Open Source Intelligence (OSINT) Link Directory - Allsource Global ...
Open Source Intelligence (OSINT) Link Directory - Allsource Global ...
Open Source Intelligence (OSINT) Link Directory - Allsource Global ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
IEDs/EFPs<br />
November 2011<br />
Public Places<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>) <strong>Link</strong> <strong>Directory</strong><br />
Targeting Tomorrow’s Terrorist Today (T 4 ) through <strong>OSINT</strong><br />
by: Mr. E. Ben Benavides<br />
CounterTerrorism<br />
Money Laundering<br />
Human Smuggling<br />
Country Studies<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> is<br />
the non-cloak-and-dagger<br />
aspect of fact collecting.<br />
(Alan D. Tompkins)<br />
Infrastructure<br />
Gang Warfare<br />
Weapon Smuggling
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Table of Contents<br />
Comments ................................................................................................................................. 6<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>): What It Is and What It Isn’t ................................................. 7<br />
How To Use <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> ...................................................................................... 7<br />
Dual Classification of <strong>Open</strong> <strong>Source</strong> Information and Able Danger .............................................. 7<br />
<strong>Intelligence</strong> Gathering ................................................................................................................ 7<br />
Tactical and Strategic <strong>Intelligence</strong> .............................................................................................. 7<br />
Components of Strategic <strong>Intelligence</strong> ......................................................................................... 7<br />
The <strong>Intelligence</strong> Community ....................................................................................................... 7<br />
The <strong>Intelligence</strong> Cycle ................................................................................................................ 7<br />
MiningThe Internet For <strong>Intelligence</strong> ............................................................................................ 9<br />
Key Army Access Sites .............................................................................................................26<br />
Must Haves References ............................................................................................................27<br />
Core <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Documents & Guides ...........................................................27<br />
MI Officer Students ...............................................................................................................28<br />
<strong>Global</strong> Incidents (interactive maps) .......................................................................................28<br />
Access by Topic ........................................................................................................................30<br />
911 Final Report....................................................................................................................30<br />
Acquisition .............................................................................................................................30<br />
Afghanistan ...........................................................................................................................30<br />
Africa .....................................................................................................................................31<br />
Agriculture .............................................................................................................................32<br />
Al Qaeda/Taliban ..................................................................................................................32<br />
Aljazeera ...............................................................................................................................32<br />
Ammunition Plants and Depots .............................................................................................33<br />
Area/International Codes .......................................................................................................33<br />
Armies Of The World .............................................................................................................33<br />
Aviation .................................................................................................................................33<br />
Banking & Finance ................................................................................................................34<br />
Biometrics .............................................................................................................................34<br />
Blogs and World Blogs ..........................................................................................................35<br />
Bomb Threat Stand-Off Distances ........................................................................................35<br />
Bridges ..................................................................................................................................38<br />
CAMS Around the World .......................................................................................................39<br />
Center for Army Lessons Learned (CALL).............................................................................39<br />
Central <strong>Intelligence</strong> Agency (CIA) .........................................................................................39<br />
Chemical/Biological/Radiological ...........................................................................................40<br />
China ....................................................................................................................................41<br />
Collective <strong>Intelligence</strong> ...........................................................................................................43<br />
Computer Forensics ..............................................................................................................43<br />
Counterintelligence And Espionage.......................................................................................43<br />
Counterterrorism ...................................................................................................................43<br />
Country <strong>Link</strong>s/Studies ...........................................................................................................44<br />
Crime & Justice .....................................................................................................................46<br />
Cryptome (controversial site but has good information) .........................................................47<br />
Critical Thinking.....................................................................................................................47<br />
Cuba .....................................................................................................................................50<br />
2
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Cultural <strong>Intelligence</strong> ...............................................................................................................50<br />
Cyber & Information Warfare .................................................................................................52<br />
Databases (Some Searchable) .............................................................................................52<br />
Datamining Tools ..................................................................................................................55<br />
Defense ................................................................................................................................55<br />
Demographics & Religion (See Also Religion) .......................................................................56<br />
Denial and Deception ............................................................................................................56<br />
Department of Homeland Security ........................................................................................56<br />
Department of Justice ...........................................................................................................56<br />
