpatrick Nine Mile Point Nuclear Power Plant http://cryptome.org/fitz/fitz-birdseye.htm<br />

Breaking Into A Power Station In 3 Easy Steps<br />

http://www.news.com/8301-10784_3-9914896-7.html?tag=blogFeed<br />

Nuclear Terrorism<br />

How to Build a Nuclear Bomb<br />

113


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.nationbooks.org/book/136/How%20to%20Build%20a%20Nuclear%20Bomb<br />

Nuclear Posture Review Report 2010<br />

http://www.globalsecurity.org/wmd/library/policy/national/2010-nuclear-posture-review.pdf<br />

Nuclear Dangers http://www.nae.edu/File.aspx?id=19815<br />

The Virtual Nuclear Tourist (Includes Individual State Maps of Nuclear Waste Transportation<br />

Routes) How much easier can we make it? http://www.nucleartourist.com/<br />

Create your own blast map by simply entering a zip code<br />

http://www.nuclearterror.org/blastmaps.html<br />

Video footage of nuclear explosions http://nuclearfiles.org/revideos/filmindex2.html<br />

<strong>Link</strong>s http://www.nuclearterror.org/links.html<br />

Nuclear Weapon Effects Calculator<br />

http://www.fas.org/main/content.jsp?formAction=297&contentId=367<br />

Oil<br />

Bibliography for the Study of Oil and War http://www.endgame.org/oilwars-biblio.htm<br />

World Oil Market and Oil Price Chronologies: 1970 – 2003<br />

http://www.eia.doe.gov/emeu/cabs/chron.html<br />

Oil Demand<br />

http://www.eia.doe.gov/pub/oil_gas/petroleum/analysis_publications/oil_market_basics/Demand_text.htm<br />

Energy Review http://archive.wn.com/2004/07/21/1400/energyreview/<br />

OPEC http://www.opecnews.com/<br />

PeakOil http://www.peakoil.org/<br />

The Oil Wars: Parts 1 and 2 http://www.angelfire.com/ab/trogl/oilwar/<br />

http://www.angelfire.com/ab/trogl/oilwar/part2.html<br />

World Energy "Areas To Watch" http://www.eia.doe.gov/emeu/cabs/hot.html<br />

Online Services<br />

Army A-Z http://www.army.mil/a-z/<br />

<strong>Open</strong> <strong>Source</strong> Center (formerly the Foreign Broadcast Information Service)<br />

Log-In (requires registration) http://www.opensource.gov<br />

<strong>Open</strong> <strong>Source</strong> Center Map Library https://www.intelink.gov/maps/<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> <strong>Link</strong>s<br />

<strong>OSINT</strong> <strong>Global</strong> – <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> from across the globe http://www.osintglobal.com/<br />

OSINFO – <strong>Open</strong> <strong>Source</strong>s Information http://www.opensourcesinfo.org/<br />

All <strong>Source</strong> <strong>Intelligence</strong> Group http://www.the35fgroup.com/<br />

<strong>OSINT</strong> and Momentum http://smallwarsjournal.com/blog/2010/11/i-came-across-the-following/<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://osint4progressives.blogspot.com/<br />

<strong>OSINT</strong> News http://osintnews.blogspot.com/<br />

AFCEA <strong>Intelligence</strong> Serving <strong>Intelligence</strong> Professionals<br />

http://www.afcea.org/mission/intel/default.asp<br />

NightWatch http://www.afcea.org/mission/intel/nightwatch.asp<br />

<strong>Intelligence</strong> Online http://www.intelligenceonline.com/<br />

114


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Army <strong>Open</strong> <strong>Source</strong> Portal (requires access) This link provides <strong>OSINT</strong> products on the following<br />

areas: https://www.intelink.gov/sharepoint/osp/default.aspx<br />

Iraq<br />

https://www.intelink.gov/sharepoint/osp/Iraq%20%20<strong>OSINT</strong>%20Library/Forms/AllItems.aspx<br />

AFRICOM<br />

https://www.intelink.gov/sharepoint/osp/AFRICOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Afghanistan<br />

https://www.intelink.gov/sharepoint/osp/Afghanistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

CENTCOM<br />

https://www.intelink.gov/sharepoint/osp/CENTCOM%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Counternarcotics<br />

https://www.intelink.gov/sharepoint/osp/Counternarcotics%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

China<br />

https://www.intelink.gov/sharepoint/osp/China%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Homeland Security<br />

https://www.intelink.gov/sharepoint/osp/Homeland%20Security%20<strong>OSINT</strong>%20Products/Forms/AllItems.a<br />

spx<br />

EUCOM<br />

https://www.intelink.gov/sharepoint/osp/EUCOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Science and Technology<br />

https://www.intelink.gov/sharepoint/osp/Science%20%20Technology%20<strong>OSINT</strong>%20Products/Forms/AllIt<br />

ems.aspx<br />

Iran https://www.intelink.gov/sharepoint/osp/Iran%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Terrorism<br />

https://www.intelink.gov/sharepoint/osp/Terrorism%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Israel/Palestine<br />

https://www.intelink.gov/sharepoint/osp/Israel%20%20Palestine%20<strong>OSINT</strong>%20Products/Forms/AllItems.<br />

aspx<br />

WMD https://www.intelink.gov/sharepoint/osp/WMD/Forms/AllItems.aspx<br />

North Korea<br />

https://www.intelink.gov/sharepoint/osp/North%20Korea%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

NORTHCOM<br />

https://www.intelink.gov/sharepoint/osp/NORTHCOM_<strong>OSINT</strong>_Products/Forms/AllItems.aspx<br />

PACOM<br />

https://www.intelink.gov/sharepoint/osp/PACOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Pakistan<br />

https://www.intelink.gov/sharepoint/osp/Pakistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Russia<br />

https://www.intelink.gov/sharepoint/osp/Russia%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

SOUTHCOM<br />

https://www.intelink.gov/sharepoint/osp/SOUTHCOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.a<br />

spx<br />

Foreign Military Studies Office http://fmso.leavenworth.army.mil/RESRCHLK.htm<br />

Naval <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://www.nosi.org/<br />

Naval <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Blogspot http://nosint.blogspot.com/<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong><br />

http://www.oss.net/extra/tools/parser/index.cgi?url=/html/parse/index.html<br />

<strong>Open</strong> <strong>Source</strong> Research Forum http://www.geocities.com/levittcm/<br />

Expanding <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://www.isanet.org/noarchive/hulnick2.html<br />

<strong>Open</strong>–<strong>Source</strong> <strong>Intelligence</strong> From the Airwaves<br />

http://www.cia.gov/csi/studies/fall_winter_2001/article04.html<br />

<strong>Open</strong> <strong>Source</strong> Collection http://www.fas.org/irp/nsa/ioss/threat96/part06.htm<br />

Carnegie Endowment http://www.carnegieendowment.org/<br />

Small Wars Journal (lots of reference material and the site is created on-the-fly daily)<br />

http://www.smallwarsjournal.com/<br />

115


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

World Facts http://worldfacts.us/<br />

Power and Interest News Report (independent organization that utilizes open source intelligence<br />

to provide conflict analysis services in the context of international relations)<br />

http://www.pinr.com/index.php<br />

Center for Media and DemocracyCenter for Media and Democracy http://www.prwatch.org/<br />

Strategy Page http://www.strategypage.com/<br />

Intellibriefs http://intellibriefs.blogspot.com/<br />

SiloBreaker (for those of you familiar with Crimelink and Analyst Notebook link diagrams, this site<br />

should be of great interest to you. Try it, you’ll like it!) http://www.silobreaker.com/<br />

<strong>Global</strong> Challenges Research http://www.axisglobe.com/<br />

<strong>Global</strong> Research http://www.globalresearch.ca/index.php?context=home<br />

Defence News (World News Network) http://defencenews.com/<br />

National <strong>Intelligence</strong> Council http://www.odci.gov/nic/NIC_home.html<br />

U.S. <strong>Intelligence</strong> Community http://www.intelligence.gov/<br />

STRATFOR http://www.stratfor.com/index.php<br />

Stratfor Free <strong>Intelligence</strong> Reports<br />

https://www.stratfor.com/subscriptions/free-weekly-intelligence-reports.php<br />

National Security <strong>Link</strong>s http://www.blueriver.net/%7Ewyrm/natlsec.html<br />

Research and <strong>Intelligence</strong> http://www.airsecurity.com/research.htm<br />

Worldwide <strong>Intelligence</strong> Agencies http://www.fas.org/irp/world/index.html<br />

National Drug <strong>Intelligence</strong> Center http://www.usdoj.gov/ndic/products.htm<br />

Gateway to <strong>Intelligence</strong> http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm<br />

Strategic <strong>Intelligence</strong> <strong>Link</strong>s http://www.loyola.edu/dept/politics/intel.html<br />

Gathering and Exposing <strong>Intelligence</strong> Online http://www.internet-intelligence.org/<br />

Nation Master: Where Statistics Come Alive (build your own charts)<br />

http://www.nationmaster.com/graph-T/agr_ban_imp_sha&int=5&id=EUR<br />

<strong>Intelligence</strong> Resources http://www.globalsecurity.org/intell/index.html<br />

Your Comprehensive <strong>Source</strong> for <strong>OSINT</strong> & SIGINT 24/7 http://mediavillage.net/test/<br />

Threats <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Gateway (requires easy registration)<br />

http://www.tosig.com/tosig/tosig.html<br />

Literally <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://osint.blox.pl/html<br />

Wikipedia <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Inputs http://en.wikipedia.org/wiki/<strong>Open</strong>_source_intelligence<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Search Engine http://www.intelligencesearch.com/<br />

World-Check Reducing Risk Through <strong>Intelligence</strong> http://www.world-check.com/<br />

Africa <strong>Intelligence</strong> http://www.africaintelligence.com/<br />

Strategic Analysis And <strong>OSINT</strong> (An informative blog on issues related to its title)<br />

http://strategicanalysis.i-blog.gr/<br />

The <strong>Intelligence</strong> Summit (open source news)<br />

http://intelligence-summit.blogspot.com/2006/11/open-source-news_13.html<br />

Startegic Analysis And <strong>OSINT</strong> Management http://strategicanalysis.i-blog.gr/<br />

Intellnet: The <strong>Intelligence</strong> Network http://www.intellnet.org<br />

Bangladesh <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Monitors (Archive of South Asian <strong>Intelligence</strong> monitored<br />

from Dhaka, Bangladesh. Daily updates and news on low intensity Regional warfare, study of National<br />

Liberation Movements, Moves by <strong>Intelligence</strong> agencies, Espionage debriefs, National Security agenda,<br />

Corruption, <strong>Global</strong> Jihad, The US Empire ~~ and our pet peeve The India. Inc DISCLAIMER: This site is<br />

a Bangladesh Citizens Initiative on the Net and is in no way connected to any Government or <strong>Intelligence</strong><br />

agency.) http://bdosintmonitors.blogspot.com/2007/05/bdosint-monitors-digest-number-753.html<br />

Noah Schahtman http://www.noahshachtman.com/<br />

International Security Research and <strong>Intelligence</strong> Agency http://www.isria.info/<br />

The <strong>Intelligence</strong> Network: IntellNet is dedicated to providing individuals and groups aggregated<br />

news and documents from around the world in an easy-to-access and understand format. Founded in<br />

early 2000 as a private project to more easily disseminate information, during the 4 years since its<br />

creation IntellNet proved itself to be a great source of knowledge. With today's re-launch, The <strong>Intelligence</strong><br />

Network will stand upon the shoulders of giants in order to see further and push higher; expanding upon<br />

the very foundations of the U.S. <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>) community. http://www.intellnet.org/<br />

Space War Your World At War<br />

116


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.spacewar.com/reports/<strong>Open</strong>_<strong>Source</strong>_<strong>Intelligence</strong>_999.html<br />

Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong><br />

http://www.onstrat.com/osint/<br />

IntelliBriefs http://intellibriefs.blogspot.com/2006_03_19_archive.html<br />

<strong>Global</strong> <strong>Intelligence</strong> http://www.isria.info/index2.php<br />

Strategy Page http://www.strategypage.com/default.asp<br />

<strong>Source</strong>s And Methods<br />

http://sourcesandmethods.blogspot.com/2008/01/bahraini-foreign-minister-speaks-iiss.html<br />

SITE <strong>Intelligence</strong> Group Monitoring Service ("By monitoring terrorist and extremist websites and<br />

penetrating password-protected Al Qaeda linked sites, SITE provides a state-of-the-art intelligence<br />

service to both practitioners and analysts to understand the adversary." - Rohan Gunaratna, Author,<br />

Inside Al Qaeda: <strong>Global</strong> Network of Terror (Columbia University Press) Studying the primary source<br />

propaganda, training manuals, and chatter of terrorists offers insight into terrorists and their activities that<br />

can not be obtained anywhere else. Failing to monitor terrorist propaganda is a failure in intelligence. To<br />

fulfill this need, the SITE <strong>Intelligence</strong> Group offers its Monitoring Service, which provides numerous daily<br />

translations of terrorist propaganda and multimedia from primary source terrorist websites.)<br />

https://www.siteintelgroup.com/_layouts/SiteIntel/aboutsite.aspx?setnav=About%20SITE<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong>: A Strategic Enabler Of National Security<br />

http://se1.isn.ch/serviceengine/FileContent?serviceID=PublishingHouse&fileid=B5D36B62-0E20-BC0B-<br />

DD2E-C12E73D54892&lng=en<br />

Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (awesome site for the<br />

open source analyst) http://www.onstrat.com/osint/<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Support<br />

National Virtual Translation Center (The National Virtual Translation Center (NVTC) was<br />

established in February, 2003 " for the purpose of providing timely and accurate translations of foreign<br />

intelligence for all elements of the <strong>Intelligence</strong> Community.) http://www.nvtc.gov/<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Training<br />

Department Of Homeland Security (requires password)<br />

I have nothing but good things to say about these folks; they provide a superb service. I have<br />

taken all the courses below to include several webinar training sessions and I highly recommend them to<br />

the serious open source analyst.<br />

https://www.intelink.gov/sites/dhs-ose/training/default.aspx<br />

Module 1 - The Value and Definition of <strong>Open</strong> <strong>Source</strong><br />

Module 2 - Assessing Reliability of <strong>Source</strong>s<br />

Module 3 - Search Engines<br />

Module 4 - The Deep Web<br />

Module 5 - The Use of RSS<br />

Module 6 - Social Bookmarking<br />

Module 7 - Introduction to Anonymization<br />

Module 8 - Intelink<br />

Module 9 - <strong>Open</strong><strong>Source</strong>.gov<br />

Module 10 - Non-Internet <strong>Open</strong> <strong>Source</strong><br />

Module 11 - Blogosphere<br />

Module 12 - Virtual Worlds New!!<br />

117


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Toddington Training Solutions http://training.toddington.com/<br />

Proposed Training http://www.reuser.biz/<br />

International Relations And Security Network http://www.isn.ethz.ch/edu/training/osint.cfm<br />

InfoSphere http://www.infosphere.se/extra/pod/?id=142&module_instance=1&action=pod_show<br />

http://www.infosphere.se/extra/pod/?id=117&module_instance=1&action=pod_show<br />

<strong>Open</strong> <strong>Source</strong> Solutions http://www.oss.net/<br />

<strong>OSINT</strong> Training Ltd http://www.linkedin.com/in/osint<br />

<strong>OSINT</strong> Training http://opensourceintelligencetraining.com/index.htm<br />

INSCOM <strong>Intelligence</strong> Analyst Training Program https://www.us.army.mil/suite/portal/index.jsp<br />

The idea with this training course is to help students understand how to gain intelligence on<br />

people or organizations using Internet based open source intelligence. Although the course is presented<br />

by Paterva the course does not center just on Maltego technology. The training course focuses on the<br />

underlying technology and tecniques and tries to give students insight in how the tool collects and<br />

correlates the information. http://www.paterva.com/web4/index.php/services<br />

<strong>OSINT</strong> Exploitation and The Criminal Threat<br />

This section is devoted to technology that is very easily exploitable by criminals. I use the word “criminal”<br />

as an umbrella term for anything from gangs to terrorists, human/drug/weapon smugglers to burglars, and<br />

anything in between. In other words, it is all-encompassing. It is not difficult to think like a criminal; all of<br />

us have at some point thought about doing something cruel. But for the most part we do not carry out our<br />

thoughts into action because we are law abiding citizens and we are rational people. Think about the time<br />

when a neighbor, a friend, girlfriend, boyfriend, or relative did something to displease us. Human nature,<br />

and psychology, says get even and do something back. But again, we are rational people. What I am<br />

trying to drive here is the point that all of us are capable of evil thought and it does not matter who we are.<br />

We just don’t admit to it. Remember Jimmy Carter and lust; not necessarily evil though. How about Bill<br />

Clinton and “I did not inhale “. They admitted to things in the hope that by doing this they would get<br />

positive results but instead those innocent comments came back to haunt them and they became the butt<br />

end of jokes. So, go ahead! Think like a human or drug smuggler. Think like a terrorist. Think like a gang<br />

banger. Think like a drug cartel boss. But most of all think! How can I exploit technology to further my<br />

criminal enterprise? By doing this brand of thinking you help law enforcement counter the threat whatever<br />

it may be or at least make them aware of the type of countermeasures to employ.<br />