Department of The Treasury .................................................................................................57<br />
Directories of the World .........................................................................................................57<br />
Domain Name Servers ..........................................................................................................58<br />
Drugs and Terrorism, Drug Cartels, And Criminal Organizations ...........................................58<br />
Drug Smuggling Techniques .................................................................................................58<br />
Mexican Drug Cartels Reach Into The U.S. ..........................................................................58<br />
Drug Cartels Moving Into The U.S. ........................................................................................34<br />
Economic/Financial .............................................................................................................. .61<br />
El Paso <strong>Intelligence</strong> Center (EPIC)....................................................................................... .61<br />
E-Mail Lookups .....................................................................................................................68<br />
Embassies of the World ........................................................................................................69<br />
Energy ..................................................................................................................................69<br />
Fauxtography ........................................................................................................................70<br />
Federal Government .............................................................................................................70<br />
Gangs (includes gangs in the Military) ...................................................................................71<br />
<strong>Global</strong> Incidents Interactive Maps .........................................................................................73<br />
<strong>Global</strong> Threats/Conflict ..........................................................................................................73<br />
Google ..................................................................................................................................74<br />
Google Hacks And Others .....................................................................................................74<br />
Hamas ..................................................................................................................................75<br />
Hate Groups on The Internet .................................................................................................75<br />
Hezbollah ..............................................................................................................................76<br />
Homeland Security (See Also Department of Homeland Security) ........................................76<br />
Human Trafficking .................................................................................................................76<br />
HUMINT ................................................................................................................................77<br />
Identity Theft .........................................................................................................................77<br />
Image, Audio, Video Finder ...................................................................................................78<br />
IMINT ....................................................................................................................................80<br />
Information Dominance/Operations .......................................................................................80<br />
Improvised Explosive Devices ...............................................................................................81<br />
<strong>Intelligence</strong> Resources ..........................................................................................................82<br />
International <strong>Intelligence</strong> Agencies ........................................................................................82<br />
Internet Privacy and Security.................................................................................................83<br />
Interpol ..................................................................................................................................83<br />
Iranian Military .......................................................................................................................83<br />
Iraninan Websites .................................................................................................................85<br />
Iraq........................................................................................................................................88<br />
Islam/Islamic Websites ..........................................................................................................89<br />
Islamic Heraldry ....................................................................................................................89<br />
Israel .....................................................................................................................................90<br />
Language Training ................................................................................................................91<br />
Language/Web Site Translators Online (In Other Words) ......................................................94<br />
3
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Law Enforcement Support .....................................................................................................94<br />
Lessons Learned ...................................................................................................................95<br />
Library Resources .................................................................................................................95<br />
<strong>Link</strong> Analysis Tools/Software.................................................................................................95<br />
Liquefied Natural Gas Facilities .............................................................................................96<br />
Major Commands (MACOMS) ...............................................................................................96<br />
Mapping and Related Material ...............................................................................................97<br />
Marine Corps ........................................................................................................................97<br />
Medical <strong>Intelligence</strong> ............................................................................................................. 101<br />
Military Magazines .............................................................................................................. 102<br />
Military Operations in Urban Terrain (MOUT) ...................................................................... 103<br />
Missile Threat ...................................................................................................................... 104<br />
Muslim Brotherhood ............................................................................................................ 104<br />
National/International Most Wanted WEB Sites ................................................................... 105<br />
National Security Agency .................................................................................................... 105<br />
Newspapers Around The World .......................................................................................... 105<br />
Nongovernment Organizations (NGOs) ............................................................................... 106<br />
North Korean Military .......................................................................................................... 106<br />
Nuclear Power Plants and WMD Series (Cryptome) ........................................................... 108<br />
Nuclear Reactors and Storage ............................................................................................ 108<br />
Nuclear Terrorism ............................................................................................................... 113<br />
Online Services ................................................................................................................... 114<br />
<strong>Open</strong> <strong>Source</strong> Center (formerly the Foreign Broadcast Information Service) ........................ 114<br />
<strong>OSINT</strong> <strong>Link</strong>s ........................................................................................................................ 114<br />
<strong>OSINT</strong> Support ................................................................................................................... 117<br />
<strong>OSINT</strong> Training ................................................................................................................... 117<br />
<strong>OSINT</strong> Exploitation and The Criminal Threat ....................................................................... 117<br />
<strong>Open</strong> <strong>Source</strong> Software ........................................................................................................ 119<br />
Organized Crime ................................................................................................................. 120<br />
Pakistan .............................................................................................................................. 120<br />
People Finder ...................................................................................................................... 121<br />
Piracy .................................................................................................................................. 121<br />
Ports Worldwide .................................................................................................................. 122<br />
Propaganda (anti-U.S.) ....................................................................................................... 122<br />
Public Data On Sex Offenders ............................................................................................ 122<br />
Public <strong>Intelligence</strong> ............................................................................................................... 122<br />
Rail...................................................................................................................................... 123<br />
Reference/Research Tools .................................................................................................. 123<br />
Religions (see Also Demographics & Religions) .................................................................. 123<br />
Russia ................................................................................................................................. 124<br />
Satellite and Space Views (real time) .................................................................................. 124<br />
Search Engines & Meta Search Engines ............................................................................. 124<br />
Secret Armies ..................................................................................................................... 126<br />
Secure Email ....................................................................................................................... 126<br />
Shopping Malls ................................................................................................................... 126<br />
Social Engineering .............................................................................................................. 126<br />
Social Networking ............................................................................................................... 127<br />
Software For The <strong>Open</strong> <strong>Source</strong> Analyst includes Visualization Software ............................ 128<br />
Steganography and Terrorists ............................................................................................. 133<br />
Sudan ................................................................................................................................. 135<br />
Suicide Bombers ................................................................................................................. 135<br />
4
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Suicide Bomber Profile ........................................................................................................ 135<br />
Suspicious Behavior Could Indicate Terror Plotting ............................................................. 135<br />
Suspicious Packages .......................................................................................................... 135<br />
Taiwan ................................................................................................................................ 135<br />
Taliban ................................................................................................................................ 135<br />
Technology Theft/Transfer .................................................................................................. 139<br />
Terrorism............................................................................................................................. 139<br />
Terrorism News ................................................................................................................... 142<br />
Terrorism Funding ............................................................................................................... 142<br />
Terrorist Targets .................................................................................................................. 143<br />
Terrorist Websites ............................................................................................................... 144<br />
Tracerouting ........................................................................................................................ 145<br />
Training Resources ............................................................................................................. 145<br />
Transportation ..................................................................................................................... 145<br />
Tunnels ............................................................................................................................... 146<br />
UAVs ................................................................................................................................... 146<br />
Venezuela ........................................................................................................................... 146<br />
Visualization Tools .............................................................................................................. 147<br />
Water Conflict ..................................................................................................................... 147<br />
Weapons Around The Globe ............................................................................................... 148<br />
Weapons of Mass Destruction ............................................................................................. 148<br />
Weather .............................................................................................................................. 149<br />
World News Network Sitemap (make this your first stop) .................................................... 149<br />
Miscellaneous ..................................................................................................................... 149<br />
5
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Comments<br />
Forward any sites you feel should be added to me at ben.benavides@gmail.com<br />
This is a living document and at the time of publication all links were active but don’t give up if you get<br />
the “Page Not Found” message. If a link does not work, try copying the link to the URL window. If it still<br />
doesn’t work place the cursor at the end of the URL address and backspace to the first slash and hit the<br />
enter key. If it still does not work keep backspacing to the next slash and press the enter key. Keep doing<br />
this until you either get a hit or enter the home page. Once in the homepage you should be able to find<br />
what you are looking for. But we all know the chaotic nature of the WEB and over time some sites will be<br />
pulled off or no longer function. If this is the case, you have a final recourse - the wayback machine,<br />
http://www.archive.org/. Copy the entire URL and paste it into the “take me back” box in the homepage.<br />