Why is it that most of the <strong>OSINT</strong> discussions are held behind firewalls and there is a requirement for<br />

passwords to access the subject? No, enough! I am going out on a limb and invite all to it. What a<br />

contradiction in terms. <strong>Open</strong> source but yet very hush, hush. We are not fooling anyone. Even criminals<br />

know how to exploit open source information and create intelligence from it. When I told a good friend of<br />

mine of what I intended to do, this is what he had to say. “We are not dealing with ignorant or stupid<br />

people. These people come from our professions, the computer industry, are computer engineers, etc. If<br />

you check open source you will see the bad guys asking for people with these skills. Not putting the<br />

information out in the open or in a book because the bad guys will find out and use it is only for those that<br />

are new to the game, do not understand the criminal element or their MO. In addition not having this<br />

information will hinder us as the new people to the game may not even know we know... Bad guys leave<br />

trails when they get sloppy and they do.”<br />

Personal Drones: When and where does it end? That is, making it easier for the enemy. Let’s go<br />

beyond celebrity stalking and spying on your neighbors. Drug Cartels, human and drug smugglers are<br />

always on the lookout for anything that will make their activities more successful. Let’s role play: I am a<br />

smuggler (humans or drugs) and I have lookouts on high hills overlooking the border fence reporting<br />

activities back to me, however, they are static and cannot maneuver from their high points. I can utilize<br />

drones to hover over the fence/border for 360 degree coverage. I can see where the Border Patrol vehicle<br />

is on the other side of the fence; something my lookout even on a high point cannot observe. I can also<br />

118


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

determine how long it takes for the patrol to make a round of the area. What else can I make out? What<br />

they look like and now I can make contact with them when they are off duty for possible bribery. The<br />

options are without limits. I have millions at my disposal. I will buy several for the kids along the border to<br />

enjoy flying while I interleave my own surveillance drone into the mix. I could also land mine on the other<br />

side to lay in wait and observe. Granted the batteries do not last long but I don’t need that much<br />

downtime. As soon as I observe what I need, I can bring my craft back over the fence and send another<br />

to lie in wait or do other types of collection. I can hire techies and have them experiment with the drones<br />

to extend their range and battery life. Does it sound far fetched? I don’t think so.<br />

Pandora’s Box<br />

http://www.dailymail.co.uk/sciencetech/article-1327343/Personal-recreation-drones-developed.html<br />

http://robotsrule.com/html/ar-parrot-drone.php?ref=drone1#video<br />

When The Drones Come Marching In<br />

http://techcrunch.com/2011/01/29/drones/#<br />

The Nano Humminbird http://www.avinc.com/<br />

http://www.engineeringtv.com/video/AeroVironment-Wasp-and-Switchbl<br />

Smartphone Applications<br />

Now here are two apps no self respecting terrorist or smuggler should be without; Compass and<br />

GpsCompassMap. My intentions are not of sounding heartless or to delve into the macabre but rather to<br />

point out the control criminals obtain with this technology. The following examples deal mostly with<br />

Google Earth and how it has been utilized by terrorists. With the newer applications one does not need<br />

the desktop or laptop computer but a simple smartphone with all the bells and whistles of a regular CPU.<br />

The other advantage is that you do not leave as large an electronic footprint. The smartphone GPS is<br />

turned on as needed to avoid detection. There are other ways also.<br />

No doubt you have heard or read about Iraqi insurgents having Google Earth imagery of British military<br />

bases (http://news.nationalgeographic.com/news/2007/03/070312-google-censor.html).<br />

There are indications that the gunmen who stormed Mumbai on November 26, and the people who<br />

trained them, were technically literate. The group appears to have used complex GPS systems to<br />

navigate their way to Mumbai by sea. They communicated by satellite phone, used mobile phones with<br />

several different SIM cards, and may have monitored events as the siege unfolded via handheld<br />

Blackberry web browsers<br />

(http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article5311241.ece).<br />

Israel’s fears in regards to Google Earth’s satellite imaging tools have come to fruition. Members of<br />

Palestine’s al-Aqsa Martyrs Brigade, a group aligned with the Fatah political party, has admitted to using<br />

Google Earth for mapping targets for rocket strikes. Khaled Jaabari, the group’s commander, has said<br />

that they are using Google Earth images to check details against their own maps in order to find sensitive<br />

areas that are vulnerable to strikes (http://mashable.com/2007/10/25/missile-attacks-israel-google-earth/).<br />

Compass – I have tried this one and although still a little quirky it gives GR8 results. I can just begin to<br />

imagine the ways a criminal can put this technology to use. It is accurate when it comes to the<br />

coordinates and addresses. I cross referenced it with Google Earth, also on my smartphone, and it is right<br />

119


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

on. Using those two in concert give excellent results. Very handy for a criminal away from built up areas<br />

where all they want are coordinates that can be saved and returned to at a later date. I think you get my<br />

implication here.<br />

GpsCompassMap – Another great little app. Combine Google Earth, Compass and this one and you<br />

have some power at your disposal. This one could replace Compass altogether but the more apps to<br />

cross check for accuracy, the better. Criminals are sure to fall in love with this one. It is extremely<br />

accurate. Went home for lunch and adjusted all the settings for the round-trip. It tells how many satellites<br />

are available and the number it is taking advantage of. Speed (miles, kilometers, knots, etc) of vehicle is<br />

very accurate as I compared it to my speedometer. As you leave the departure point the screen adjusts to<br />

show the entire track and at the end shows distance traveled. Geo coordiantes which change according<br />

to location are a great feature. Superb tool for smugglers on the Southwest (Arizona/Mexico) Border but<br />

that’s as far as I go.<br />

Untraceable Encrypted Blackberrys - Mexico has no reliable register of handsets, mobile numbers, or<br />

users. Vendors are unregistered and sell the phones and SIM cards for cash, no questions asked. In<br />

other words, the cartels have nothing to worry about until such a time that Mexico makes strides to<br />

establish an official registry. (http://www.theage.com.au/national/bikies-trafficking-in-data-secrecy-usingmexican-blackberrys-20110205-1aht9.html)<br />

<strong>Open</strong> <strong>Source</strong> Software<br />

(necessary for the sharing of all forms of information)<br />

The Free Software Portal http://en.wikipedia.org/wiki/Portal:Free_software<br />

STRONG ANGEL TOOZL http://www.strongangel3.net<br />

Operations Security (OPSEC)<br />

Government contractor Frazier-Masonry provides detailed photographs of some of their contract<br />

work. Clients include Navy SEALS, NCIS, Marine Corp Special Operations Command West, EOD and<br />

various other agencies in and around Southern California. The work of these mostly U.S. Navy agencies<br />

is highly sensitive and the release of such photos, which reveal location, building lay-out and structural<br />

nature is a serious violation of Operational Security(OPSEC). Posted on social networking site.<br />

http://cryptome.org/0001/frazier.htm<br />

http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x6407146<br />

Organized Crime<br />

Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/orgcrime.htm<br />

Organized Crime Web <strong>Link</strong>s http://www.yorku.ca/nathanson/<strong>Link</strong>s/links.htm#General_Overview<br />

http://www.yorku.ca/nathanson/default.htm<br />

Organized Crime Database Search http://www.yorku.ca/nathanson/search.htm<br />

Organized Crime Selected Resources<br />

http://www.questia.com/Index.jsp?CRID=organized_crime&OFFID=se5<br />

120


Pakistan<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Pakistan’s Tribal Belt Interactive Map http://www.cfr.org/publication/18405/<br />

Wikileaks http://wikileaks.org/wiki/Category:Pakistan<br />

Pakistan Airport Guide<br />

http://www.the-airport-guide.com/search.php?by=country&search=Pakistan<br />

Pakistan Maps http://www.nps.edu/Programs/CCS/Pakistan_Index.html<br />

Pakistan Airports And Bases http://eyeball-series.org/pk-bases/pk-bases.htm<br />

Pakistan<br />

https://www.intelink.gov/sharepoint/osp/Pakistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Patriot Groups<br />

Patriot Groups in The United States and Their Geographical Locations<br />

http://www.pa-aware.org/who-are-terrorists/pdfs/C-13.pdf<br />

Anti Government Patriot Groups http://www.unitedstatesaction.com/anti-govt-patriot-groups.htm<br />

People Finder<br />

Piracy<br />

ZabaSearch http://www.zabasearch.com/<br />

ZoomInfo http://www.zoominfo.com/<br />

IceRocket http://www.icerocket.com/<br />

Spock http://www.spock.com/<br />

PeekYou http://www.peekyou.com/<br />

Pipl http://pipl.com/<br />

Wink http://wink.com/<br />

Maersk – Track ships in real time. (we certainly do make it easy for pirates!)<br />

http://www.maerskfleet.com/#live-map<br />

Ship Tracking http://www.sailwx.info/shiptrack/shiplocations.phtml<br />

Ships Map http://www.marinetraffic.com/ais/<br />

http://www.boat-project.com/cruises/ais.php<br />

VesselTracker http://www.vesseltracker.com/en/Googleearth.html<br />

http://www.digital-seas.com/<br />

Piracy Watch (interactive Map) http://vfdemo.idvsolutions.com/piracy/<br />

Operation Ocean Shield http://www.shipping.nato.int/CounterPir<br />

International Maritime Bureau Piracy Reporting Center<br />

http://www.icc-ccs.org/index.php?option=com_content&view=article&id=30&Itemid=12<br />

Piracy Map 2005 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />

4<br />

Piracy Map 2006 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />

3<br />

Piracy Map 2007 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />

2<br />

121


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Piracy Map 2008 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=89<br />

Piracy Map 2009 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=21<br />

9<br />

Piracy News http://www.iccccs.org/index.php?option=com_content&view=category&layout=blog&id=60&Itemid=51<br />

USCG Ship Traffic Density Plot http://www.amver.com/density.asp<br />

Combating Piracy http://www.hansonwade.com/events/combating-piracy-09/index.shtml<br />

Ports Worldwide<br />

<strong>Directory</strong> of Worldwide Ports http://sailings.to/ports-home.html<br />

Port Guide http://www.portguide.com/<br />

International Ports<br />

http://www.mesteel.com/cgi-bin/w3-msql/goto.htm?url=http://www.mesteel.com/countries/intl/ports.htm<br />

Port Index (this one is especially valuable when used in conjunction with Google Earth. Cut and<br />

paste the port names from the alphabetical listing into Google Earth for instant views)<br />

http://www.schednet.com/port_index/port_index.asp<br />

<strong>Link</strong>s to Worldwide Cargo Ports http://www.infomarine.gr/ports/<br />

Ports Worldwide http://www.anlloyd.be/Ports_worldwide/default.html<br />

http://www.sailorschoice.com/worldports/<br />

http://www.ilwu19.com/links/portlinks.htm<br />

Cargo Port <strong>Link</strong>s http://www.hal-pc.org/~nugent/port.html<br />

http://www.mesteel.com/cgi-bin/w3-msql/goto.htm?url=http://www.mesteel.com/countries/intl/ports.htm<br />

Propaganda (anti-U.S.)<br />

Camera/Iraq This site was active between 2004 and 2008 and it may still come in handy for research.<br />

Very much a propaganda site so read with caution.<br />

http://web.archive.org/web/*/http://www.camerairaq.com/2004/05/doctored_photos.html<br />

Public Data On Sex Offenders<br />

The Dru Sjodin National Sex Offender Public Website (NSOPW)<br />

http://www.nsopw.gov/Core/Conditions.aspx<br />

Sex Offenders http://www.criminalcheck.com/<br />

National Sex Offender Public Registry http://www.nsopr.gov/<br />

Valuations and Data for 65,000,000 + Homes (ever wonder why a person with no means of<br />

high income lives in a mansion?) Could it be criminal activity? http://www.zillow.com/<br />

Family Watchdog http://www.familywatchdog.us/<br />

Arizona http://az.gov/webapp/offender/searchZip.do<br />

Florida Sexual Offenders and Predators http://offender.fdle.state.fl.us/offender/homepage.do<br />

Public <strong>Intelligence</strong><br />

A note to everyone: This site publishes documents that have been discovered through open<br />

source methods available to any member of the public. It includes U/FOUO, U/LES, U/FOUO/LES, and<br />

other classifications. However, with the recent release of documents by WikiLeaks I can understand how<br />

122


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

some may feel about releasing more sensitive material. I will not publish any of the material here but<br />

direct you to the site. I will remove this category if you feel too much is being released.<br />

http://publicintelligence.net/<br />

Rail<br />

Amtrak http://www.amtrak.com/servlet/ContentServer?pagename=Amtrak/HomePage<br />

Federal Railroad Administration http://www.fra.dot.gov/<br />

Freight World http://www.freightworld.com/railroads.html<br />

Metra Rail http://www.metrarail.com/<br />

Military Rails http://military.railfan.net/<br />

New York City Transit http://www.mta.nyc.ny.us/nyct/<br />

North American Passenger and Urban Transit<br />

http://www.railserve.com/Passenger/North_America/<br />

Freight Product Information by State http://www.tomorrowsrailroads.org/industry/moving.cfm<br />

Short Line Railroads http://www.uprr.com/customers/shortline/lines/index.shtml<br />

Railroads Page http://www.tours.com/railroads.php<br />

Rail Industry <strong>Link</strong>s http://www.railindustry.com/industry/pages/<br />

Reference/Research Tools<br />

PDF Queen http://www.pdfqueen.com/<br />

Bates Information Services (provides GR8 tips for doing research)<br />

http://batesinfo.com/Writing/Archive/Archive/feb2010.html<br />

Dictionary for translations http://freedict.com/<br />

Dictionary http://dictionary.reference.com/<br />

Thesaurus http://thesaurus.reference.com/<br />

Translator http://dictionary.reference.com/translate/text.html<br />

Encyclopedia http://encyclopedia.com/<br />

Online Encyclopedia http://www.neohumanism.org/<br />

Fast Facts http://www.refdesk.com/facts.html<br />

http://www.refdesk.com/fastfact.html<br />

http://www.freepint.com/gary/handbook.htm<br />

Foreign Words http://foreignword.com/<br />

Librarians Index to the Internet http://lii.org/<br />

One Look Dictionary Search http://onelook.com/<br />

WEB Translation http://www.online-translator.com/srvurl.asp?lang=en<br />

ProQuest http://proquest.umi.com/pqdweb<br />

Translating Dictionaries http://dictionaries.travlang.com/<br />

Word Reference http://wordreference.com/<br />

World Fact Book http://worldfactbook.com/<br />

Your Dictionary http://yourdictionary.com/<br />

Encyclopedia Of The Orient http://i-cias.com/e.o/index.htm<br />

Reference Desk: The Single Best <strong>Source</strong> For Facts http://refdesk.com/<br />

Reference, Facts Look-up, & Library Resources http://www.harrold.org/rfhextra/referenc.html<br />

Religions (see Also Demographics & Religions)<br />

Adherents http://www.adherents.com/<br />

123


Russia<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Major Religions of the World http://www.adherents.com/Religions_By_Adherents.html<br />

Religion Studies http://www.foreignpolicy.com/resources/links.php?cat=35<br />

Russian Military Analysis http://warfare.ru/?linkid=2280&catid=255<br />

Military Website http://warfare.ru/?<br />

Russian Weaponry http://www.youtube.com/watch?v=i0ErfRVHPYE&feature=related<br />

Central Asia http://www.nps.edu/Programs/CCS/Central_Asia_index.html<br />

Russia<br />

https://www.intelink.gov/sharepoint/osp/Russia%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

Russian Strategic Nuclear Forces http://www.russianforces.org/<br />

GRU Spetsnaz Army http://www.spets.dk/spets_stofmrk.htm<br />

Russian Ground Forces http://en.wikipedia.org/wiki/Russian_Ground_Forces<br />

Armed Forces Of The Russian Federation<br />

http://en.wikipedia.org/wiki/Armed_Forces_of_the_Russian_Federation<br />

Russian Strategic Nuclear Forces http://russianforces.org/<br />

Russian Military Bases http://www.kommersant.com/p766827/Russia,_military_bases/<br />

Moscow Region http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_4.gif<br />

http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_5.gif<br />

Missile Strategic Forces http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_0.gif<br />

Space Forces http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_1.gif<br />

Airborne Forces http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_2.gif<br />

World’s Armed Forces Forum http://www.network54.com/Forum/211833/page-11<br />

Russian Analytical Digest http://www.isn.ethz.ch/news/rad/<br />

Russian Air Force Order Of Battle http://www.scramble.nl/ru.htm<br />

Russian Navy Order Of Battle http://www.rkka.org/russiran/russnavy.html<br />

Russian Army Order of Battle – 1996<br />

http://www.fas.org/nuke/guide/russia/agency/army-oob.htm<br />

Russian Order Of Battle <strong>Link</strong>s http://demo.carrot2.org/demotable/search?in=Web&q=russian+order+of+battle&s=100&alg=Lingo&opts=h<br />

Russian Collectibles https://www.collectrussia.com/index.cfm<br />

http://www.sovietawards.com/forum/vbclassified.php?s=022589c82ee918a1bc349bd20683482a&do=ad&id=166<br />

http://www.soviet-awards.com/<br />

Satellite and Space Views (real time)<br />

Satellite and Space Views http://www.leonardsworlds.com/info/satellite.htm<br />

Space Imaging http://spaceimaging.com/<br />

Real Time Satellite Tracking http://www.n2yo.com/?s=24786<br />

Search Engines & Meta Search Engines<br />

(includes Arabic And Other Language Search Engines)<br />

Powerset – technology that attempts to mine meaning out of web pages -- specifically,<br />

Wikipedia articles. This isn't a general-purpose search engine, but it is a tremendous tool if you are<br />

looking for information on a subject that spans a number of Wikipedia articles, or that has a number of<br />

meanings. http://www.powerset.com/<br />

Hakia – Same as Powerset above. http://www.hakia.com/<br />

124


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

The Top 100 Alternative Search Engines<br />

http://www.readwriteweb.com/archives/top_100_alternative_search_engines_mar07.php<br />

http://altsearchengines.com/2007/12/31/top-100-alternative-search-engines-of-the-year/<br />

Search Engine Watch (tips on conducting good searches)<br />

http://searchenginewatch.com/sereport/<br />

International Search Engines http://www.arnoldit.com/lists/intlsearch.asp<br />

Search Engine Listing http://www.arnoldit.com/lists/searchlist.html<br />

Search Engines of The World<br />

http://www.escapeartist.com/Search_Engines/Search_Engines.html<br />

Search Engine Colossus http://www.searchenginecolossus.com/<br />

Quick Click To Search Engines http://www.aresearchguide.com/2quick.html<br />

Ixquick (It can search in 17 languages, including Chinese and Turkish) http://www.ixquick.com/<br />