This should take you back to the original homepage and from there you can pick up key words to find<br />
what you are looking for.<br />
I realize also that we don’t think alike. If you feel some links do not belong in a particular category let<br />
me know and I will make the adjustments. If you feel a new category should be added please justify it,<br />
and if you discover links that you think are relevant to the handbook please submit your list and I will<br />
update. Together we can create a valuable guide that is not only useful to the intelligence analyst but also<br />
beneficial to all branches of the military, and civilian agencies. The idea is to develop something that any<br />
branch (infantry, artillery, armor, etc) besides MI can use for their own intelligence gathering. Remember,<br />
“Every Soldier Is A Sensor”. We could also apply this to the civilian world and say “Every Citizen Is A<br />
Sensor”. A good example is the individual that spotted the smoking SUV in Times Square and alerted<br />
police to the situation. Had the contents smoldered long enough it is quite possible the situation could<br />
have turned into something more serious.<br />
While I have tried to get you to your objective as quickly as possible, there is still no substitute for<br />
effective searching techniques. I strongly recommend looking over this very basic WEB searching<br />
techniques site http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Handouts.html and download<br />
the tutorial with powerpoint slides and handouts. I also like Russ Haynal’s Internet Training at<br />
http://navigators.com/opensource.html and I think you will too. Very easy to follow and digest the<br />
information even while working at your own pace.<br />
There are two areas one cannot get away from on the WEB, pornography and theological/political<br />
agendas. I have definitely made sure that none of the links end up with the former, but the latter cannot<br />
be avoided.<br />
I have been advised that I probably have published too much information and have made it easier for<br />
the criminal element. All the information gathered has been through open source harvesting and anyone<br />
with even the slightest knowledge of good searching techniques will be able to gather the same<br />
information. For example, the nuclear related portions in this handbook when merged together will<br />
produce a neat little file. You can gather this same information at the public library or by visiting several<br />
blogs and merging the results. Scattered throughout this handout you will run across material like<br />
Unclassified/FOUO, Law Enforcement Sensitive (LES), Restricted, Controlled Unclassified Information,<br />
and other caveats. Again, this is all open source exploitation. I did not hack into any sites! That’s my story<br />
and I’m sticking to it.<br />
Those links that require a .mil or .gov return address are included for those<br />
authorized access, they will not work for those not authorized access.<br />
Prior to leaving the service of the U.S. Army, I established that this is my intellectual property and there<br />
are no applicable constraints on my sharing it with the public.<br />
6
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>): What It Is and What It Isn’t<br />
According to the NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook, November 2001, there are four<br />
distinct categories of open source information and intelligence.<br />
1) <strong>Open</strong> <strong>Source</strong> Data (OSD). Data is the raw print, broadcast, oral debriefing, or other form of<br />
information from a primary source. It can be a photograph, a tape recording, a commercial satellite image,<br />
or a personal letter from an individual. A god example is a reporter embedded with forces in Afghanistan<br />
or Iraq. He/she is taking pictures, talking to soldiers, recording conversations and firefights, and taking<br />
notes with a pen or pencil. This is considered raw data until it goes through a conversion process to<br />
create a coherent product.<br />
2) <strong>Open</strong> <strong>Source</strong> Information (OSI). OSI is comprised of the raw data that can be put together,<br />
generally by an editorial process that provides some filtering and validation as well as presentation<br />
management. OSI is generic information that is usually widely disseminated. Newspapers, books,<br />
broadcasts, and general daily reports are part of the OSI world. An example is a reporter embedded with<br />
forces who takes the raw data and converts it into a meaningful article that is printed in newspapers,<br />
magazines or broadcasted over the air waves. OSI is what a Soldier would purchase at the bookstore<br />
inside the Post Exchange in the form of USA Today or Newsweek.<br />
3) <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>). <strong>OSINT</strong> is information that has been deliberately<br />
discovered, discriminated, distilled, and disseminated to a select audience, generally the commander and<br />
his/her immediate staff, in order to address a specific question. In the case of a battlefield commander, it<br />
would more than likely be answering the priority intelligence requirements (PIR) or specific orders or<br />
requests (SOR). <strong>OSINT</strong>, in other words, applies the proven process of intelligence to the broad diversity<br />
of open sources of information, and creates intelligence. Example: The meaningful article above (OSI)<br />
that was created from raw data is used to support an operation. It’s quite possible that a photo<br />
accompanying the article may be of a house known to harbor insurgents. The photo in the article<br />
identifies the location and now can be used to support a tailored operation to attack the insurgents.<br />
4) Validated <strong>OSINT</strong> (<strong>OSINT</strong>-V). <strong>OSINT</strong>-V is information to which a very high degree of certainty<br />
can be attributed. It can only be produced by an all-source intelligence professional, with access to<br />
classified intelligence sources, whether working for a nation or for a coalition staff. It can also come from<br />
an assured open source to which no question can be raised concerning its validity (live video of an<br />
aircraft arriving at an airport that is broadcast over the media). <strong>OSINT</strong>-V is <strong>OSINT</strong> for which there are<br />
either confirming or unavailable classified sources or there are no available classified sources disputing<br />
<strong>OSINT</strong>. <strong>OSINT</strong>-V is produced only when the analyst has access to classified sources.<br />
Example: CNN reporter takes photos and reports on a bridge. <strong>Intelligence</strong> personnel are aware<br />
the bridge is vital for the movement of insurgent supplies; however, CNN is unaware of that. Classified<br />
information confirms that such a bridge exists. This in effect validates the reporting as <strong>OSINT</strong>-V,<br />
especially if the bridge is identified to be destroyed to keep insurgents from moving supplies. But, if there<br />
isn’t anything in the classified holdings to deny the existence of the bridge, it is still considered <strong>OSINT</strong>-V<br />
since this is the first time the bridge has been observed and reported, and there are other sources like<br />
other reporters to backup the findings.<br />
People in the intelligence business are realists and know that everything cannot be monitored<br />
simultaneously; construction of new infrastructure is continuously taking place around the world. We<br />
cannot keep track of all new buildings, bridges, roads or airfields being built. This is what makes open<br />
source reporting extremely valuable. It covers the areas the classical “INTS” are not assigned to cover.<br />
The only time <strong>OSINT</strong>-V can be disputed is when there is confirming evidence to deny the information.<br />
Summary: How do I know when I have <strong>OSINT</strong>? The simple answer is the analyst does not have<br />
<strong>OSINT</strong> until the open source information has been processed and analyzed, and supports a specific<br />
requirement. The specific requirement can be a tailored operation or simply answering a question. The<br />
7
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
analyst has to be very careful when it comes to distinguishing between OSI and <strong>OSINT</strong>. <strong>Open</strong> source<br />
information exploitation is exactly what the name implies, that which is gathered/collected from open<br />
sources. In general, it is information that is available to the general public without restrictions unless it is<br />