ResearchBuzz (designed to cover the world of Internet research)<br />

http://www.researchbuzz.org/wp/<br />

Country Based Search Engines http://www.philb.com/countryse.htm<br />

SearchEzee http://www.searchezee.com/<br />

QuickFindIt http://www.quickfindit.com/<br />

All Search Engines http://www.allsearchengines.com/<br />

Foreign Search Engines http://www.allsearchengines.com/foreign.html<br />

Search.Com http://www.search.com/<br />

Meta Crawler http://www.metacrawler.com/<br />

Pandia Search Central http://www.pandia.com/<br />

Mamma The Mother Of All Search Engines http://www.mamma.com/<br />

Weblog Search Engines http://www.daypop.com/<br />

http://www.blogsearchengine.com/<br />

http://www.blogdigger.com/<br />

http://www.technorati.com/<br />

Search Engine Optimization http://www.seochat.com/<br />

KartOO (is a metasearch engine with visual display interfaces. When you click on OK, KartOO<br />

launches the query to a set of search engines, gathers the results, compiles them and represents them in<br />

a series of interactive maps through a proprietary algorithm. http://www.kartoo.com/en_index.htm<br />

Quintura http://www.quintura.com/<br />

Country Based Search Engines http://www.philb.com/countryse.htm<br />

Search Engine Guide http://www.searchengineguide.com/<br />

Webbrain (results in tree structure) http://www.webbrain.com/html/default_win.html<br />

ChaCha http://www.chacha.com/<br />

Dog Pile http://www.dogpile.com/<br />

Zuula (takes advantage of 16 search engines) http://www.zuula.com/<br />

Planetsearch (takes advantage of 16 search engines) http://www.planetsearch.com/<br />

GoshMe (You may not know but there are more than half a million search engines out there on<br />

the Internet, with exclusive content and features. GoshMe will be the way to discover them, and even<br />

better, the key to know when and how to use them.) http://www.goshme.com/login.jsp<br />

Yahoo Short Cur Cheat Sheets http://help.yahoo.com/help/us/ysearch/tips/tips-01.html<br />

WayBack Machine (Browse through over 150 billion web pages archived from 1996 to a few<br />

months ago. To start surfing the Wayback, type in the web address of a site or page where you would like<br />

to start, and press enter. Then select from the archived dates available. The resulting pages point to other<br />

archived pages at as close a date as possible. Keyword searching is not currently supported.) Note: If you<br />

find some links in this handout that no longer work you can get some practice with this site. Copy and<br />

paste the URL that is no longer active into the wayback machine. This should take you back to how the<br />

web page existed. Then by using keywords it’s possible you may be able to reach the new site with new<br />

and updated content. http://www.archive.org/web/web.php<br />

Search Engine For Arabic Speakers http://www.ayna.com/<br />

SearchMash http://www.searchmash.com/<br />

CrossEngine http://www.crossengine.com/<br />

125


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Factbites (A search engine that is calibrated for searchers rather than for surfers. I don't want to<br />

find the hottest web site about Britney Spears; I want information on best practices for call centers, or<br />

background on the California mortgage industry.) http://www.factbites.com/<br />

Intelways (Intelways.com, formerly CrossEngine and before that, mrSAPO, isn't a metasearch<br />

engine; you type in your query and then select which search engine to use. Intelways provides one-click<br />

access to around 300 different search tools, organised by broad channels.) http://www.intelways.com/<br />

Alt Search Engines http://altsearchengines.com/archives/<br />

http://altsearchengines.com/wp-content/uploads/2007/11/the-top-100-alternative-search-enginesnovember-2007.pdf<br />

Goshme http://beta3.goshme.com/<br />

Taya It (Arabic) Tayait offers their users the ability to search in the following language modes:<br />

Morphological Search: Results include all inflictions of the keyword. Expanded Search: Results include<br />

all derivatives of the keyword. Synonyms (Thesaurus): Return all synonyms and dialectical variants.<br />

Cross Language: The ability to input English words to search through Arabic Documents Phrase: The<br />

ability to link multiple keywords more loosely or tightly. http://www.tayait.com/<br />

YamLi (Arabic) http://www.yamli.com/<br />

Ayna (Arabic) http://www.ayna.com/<br />

Araby (Arabic) http://www.araby.com/<br />

Le Moteur (French) http://lemoteur.orange.fr/<br />

Carrot Clustering Engine An open source search-results-clustering engine, just recently out in<br />

beta. In a nutshell, it takes search results, analyzes them and, on the fly, creates groups of the most<br />

common concepts or terms from those results. Since this is all done by algorithms rather than by humans,<br />

expect the odd result every once in a while. (BatesInformation Services, www.BatesInfo.com/tip.html)<br />

http://demo.carrot2.org/demo-stable/main<br />

Tianamo has developed a visually search engine that represents your search results as a terrain<br />

map. You decide if it has utility. http://search.tianamo.com/index2.php<br />

Semantics – in a nutshell, the study of words. Great site of 302 semantic web videos and<br />

podcasts. http://www.semanticfocus.com/blog/entry/title/302-semantic-web-videos-and-podcasts/<br />

Secret Armies<br />

Secret Armies http://www.secretarmies.com/index.html<br />

Secure Email<br />

Perfectly Private http://www.perfectlyprivate.com/<br />

Hush Mail https://www.hushmail.com/?PHPSESSID=bf416cbe6609e186dd2a7da3720296f4<br />

Mail2WEB http://mail2web.com/<br />

Crypto Heaven http://www.cryptoheaven.com/secure-email.htm<br />

The Case For Secure Email http://luxsci.com/extranet/articles/email-security.html<br />

Shopping Malls<br />

List of shopping malls in the United States<br />

http://en.wikipedia.org/wiki/List_of_shopping_malls_in_the_United_States<br />

Mall of America http://www.mallofamerica.com/<br />

Shopping Mall Studies http://www.easternct.edu/depts/amerst/Malls.htm<br />

Largest Shopping Malls in The US http://www.easternct.edu/depts/amerst/MallsLarge.htm<br />

126


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Social Engineering<br />

Social engineering is the act of manipulating people into performing actions or divulging<br />

confidential information. The term typically applies to trickery or deception for the purpose of information<br />

gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with<br />

the victim.<br />

Social Engineering Fundamentals, Part I: Hacker Tactics<br />

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics<br />

Social Engineering Fundamentals, Part II: Combat Strategies<br />

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies<br />

Social Networking<br />

Social networking sites can be especially useful for the analyst. Many of the sites are used by<br />

terrorists, gangs, criminals and others with less than honorable intentions. Careful analysis of these open<br />

source worlds can yield intelligence you never knew existed. Like a jigsaw puzzle, you may have to visit<br />

several sites (as the enemy does to post bits and pieces of information so as to not leave a trail) to bring it<br />

all together. This is the heart of analysis: bringing it all together to monitor the beat.<br />

Social Media Training Sites http://kommein.com/25-free-online-social-media-classes/<br />

http://kommein.com/25-social-media-how-tos-resources-tutorials-and-lessons/<br />

http://www.newsu.org/<br />

http://www.afspc.af.mil/shared/media/document/AFD-100521-024.pdf<br />

http://www.defense.gov/socialmedia/education-and-training.aspx/<br />

http://businessjournalism.org/wp-content/uploads/2011/02/Social-Media-101-Handout.pdf<br />

http://businessjournalism.org/wp-content/uploads/2011/02/Social-Media-202-Handout.pdf<br />

http://businessjournalism.org/wp-content/uploads/2011/02/Social-Media-303-Handout.pdf<br />

http://businessjournalism.org/wp-content/uploads/2010/03/Soc-Media-handout.pdf<br />

U.S. Central Command http://www.centcom.mil/faq-on-security-for-social-media<br />

DoD Social Media Hub http://www.defense.gov/socialmedia/<br />

US Army Social Media Handbook 2011 http://www.slideshare.net/USArmySocialMedia/armysocial-media-handbook-2011<br />

US Army Official Blog http://armylive.dodlive.mil/index.php/category/social-media/<br />

National Nuclear Security Administration http://nnsa.energy.gov/mediaroom/socialmedia<br />

Department of Homeland Security http://www.dhs.gov/xabout/gc_1238684422624.shtm<br />

Military Home Front<br />

http://www.militaryhomefront.dod.mil/portal/page/mhf/MHF/MHF_HOME_1?section_id=20.110.500.10.0.0<br />

.0.0.0<br />

Indiana National Guard http://www.in.ng.mil/Home/SocialMediaHub/tabid/1120/Default.aspx<br />

West Point http://www.usma.edu/Dcomm/smedia/list.html<br />

NASA http://www.jpl.nasa.gov/social/<br />

Installation Management Command (IMCOM) http://www.imcom.army.mil/hq/about/news/<br />

Social Networking <strong>Intelligence</strong> Web Search. This is a custom Google search that goes through<br />

various social networking and other similar sites to maximize your intelligence search capabilities and<br />

efficiency by reducing the clutter and false positives you are likely to encounter when searching the web.<br />

http://www.google.com/cse/home?cx=013791148858571516042:ntbykhk-kus<br />

Kurrently - A real-time search engine for Facebook and Twitter (just for the heck of it, I searched for<br />

“drug cartels” and very interesting conversations were taking place) http://www.kurrently.com/<br />

SPY (spy can listen in on the social media conversations you're interested in. What do you want<br />

to listen for?) http://www.spy.appspot.com/<br />

Spokeo (not your grandmas phone book) http://www.spokeo.com/<br />

Searching for Saddam. A five-part series on how the U.S. military used social networking to<br />

capture the Iraqi dictator. http://www.slate.com/id/2245228/<br />

127


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Top Ten http://social-networking-websites-review.toptenreviews.com/<br />

List Of Social Networking Sites http://en.wikipedia.org/wiki/List_of_social_networking_websites<br />

2010 Social Network Analysis Report http://www.ignitesocialmedia.com/2010-social-networkanalysis-report/#mixx<br />

Software/Tools For The <strong>Open</strong> <strong>Source</strong> Analyst<br />

Badoo.com<br />

Bebo.com<br />

Digg.com<br />

Facebook.com<br />

Fark.com<br />

Flickr.com<br />

Flixster.com<br />

Foursquare.com<br />

Friendster.com<br />

Gather.com<br />

Habbo.com<br />

Hi5.com<br />

Iambored.com<br />

Identi.ca<br />

IndianPad.com<br />

Last.fm<br />

<strong>Link</strong>edin.com<br />

Livejournal.com<br />

Meetup.com<br />

Metafilter.com<br />

Mixx.com<br />

Multiply.com<br />

Myspace.com<br />

Netlog.com<br />

Newsvine.com<br />

Ning.com<br />

Plaxo.com<br />

Plurk.com<br />

Propeller.com<br />

Reddit.com<br />

Reunion.com<br />

Shoutwire.com<br />

Skyrock.com<br />

Stumbleupon.co<br />

m<br />

Teamsugar.com<br />

Tribe.net<br />

Tuenti.com<br />

Twitter.com<br />

Wayn.com<br />

Xanga.com<br />

Yelp.com<br />

YouTube.com<br />

Addict-O-Matic (instantly create a custom page) http://addictomatic.com/<br />

PasteLert (PasteLert is a simple system to search pastebin.com and set up alerts (like google<br />

alerts) for pastebin.com entries. This means you will automatically recieve email whenever your term(s)<br />

is/are found in new pastebin entries! http://www.andrewmohawk.com/pasteLert/<br />

Social Mention (real-time social media search and analysis) http://www.socialmention.com/<br />

Whos Talking http://www.whostalkin.com/<br />

128


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Kurrently - A real-time search engine for Facebook and Twitter (just for the heck of it, I searched for<br />

“drug cartels” and very interesting conversations were taking place) http://www.kurrently.com/<br />

Social Networking <strong>Intelligence</strong> Web Search. This is a custom Google search that goes through<br />

various social networking and other similar sites to maximize your intelligence search capabilities and<br />

efficiency by reducing the clutter and false positives you are likely to encounter when searching the web.<br />

http://www.google.com/cse/home?cx=013791148858571516042:ntbykhk-kus<br />

Analyst Toolbox:A Toolbox For The <strong>Intelligence</strong> Analyst<br />

http://it.ojp.gov/documents/analyst_toolbox.pdf<br />

22 Free Tools for Data Visualization and Analysis (There are many tools around to help turn data<br />

into graphics, but they can carry hefty price tags. The cost can make sense for professionals whose<br />

primary job is to find meaning in mountains of information, but you might not be able to justify such an<br />

expense if you or your users only need a graphics application from time to time, or if your budget for new<br />

tools is somewhat limited. If one of the higher-priced options is out of your reach, there are a surprising<br />

number of highly robust tools for data visualization and analysis that are available at no charge.)<br />

http://www.computerworld.com/s/article/9214755/Image_gallery_22_free_tools_for_data_visualization_an<br />

d_analysis<br />

Tool Category<br />

Multipurpose<br />

visualization<br />

Mapping<br />

Platform<br />

Skill<br />

level<br />

Data stored<br />

or processed<br />

Data Wrangler Data cleaning No No Browser 2 External server No<br />

Google Refine Data cleaning No No Browser 2 Local No<br />

R Project Statistical analysis Yes<br />

Google Fusion<br />

Tables<br />

With<br />

plugin<br />

Linux, Mac OS X, Unix,<br />

Windows XP or later<br />

4 Local No<br />

Visualization app/service Yes Yes Browser 1 External server Yes<br />

Impure Visualization app/service Yes No Browser 3 Varies Yes<br />

Many Eyes Visualization app/service Yes Limited Browser 1<br />

Tableau Public Visualization app/service Yes Yes Windows 3<br />

Public external<br />

server<br />

Public external<br />

server<br />

VIDI Visualization app/service Yes Yes Browser 1 External server Yes<br />

Zoho Reports Visualization app/service Yes No Browser 2 External server Yes<br />

Choosel Framework Yes Yes Chrome, Firefox, Safari 4<br />

Exhibit Library Yes Yes Code editor and browser 4<br />

Google Chart Tools<br />

JavaScript InfoVis<br />

Toolkit<br />

Library and Visualization<br />

app/service<br />

Yes Yes Code editor and browser 2<br />

Library Yes No Code editor and browser 4<br />

Protovis Library Yes Yes Code editor and browser 4<br />

Quantum GIS (QGIS) GIS/mapping: Desktop No Yes<br />

Linux, Unix, Mac OS X,<br />

Windows<br />

Local or external<br />

server<br />

Local or external<br />

server<br />

Local or external<br />

server<br />

Local or external<br />

server<br />

Local or external<br />

server<br />

Designed for<br />

Web<br />

publishing?<br />

Yes<br />

Yes<br />

Not yet<br />

Yes<br />

Yes<br />

Yes<br />

Yes<br />

4 Local With plugin<br />

<strong>Open</strong>HeatMap GIS/mapping: Web No Yes Browser 1 External server Yes<br />

<strong>Open</strong>Layers<br />

GIS/mapping: Web,<br />

Library<br />

<strong>Open</strong>StreetMap GIS/mapping: Web No Yes<br />

No Yes Code editor and browser 4<br />

Browser or desktops<br />

running Java<br />

3<br />

local or external<br />

server<br />

Local or external<br />

server<br />

TimeFlow Temporal data analysis No No Desktops running Java 1 Local No<br />

IBM Word-Cloud<br />

Generator<br />

Word clouds No No Desktops running Java 2 Local As image<br />

Yes<br />

Yes<br />

129


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Tool Category<br />

Multipurpose<br />

visualization<br />

Mapping<br />

Platform<br />

Skill<br />

level<br />

Data stored<br />

or processed<br />

Designed for<br />

Web<br />

publishing?<br />

Gephi Network analysis No No Desktops running Java 4 Local As image<br />

NodeXL Network analysis No No<br />

Excel 2007 and 2010 on<br />

Windows<br />

4 Local As image<br />

8 more free tools for data visualization and analysis<br />

http://blogs.computerworld.com/18212/8_more_free_tools_for_data_visualization_and_analysis<br />

GeoChat It is designed to enable self-organizing group communications by allowing users to link<br />

the field, headquarters, and the local community in a real-time, interactive conversation visualized on the<br />

surface of a map. GeoChat is a tool for group communications based on SMS, email, and Twitter. People<br />

use GeoChat to simplify team communications, logistics and data reporting, and they can extend their<br />

own software applications using the open APIs. GeoChat is a flexible open source group communications<br />

technology that lets team members interact to maintain shared geospatial awareness of who is doing<br />

what where — over any device, on any platform, over any network. GeoChat allows you and your team to<br />

stay in touch one another in a variety of ways: over SMS, over email, and on the surface of a map in a<br />

web browser. Whether you are sitting at a computer with a high-speed Internet connection, or on the go<br />

with your mobile phone, GeoChat lets you react to events on the ground with maximum agility, forming<br />

cross-organizational virtual teams on the fly, linking field to headquarters, and keeping everyone on your<br />

team connected, in sync, and aware of who is doing what, and where.<br />

http://instedd.org/technologies/geochat/<br />

New Tools of Military Soft Power http://www.nationaldefensemagazine.org/Pages/default.aspx<br />

Broadcast Television Tools to Help <strong>Intelligence</strong> Analysts Wade Through Data<br />

http://www.nationaldefensemagazine.org/archive/2011/March/Pages/BroadcastTelevisionToolstoHelpIntel<br />

ligenceAnalystsWadeThroughData.aspx<br />

Granted there are many units out there that do not have the budget to buy or subscribe to<br />

expensive analytical software, but this should not stop the analyst from doing his/her work. There are<br />

abundant resources of freebies that when used in conjunction with each other provide just as powerful<br />

analytical capabilities. I actually view this as a heavy plus (+). When we use expensive commercial<br />

versions of analytical software that give instantaneous analysis/gratification we tend to depend too much<br />

on the outcome and in many cases take the results for granted. When we do this we cheat ourselves from<br />

doing our own critical thinking and critical analysis for good predictive analysis. However, by taking<br />

advantage of the free (or very cheap) community versions and using them together we force ourselves to<br />

do more critical thinking/analysis because we are trying to determine what information to input into one<br />

program based on the output of another program.<br />

Recorded Future (scour the web, extract, analyze and rank, then explore the past, present and<br />

future.) https://www.recordedfuture.com/<br />

IP Locator (Find an Internet user’s geographic location without invading visitor’s privacy<br />

IP Locator Object is a multiplatform API that will help you understand your visitors better by<br />

geographical location. IP Locator Object provides a wealth of information you can use to geotarget.<br />

http://www.melissadata.com/dqt/ip-locator.htm<br />

Sample Output using IP Locator Object<br />

IP Address 216.231.3.166<br />

Latitude 33.4774<br />

Longitude -117.705<br />

130


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

ZIP 92624<br />

Region CALIFORNIA<br />

Name COX COMMUNICATIONS INC<br />

Domain COX.NET<br />

City Name DANA POINT<br />

Country UNITED STATES<br />

Abbreviation US<br />

Google Goggles. You have to try this one and see for yourself. My mind wandered as I gave this<br />

one a spin. Suppose a drug cartel member is interviewed in a strange location, however, in the distance<br />

you are able to distinguish a building and…. What if you found a note at a terrorist location in a different<br />

language. The possibilities are endless. Google Goggles lets you search Google using pictures from your<br />

camera phones. We take an image as input, and using several image recognition backends (object recognition,<br />

place matching, OCR, etc), we return relevant search results.<br />

http://www.google.com/mobile/goggles/#text<br />

Google Squared. Google Squared is an experimental tool that takes a category (like US presidents,<br />

roller coasters, or digital cameras) and attempts to create a starter "square" of information, automatically<br />

fetching and organizing facts from across the web. You can modify your square by removing rows and columns<br />

you don't like--or by adding new rows and columns and having Google Squared attempt to fetch the relevant<br />

facts. Verify and correct the facts in your square by exploring the original sources and investigating other<br />

possible values. If you're happy with your square you can save it and come back to it later. Google Squared<br />

does the grunt work for you, making research fast and easy. I use this one often. You can then export the<br />

results into an excel spreadsheet that you can then modify to suit your needs. Using this one in conjunction<br />

with Google Squared helps fill in the blanks. http://www.google.com/squared<br />

Google News Timeline is a web application that organizes information chronologically. It allows users<br />

to view news and other data sources on a zoomable, graphical timeline. You can navigate through time by<br />

dragging the timeline, setting the "granularity" to weeks, months, years, or decades, or just including a time<br />

period in your query (ie. "1977"). I queried MS-13 and was amazed at the results. Went back to 1996 and was<br />

able to do some raw trend analysis. Did the same thing with “California Gangs”. It will take patience.<br />

Available data sources include recent and historical news, scanned newspapers and magazines, blog posts<br />

and Twitter status messages, sports scores and various types of media like music albums and movies.<br />

Using this one in conjunction with Google Squared helps fill in the blanks.<br />

http://newstimeline.googlelabs.com/<br />

Maltego is an open source intelligence and forensics application. It will offer you timous mining<br />

and gathering of information as well as the representation of this information in a easy to understand<br />

format. Coupled with its graphing libraries, Maltego allows you to identify key relationships between<br />

information and identify previously unknown relationships between them. http://www.paterva.com/web5/<br />

ORA is a dynamic meta-network assessment and analysis tool developed by CASOS at Carnegie<br />

Mellon. It contains hundreds of social network, dynamic network metrics, trail metrics, procedures for<br />

grouping nodes, identifying local patterns, comparing and contrasting networks, groups, and individuals<br />

from a dynamic meta-network perspective. *ORA has been used to examine how networks change<br />

through space and time, contains procedures for moving back and forth between trail data (e.g. who was<br />

where when) and network data (who is connected to whom, who is connected to where …), and has a<br />

variety of geo-spatial network metrics, and change detection techniques. *ORA can handle multi-mode,<br />

multi-plex, multi-level networks. It can identify key players, groups and vulnerabilities, model network<br />

changes over time, and perform COA analysis. It has been tested with large networks (106 nodes per 5<br />

entity classes).Distance based, algorithmic, and statistical procedures for comparing and contrasting<br />

networks are part of this toolkit. http://www.casos.cs.cmu.edu/projects/ora/<br />

Computational Models and Social Network Tools<br />

131


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

http://www.casos.cs.cmu.edu/computational_tools/tools.html<br />

RFFlow is a powerful, yet easy to use, tool for drawing flowcharts, organization charts, and many<br />

other kinds of diagrams. You will quickly create professional-looking charts for documents, presentations,<br />

or the Web. 30 day free trial period; $49.00 thereafter for individual. http://rff.com/<br />

The Brain Simply type in your ideas. Drag and drop files and web pages. Any idea can be linked<br />

to anything else. Using your digital Brain is like cruising through a Web of your thinking. See new<br />

relationships. Discover connections. Go from the big picture of everything to a specific detail in seconds<br />

http://www.thebrain.com/<br />

Analysis Of Competing Hypotheses (ACH), Analysis of Competing Hypotheses is a simple model<br />

for how to think about a complex problem. It takes you through a process for making a well-reasoned,<br />

analytical judgment. It is particularly useful for issues that require careful weighing of alternative<br />

explanations of what has happened, is happening, or is likely to happen in the future. It helps you<br />

overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence analysis<br />

so difficult. ACH is grounded in basic insights from cognitive psychology, decision analysis, and the<br />

scientific method. It helps analysts protect themselves from avoidable error and improve their chances of<br />

making right calls. A free download. http://www2.parc.com/istl/projects/ach/ach.html<br />

SPY (spy can listen in on the social media conversations you're interested in. What do you want<br />

to listen for?) http://www.spy.appspot.com/<br />

Spokeo (not your grandmas phone book) http://www.spokeo.com/<br />

Silobreaker (for those familiar with Analyst Notebook, I think you’ll like this)<br />

http://www.silobreaker.com/<br />

Evolution (It has applications in forensic investigations, law enforcement, intelligence<br />

operations, identity fraud, and identity verification processes). Download the free community edition. It is<br />

not as powerful as the commercial version, which is also very expensive, but has great utility when used<br />

in conjunction with other free sites like Silobreaker. http://www.paterva.com/web2/<br />

A Periodic Table of Visualization Methods (If you've ever wondered how to model something, or<br />

were looking for new ideas for segmenting and presenting complex concepts, this is an incredible online<br />

resource. A neat graphical explanation and example of each "element" (ex; a cycle diagram) appears as<br />

soon as your cursor scrolls over them. For instance, they've color-coded their categories: data, metaphor,<br />

concept, strategy, information, and compound visualisation techniques. As if that were not enough to<br />

spark your brain, the creators also provide clues as to whether the model works best for convergent or<br />

divergent thinking, and whether it is more for an overview vs. detailed perspective.)<br />

http://www.visual-literacy.org/periodic_table/periodic_table.html<br />

Sentinel Visualizer (for those of you who have experience with Crime <strong>Link</strong> and Analyst Notebook<br />

this one should be quite interesting. You can download a 45-day fully functional with all the bells and<br />

whistles copy and take it for a spin, and at the same time train yourself to use the software. It may come<br />

in handy down the road and you can always say you know how to use it) http://www.fmsasg.com/<br />

The Best Ever Freeware Utilities http://www.techsupportalert.com/<br />

Ideas Worth Spreading: Imagine what the open source analyst has at his/her disposal with this<br />

type of technology. View the video and see what I mean http://www.ted.com/index.php/talks/view/id/129<br />

Free Antivirus And Spyware Software http://free.grisoft.com/doc/5390/us/frt/0<br />

Want Your Own Blog? It’s Easy. It’s Free https://www.blogger.com/start<br />

http://wordpress.com/<br />

TOR Anonymizer http://www.torproject.org/<br />

Images (convert 2D to 3D online for free) The 3D face reconstruction may have utility if you only<br />

have a frontal face shot of a suspect.<br />

http://sourcesandmethods.blogspot.com/2008/02/convert-2d-to-3d-online-for-free.html<br />

http://make3d.stanford.edu/<br />

132


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Semantics – in a nutshell, the study of words. Great site of 302 semantic web videos and<br />

podcasts. http://www.semanticfocus.com/blog/entry/title/302-semantic-web-videos-and-podcasts/<br />

NNDB Mapper (a visual tool for exploring the connections between people in NNDB, linking them<br />

together through family relations, corporate boards, movies and TV, political alliances, and shadowy<br />

conspiracy groups. Maps can be saved and shared for others to explore.) http://www.nndb.com/<br />

Generate Maps of the Blogosphere (Generate animated clickable maps of connected blogs from<br />

Blogger . Simply enter the URL of a blog website to start mapping.<br />

http://www.lococitato.com/blogger_map/blogger_map.html<br />

http://www.lococitato.com/<br />

TouchGraph Google Browser (The touch graph google browser reveals the network of<br />

connectivity between websites, as reported by Googles database of related websites)<br />

http://www.touchgraph.com/TGGoogleBrowser.html<br />

SquidMat (The program compares two or more courses of action based on two or more<br />

evaluation criteria. The user arranges the evaluation criteria in descending order of importance and tells<br />

the program how much more important each criterion is than the next lower criterion. These importance<br />

ratings are used to calculate weights for each criterion. SquidMat takes user-supplied values for each<br />

course-of-action/criterion combination and converts them to Z scores. Using the criterion weights, the<br />

program calculates weighted sums for each course of action. The course of action with the highest<br />

weighted sum is considered to be the best. http://faculty.tamu-commerce.edu/jmstauffer/Squidmat/<br />

Decision Matrix Software Download http://www.dcswift.com/military/software.html<br />

NNDB Tracking the Entire World. Not sure if this one has any utility but I throw it in for your<br />

perusal. I had fun with Fidel Castro, Hugo Chavez and Vladimir Putin. NNDB is an intelligence aggregator<br />

that tracks the activities of people we have determined to be noteworthy, both living and dead.<br />

Superficially, it seems much like a "Who's Who" where a noted person's curriculum vitae is available (the<br />

usual information such as date of birth, a biography, and other essential facts.). But it mostly exists to<br />

document the connections between people, many of which are not always obvious. A person's otherwise<br />

inexplicable behavior is often understood by examining the crowd that person has been associating with.<br />

http://www.nndb.com/<br />

Visualization Software: Analysts are great when it comes to understanding relationships. Visual<br />

results jump right at you. If they can query a search engine that produces results in a relational (visual)<br />

format, they immediately grasp the information and start drawing conclusions. Visual results are more<br />

appealing than endless lists of browsing results which are extremely time consuming even when doing<br />

key word searches.<br />

Viewzi is a metasearch engine. It searches not only Google and Yahoo, but also Flickr, YouTube<br />

and other great sources of information to present the search results blended in different “flavors”. You not<br />

only get one, but seemingly countless ways to view your search results, each using thubmnail images,<br />

screenshots and more as visual aids http://www.viewzi.com/<br />

NeXplore lets you choose between three ways of viewing search results. For starters, there is the<br />

regular list of web search results: Title, description and URL. But you get much more than that. Thumbnail<br />

images and pop-up previews which make it easier to browse the search result and decide which to click.<br />

http://www.nexplore.com/<br />

TouchGraph http://touchgraph.com/TGGoogleBrowser.html<br />

Quintura http://quintura.com/<br />

Steganography and Terrorists<br />

Steganography is the science of writing hidden messages in such a way that no one apart from<br />

the sender and intended recipient even realizes there is a hidden message.<br />

Sunday, July 31, 2011<br />

In 2010 Moscow communicated with a ring of alleged spies in America by encoding instructions in<br />

otherwise innocent-looking images on public websites. It’s a process called steganography.<br />

Steganography is a smart way to hide data into other files, called carriers. Modified carriers will look like<br />

133


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

the original ones, without perceptible changes. The advantage of steganography, over cryptography<br />

alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages will<br />

arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.<br />

Today we can use some free tools to create covert transmission for any sensitive data or to protect your<br />

copyright.<br />

Protecting files copyright is by using Watermarking which is the process of embedding information into a<br />

digital signal which may be used to verify its authenticity or the identity of its owners. Still images, video,<br />

music, text, and software are all easily copied and illegally distributed, causing the authors to lose out on<br />

considerable income in royalties.<br />

By embedding identifying information in a file, watermarking software enables authors to control the<br />

distribution of and to verify ownership of their digital information.<br />

The first tool is <strong>Open</strong>Puff a freeware steganography tool for Microsoft Windows created by Cosimo<br />

Oliboni and still maintained as independent software author.<br />

The program is notable for being the first steganography tool (version 1.01 released on December 2004)<br />

that:<br />

� Let’s users hide data in more than a single carrier file. When hidden data are split among a set of<br />

carrier files you get a carrier chain, with no enforced hidden data theoretical size limit (256Mb,<br />

512Mb… depending only on the implementation)<br />

� Implements 4 layers of hidden data obfuscation (cryptography, scrambling, whitening and<br />

encoding)<br />

� Extends deniable cryptography into deniable steganography<br />

The current version is <strong>Open</strong>Puff 3.40 and released on the 18th of July.<br />

Another interesting tool is QuickStego which lets you hide text in pictures so that only other users of<br />

QuickStego can retrieve and read the hidden secret messages.<br />

Once text is hidden in an image the saved picture is still a ‘picture’, it will load just like any other image<br />

and appear as it did before.<br />

The image can be saved, emailed, uploaded to the web as before, the only difference will be that it<br />

contains hidden text<br />

QuickStego Software Free Steganography Software by QuickCrypto<br />

http://quickcrypto.com/free-steganography-software.html<br />

https://www.infosecisland.com/blogview/15439-<br />

Steganography-and-Digital-Watermarking-Tools.html<br />

Steganography & Digital Watermarking - Information Hiding http://www.jjtc.com/Steganography/<br />

What is Steganography? http://www.stegoarchive.com/<br />

OutGuess http://www.outguess.org/<br />

Bin Laden: Steganography Master? http://www.wired.com/news/politics/0,1283,41658,00.html<br />

Steganography Software http://www.securekit.com/<br />

Terrorists Use of Steganography http://www.brendastardom.com/arch.asp?ArchID=48<br />

Steganography: A New Age of Terrorism<br />

http://www.giac.org/practical/GSEC/Stephanie_Betancourt_GSEC.pdf<br />

Did The Hijackers Hide Their Messages? http://www.y2k.msnbc.com/id/3067670/<br />

Steganography: High-Tech Hidden Messages<br />

http://enterprisesecurity.symantec.com/article.cfm?articleid=1314&PID=11610559&EID=0<br />

134


Sudan<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

When a Picture Is Worth a Thousand Secrets: The Debate Over Online Steganography<br />

http://www.benton.org/publibrary/digitalBeat/db103101.html<br />

Steganography for Dummies http://www2.cio.com/research/security/edit/a08012006.html<br />

Conference Papers http://www.jjtc.com/stegdoc/stegdoc.html<br />

Hide And Encrypt Your Files http://www.makeuseof.com/tag/become-a-secret-steganographer/<br />

http://www.makeuseof.com/tag/2-ways-to-hide-porn-important-folders/<br />

Eyes On Darfur http://eyesondarfur.org/index.html<br />

Suicide Bombers<br />

Understanding Suicide Terrorism http://www.interdisciplines.org/terrorism/papers/1<br />

http://www.interdisciplines.org/terrorism<br />

The Cult Of The Suicide Bomber<br />

http://www.independent.co.uk/news/fisk/robert-fisk-the-cult-of-the-suicide-bomber-795649.html<br />

Profiling Islamic Suicide Terrorists http://www.cpt-mi.org/pdf/profiling_arab_terr.pdf<br />

The Face of Terror: Confessions of a Failed Suicide Bomber (video)<br />

http://newsweek.washingtonpost.com/postglobal/islamsadvance/2008/03/suicide_bomber_interview_afgh<br />

anistan.html<br />

Muslim Female Fighters: An Emerging Trend<br />

http://www.jamestown.org/terrorism/news/article.php?articleid=2369824<br />

Female Suicide Bombers http://english.aljazeera.net/NR/exeres/F420CC21-<br />

DF4B-4DF6-AFCC-61C27FBBE851.htm?FRAMELESS=true&NRNODEGUID=%7bF420CC21-DF4B-<br />

4DF6-AFCC-61C27FBBE85<br />

http://www.youtube.com/watch?v=eSpH0wtwRzs<br />

http://www.youtube.com/watch?v=Up1yxJv8IkI<br />

Suicide Bomber Profile<br />

Following is a checklist for observing, reporting, responding and investigating suicide bombing incidents.<br />

It is not designed as a comprehensive or complete list of all considerations in these areas but is<br />

suggestive of the types of common concerns that may affect police and other emergency service<br />

responders. A noted authority on terrorism states that Israeli authorities and psychologists have carefully<br />

developed behavioral profiles that might help security personnel identify a potential suicide bomber. The<br />

following are among the most obvious signs of such persons according to this source.<br />

• The wearing of heavy clothing, no matter what the season. Long coats or skirts may be used to conceal<br />

explosive belts and devices.<br />

• An unusual gait, especially a robotic walk. This could indicate someone forcing or willing himself/herself<br />

to go through with a mission.<br />

• Tunnel vision. The bomber often will be fixated on the target and for that reason will look straight ahead.<br />

He or she also may show signs of irritability, sweating, tics, and other nervous behavior. (The Al Qaeda<br />

terrorist Ahmed Ressam, who was captured at a border crossing in Washington state while driving a car<br />