copyrighted material. These include newspapers, the internet, books, phone books, scientific journals,<br />
radio broadcasts, television, individuals, and other forms. On the other hand, <strong>OSINT</strong> is an intelligence<br />
gathering discipline that involves collecting information from open sources and analyzing it to produce<br />
usable intelligence, and there isn’t anything that says intelligence must be classified in order for it to have<br />
utility. In the <strong>Intelligence</strong> Community, the term "open" refers to overt, publicly available sources (as<br />
opposed to covert or classified sources); it is not related to open-source software. <strong>OSINT</strong> is distinguished<br />
from straight research in that it applies the process of intelligence to create tailored knowledge supportive<br />
of a specific decision by a specific individual or group.<br />
How To Use <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong><br />
By eHow Culture & Society Editor http://www.ehow.com/how_2126848_use-open-sourceintelligence.html<br />
<strong>Open</strong> source intelligence is a process of information gathering from public and overt sources,<br />
such as newspapers and military trade journals, that produces "actionable intelligence." Far from being<br />
the hobby of amateurs, open source intelligence is used by official military and government intelligence<br />
agencies on a regular basis.<br />
1. Gather sources. The number of possible open source intelligence outlets is limitless. Some<br />
basic ones are newspapers, which report on things like troop and fleet movement, and even civilians who<br />
visit other countries and can make relevant observations upon return. Strategy and defense information<br />
websites, such as Jane's Group, also provide high quality information for you to harvest.<br />
2. Pick a region or topic. Monitoring all varieties of open source intelligence across regional and<br />
topical interests takes huge amounts of manpower. To effectively use open source intelligence you<br />
should focus on one region or issue at a time. This will help you to stay on top of the latest information<br />
and will allow you to develop a background understanding of intelligence items.<br />
3. Connect the dots. Once you have gathered your sources you need to monitor news and<br />
information in order to connect the dots. Look, for example, at how heads of state visits coincide with<br />
arms sales. Then consider troop and fleet movement against rising tensions in various regions. Use<br />
widely available technology such as Google Earth, Bing Maps 3D, and others to get views of important<br />
locations. Take all this kind of information and try to deduce the most likely intelligence information from it.<br />
4. Test your theories. One of the best ways to test a theory that you've constructed on the basis<br />
of open source intelligence is to publish the theory. You can post theories on strategy discussion forums<br />
or you can send your piece to influential military bloggers or even newspapers. Check the responses from<br />
other members of the open source intelligence community to see what the criticisms might be.<br />
8
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Dual Classification of <strong>Open</strong> <strong>Source</strong> Information<br />
1 August 2011 (<strong>Source</strong>: http://cryptome.org/0005/double-secret.htm )<br />
The US Director of National <strong>Intelligence</strong> has stated<br />
(http://www.spacewar.com/reports/Analysis_Classifying_open_source_intel_999.html ) that increasingly<br />
heavy use by spies of open source information requires classifying the information to cloak its use. This is<br />
exemplified by Anthony Shaffer, a former military spy, in an interview with Government Security News in<br />
September 2005 describing the early days of classifying open source information acquired from the<br />
Internet. Shaffer made a distinction between the use of open information for intelligence purposes, which<br />
had legal restrictions, and use of the information for military operations which did not have those<br />
restrictions. This may account for the reliance upon military intelligence to gather domestic information<br />
forbidden to spies, that is to classify such information as military in addition to its secrecy classification.<br />
(The interview has been withdrawn from GSN but is available on Archive.org)<br />
http://web.archive.org/web/20070205134153/http://www.gsnmagazine.com/sep_05/shaffer_interview.html<br />
[Excerpts]<br />
SHAFFER:<br />
When the information from LIWA arrived at Tampa, Scott Philpott and his team started looking at it<br />
critically, trying to figure out what this really meant; based on other classified databases and lawyer<br />
review. The lawyers started looking at the data as well for any legal issues regarding the fact that this<br />
information came from “open sources”.<br />
GSN:<br />
Even before anyone at Able Danger made the decision to try to share its findings with other agencies or<br />
departments?<br />
SHAFFER:<br />
Absolutely.<br />
GSN:<br />
Even while the data is still being gathered and analyzed?<br />
SHAFFER:<br />
Absolutely, because there were so many critical issues regarding this, simply because it dealt with open<br />
sources. When an intelligence officer, like me, looks at the data, does that somehow magically turn it into<br />
“intelligence”? That was the critical issue. Somehow, there is this interpretation that even open source<br />
information could be construed as intelligence information because of its use. If Tony Shaffer, intelligence<br />
officer, takes data off the Internet and I use it for a project does that make it “intelligence” and subject it to<br />
all of the rules that govern the oversight of intelligence information?<br />
GSN:<br />
Which legal organization within SOCOM is raising these questions?<br />
SHAFFER:<br />
We’re talking about the lawyers. All lawyers in DoD report back to the DoD General Counsel. There’s no<br />
exception to that. Therefore, it doesn’t matter if the lawyer sits in SOCOM or Defense <strong>Intelligence</strong>, they all<br />
report back to the General Counsel.<br />
GSN:<br />
How big is the group of lawyers sitting in SOCOM?<br />
SHAFFER:<br />
I don’t know the exact size of the shop. I suspect it is probably between eight to a dozen folks, for the<br />
headquarters itself.<br />
9
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
GSN:<br />
Do you remember how the battle over this issue began?<br />
SHAFFER:<br />
Oh, I do, because from Day One, they were worried about, “Where are you getting this data from? What’s<br />
the source of the data? This is open source. How can it be this detailed?”<br />
There were a lot of interrogatives the lawyers were asking regarding the sourcing of the information. I had<br />
no problem ever with oversight and answering the hard questions. The concern was, again, this was open<br />
source, but are we somehow violating some U.S. person’s rights by the fact we’re bringing in [the<br />
information] and using it for intelligence purposes?<br />
GSN:<br />
Was it one of the staff lawyers or was it the head of SOCOM’s legal department that was the principal<br />
mover and shaker of this?<br />
SHAFFER:<br />
I don’t know that answer, but the lawyer assigned to Able Danger was the person who explained this to<br />
us.<br />
GSN:<br />
Was the resistance that you were getting to the methodology -- we haven’t even gotten to the conclusions<br />
yet -- driven largely by this individual lawyer or by his organization?<br />
SHAFFER:<br />
By the organization. I’m confident because I started getting problems with this issue back in my<br />
headquarters in D.C., through the DIA lawyers. I know they were talking to each other and it became a<br />
big issue that all the lawyers in DoD were talking about. One of the investigators currently looking into<br />
this, when I talked to him this last week, confirmed to having the same problems even now. What open<br />
source collection really means, and what level of oversight is appropriate to protect U.S. persons’ rights,<br />
even when intelligence officers look at stuff off the open Internet. The debate remains now.<br />
GSN:<br />
Did this issue get to the DoD general counsel?<br />
SHAFFER:<br />
Yes it did. I know for a fact that it did because I talked to the general counsel lawyer who was the<br />
oversight for this issue. I know for a fact that is was being looked at by the DoD general counsel.<br />
GSN:<br />