135


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

filled bomb-making materials, caught the attention of authorities because of his excessive sweating,<br />

furtive eyes, and other nervous movements.)<br />

• The appearance of being drugged. The suicide truck bomber who attacked the U.S. Marine Barracks in<br />

Beirut in 1983 had been drugged before the attack and was tied to the seat of his vehicle.<br />

• Signs of drug use - including, for example, enlarged pupils, fixed stare, and erratic behavior.<br />

• Bags or backpacks (used to carry explosives, nails, and other shrapnel). The bomber generally holds his<br />

or her bag or backpack tightly, sometimes gingerly, and may refuse to be separated from it.<br />

• A fresh shave—a male with a fresh shave and lighter skin on his lower face may be a religious Muslim<br />

zealot who has just shaved his beard so as not to attract attention, and to blend in better with other<br />

people in the vicinity.<br />

• A hand in the pocket or tightly gripping something—this could be someone clutching a detonator or a<br />

trigger for an explosive device. Such triggers, which may be designed in the form of button, usually are<br />

rather stiff so that they may not be set off accidentally. (One Israeli acquaintance described how he and<br />

several guards shot a would-be bomber numerous times, but found his twitching finger still on the<br />

button—and still posing a danger, thereafter.)<br />

• Evasive movements. It seems obvious that anyone who tries to avoid eye contact, or to evade security<br />

cameras and guards, or who appears to be surreptitiously conducting surveillance of a possible target<br />

location, may be a bomber.<br />

Such profiles are valuable not only for law enforcement personnel but for all persons who work in security<br />

or related fields in facilities or other locations that are potential targets or, where intelligence indicates an<br />

elevated risk of a terrorist attack. Programs throughout the United States have successfully recruited key<br />

personnel within the community to act as additional eyes and ears for law enforcement. Mall security<br />

officers for example have been introduced to the above type of profile information in order to more<br />

effectively spot potential terrorist threats. Similarly, community outreach programs provided training to<br />

other persons who are in positions where they are more likely to interact with terrorist cells or operatives,<br />

such as car rental agents, truck rental agents, security storage operators, hotel and motel managers,<br />

school and hospital security officers, and related persons.<br />

Questions<br />

1. Which of the following statements is false?<br />

(a) Suicide bombing attempts have not yet been made within the United States.<br />

(b) Most of what we know presently about suicide bombings has come from experiences<br />

overseas in Israel and Iraq.<br />

(c) A major disadvantage of suicide bombers on foot is the limited amount of explosives<br />

that they can reasonably conceal and carry.<br />

(d) A major advantage of suicide bombers on foot is that they can penetrate targets<br />

not otherwise available to motor vehicles.<br />

2. Which of the following statements is false?<br />

(a) The main advantage of vehicular suicide bombers is the ability to carry large<br />

explosive payloads.<br />

(b) Bloodborne pathogens can be delivered by suicide bombers.<br />

(c) Suicide bombers can and have penetrated heavily fortified compounds.<br />

(d) None of the above is false.<br />

136


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

3. Which of the following statements is false?<br />

(a) Suicide bombers often target location where large numbers of persons gather.<br />

(b) In the preincident phase, surveillance of a target is often performed.<br />

(c) Most commonly, suicide bombers are unmarried males between 16 and 40<br />

years of age.<br />

(d) Females have not been used for suicide bombings.<br />

Answers<br />

1. (a) Suicide bombing attempts have been made within the United States.<br />

2. (d) None of the statements is false.<br />

3. (d) Females have been used as suicide bombers.<br />

Suspicious Packages<br />

How to Handle Suspicious Mail<br />

What constitutes a suspicious letter or parcel? Some typical characteristics which ought to trigger<br />

suspicion include letters or parcels that:<br />

� Have any powdery substance on the outside.<br />

� Are unexpected or from someone unfamiliar to you.<br />

� Have excessive postage, handwritten or poorly typed address, incorrect titles or titles with no<br />

name, or misspellings of common words.<br />

� Are addressed to someone no longer with your organization or are otherwise outdated.<br />

� Have no return address, or have one that can't be verified<br />

as legitimate.<br />

� Are of unusual weight, given their size, or are lopsided or<br />

oddly shaped.<br />

� Have an unusual amount of tape.<br />

� Are marked with restrictive endorsements, such as<br />

"Personal" or "Confidential."<br />

� Have strange odors or stains.<br />

137


Taiwan<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Military Air Bases And Airports http://eyeball-series.org/tw-bases/tw-bases.htm<br />

Cimei Township<br />

Hsinchu Airport<br />

Hualien City<br />

Husi Township<br />

Husi Township 2<br />

Linluo Township North<br />

Linluo Township South<br />

Mituo Township<br />

Quemoy Island<br />

Shueishang Township<br />

Situn District<br />

Song Sang Airport<br />

Taichung Airport<br />

Tainan Airport<br />

Taitung City<br />

Taitung City Military<br />

138


Taliban<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Taiwan International<br />

Taiwan International Military<br />

Wang An Township<br />

Wu Liting Hengchun Airport<br />

All Taliban News<br />

http://topics.nytimes.com/top/reference/timestopics/organizations/t/taliban/index.html<br />

Behind Taliban Lines http://www.pbs.org/wgbh/pages/frontline/talibanlines/etc/links.html<br />

Long War Journal http://www.longwarjournal.org/<br />

Taliban presence, by district and tribal agency, in the Northwest Frontier Province and the<br />

Federally Administered Tribal Agencies, and in some districts in Punjab and Baluchistan.<br />

http://www.longwarjournal.org/maps.php<br />

Taliban Code Of Conduct FOUO (requires password access to Intelink)<br />

https://www.intelink.gov/wiki/Taliban_Code_of_Conduct<br />

Analysis of The Taliban Code of Conduct FOUO<br />

https://www.intelink.gov/wiki/Taliban_Code_of_Conduct<br />

http://www.nps.edu/Programs/CCS/index.html<br />

Technology Theft/Transfer<br />

Technology Magazines http://www.world-newspapers.com/technology.html<br />

Economic And Competitive <strong>Intelligence</strong> http://www.loyola.edu/dept/politics/ecintel.html<br />

Terrorism (includes eco-terrorism)<br />

Terrorism and Political Violence Threat Map 2011 (great interactive map)<br />

http://www.aon.com/risk-services/political-riskmap2/map/Interactive_Risk_Map/2011_Terrorism_Political_Violence_Map/index.html<br />

Action Against Terrorism http://www.coe.int/t/dlapil/codexter/default_en.asp<br />

National Counterterrorism Center http://www.nctc.gov/site/other/wits.html<br />

Worldwide Incidents Tracking System https://wits.nctc.gov/FederalDiscoverWITS/index.do?N=0<br />

Tactics of Eco-Terrorists to Thwart Cops (U/LES) http://cryptome.org/0003/fbi-ecoterrorism.pdf<br />

Country Reports on Terrorism 2009, August 2010<br />

http://www.state.gov/documents/organization/141114.pdf<br />

Terrorism Tracker https://www.terrorismtracker.com/index.php<br />

Terrorist Groups Interactive Map http://www.nctc.gov/site/map/map.html<br />

Terrorist Website Search Engine (kind of dated but still fulfills a requirement)<br />

http://www.google.com/cse/home?cx=012389276654712134826%3Amiiykhqamla<br />

Tracking The Threat http://www.trackingthethreat.com/<br />

Terrorism World http://terrorismworld.com/<br />

Fact Sheets On Terrorist Attacks (The National Academies has prepared, in cooperation with the<br />

Department of Homeland Security, fact sheets on five types of terrorist attacks. Drawing on our many<br />

reviewed publications, the expertise of our members, and the knowledge of other esteemed authorities,<br />

the fact sheets provide reliable, objective information.)<br />

http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks.aspx<br />

Terrorism<br />

https://www.intelink.gov/sharepoint/osp/Terrorism%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />

139


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Country Reports On Terrorism 2008 http://www.state.gov/documents/organization/122599.pdf<br />

Terrorist Recognition Handbook 2d Edition<br />

http://www.dmos.info/eng/Terrorist%20Recognition%20Handbook.pdf<br />

Map of Worst Terrorist Attacks Worldwide<br />

http://www.johnstonsarchive.net/terrorism/globalterrorism1.html<br />

Terrorist And Criminal Attacks Targeting Children<br />

http://www.johnstonsarchive.net/terrorism/wrjp39ch.html<br />

<strong>Global</strong> Terrorism Analysis<br />

http://www.jamestown.org/terrorism/news/article.php?articleid=2369824<br />

<strong>Global</strong> Terrorism Database http://www.start.umd.edu/data/gtd/<br />

Office of Anti-Terrorism Assistance http://www.diplomaticsecurity.org/<br />

Terrorism http://www.users.fl.net.au/~nds/terror.html<br />

http://www.cdi.org/program/index.cfm?programid=39<br />

http://www.nsi.org/terrorism.html<br />

http://www.awesomelibrary.org/Classroom/Social_Studies/Terrorism/Terrorism.html<br />

War on Terrorism Resource Guides http://personal.ecu.edu/durantd/wot/index.html<br />

International Law Terrorism http://www.un.int/usa/terror.htm<br />

Implementing international action against terrorism http://www.unodc.org/unodc/terrorism.html<br />

UN Action Against Terrorism http://www.un.org/terrorism/<br />

The World's Most Wanted Terrorists http://www.mostwanted.org/Terrorists.html<br />

http://www.fbi.gov/mostwant/terrorists/fugitives.htm<br />

Terrorism Research Center http://www.terrorism.com/<br />

Terrorism Portal http://www.theterrorismportal.com/<br />

Terrorism Resources http://library.nps.navy.mil/home/tgp/tgpndx.htm<br />

http://library.nps.navy.mil/home/tgp/tgp2.htm<br />

http://www.ceip.org/files/projects/npp/resources/terrorism.htm<br />

Terrorist Financing http://www1.oecd.org/FATF/TerFinance_en.htm<br />

War on Terrorism Latest News http://www.terrorismfiles.org/<br />

Terrorism/Counterterrorism Web <strong>Link</strong>s http://www.usip.org/library/topics/terrorism.html<br />

Terrorism Questions and Answers http://www.terrorismanswers.org/home/<br />

http://cfrterrorism.org/thisweek/<br />

http://cfrterrorism.org/index/<br />

Terrorism Disasters http://www.disasters.org/emgold/Terrorism.htm<br />

Terrorism and Terrorists http://jurist.law.pitt.edu/terrorism/terrorism1.htm<br />

Terrorism, Anti-Terrorism, Taliban and Afghanistan <strong>Link</strong>s<br />

http://www.windweaver.com/politics/terrorism.htm<br />

Terrorism 2004 http://www.au.af.mil/au/aul/bibs/terrornew/terrorism.htm<br />

South Asia Terrorism Portal http://www.satp.org/<br />

Terrorism and Homeland Security http://www.rand.org/research_areas/terrorism/<br />

WWW Sites related to Terrorism http://www.sima.co.at/terror.htm<br />

http://www.jmu.edu/orgs/wrni/links.html<br />

http://www.blkbox.com/~guillory/terr.html<br />

Patterns of <strong>Global</strong> Terrorism http://www.mipt.org/Patterns-of-<strong>Global</strong>-Terrorism.asp<br />

International <strong>Global</strong> War on Terrorism http://www.au.af.mil/au/awc/awcgate/cps-terr.htm<br />

Terror Analysis http://www.terroranalysis.com/<br />

Comprehensive Guide to International Terrorist Organizations<br />

http://www.specialoperations.com/Terrorism/SOCGuide/Default.htm<br />

Terrorist Group Profiles<br />

http://www.specialoperations.com/Terrorism/Terrorist_Groups/Default.htm<br />

Terrorism Knowledge Base http://www.tkb.org/Home.jsp<br />

A Military Guide To Terrorism In The 21 st Century<br />

http://www.au.af.mil/au/awc/awcgate/army/guidterr/<br />

Terror Group Emblems http://www.osis.gov/docs/TerrorGroupEmblems.pdf<br />

Fighting Terror http://www.cnn.com/SPECIALS/2004/fighting.terror/index.html<br />

140


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Terrorism Unveiled http://athena.blogs.com/athena/<br />

<strong>Global</strong> Terrorr Alert http://www.globalterroralert.com/<br />

Guide to Research Terrorism and Insurgency<br />

http://www.library.georgetown.edu/guides/terrorism/<br />

http://www.library.georgetown.edu/guides/right.htm#int<br />

Terrorism Database Project http://www.rand.org/ise/projects/terrorismdatabase/<br />

Terrorist Attacks and Organizations<br />

http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/<br />

Terrorism Research http://www.washburn.edu/faculty/aschbley/publications.html<br />

Nuclear Terrorism http://www.nci.org/nci-nt.htm<br />

http://www.nuclearterrorism.org/<br />

http://www.fas.org/irp/crs/RL32595.pdf<br />

What If Terrorists Go Nuclear http://www.cdi.org/terrorism/nuclear.cfm<br />

Targeting The Threat (TrackingTheThreat.com is a database of open source information about<br />

the Al Qaeda terrorist network and you can search the database by terrorist name)<br />

http://www.trackingthethreat.com/index.jsp<br />

Tracking The Terror http://www.cnn.com/US/tracking.terror/archive/<br />

<strong>Global</strong> Terrorism Analysis http://www.jamestown.org/terrorism/<br />

http://www.jamestown.org/terrorism/archives.php?publication_id=9<br />

South Asia Terrorism Updates http://www.satp.org/<br />

Interactive United States/Afghanistan War Machine<br />

http://www.satp.org/satporgtp/usa/Osama.htm#<br />

South Asia Conflict Map http://www.satp.org/satporgtp/southasia/images/Conflict_Map.pdf<br />

Geography Of Terrorism http://www.yourdictionary.com/library/terror.html#geography<br />

Searchable Terrorism Knowledge Database http://www.tkb.org/AdvancedSearch.jsp<br />

Jihadi and Islamist Activities on MySpace.com http://www.nbcnco.com/MySpaceJihad.pdf<br />

A Picture Speaks A Thousand Words http://www.st-andrews.ac.uk/~ilr/emblems/index.html<br />

Terrorism Focus http://jamestown.org/terrorism/news/uploads/tf_002_015.pdf<br />

<strong>Global</strong> Terrorism Analysis http://jamestown.org/terrorism/archives.php?publication_id=15<br />

Terrorism and Crime Studies http://www.loc.gov/rr/frd/terrorism.html<br />

Gobs And Gobs Of Terrorism <strong>Link</strong>s http://library.nps.navy.mil/home/terrorism.htm<br />

World Conflict Quarterly (News, Analyis and Articles on Terrorists & Terrorism)<br />

http://www.globalterrorism101.com/<br />

http://www.globalterrorism101.com/UnderstandingTerrorismSummary.html<br />

How Modern Terrorism Uses The Internet http://www.usip.org/pubs/specialreports/sr116.pdf<br />

Terrorism Archived Records http://rantburg.com/thugburg.php?ORGEX=Al-Qaeda<br />

Congressional Research Service Reports on Terrorism<br />

http://www.fas.org/sgp/crs/terror/index.html<br />

South Asia Terrorism Portal http://www.satp.org/<br />

Combatting Terrorism Center At West Point http://www.ctc.usma.edu/atlas/default.asp<br />

Cross Border Financing http://www.fincen.gov/cross_border/CBFTFS_Complete.pdf<br />

Terrorist Selection And Recruitment http://www.rand.org/pubs/reprints/2006/RAND_RP1214.pdf<br />

Beyond Al Qaeda Parts 1 & 2 http://www.rand.org/pubs/monographs/2006/RAND_MG429.pdf<br />

http://www.rand.org/pubs/monographs/2006/RAND_MG430.pdf<br />

Terrorism And Homeland Security: Documents Available Online<br />

http://www.rand.org/pubs/online/terrorism/index.html<br />

Breaching The Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive<br />

Technologies http://www.rand.org/pubs/monographs/2007/RAND_MG481.pdf<br />

Terrorist Organizations http://www.terrorist-organizations.com/<br />

A Look At The History Of Suicide Attacks<br />

http://www.npr.org/templates/story/story.php?storyId=4760240&sc=emaf<br />

MIPT Terrorism Knowledge Base http://www.tkb.org/Home.jsp<br />

EU Terorrism Situation and Trend Report http://cryptome.org/eu-terrorism.pdf<br />

International Terrorist Symbols Database http://www.adl.org/terrorism/symbols/default.asp<br />

The Islamic Imagery Project: Visual Motifs In Jihadi Internet Propaganda<br />

http://www.ctc.usma.edu/CTC%20--%20Islamic%20Imagery%20Project.pdf<br />

141


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Study Of Terrorism And Response To Terrorism (START) The <strong>Global</strong> Terrorism Database (GTD)<br />

is an open-source database including information on terrorist events around the world since 1970<br />

(currently updated through 2004). Unlike many other event databases, the GTD includes systematic data<br />

on international as well as domestic terrorist incidents that have occurred during this time period and now<br />

includes almost 80,000 cases. For each GTD incident, information is available on the date and location of<br />

the incident, the weapons used and nature of the target, the number of casualties, and -- when<br />

identifiable -- the identity of the perpetrator. http://www.start.umd.edu/data/gtd/<br />

Terrorism General Resources http://c21.maxwell.af.mil/terrorsm.htm<br />

Library Websites On Terrorism And Homeland Security<br />

http://www.library.uiuc.edu/doc/godort/terrorism.htm<br />

Google <strong>Directory</strong> Of Terrorism <strong>Link</strong>s http://directory.google.com/Top/Society/Issues/Terrorism/<br />

Transportation Terrorism <strong>Directory</strong><br />

http://www.siql.com/security/terrorism/transportation_terrorism.htm<br />

Everything Terrorism: Counterterrorism <strong>Directory</strong><br />

http://www.siql.com/security/terrorism/counterterrorism.htm<br />

Osama Bin Laden <strong>Directory</strong> http://www.siql.com/security/terrorism/Osama_bin_Laden.htm<br />

South Asia Terrorism Portal http://www.satp.org/<br />

Terrorism Online http://www.slais.ubc.ca/courses/libr500/04-05-wt1/www/m_au/index.htm<br />

Terrorism News And Media<br />

http://www.kinghost.com.br/diretorio/Society/Issues/Terrorism/News_and_Media/<br />

The Investigative Project On Terrorism http://www.investigativeproject.org/<br />

The Terrorist Network In America 1991-2007 http://www.investigativeproject.org/maps.php<br />

Groups And Networks, Individual Terrorists, Apologists or Extremists, Terrorist Organizations And<br />

Other Groups Of Concern http://www.investigativeproject.org/profile/all/<br />

Terrorism Cases http://www.investigativeproject.org/cases.php<br />

The Investigative Project On Terrorism Audi And Video Clips<br />

http://www.investigativeproject.org/multimedia.php<br />

2005 Terrorism Risk Map http://folk.uio.no/erikro/WWW/corrgr/insurance/terrorismMap.pdf<br />

Terrorism Threat Map 2007<br />

http://www.aon.com/se/se/attachments/Aon%20Terrorism%20map%202007.pdf<br />

Terrorism News (News on Terrorism continually updated from thousands of sources around the<br />

net.) http://www.topix.com/news/terrorism<br />

Terrorism 2002-2005 http://www.fbi.gov/publications/terror/terrorism2002_2005.pdf<br />

Terrorist Recognition Cards http://www.dia.mil/site6_images/cards/index.htm<br />

Rewards For Justice http://www.rewardsforjustice.net/<br />

Wanted Terrorists<br />

http://www.rewardsforjustice.net/index.cfm?page=Wanted_Terrorist&language=english<br />

<strong>Link</strong>s To War On Terror http://www.copleydc.com/cns_links/cns_links_terrorism.htm<br />

Rogues Gallery http://www.rantburg.com/rogues_gallery.php<br />

The <strong>Intelligence</strong> and Terrorism Information Center<br />

http://www.terrorism-info.org.il/site/home/default.asp<br />

Terrorism News (News on Terrorism continually updated from thousands of sources around the<br />

net.) http://www.topix.net/news/terrorism<br />

Terrorism Funding<br />

Terrorism Financing in Saudi Arabia (in Arabic) http://cryptome.org/0002/gao-11-190.zip<br />

http://www.gao.gov/products/GAO-09-883<br />

http://www.gao.gov/new.items/d09883.pdf<br />

Counterterrorism Blog<br />

http://counterterrorismblog.org/2010/09/getting_a_better_handle_on_ter.php<br />

Intel – Terrorism Funding http://werzit.com/intel/terrorism/funding/<br />

142


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

A Banking System Built For Terrorism<br />

http://web.archive.org/web/20041226110228/http://www.ci-cect.com/article/showquestion.asp?faq=3&fldAuto=1393<br />

http://web.archive.org/web/20041210150855/www.ci-ce-ct.com/article/showfaq.asp?fldAuto=3<br />

Hawala Money Laundering<br />

http://www.interpol.int/Public/FinancialCrime/MoneyLaundering/hawala/<br />

http://repositories.cdlib.org/imbs/socdyn/sdeas/vol1/iss2/art6/<br />

Protecting Charitable Organizations<br />

http://www.treas.gov/offices/enforcement/key-issues/protecting/fto.shtml<br />

Terrorist Targets<br />

Potential Terrorist Attack Methods<br />

http://info.publicintelligence.net/PotentialTerroristAttackMethods.pdf<br />

Threat to Critical Infrastructure http://fas.org/irp/threat/terrorism/sup2.pdf<br />

Worship Places (FOUO) http://cryptome.org/worship-sec.pdf<br />

Gambling Places (FOUO) http://cryptome.org/gamble-sec.pdf<br />

Critical Infrastructure Protection<br />

http://www.eei.org/industry_issues/energy_infrastructure/critical_infrastructure_protection/<br />

Prototypes for Targeting America: A Soviet Assessment<br />

http://fmso.leavenworth.army.mil/fmsopubs/ISSUES/prototypes/prototypes.htm<br />

Foreign Terrorists in America http://www.fas.org/irp/congress/1998_hr/s980224c.htm<br />

Terrorist Attacks on Americans 1979-1988<br />

http://www.pbs.org/wgbh/pages/frontline/shows/target/etc/cron.html<br />

Guarding America: Security Guards and U.S. Critical Infrastructure Protection<br />

http://www.fas.org/sgp/crs/RL32670.pdf<br />

Commercial Nuclear Reactor Sites as Terrorist Targets<br />

http://www.neis.org/literature/Reports&Testimonies/Here_today_there_tomorrow_report_10-22-01.pdf<br />

Transportation and The Terrorist Threat<br />

http://www.strom.clemson.edu/opinion/whitehurst/transterror.pdf<br />

Passenger Ferries Could Be Prime Terrorist Targets<br />

http://www.transportationsec.com/ar/security_passenger_ferries_prime/index.htm<br />

Terrorists planning to assemble bombs on planes<br />

http://transportationsec.com/ar/security_terrorists_planning_assemble/index.htm<br />

Target America http://www.pbs.org/wgbh/pages/frontline/shows/target/<br />

Plan Targets Terrorist Use Of Shipping Containers<br />

http://www.newsmax.com/archives/articles/2002/6/7/52635.shtml<br />

Task Force to Bolster Security for Attractive Terrorist Targets<br />

http://www.signonsandiego.com/news/nation/terror/20040419-0736-terrorism-taskforce.html<br />

The Top 100 Terrorist Targets in the United States (if you can steer away from the political<br />

comments, it makes good for further study)<br />

http://www.lilithgallery.com/articles/terrorist_targets.html<br />

Chronology of Major Terrorist Attacks Against U.S. Targets<br />

http://www.freerepublic.com/focus/f-news/1087538/posts<br />

Thoughts on Terrorist Targets http://antiwar.com/utley/?articleid=1900<br />

Terror’s Next Target http://www.iags.org/n0111041.htm<br />

Developing Trends in Terrorist Strategy<br />

http://www.siteinstitute.org/terrorismlibrary/charts_maps/charts_maps_1103218242.pdf<br />

Mapping The Risks http://www.rand.org/pubs/monographs/2004/RAND_MG142.pdf<br />

How Terrorists Plan And Conduct An Attack On Infrastructure Targets<br />

http://www.ibtta.org/files/PDFs/bell_alan.pdf<br />

143


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Terrorist Websites<br />

(some may be quite offensive, especially the multimedia)<br />

The Jihadi Fan Club http://www.youtube.com/user/jihadifanclub<br />

Terrorist Websites, Pages Indexed: 11,700,000<br />

http://www.google.com/coop/cse?cx=012389276654712134826%3Amiiykhqamla<br />

http://clearinghouse.infovlad.net/<br />

http://www.al-ekhlaas.org/forum/<br />

http://www.atsdp.com/<br />

Radical Islamic Websites http://www.threeworldwars.com/f/radical-islamic-websites.htm<br />

The Search For International Terrorist Entities (videos of suicide bombings and attacks on U.S.<br />

Forces) http://siteinstitute.org/index.html<br />

<strong>Global</strong> Terror Alert (videos of suicide bombings and attacks on U.S. Forces) not a terrorist<br />

website but fits in this group http://www.globalterroralert.com/<br />

Terrorist Website Resources http://website-101.info/terroristwebsites/<br />

Islamic Terror Web http://uk.geocities.com/johnathanrgalt/<br />

Terrorism/Terrorist Group Websites http://members.tripod.com/spylopedia/ind-terror.htm<br />

The Battar Training Camp http://www.homelandsecurityus.com/battar7.asp#Targets<br />

Anti-Terrorism <strong>Intelligence</strong> http://atdatabase.r8.org/<br />

Jihad Online http://www.adl.org/internet/jihad_online.pdf<br />

Background on Saudi Arabia’s 26 Most Wanted<br />

http://www.siteinstitute.org/terrorismlibrary/charts_maps/charts_maps_1099422145.pdf<br />

The Iraqi Resistance (very controversial sites, you may be offended)<br />

http://www.albasrah.net/images/moqawama/index1.htm<br />

http://www.albasrah.net/<br />

Special Report http://memri.org/bin/articles.cgi?Page=archives&Area=sr&ID=SR3104<br />

A Trio of Disinformers: Islam Memo, Muhammad Abu Nasr, and Jihad Unspun<br />

http://aljazeera.com/<br />

http://www.jihadunspun.com/home.php<br />

http://www.islammemo.cc/<br />

Albasrah http://www.albasrah.net/<br />

Middle East Online http://www.middle-east-online.com/english/?id=12332<br />

The Army Of Ansar Al-Sunnah http://www.infovlad.net/mirror_alansar_alsunnah/<br />

http://online2005.100free.com/<br />

Pro Pakistani Islamic Jihad and pro Al Qaeda sites in Urdu (some also have Arabic and/or<br />

English.) http://akhbaar.jeeran.com/news004.htm<br />

http://islaminfo.50g.com/oldweb/shaheed_and_shahadaut1.htm<br />

www.almuslimoon.jeeran.com/mansoor.htm<br />

http://www.geocities.com/iqaaz_magazine/new/index.htm<br />

www.geocities.com/qadianis<br />

www.zavaj.com/i_saw_the_bodies.html<br />

www.free-webspace.biz/muwahideen/tibyaan/index.htm<br />

http://content.jeeran.com/miras_main.htm (Arabic)<br />

www.nuzool.tripod.com/naqshbandi.html<br />

http://aljihad.esmartweb.com/<br />

http://mitglied.lycos.de/muwahideen/unfolding_the_agenda.htm<br />

Jihadist Videos http://almagribi.blogspot.com/<br />

Ansar Jihad http://www.ansar-jihad.com/<br />

Camagat http://www.camagat.com/<br />

Jihad Films http://www.jihad-films.com/index.php<br />

World News Network http://www.w-n-n.net/<br />

World News Network Videos<br />

http://www.w-n-n.net/forumdisplay.php?s=a5ca51ad7ec647ce066fb6f3090d8403&f=10<br />

Pro Terrorist Hacker Web Site (The URL is linked to 9 different Arabic websites and is<br />

mentioned in 1,770 different web-pages via GOOGLE.) NOTE: Use extreme<br />

144


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

caution with this site, especially if you don’t know Arabic because it could<br />

compromise your systems. http://mooj3.jeeran.com/18hakar.htm<br />

Pro Iraqi Resistance http://www.iraqresistance.net/<br />

Palestinian Media Watch http://www.pmw.org.il/<br />

Indoctrination of Children http://www.pmw.org.il/tv%20part1.html<br />

Marketing of Terrorism Through The Internet<br />

http://www.intelligence.org.il/Eng/sib/12_04/int_m.htm<br />

http://www.intelligence.org.il/eng/eng_n/al_aqsa_e.htm<br />

Iraqi Insurgent Sniper Training http://www.military.com/ppt/iraqi_insurgent_sniper_training.htm<br />

al-Aqsa Martyrs Brigade (data on creating explosives) http://www.kataebaqsa.org/<br />

al-Bramj (how to make the highly explosive acetone peroxide) http://www.bramjnet.com/<br />

Tajdeed http://www.tajdeed.org.uk/<br />

Jihadi Du Jour http://jihadidujour.blogspot.com/<br />

Radical Islamic Websites http://www.threeworldwars.com/f/radical-islamic-websites.htm<br />

The site of the Islamic Block, Hamas' student wing http://www.alkotla.com/<br />

In The Name Of Allah, Most Gracious, Most Merciful http://bassel114.spaces.live.com/<br />

Tracerouting<br />

Geek Tools http://www.geektools.com/traceroute.php<br />

Traceroute http://www.tracert.com/cgi-bin/trace.pl<br />

http://cities.lk.net/trlist.html<br />

http://www.traceroute.org/<br />

Using Traceroute http://www.exit109.com/~jeremy/news/providers/traceroute.html<br />

Tracerouters Around The World http://nielssen.com/tracerouters/<br />

Hubble: Monitoring Internet Reachability in Real-Time http://hubble.cs.washington.edu/<br />

An Explanation Of Hubble<br />

http://www.govtech.com/gt/articles/286661?utm_source=newsletter&utm_medium=email&utm_campaign<br />

=GTEN_2008_4_15<br />

Training Resources<br />

MIT <strong>Open</strong>CourseWare (hundreds of free classes online) http://ocw.mit.edu/index.htm<br />

Introduction to <strong>Intelligence</strong> Analysis (1 to 2 Hours)<br />

Data Collection Tradeoffs (2 to 3 Hours)<br />

Critical Thinking Strategies (2 to 3 Hours)<br />

http://www.anacapatraining.com/webtraining/index.html<br />

Transportation<br />

National Transportation Library http://ntl.bts.gov/<br />

Transportation Search Engines http://ntl.bts.gov/tools/search_engines.html<br />

Bureau of Transportation Statistics http://www.bts.gov/<br />

Major Transportation Facilities of The U.S. 2009 (interactive map)<br />

http://www.bts.gov/programs/geographic_information_services/maps/major_transportation_facilities/html/<br />

map.html<br />

145


Tunnels<br />

UAVs<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Tunnels in The USA and Canada http://freespace.virgin.net/john.cletheroe/usa_can/tunnels/<br />

Tunnel <strong>Link</strong>s http://www.mysteries-megasite.com/main/bigsearch/tunnels.html<br />

New York City Tunnel No 3 http://www.water-technology.net/projects/new_york/<br />

Notable PA Railroad Tunnels http://www.railfanusa.com/pa/patunnels.html<br />

Longest Railroad Tunnels in the World http://www.robl.w1.com/Transport/tunnel.htm<br />

United States Air Force Unmanned Aircraft Systems Flight Plan 2009-2047<br />

http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA505168&Location=U2&doc=GetTRDoc.pdf<br />

Flight of The Drones http://www.economist.com/node/21531433<br />

NanoEye http://www.scribd.com/doc/68542133/Nano-Eye<br />

http://defensetech.org/2011/10/12/the-armys-tiny-future-spy-satellite/<br />

Drones That Think http://www.c4isrjournal.com/story.php?F=magazine<br />

Unmanned Aircraft Systems Present & Future Capabilities http://cryptome.org/dodi/uav-future.pdf<br />

See what it’s like to fly a UAV: Welcome to the UAV pilot training program. Your mission is to<br />

locate and destroy enemy targets using AGM-114 Hellfire missiles launched from a MQ-9 Reaper.<br />

http://www.airforce.com/interactive/uav/index.html<br />

The Spy Flight Website http://www.spyflight.co.uk/main.htm<br />

The Complete UAV Field Gude http://www.popsci.com/technology/gallery/2010-02/galleryfuture-drones<br />

UAV World http://www.uavworld.com/<br />

A Worldwide Roundup http://www.aiaa.org/aerospace/Article.cfm?issuetocid=365<br />

http://www.aiaa.org/images/PDF/WilsonChart.pdf<br />

http://www.uav-info.com/pdfs/fig6_UAV-Systems_Overview.pdf<br />

UAV World http://www.uavworld.com/<br />

Photo Gallery http://www.uavforum.com/library/photo.htm<br />

Video Theater - A 5-10 Sec Video Clip Of A Featured UAV Each Month<br />

http://web.archive.org/web/20090513061222/http://www.uavforum.com/library/video.htm<br />

List of Unmanned Aerial Vehicles http://en.wikipedia.org/wiki/List_of_unmanned_aerial_vehicles<br />

Unmanned Aerial Vehicles Website <strong>Link</strong>s<br />

http://www.garmin-air-race.freeola.com/links%20listing/77.htm<br />

Drones: America’s New Air Force<br />

http://www.cbsnews.com/stories/2009/05/08/60minutes/main5001439.shtml<br />

Venezuela<br />

Venezuela Air Force http://www.aeroflight.co.uk/waf/americas/venezuela/AirForce/Venezuela-afbases.htm<br />

Military Air Bases And Airports http://eyeball-series.org/ve-mil-air/ve-mil-air.htm<br />

Aji<br />

Anaco<br />

Barcelona Air Base<br />

Barquisimeto Air Base<br />

Boca del Rio Air Base<br />

Cabruta<br />

Cabimas<br />

Caracas Air Base/International<br />

146


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Carizalles Air Base<br />

Chaparral<br />

Ciratobo<br />

Coro<br />

Ciudad Bolívar<br />

Cumaná<br />

El Vigia<br />

Guina<br />

Higuerote<br />

Inglaterra<br />

La Orchila Air Base<br />

Las Piedras<br />

La Trinidad de Orichuna<br />

La Uva<br />

Maracaibo Air Base<br />

Maturin<br />

Mayupa<br />

Ocumare del Tuy<br />

Palo Negro Air Base<br />

Pariaguán<br />

Porlamar<br />

Potrento<br />

Puerto Ayacucho Air Base<br />

Puerto Cabello<br />

Puerto Ordaz Air Base<br />

Puerto Páez<br />

San Jose de Guanira<br />

Santo Domingo Air Base<br />

Valencia<br />

ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/venez.htm<br />

Army Of Venezuela http://en.wikipedia.org/wiki/Army_of_Venezuela<br />

http://www.answers.com/topic/army-of-venezuela<br />

A Country Study http://lcweb2.loc.gov/frd/cs/vetoc.html<br />

World Of Facts http://www.worldoffacts.com/ve<br />

Visualization Tools<br />

Water Conflict<br />

Water Wars http://www.ciesin.org/docs/006-304/006-304.html<br />

http://www.ipsnews.org/africa/interna.asp?idnews=23759<br />

http://www.mideastnews.com/WaterWars.htm<br />

The Emerging Water Wars http://samvak.tripod.com/pp146.html<br />

The World’s Water http://www.worldwater.org/links.htm<br />

http://www.worldwater.org/<br />

http://www.worldwater.org/conflictIntro.htm<br />

http://www.worldwater.org/waterData.htm<br />

A World Without Water http://www.villagevoice.com/news/0234,otis,37614,1.html<br />