Did the General Counsel’s organization know about this matter?<br />
SHAFFER:<br />
Based on direct knowledge, I know they were looking at -- and dealing with -- all these issues because a<br />
subsequent operation, the nickname of the operation was Dorhawk Galley, which happened in the spring<br />
of 2001, before 9/11, I had to talk to the general counsel about the same set of issues, because this had<br />
to do with the Internet and U.S. persons and open source information. I personally briefed George Tenet<br />
on this and I briefed the National Security Council twice.<br />
GSN:<br />
On the issue of open sourcing?<br />
SHAFFER:<br />
On the legal set of issues regarding Dorhawk Galley, which were compatible to the issues we were facing<br />
for Able Danger.<br />
GSN:<br />
10
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Can you summarize the legal argument barring the use of open source information against U.S. citizens<br />
or quasi-citizens?<br />
SHAFFER:<br />
There are two concerns. First, the government has to be careful about what information it puts on the<br />
open Internet because, obviously, if they put something out there, U.S. people can see it. Therefore, it<br />
has to be above board.<br />
Second issue, comparing that information to anything else out there regarding open source information. If<br />
you put information out [on the Internet], you have the reasonable belief, that it’s not going to be<br />
protected. That’s my judgment. If you put something on the Internet, such as a blog statement, it isn’t<br />
protected, it’s open. Does the government have the right to look at that and the use it against you if they<br />
so choose? That is one of the fundamental issues. Because although it’s not protected, and it’s out there,<br />
does the government have the right to do something with it?<br />
What can you look at and not look at regarding U.S. citizens? That was one of the issues we were dealing<br />
with regarding these open Internet searches, which the lawyers were concerned about.<br />
GSN:<br />
What kind of records would be referred to as on the open Internet?<br />
SHAFFER:<br />
For example, corporate records. Say a company talks about its business activities overseas and lists<br />
them. If I take that information, as an intelligence officer, and say “Gee, I may want to look at this for<br />
some intelligence operation down the road.” I take it, print it off and put it in a file. Any file I keep as an<br />
intelligence officer is subject to oversight.<br />
GSN:<br />
Say, for example, hoovers.com, which presents all kinds of corporate financial information, lists every<br />
overseas office of every U.S. publicly-traded company. Now, you look at this and say “Hey, there are 37<br />
companies that have an office in Lagos, Nigeria.”<br />
SHAFFER:<br />
Right. You’re spot on.<br />
GSN:<br />
You’re saying that someone on the legal side of the intelligence community might have said, “We don’t<br />
even have the right to do that. You can’t gather that information off the Internet, which is publicly out<br />
there, and use it in an intelligence manner.”<br />
SHAFFER:<br />
You hit the nub of it, absolutely. That’s what they were concerned about.<br />
GSN:<br />
What was the Able Danger program’s response to that legal argument?<br />
SHAFFER:<br />
Well, we aren’t doing intelligence collection operations, we’re doing operational planning. Therefore,<br />
whatever we’re doing should not fall under intelligence guidelines.<br />
GSN:<br />
That was sort of a stretch, wasn’t it? Here you have this ultra-secret and important intelligence mission<br />
which you claim is happening under operational planning, but wasn’t that somewhat bogus?<br />
SHAFFER:<br />
No, it wasn’t bogus. It was the operational focus. The idea was that we were trying to use this information<br />
for purposes not of intelligence collection. Obviously, we wanted to do it to confirm or vet information, but<br />
I wasn’t using this to plan to go after some U.S. citizen. That was not the purpose.<br />
11
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The purpose was to look at linkages. That’s what we were doing. So, any given byte of information<br />
probably wouldn’t even have been looked at [individually] because it didn’t fit the criteria of our search.<br />
There was [vast amounts] of information. Out of all that, we’re only going to look for things that are<br />
relevant to the target, Al Qaeda.<br />
If I take information off the Internet and put it into a file, I’m doing that electronically, with the database.<br />
That was the issue. You’re doing it electronically. The argument was, “When you take all this information<br />
off the Internet, how do you then protect U.S. citizen rights?” The lawyers were looking at all the<br />
information that was coming in. They had to vet everything. They were personally looking at it and had a<br />
validation process.<br />
GSN:<br />
What would they have pointed to and said, “This is a violation. We can’t allow you to do this”?<br />
SHAFFER:<br />
That’s where the whole issue comes in of lawyers saying, “You can’t look at these guys, who are<br />
suspected as being terrorists.” All this information is coming in. They had this vetting process. And then,<br />
all this information comes to us regarding these [suspected terrorists] who were here legally, as part of<br />
these data runs. But, the lawyers are now saying, “You can’t look at that. We’re going to put that in the<br />
‘U.S person’ category that you can’t look at.”<br />
There is a vetting process. They’re trying to protect U.S citizens’ rights. I briefed the general counsel on<br />
this. I briefed George Tenet on this. The problem was, where do you draw that line regarding protection of<br />
U.S. persons -- between U.S. citizens, such as yourself, and these other folks who are here legally, but<br />
not technically deserving of the same protections? That’s the kernel of the issue.<br />
12
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
<strong>Intelligence</strong> Gathering<br />
<strong>Source</strong>s: http://seattletimes.nwsource.com/html/nationworld/2016162814_threatwhat10.html<br />
http://www.seattlepi.com/news/article/An-intel-Q-A-How-the-US-gets-it-where-it-goes-2163524.php#page-<br />
1<br />
http://romenews-tribune.com/bookmark/15489804<br />
http://www.theskanner.com/article/911-Special-<strong>Intelligence</strong>-QA--How-the-US-Gets-It-Where-It-Goes-<br />
2011-09-11<br />
By The Associated Press<br />
Some questions and answers about the gathering and use of intelligence:<br />
WASHINGTON (AP) — U.S. intelligence in the struggle against terrorism comes in many forms,<br />
maddeningly general, improbably precise, a game of sorts with vast consequences for winner and loser.<br />
It's a satellite image showing tribesmen gathering in a remote area where none should be — the<br />
photograph so clear you can see the caliber of ammunition they are carrying.<br />
It's a snatched bit of conversation between two terrorist leaders, overheard by a trusted source the<br />
terrorists don't realize is listening.<br />
It's a stolen diplomatic cable. That's right, we steal.<br />
Each of these sources and a multitude of others can become the tips that put an entire nation on alert, as<br />
a single tip has done from a single source just before the 10th anniversary of the Sept. 11 attacks.<br />
Here are some questions and answers about the gathering and use of intelligence:<br />
Q: What is intel?<br />
A: Simply put, it is information from anywhere that the U.S. can use to its advantage in the world, either in<br />
pursuit of its goals or to protect its people. It can be as basic as a diplomat reading a local newspaper and<br />
passing on something interesting to a superior in an embassy or Washington. But it gets much more<br />
sophisticated and aggressive than that.<br />
In counterterrorism, bits and pieces of information form a messy picture like an impressionist painting.<br />
Those collecting the signs and signals look for a pattern, eventually an image, that gives them a target to<br />
go after or tells them which target to protect.<br />
___<br />
Q: What are the main forms of intel?<br />
A: Perhaps the spookiest is measurement intelligence, known as "masint," using far-away technology to<br />
get extremely up close and personal. The U.S. is capable of placing a sensor near a suspected terrorist<br />
hideout that can count the number of heartbeats in a room and gauge how fast they're beating. There are<br />
even efforts to understand what a "guilty" heartbeat pattern might be.<br />