Water Wars in The Middle East<br />

http://www.nmhschool.org/tthornton/mehistorydatabase/waterwars.htm<br />

Water Wars Worldwide http://www.worldwaterwars.com/World/index.htm<br />

147


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Weapons Around The Globe<br />

Naval Weapons of The World http://www.navweaps.com/Weapons/index_weapons.htm<br />

World’s Deadliest Conventional Weapons http://www.foxnews.com/story/0,2933,473985,00.html<br />

World Special Weapons Guide http://www.globalsecurity.org/wmd/world/index.html<br />

Weapons Of The World Videos<br />

http://video.google.com/videosearch?hl=en&source=hp&q=weapons+of+the+world&oq=&um=1&ie=UTF-<br />

8&ei=9Th0S_j9M43QsgOt7MScBg&sa=X&oi=video_result_group&ct=title&resnum=4&ved=0CCEQqwQ<br />

wAw#<br />

Military Factory http://www.militaryfactory.com/<br />

Enemy Forces http://www.enemyforces.net/index.htm<br />

Weapons and Equipment<br />

http://directory.google.com/Top/Society/Military/Weapons_and_Equipment/<br />

http://www.canadiancontent.net/dir/Top/Society/Military/Weapons_and_Equipment/<br />

North Korean Special Weapons http://fas.org/nuke/guide/dprk/<br />

Fast Facts http://www.fas.org/asmp/fast_facts.htm<br />

Federation of American Scientists http://www.fas.org/main/home.jsp<br />

Military World http://www.militaryworld.com/dir/Armed_Forces/Weapons/<br />

Technology http://www.aeronautics.ru/technology.htm<br />

Military Factory http://www.militaryfactory.com/<br />

Worldwide Equipment Guide http://www.fas.org/man/dod-<br />

101/sys/land/row/weg.pdf#search=%22Worldwide%20Equipment%20Guide%22<br />

Rest Of The World Land Combat Systems<br />

http://www.fas.org/man/dod-101/sys/land/row/index.html<br />

World Wide Ground Combat System http://www.globalsecurity.org/military/world/links-ground.htm<br />

World Wide Missile Systems http://www.designation-systems.net/<br />

Strategy Page http://www.strategypage.com/default.asp<br />

World Wide Military http://www.worldwide-military.com/<br />

Weapons of Mass Destruction<br />

WMD https://www.intelink.gov/sharepoint/osp/WMD/Forms/AllItems.aspx<br />

Weapons of Mass Destruction <strong>Intelligence</strong> Threat Assessments<br />

http://www.fas.org/irp/threat/wmd.htm<br />

Weapons of Mass Destruction in the Middle East http://cns.miis.edu/research/wmdme/<br />

Weapons of Mass Destruction http://en.wikipedia.org/wiki/Weapons_of_mass_destruction<br />

Weapons of Mass Destruction Around The World http://www.fas.org/nuke/guide/index.html<br />

WMD Resources http://www.fas.org/nuke/<br />

WMD in ASIA http://nti.org/e_research/e3_19a.html<br />

Nuclear Threat Initiative http://nti.org/index.html<br />

Nuclear Weapons, Nuclear Warfare and WMD<br />

http://greennature.com/modules.php?op=modload&name=News&file=article&sid=1052&mode=thread&or<br />

der=0&thold=0<br />

Center for Nonproliferation Studies http://cns.miis.edu/<br />

Counter Proliferation Center http://www.au.af.mil/au/awc/awcgate/awc-cps.htm<br />

Weapons of Mass Destruction Resources http://www.extremistgroups.com/wmd.html<br />

Nuclear Control Institute http://www.nci.org/<br />

A Guide to Nuclear Weapons http://www.nuclearweaponarchive.org/<br />

Nuclear Weapons Websites http://members.tripod.com/spylopedia/ind-nukes.htm<br />

Commission on The <strong>Intelligence</strong> Capabilities of the U.S Regarding WMD<br />

http://www.wmd.gov/report/<br />

Center For Contemporary Conflict http://www.ccc.nps.navy.mil/si/<br />

148


Weather<br />

Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Google Maps Weather http://googlemapsmania.blogspot.com/2011/08/google-maps-getsweather.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+GoogleMapsMani<br />

a+%28Google+Maps+Mania%29<br />

WeatherMaps/Satellite Images http://www.cnn.com/SPECIALS/2003/megastorm/<br />

Earth Station 9 Weather http://www.earthstation9.com/index.html?aircraf6.htm<br />

Intellicast Local Weather http://www.intellicast.com/LocalWeather/World/<br />

Climate and Weather http://www.lib.berkeley.edu/EART/Earth<strong>Link</strong>s.html#climate<br />

Weather Around the World http://www.mathcats.com/explore/weather.html<br />

Military Weather History http://www.srh.noaa.gov/ohx/educate/atc/history.htm<br />

Naval Pacific Meteorological and Oceanography https://207.133.112.33/<br />

National Weather Service Radar Image<br />

http://www.crh.noaa.gov/radar/loop/DS.p37cr/si.keax.shtml<br />

Internet Weather <strong>Source</strong> http://weather.noaa.gov/<br />

The World of Weather http://www.tec.army.mil/weather/customize.html<br />

Weather Software Archive http://cirrus.sprl.umich.edu/wxnet/software.html<br />

Weather Sites http://cirrus.sprl.umich.edu/wxnet/servers.html<br />

United States Air Forces in Europe Operational Weather Squadron (OWS)<br />

http://ows.public.sembach.af.mil/<br />

Live Weather Images http://www.weatherimages.org/weathercams/<br />

Weather Maps http://cirrus.sprl.umich.edu/wxnet/maps.html<br />

Organized Weather <strong>Link</strong>s http://weather.communitycomputing.com/owl/links/index.asp<br />

WunderGround http://www.wunderground.com/<br />

Weather CAMS http://www.weatherwatchers.org/wxcam/<br />

World Weather http://weather.wn.com/<br />

Weather Matrix http://www.weathermatrix.net/radar/world/<br />

AccuWeather http://home.accuweather.com/index.asp?partner=accuweather<br />

World News Network Sitemap (make this your first stop)<br />

World News http://wnsitemap.com/<br />

Miscellaneous<br />

Official Department Of The Army Publications And Forms http://www.army.mil/usapa/<br />

World Statistics Clock http://www.poodwaddle.com/worldclock.swf<br />

Understanding Surveillance Technologies<br />

http://www.dmos.info/eng/Understanding%20Surveillance%20Technologies.pdf<br />

Army Field Manuals http://www.globalsecurity.org/military/library/policy/army/fm/<br />

http://www.enlisted.info/field-manuals/<br />

149


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

SUSPICIOUS BEHAVIOR COULD INDICATE TERROR PLOTTING<br />

By Anthony L. Kimery<br />

' ... being able to distinguish the ordinary from the extraordinary'<br />

Coinciding with concerns among some intelligence services that suspected Hezbollah "sleeper cells" in<br />

Canada have been activated, Canadian law enforcement authorities increasingly are training for spotting<br />

potentially suspicious activity and behavior that may indicate terrorists are conducting surveillance or<br />

other goings-on in preparation for targeting a specific structure or location for attack.<br />

Several years ago, Robert David Steele, an outspoken veteran intelligence officer, told HSToday.us that<br />

“50 percent of the ‘dots’ that prevent the next 9/11 will come from bottom-up [local] level observation” and<br />

unconventional intelligence from “private sector parties.”<br />

Since 9/11, the Department of Homeland Security (DHS) and law enforcement in the Washington, DC<br />

capital region have actively urged citizens to report “suspicious activity.” Mobile electronic signs urging<br />

people to report suspicious activity are routinely placed at strategic locations throughout the metro area<br />

for periods of time. The last one of these portable warnings I saw was at the convergence of Key Bridge<br />

and George Washington Memorial Parkway on the Virginia-side of the Potomac River just across from<br />

Georgetown.<br />

Lynda Howes, a civilian member of the emergency event and management unit of the Calgary (Canada)<br />

Police Service, told attendees of the “Tri-lateral Security Conference” in Calgary last week that law<br />

enforcement must learn how terrorists operating in order to prevent attacks. She said counterterrorism is<br />

only manageable if it is tackled at the grass roots level. She explained that it’s vital that everyone -<br />

including the public, the police, government and private industry – recognizes the potential indicators of<br />

terrorism and what actions to take if, and when, they are encountered.<br />

Howes said terrorists must recruit members, research their targets, procure resources, receive, transfer<br />

and conceal money, and provide transportation and communication.<br />

And "each one of those phases represents an activity” that can be identified if a person is trained to know<br />

what to be on the look-out for. “Those activities are associated with a behavior. Once we have that<br />

behavior, those are things you and I will be witnessing every single day and are things we can pick up on<br />

as potential indicators.”<br />

In late 2002, The Air Force's Office of Special Investigations launched “Eagle Eyes,” a program to "deter<br />

terrorism by recognizing and reporting pre-attack activities," according to an OSI memo.<br />

"Every terrorist act is preceded by observable planning activities," according to the OSI memo. "When<br />

troops and citizens know what to look for and how to report suspicious activity, terrorist acts can be<br />

prevented."<br />

Department of Defense personnel have routinely been advised to report suspicious reconnoitering of<br />

military facilities, people asking detailed information about specific sites, and any other activity which<br />

could indicate a "dry run” attack.<br />

DHS says “knowing what to look for and being able to distinguish the ordinary from the extraordinary are<br />

the key elements to successful surveillance detection.”<br />

“A persistent stream of reported suspicious incidents requires an understanding of the purpose of terrorist<br />

surveillance, to know what terrorists look for, and how they conduct surveillance operations,” DHS’s<br />

advice states.<br />

150


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

DHS states “terrorists conduct surveillance to determine a target's suitability for attack by assessing the<br />

capabilities of existing security and discerning weaknesses in the facility. After identifying weaknesses,<br />

they plan their attack at the point of greatest vulnerability.”<br />

“Because terrorists must conduct surveillance-often over a period of weeks, months, or years-detection of<br />

their activities is possible,” DHS continued, noting, “regardless of their level of expertise, terrorists<br />

invariably make mistakes. The emphasis of surveillance detection is to key in on indicators of terrorist<br />

surveillance activities."<br />

DHS states “successful surveillance detection efforts require immediate reporting of incidents similar to<br />

the following:<br />

o Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or<br />

direction;<br />

o Individuals who stay at bus or train stops for extended periods while buses and trains come and go;<br />

o Individuals who carry on long conversations on pay or cellular telephones;<br />

o Individuals who order food at a restaurant and leave before the food arrives or who order without<br />

eating;<br />

o Joggers who stand and stretch for an inordinate amount of time;<br />

o Individuals sitting in a parked car for an extended period of time;<br />

o Individuals who don't fit into the surrounding environment because they are wearing improper attire<br />

for the location or season;<br />

o Individuals drawing pictures or taking notes in an area not normally of interest to a tourist or showing<br />

unusual interest in or photographing security cameras, guard locations, or watching security reaction<br />

drills and procedures; and<br />

o Individuals who exhibit suspicious behavior, such as staring or quickly looking away from individuals<br />

or vehicles as they enter or leave facilities or parking areas<br />

Other activity which should cause a heightened sense of suspicion include:<br />

o Suspicious or unusual interest;<br />

o Surveillance (suspicious in nature);<br />

o Inappropriate photographs or videos;<br />

o Note-taking;<br />

o Drawing of diagrams;<br />

o Annotating maps; and<br />

o Using binoculars or night vision devices<br />

“Terrorists may also employ aggressive surveillance techniques, such as making false phone threats,<br />

approaching security checkpoints to ask for directions, or ‘innocently’ attempting to smuggle nonlethal<br />

contraband through checkpoints,” DHS’s advice states. “The terrorists intend to determine firsthand the<br />

effectiveness of search procedures and to gauge the alertness and reaction of security personnel.”<br />

Karen Morley, senior director of TerraGo Technologies, Atlanta, Ga., who began her career in the<br />

geospatial industry in the US Air Force as a target intelligence specialist, told HSToday.us that terrorists<br />

need to conduct careful surveillance of a potential target in order to be confident that they can pull off a<br />

successful attack.<br />

In 2004, RAND developed the book, “Mapping the Risks: Assessing Homeland Security Implications of<br />

Publicly Available Geospatial Information,” for the National Geospatial-<strong>Intelligence</strong> Agency, determined<br />

that “potential attackers, such as terrorist groups or hostile governments, are more likely to [utilize]<br />

reliable and timely information … such as through direct access or observation. In addition, many types of<br />

attacks, such as those by ground parties, are likely to require detailed information for attack planning<br />

purposes (depending on the target type and mode of attack). This type of information, which mostly<br />

151


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

comes from such nongeospatial sources as engineering textbooks or human expertise on the operations<br />

of a particular type of industrial complex, is essential for attackers to have a high confidence in their plan.”<br />

But according to John Bumgarner, an 18-year veteran of special operations who has worked with most of<br />

the three-letter intelligence agencies at one time or another and is now research director for security<br />

technology at the US Cyber Consequences Unit, a non-profit research institute, because of training like<br />

that promoted by Howes it has become more and more difficult for terrorists to physically recon targets,<br />

especially in the US.<br />

“To actually start planning very detailed reconnaissance of a building, and all the streets that go into it,<br />

and all the alleyways and everything else, that could require a lot of physical reconnaissance on the<br />

ground - it’s not something that you can actually just easily do anymore,” Bumgarner stressed, especially<br />

in the post-9/11 environment where conspicuous photographing, videoing and other apparent physical<br />

surveillance can, and has - repeatedly across the nation - caused people to be detained and questioned<br />

about their activities.<br />

“In other words,” said Bumgarner, “it’s gotten a whole lot harder for a terrorist to conduct the kind of<br />

conspicuous physical surveillance of a target that’s necessary for conducting a large-scale or mass<br />

casualty attack.”<br />

Consequently, more sophisticated terrorists are utilizing easily accessible geospatial information, which<br />

was examined in the April HSToday cover report, “Every Eye a Spy.”<br />

152


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Taking Advantage Of Search Engines To Do Your Work<br />

My favorite search engines, and I’m sure you have your favorites, are the Copernic Suite followed by<br />

Google and then others. I use them extensively and use them to my advantage when doing research and<br />

I just don’t have the time to sit in front of the computer and type in all the keywords. First let me start with<br />

the Copernic Suite. It is comprised of Copernic Agent Professional, Copernic Tracker and Copernic<br />

Summarizer. Tracker and summarizer are exactly what the titles imply. The tracker keeps track of<br />

websites and alerts you when there are changes to it. Summarizer will take an article and summarize it to<br />

a more manageable article; and you determine the number of words in the summarized article. The<br />

following applies to copernic agent professional and how to customize it to work for you.<br />

You’ll notice on the graphic below how I have formatted my copy. On the right side is a box where folders<br />

are created as I have done. In the top center are the keywords I used for the Iran folder in the box at right.<br />

I have programmed the engine to do automatic searches at 0800 every day (by this time I have had my<br />

first cup of coffee and just waiting for all the results to come in). You also will notice that on the search<br />

term “Iranian military capabilities” there is a number 24 in parenthesis. These are the new results that<br />

came in at 0800, so you will always know about new results. Just below the box with the keywords are all<br />

the hits that came in. The green check mark indicates that it is a valid link. Now look at the left hand side<br />

in the quick search box and you should notice that I have 1005 search engines enabled. With these many<br />

search engines enabled you should be able to pin down what you’re looking for.<br />

153


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

154


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Let’s now look at Google and see how it can be customized to work for you. What you’re looking at now is<br />

the traditional page. On the upper right is the “sign in” link. Click on this link to establish an account. Once<br />

you establish an account click on the news link to go to the personalized news page.<br />

Click on news to go to personalized news page.<br />

Click here to establish an account<br />

155


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Clicking on the news link brings up the following page. You’ll notice on the left hand side where I have<br />

established all keywords of interest to me. I have included all the classical “INTS’ along with some others<br />

of interest. Clicking on a keyword, for example “explosively formed projectiles”, brings up the latest search<br />

on that term. I use the same keywords in Copernic above because the results are not always the same<br />

for both search engines. By using two search engines to do my bidding I stand a better chance of getting<br />

a plethora of results and thus more solid news from around the world.<br />

My keywords<br />

Clicking on the “edit this personalized page” brings up<br />

the following where the user enters all the keywords of<br />

interest to them. You’ll notice that all my keywords match<br />

those on the left hand side.<br />

Click here to personalize your page.<br />

156


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Terrorism Threat Map 2005<br />

Map Is Hyperlinked To The Web<br />

157


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Terrorism Threat Map 2006<br />

Map Is Hyperlinked To The Web<br />

158


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Terrorism Threat Map 2007<br />

Map Is Hyperlinked To The Web<br />

159


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Political And Economic Risk Map 2006<br />

http://www.offnews.info/downloads/2006_P&E_Region_Snapshots.pdf<br />

Political And Economic Risk Map 2007<br />

Map Is Hyperlinked To The Web<br />

This map is shown because terrorism has always had some type of correlation to the economic<br />

and political health of certain countries. It may help the analyst determine where terrorist acts<br />

are likely to take place. Obviously the risk map will not tell with any degree of certainty where<br />

the next incident will occur but the analyst can make some predictions by looking at current<br />

instabilities in certain parts of the globe.<br />

160


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Political And Economic Risk Map 2008<br />