Masint, working in combination with other kinds of intelligence-gathering, was one of the clinchers in the<br />
raid that killed Osama bin Laden. The U.S. measured the approximate height of the tall man who paced<br />
beneath the trellis outside the kitchen in a Pakistani compound, to help determine bin Laden was that<br />
man.<br />
13
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Then there is human intelligence, or "humint," which has been around since the dawn of spycraft and is<br />
still vital. That's the tipster you cultivate and pay, or perhaps the unproven one who simply walks into a<br />
U.S. embassy and offers information.<br />
"Sigint," or signals intelligence, monitors or otherwise exploits radio, telephone or satellite phone<br />
transmissions. "Imint" is imagery intelligence that includes photographs showing the outlines of a nuclear<br />
power plant, obscured in desert sands, or a terrorist training base tucked in a mountainside.<br />
Cybertracking is a newer tool, pursuing terrorists who use computers either to attack a computer network<br />
or, more often, to organize how their own human network would launch a physical attack.<br />
___<br />
Q: What happens to this mountain of raw material?<br />
A: Each of those streams of data is captured by a multibillion-dollar worldwide network of U.S. satellites,<br />
armed drones, static blimps and high-flying spy aircraft, manned or unmanned, that suck up so much<br />
sound it takes massive computers to crunch all the data and help analysts overwhelmed by the technical<br />
information to find meaningful clues.<br />
Sometimes these streams are collected by U.S. operatives — Americans or those in U.S. employ — who<br />
go behind enemy lines or into enemy homes, leaving behind the sensors that will provide the data.<br />
True to its name, the Central <strong>Intelligence</strong> Agency is an "all-source" organization using all means.<br />
___<br />
Q: How do all these eyes and ears work together?<br />
A: Sometimes they don't. After a Nigerian allegedly tried to bring down a Detroit-bound airliner on<br />
Christmas Day almost two years ago, it emerged that his father had warned U.S. diplomats about his<br />
son's possible terrorist sympathies, but that tip was lost in the blizzard of counterintelligence.<br />
But in the bin Laden raid, a human source led to the compound in the Pakistani army town of Abbottabad.<br />
Signals intelligence monitored for phone calls emanating from there, and found none, because bin Laden<br />
forbade them, hoping to evade detection by just such technical means. Masint was derived from the<br />
imagery taken by drones and satellites.<br />
All of this helped to convince CIA analysts they had found their man and persuade President Barack<br />
Obama to approve a dangerous and diplomatically risky raid into Pakistani sovereign territory.<br />
___<br />
Q: How is all of this intel sorted through so that the real threats are detected and averted?<br />
A: The ever-present risk is that they won't be. One of the failings of pre-9/11 counterintelligence was that<br />
information was jealously guarded by the individual intelligence agencies. Word of a potential plot to fly<br />
planes into U.S. landmarks was received by one agency. Another agency had word terrorists might be<br />
attending flight school. Each organization kept to itself the dots of information that, when connected, could<br />
have revealed the larger pattern of a massive terrorist plot.<br />
Before raw data and human tips can be called "intelligence," they must be analyzed, and if possible,<br />
corroborated. The CIA alone has 2,500 people in its Directorate of <strong>Intelligence</strong> devoted to that task. There<br />
are thousands more across the 16 intelligence agencies, sifting raw data, and cross-comparing within<br />
their own agencies, and with others, to spot a pattern.<br />
14
___<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Q: What does it mean to receive — and warn the public about — a credible and specific but unconfirmed<br />
threat, as in the latest case?<br />
A: A credible threat means it was heard from a trusted source, not just anyone. Specific means the U.S.<br />
has details about when, where or how an attack might unfold. When a threat is specific and credible but<br />
unconfirmed, that means intelligence officials haven't been able to validate the information even though<br />
they trust the source who gave it to them.<br />
This particular threat is not unusual, but it's being taken so seriously because it comes days before the<br />
10th anniversary of 9/11, a date al-Qaida has eyed for attack.<br />
___<br />
Q: How is the intel being analyzed in the latest threat?<br />
A: Right now, teams of analysts are combing through information gleaned from one trusted source, who<br />
heard that a small group of attackers, perhaps from Pakistan, might blow up a car bomb in New York or<br />
Washington. One or all of the attackers might be from Pakistan. Newly minted al-Qaida leader Ayman al-<br />
Zawahri might be behind it.<br />
These analysts are looking for anything to corroborate that report in the reams of information they've<br />
gathered tracking travelers to the U.S. from Pakistan. U.S. spies overseas will be going back to their<br />
sources to see if anyone has heard the same rumor.<br />
Everything unfolds in a hurry.<br />
"You don't have the luxury of vetting the source and then disseminating the information," said Phillip<br />
Mudd, a former top counterterrorist official at the CIA and the FBI. "You have to tell everyone what you<br />
heard and then try to prove the information is legitimate.<br />
He said he would be directing analysts to pore over everything that can be gleaned from flight and<br />
passport logs of potential foreign suspects who have traveled to the U.S.<br />
"Figuring out who would-be attackers are, or even whether they exist, could take months, where the<br />
drumbeat of national security wants answers in minutes or days," Mudd said.<br />
___<br />
Q: What rules do U.S. intelligence-gatherers have to play by?<br />
A: Looser rules than for most people.<br />
The CIA operates under the U.S. law known as Title 50 — literally a license to break laws in foreign<br />
countries, by committing espionage, persuading a local official to commit treason, or in extreme<br />
circumstances, to go into a foreign country and target an al-Qaida suspect for killing or capture. Title 50<br />
operations are covert, meaning the U.S. never intends to acknowledge them. Other intelligence agencies,<br />
such as the eavesdropping National Security Agency and the new Cyber Command, routinely operate<br />
under Title 50 as well.<br />
___<br />
Q: Ultimately, doesn't it all come down to getting lucky — or unlucky?<br />
A: It can feel that way. There is a favorite expression among intelligence officials, memorably if<br />
15
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
confusingly uttered by former Defense Secretary Donald H. Rumsfeld, that captures the essence of their<br />
work:<br />
"As we know, there are known knowns; there are things we know we know. We also know there are<br />
known unknowns; that is to say we know there are some things we do not know. But there are also<br />
unknown unknowns — the ones we don't know we don't know."<br />
___<br />
Associated Press writer Eileen Sullivan contributed to this report<br />
Read more: RN-T.com<br />
16
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Tactical and Strategic <strong>Intelligence</strong><br />
Tactical <strong>Intelligence</strong> - <strong>Intelligence</strong> that is required for the planning and conduct of tactical<br />
operations. This is in line with military operations being conducted on the battlefield, generally in direct<br />
contact with the enemy, the commander’s timeframe is very much compressed, and he is dealing with<br />
towns, villages, or local tribes. The commander is troubled that an insurgent force may be just over the<br />
next hill or hiding in a building waiting to ambush his forces. He is operating in the here-and-now-in-yourface<br />
cultural environment. There is no room for error!<br />
Strategic <strong>Intelligence</strong> - <strong>Intelligence</strong> that is required for forming policy and military plans at national<br />
and international levels. This is in line with more of an expanded timeframe and takes into consideration<br />
entire countries. The intelligence analysis may run months or years into the future. During this period,<br />
errors, which are not acceptable but do still occur, are not as critical as they are at the tactical level where<br />