Map Is Hyperlinked To The Web<br />

This map is shown because terrorism has always had some type of correlation to the economic<br />

and political health of certain countries. It may help the analyst determine where terrorist acts<br />

are likely to take place. Obviously the risk map will not tell with any degree of certainty where<br />

the next incident will occur but the analyst can make some predictions by looking at current<br />

instabilities in certain parts of the globe.<br />

161


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

<strong>Global</strong> Health Care Capabilities<br />

Map Is Hyperlinked To The Web<br />

162


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Tricks Of The Trade For The <strong>Open</strong> <strong>Source</strong> Analyst<br />

Looking For Old Information<br />

By Etan Horowitz<br />

The Orlando (Fla.) Sentinel<br />

Things move so fast on the Internet that sometimes the information you are looking for has been removed<br />

or changed. Using Google's Cached <strong>Link</strong>s and the Internet Archive's Wayback Machine can help you find<br />

what you are looking for even if the content is no longer online.<br />

1. If you know that the information you are searching for is no longer online, go to Google.com.<br />

2. Enter as much information as you can into Google's search field and hit enter.<br />

3. When your search results appear, find the result with the most appropriate description and click on the<br />

link at the bottom left of the result that says "Cached." This will open a snapshot of the Web page that<br />

Google took as it was indexing it.<br />

Clicking on the cached link may also be useful if you ever click on a search result link that doesn't work.<br />

4. If you don't know exactly what you are looking for or are curious about a previous version of a Web<br />

page, go to web.archive.org to search the Internet Archive's Wayback Machine, an archive of 85 billion<br />

Web pages dating back to 1996.<br />

5. Type the URL of the Web site you want to see and click "Take Me Back." This will bring up a collection<br />

of archived pages from that Web site, organized by year.<br />

Cached <strong>Link</strong>s may not be available for all Web sites and less popular Web sites may not be included in<br />

the Internet Archive Wayback Machine.<br />

163


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

<strong>Open</strong> Access Copyright OSS.Net, Inc. © 2006 All Rights Reserved.<br />

<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Familiarization Documents<br />

The intent of this single-page document is to share basic knowledge about <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>).<br />

History<br />

Quincy Wright, “Project for a World <strong>Intelligence</strong> Center” (1957)<br />

Al Gray, “<strong>Global</strong> <strong>Intelligence</strong> Challenges of the 1990’s” (1988-1989)<br />

Robert Steele, Critique of CIA/FBIS <strong>OSINT</strong> Plan (1989, Still Valid in 2006)<br />

USMC, <strong>OSINT</strong> Program Debate History (1989-1995)<br />

Robert Steele, “E3i: Ethics, Ecology, Evolution, & <strong>Intelligence</strong>: An Alternative Paradigm” (1992)<br />

Robert Steele, “God, Man, and Information: Comments to INTERVAL In-House” (1993)<br />

Robert Steele, “Creating a Smart Nation” (1996)<br />

Robert Steele, “The <strong>OSINT</strong> Story” (2004)<br />

Robert Steele, “Basic Lectures on Secret <strong>Intelligence</strong> Shortfalls and All-<strong>Source</strong> Reform” (2004)<br />

Context<br />

MCIA, “Model for Analysis of Expeditionary Environment” (1989)<br />

MCIA, “Expeditionary Environment Strategic Generalizations” (1990)<br />

USMC, “<strong>Intelligence</strong> Preparation of the Battlefield” (1992)<br />

Robert Steele, “<strong>OSINT</strong>: What Is It? Why Is It Important to the Military?” (1994)<br />

Robert Steele, “Expeditionary Environment in 21 st Century” (1994)<br />

Ben Gilad, Business Blindspots (1996)<br />

Robert Steele, “Virtual <strong>Intelligence</strong> & Information Peacekeeping” (1997)<br />

Robert Steele, “Information Peacekeeping: The Purest Form of War” (1998)<br />

Robert Steele, “Asymmetric Warfare and Four Forces After Next” (1998)<br />

Robert Steele et al, “Relevant Information” (1999)<br />

Amitai Avishalom, “Overcoming Impediments to Information Sharing” (2003)<br />

Defense Science Board “Strategic Communication” (July 2004)<br />

United Nations, “A More Secure World: Our Shared Responsibility” (2004)<br />

Robert Steele, “Address to the Department of State” (2004)<br />

Robert Steele, “Peacekeeping <strong>Intelligence</strong>” (2004)<br />

Robert Steele, “Information Peacekeeping” (2004)<br />

Robert Steele, “Questions Any National <strong>Intelligence</strong> Manager Should Be Able to Answer” (2005)<br />

Robert Steele, “Address to the Department of Homeland Security” (2005)<br />

Robert Steele, “Briefing for the Department of Defense” (2006)<br />

C. K. Prahalad, The Fortune at the Bottom of the Pyramid (2006)<br />

Robert Steele, “Reinventing <strong>Intelligence</strong>” (2006)<br />

Practice<br />

Robert Steele, “Creating a Bare Bones <strong>OSINT</strong> Capability” (1994)<br />

Jack Davis, Compendium of Analytic Tradecraft (1997)<br />

Robert Steele,, <strong>OSINT</strong> Executive Overview (1998)<br />

NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook (2001)<br />

NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Reader (2002)<br />

NATO <strong>Intelligence</strong> Exploitation of the Internet (2002)<br />

Robert Steele, “New Rules for the New Craft of <strong>Intelligence</strong>” (2002)<br />

Robert Steele, “Peacekeeping <strong>Intelligence</strong> Leadership Digest 1.0” (2003)<br />

Eobert Steele, “Special Operations Forces <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook” (DRAFT, 2004)<br />

Robert Steele, “Primer on Public <strong>Intelligence</strong>” (2005)<br />

Essential Individual Access & Analytic Toolkit via SILOBREAKER (2006)<br />

Anonymous, Web Quick <strong>Link</strong>s for the Military Analyst (2006)<br />

Robert Steele, The Practice of <strong>Intelligence</strong> and Related Documents (2006)<br />

Policy & Investment<br />

Mr. Boyd Sutton, “Challenge of <strong>Global</strong> Coverage” (1997)<br />

Dr. Joseph Markowitz, “<strong>Open</strong> <strong>Source</strong> Investment Strategy” (2000)<br />

Dr. Stephen Cambone, USDI, Speech to SASA (2004)<br />

Defense Science Board, “Transition to and From Hostilities” (2004)<br />

Robert Steele, “Creating a Defense <strong>Open</strong> <strong>Source</strong> Agency” (2005)<br />

Robert Steele, “Funding a National <strong>Open</strong> <strong>Source</strong> Agency at $2B a Year” (2005)<br />

164


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Robert Steele, “Commercial Imagery and Geospatial Funding at $600M a Year” (2005)<br />

Robert Steele, “Creating a Combatant Commander <strong>Open</strong> <strong>Source</strong> Program” (2005)<br />

Congressman Rob Simmons (R-CT-02), “Foreword” to Book on Information Operations (2006)<br />

Media<br />

John Perry Barlow in Forbes (2002)<br />

Robert STEELE in TIME (2003)<br />

Kris Alexander in WIRED (2005)<br />

“The Power of Us” in Business Week (2005)<br />

Reference<br />

Annual Training Conference, Proceedings, 1992-date (less 2005, none held)<br />

Portal Pages and Archives, www.oss.net, 1992-date<br />

Robert Steele, Amazon Lists of Recommended Books (look at this first)<br />

Robert Steele, Amazon Reviews (Be patient, two hours = overview of<br />

reality<br />

165


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Dissemination<br />

Can we share?<br />

How much restriction?<br />

May divulge sensitive open<br />

source collection capabilities.<br />

Analysis and Production<br />

(Validated <strong>OSINT</strong> and<br />

Predictive Analysis)<br />

Do we need to go back and modify<br />

the planning and direction?<br />

This still does NOT stop the next<br />

step which is dissemination.<br />

Planning and Direction<br />

What is the Crisis/Crises?<br />

NEO, Humanitarian, Peacekeeping, etc.<br />

Gangs/Drug Cartels/Trafficking<br />

Identify best sources of information.<br />

<strong>Open</strong> <strong>Source</strong><br />

<strong>Intelligence</strong> Cycle<br />

Collection Phase<br />

(Data Capture)<br />

Country Studies<br />

Magazines/Newspapers<br />

Web<br />

Television/Radio<br />

Databases<br />

FBIS<br />

Who’s on the ground?<br />

Informants/<strong>Source</strong>s<br />

Foreign Services<br />

Processing, Integration and<br />

Guidance (Data Mining and Critical<br />

Thinking)<br />

Is there supporting evidence?<br />

Can present data be sanitized?<br />

Do we query/task classified<br />

“INTS”?<br />

Credibility and Reliability<br />

166


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

* * * Google Can Do That? * * *<br />

Recommended Search Tips<br />

* Google lets you search for a range of numbers, in any format. To include a number range in your search<br />

query, type in the lower and upper numbers, separated by two periods - e.g., 15..50 I had a chance to try<br />

out this feature in a real-life search; I wanted to find a set of wireless headphones on Amazon.com<br />

costing between $50 and $100. I typed in the query (wireless OR cordless) headphones $50..$99<br />

site:amazon.com and, sure enough, I retrieved a wide selection of wireless headphones within my price<br />

range.<br />

Note that Google is smart enough to recognize decimal points - some of the items I retrieved weren't an<br />

even dollar amount but were, for example, $57.83. This feature could also come in handy if you are<br />

looking for a mention of a range of years.<br />

* Speaking of date-searching on Google, you can limit your search to only those pages added or changed<br />

within the past [whatever] days. This can be a useful feature if you re-run a search regularly; just limit your<br />

search to the pages added or modified since you last ran your search. You can do this not by adding text<br />

in the search box but by modifying the search results page URL by adding the following text to the end of<br />

the URL and clicking [Search]: &as_qdr=dn (where n is the number of days you want searched)<br />

So, for example, to limit my search to the last 18 days, I would add &as_qdr=d18 to the end of the search<br />

results page URL.<br />

Keep in mind that this isn't a perfect date-limiting search. Some web content management systems<br />

automatically refresh a web page frequently, without necessarily making any changes to the page. Those<br />

pages will have a recent date but the content within them may have been unchanged for months.<br />

* If you are based in the US, you can search for local companies through your cell phone, regardless of<br />

whether or not your phone has web capability. If you call 1-800-GOOG411 (1-800-466-4411), you will be<br />

asked to say the city and state you want information on - Boulder, Colorado, for example - then you say<br />

the type of business or specific business name you want - for example, "book store" or "Barnes and<br />

Noble". A text-to-speech program will read you the top eight results from its local search<br />

(http://local.google.com). If you want, Google can automatically dial any of the first eight businesses'<br />

phone number, or you can ask to have the address and phone number read to you.<br />

You can also get quick answers to simple queries by texting Google from a US cell phone. Send a text<br />

message to 466 453 (GOOGLE) and then type your query in the text box and send it. Within seconds,<br />

you will receive a text message with one of Google's Quick Answers. The default is for Google to take<br />

your query and attempt to find a Quick Answer. If you want a search of the web, put the word web at the<br />

beginning of your search, such as web avian flu. This will return you a text message with a snippet of the<br />

first search result, along with a link to mobile-formatted page of the search results. See<br />

http://sms.google.com for more information on this service.<br />

I recently discovered Intelways, a nifty way to search a number of search engines sequentially. It's not a<br />

metasearch engine; it lets you click from one resource to another. Its main claim to fame is that it<br />

categorizes the tools by broad type of search -- general, images, video, news, social (blogs, social<br />

networking sites, social bookmarking sites, etc.), file-type searching, reference, academic, business, tech<br />

and (natch) shopping. (<strong>Source</strong>: Bates Information Services, www.BatesInfo.com/tip.html )<br />

167


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

PowerSet.com<br />

We have a new player in the semantic search arena; "semantic search" refers to the idea<br />

that a better way to find the most relevant material is to not just look at word frequency,<br />

location, links to a page and so on but to understand the sense of what is being asked and<br />

the sense of what is on web pages, and then to match the most applicable pages. For<br />

example, if I typed in a query for stock, a semantic search engine would see that this was in<br />

the context of livestock, and would find other pages that have to do with animals on farms<br />

rather than about shares of ownership in a company, flowers, or racing cars.<br />

PowerSet uses a technology that attempts to mine meaning out of web pages -- specifically,<br />

Wikipedia articles. This isn't a general-purpose search engine, but it is a tremendous tool if<br />

you are looking for information on a subject that spans a number of Wikipedia articles, or<br />

that has a number of meanings. Take "Barack Obama" as an example. There are thousands<br />

of articles that mention Obama -- the Wikipedia article specifically about him, as well as<br />

articles about politicians who have endorsed him, his early career, the roles of race and<br />

religion in the US presidential campaign, and so on.<br />

Rather than going through all of those entries, including the extensive article specifically on<br />

Obama, head over to PowerSet and you will get a single search result that pulls together<br />

what it judges to be the most relevant information about Barack Obama. There is a nice<br />

summary of who he is, the key facts about his career, and a relevance-ranked list of<br />

Wikipedia pages that mention him.<br />

What I find particularly interesting is the "Factz" section of the page, which attempts to pull<br />

together significant statements about Barack Obama in the Wikipedia articles. So, for<br />

example, the Factz for Barack Obama include information that he introduced the following<br />

pieces of legislation:<br />

� Iraq War De-Escalation Act of 2007<br />

� Response Act<br />

� Pandemic Preparedness<br />

� Transparency Act<br />

� Federal Funding Accountability<br />

While that isn't a comprehensive list of the pieces of legislation he has introduced, these are<br />

probably the most significant ones, since this list includes only legislation that was<br />

mentioned in Wikipedia articles.<br />

PowerSet is best used for those searches that cover a number of topics or areas. It's not<br />

perfect, and it only searches Wikipedia, but I find it an exciting new approach in the efforts<br />

of search engines to make sense out of web content. www.BatesInfo.com/tip.html<br />

168


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Bing Gets Smart<br />

Bing,the search engine formerly known as Microsoft Live Search, has surfaced a number of<br />

its advanced search commands. Some of these are new, some simply haven't been<br />

publicized. You can see some of Bing's features in its Advanced Operator Reference, a<br />

minimalist page that lists operators and, with another click, gives a brief description and<br />

example of when the operator could be used.<br />

Following are a list of four Bing commands:<br />

� Contains: specifies that any page retrieved has links to specific file types. Syntax is<br />

contains:files_type Example: apiculture contains:ppt This is not a search within<br />

pages of those file types; the example here is looking for pages that both contain the<br />

word "apiculture" and have links to files with the .ppt extension. Other file type<br />

extensions you can search for include doc, pdf, ppt, rtf, txt and xls.<br />

� HasFeed: specifies that any page retrieved has a link to an RSS feed on the page.<br />

Syntax is feed: Example:apiculture hasfeed: As with the contains: command, this<br />

isn't searching within RSS feeds; this search finds pages with RSS feeds on them.<br />

� <strong>Link</strong>FromDomain: identifies all the outgoing links on a specific domain, optionally<br />

limited to a particular topic. Syntax is linkfromdomain:a_domain_name To find some<br />

tutorials on renewable energy, for example, you might search for pages that are<br />

linked-to from HowStuffWorks.com and that also have the phrase "renewable<br />

energy" -- linkfromdomain:howstuffworks.com "renewable energy".<br />

� Norelax: lets you specify that all your search terms, not just the first four, be<br />

included in the query. Syntax is norelax:search_word Use this operator to indicate to<br />

Bing that all words in your query must be weighted equally. This tells Bing not to<br />

"relax" its Boolean AND for the fifth and subsequent words in a query. If, for<br />

example, you are creating a more complex query and want to ensure that Bing treats<br />

all words as mandatory, you could search "west nile" mosquito non-toxic<br />

norelax:spraying, using norelax: to make the search word spraying mandatory.<br />

Bates Information Services, and include the URL, www.BatesInfo.com/tips<br />

Using Yahoo to Brainstorm<br />

Yahoo! has an experimental service called Correlator, part of its Sandbox area where Yahoo<br />

tries out new ideas. This particular demonstration is useful for research brainstorming; it<br />

gives you information -- not just search results -- that can help you get a better sense of<br />

the various aspects of an idea.<br />

At its core, Correlator is a sophisticated tool for mining Wikipedia; its default search results<br />

page groups Wikipedia snippets by category. The search query "lithium ion batteries", for<br />

example, gives me information organized into areas such as rechargeable batteries, electric<br />

vehicles, and electric batteries. But what's more interesting is that below the search box are<br />

icons for Names, Places, Events, Concepts, News and Answers.<br />

When I click the Names icon, the result is a dynamic word cloud and list of frequentlyoccurring<br />

names (geographic, personal, company, etc.) related to lithium ion batteries.<br />

169


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Clicking the Places icon displays a map of the world, with flags in areas that are significant<br />

in the context of lithium batteries, such as China (manufacturing), Austin (research and<br />

development), and Chicago and Japan (which both have tests of lithium battery-powered<br />

vehicles). This alone gives me ideas on where to look next -- local Chicago and Japanese<br />

papers, for example, if I want to know what is past the drawing board stage.<br />

The Events icon displays a time line of events, again culled from Wikipedia, pertaining to Liion<br />

batteries. This helps me see, among other things, the speed with which Li-ion batteries<br />

have been incorporated into various devices. The News icon produces snippets from 20 or<br />

so recent stories in Yahoo News on the batteries. Clicking the Answers icon runs my query<br />

in the Yahoo Answers database; since Yahoo Answers tends to be consumer-oriented, the<br />

results help me identify the most common consumer concerns regarding batteries. The<br />

Concepts icon produces another dynamic word cloud and list of key words and phrases from<br />

the relevant Wikipedia articles. Of all the icons, this is the most variable in terms of<br />

usefulness.<br />

While limited to Wikipedia results, I have found Yahoo Correlator to be a quick way to see<br />

the wide range of possibilities for me to explore with a new concept.<br />

170


Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />

Killing Time (only on launch/lunch breaks)<br />

http://dsc.discovery.com/tv/future-weapons/games/cannon/cannon.html<br />

171

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!