life and death are daily concerns. Errors at this level can be corrected with the luxury of more room for<br />
maneuver.<br />
Components of Strategic <strong>Intelligence</strong><br />
The same analytical process that takes place at the strategic level can be applied at the tactical<br />
level. The tactical commander is faced with the same issues albeit at a smaller scale. Policy makers at<br />
national level worry about Iranian and North Korean WMDs but the ground commander also worries<br />
about insurgent WTDs (weapons of troop destruction) that include but are not limited to RPGs, AKs, IEDs,<br />
suicide bombers, etc. Strategic intelligence and tactical intelligence differ primarily in level of application<br />
but may also vary in terms and scope of detail.<br />
Information gathered as strategic intelligence may be categorized into eight components. An easy<br />
way to remember these components is through the use of the acronym BEST MAPS:<br />
Components of Strategic <strong>Intelligence</strong><br />
� Biographic<br />
� Economic<br />
� Sociologic<br />
� Transportation And Communications<br />
� Military Geography<br />
� Armed Forces<br />
� Political<br />
� Scientific And Technical<br />
Each of these components can further be divided into a number of subcomponents. These<br />
components and subcomponents are not all-encompassing nor mutually exclusive. This approach is<br />
merely a means to enhance familiarization with the types of information included in strategic intelligence.<br />
Biographic <strong>Intelligence</strong>:<br />
The study of individuals of actual or potential importance, their background and personalities.<br />
� Educational And Occupational History<br />
� Individual Accomplishments<br />
� Idiosyncrasies And Habits<br />
� Position, Influence, And Potential<br />
� Attitudes And Hobbies<br />
Economic <strong>Intelligence</strong>:<br />
The science of production, distribution, and use of wealth-- the material means of satisfying<br />
human desires. economic intelligence is intelligence which deals with the extent and utilization of the<br />
natural and human resources and the economic potential of nations.<br />
17
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
� Economic Warfare<br />
� Economic Vulnerability<br />
� Manufacturing<br />
� <strong>Source</strong>s Of Economic Capability<br />
Sociological <strong>Intelligence</strong>:<br />
The study of society, as well as the groups within society, their composition, organization,<br />
purposes and habits, and the role of the individual in relation to social institutions.<br />
� Population, Manpower And Labor<br />
� Cultural, Physical Characteristics Of People<br />
� Public Opinion<br />
� Education<br />
� Religion<br />
� Public Health And Welfare<br />
Transportation and Telecommunications <strong>Intelligence</strong>:<br />
Transportation <strong>Intelligence</strong>:<br />
Concerned with the operation and facilities of transportation systems in foreign countries.<br />
Telecommunications <strong>Intelligence</strong>:<br />
Concerned with the operation and facilities of civil and fixed military communications systems in<br />
foreign countries.<br />
Transportation Telecommunications<br />
- Railways - Radio<br />
- Highways - Television<br />
- Inland Waterways - Telephone<br />
- Petroleum Pipelines - Telegraph<br />
- Ports - Submarine Cable<br />
- Merchant Marine - Related Comms<br />
- Aviation - Media<br />
Military Geography:<br />
Geography is the science of the description of the land, sea and air, and the distribution of plant<br />
and animal life, including man and his industries.<br />
Military geographical intelligence is the military evaluation of all geographical factors which may in<br />
any way influence military operations.<br />
� Description<br />
� Natural Features<br />
� Manmade Features<br />
� Sub-Component Name<br />
� Physical Geography<br />
� Human And Cultural Geography<br />
Armed Forces <strong>Intelligence</strong>:<br />
Is the integrated study of the organized land, sea, and air forces, both actual and potential, of<br />
foreign nations.<br />
Strategy: Strategic military problems of the nation in light of position, terrain, economic, political, and other<br />
factors.<br />
18
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Tactics: Employment of weapons, employment and operations of the various arms and services, special<br />
operations training.<br />
Category: Order of battle - equipment - logistics - organization/administration - military manpower<br />
Political <strong>Intelligence</strong>:<br />
Political intelligence is intelligence concerning foreign and domestic policies of governments and<br />
the activities of political movements.<br />
� Basic Principles Of Government/National Policies<br />
� Government Structure<br />
� Foreign Policy<br />
� Political Organizations And Parties<br />
� Pressure Groups<br />
� Electoral Procedures<br />
� Public Order And Safety<br />
� Subversion<br />
� <strong>Intelligence</strong> And Security Organization<br />
� Propaganda<br />
Scientific And Technical <strong>Intelligence</strong>:<br />
Is the study and evaluation of a foreign countries scientific and technical capability and potential<br />
to supports its objective through the development of new weapons and new equipment.<br />
� New Weapons And Equipment<br />
� Missiles And Space<br />
� Nuclear, Biological, And Chemical<br />
� Basic And Applied Science<br />
Overt Collection Responsibilities:<br />
� Dept. Of State: Political, Sociological, Economic, Scientific And Technical.<br />
� Dept. Of Defense: Military intelligence information (also scientific/technical and economic pertinent to<br />
DoD missions.<br />
� CIA: Exploitation of domestic sources of foreign intelligence; monitoring of foreign radio broadcasts<br />
19
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
THE INTELLIGENCE COMMUNITY<br />
MISSION AND AUTHORITIES OF THE DIRECTOR OF NATIONAL INTELLIGENCE (DNI)<br />
The Director of National <strong>Intelligence</strong> (DNI) serves as the head of the <strong>Intelligence</strong> Community (IC),<br />
overseeing and directing the implementation of the National <strong>Intelligence</strong> Program (NIP) and acting as the<br />
principal advisor to the President, the National Security Council, and the Homeland Security Council for<br />
intelligence matters. Working together with the Principal Deputy DNI (PDDNI) and with the assistance of<br />
Mission Managers and four Deputy Directors, the Office of the Director of National <strong>Intelligence</strong>’s goal is to<br />
protect and defend American lives and interests through effective intelligence.<br />
20
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
THE INTELLIGENCE CYCLE<br />
Equally important to the components of strategic intelligence is an awareness of the strategic<br />
intelligence cycle and the debriefer's role within that cycle. The first step is the identification of intelligence<br />
gaps. Analysts translate these gaps into intelligence requirements - the second step. In the third step, the<br />
strategic debriefer fulfills those requirements. The fourth step involves preparation of an intelligence<br />
report. The fifth and last step is the preparation of an intelligence report evaluation by the originator of the<br />
requirement. These evaluations measure the quality of the information as well as the quality of the report<br />
writing.<br />
The <strong>Intelligence</strong> Cycle is the process of developing raw information into finished intelligence for<br />
policymakers to use in decisionmaking and action. There are five steps which constitute the <strong>Intelligence</strong><br />
Cycle.<br />
1. Planning and Direction<br />
... is management of the entire effort, from identifying the need for data to delivering an intelligence<br />
product to a consumer. It is the beginning and the end of the cycle—the beginning because it involves<br />
drawing up specific collection requirements and the end because finished intelligence, which supports<br />
policy decisions, generates new requirements.<br />
The whole process depends on guidance from public officials. Policymakers—the President, his aides,<br />
the National Security Council, and other major departments and agencies of government—initiate<br />
requests for intelligence.<br />
2. Collection<br />
... is the gathering of the raw information needed to produce finished intelligence. There are many<br />
sources of information, including open sources such as foreign broadcasts, newspapers, periodicals, and<br />
books. <strong>Open</strong> source reporting is integral to CIA's analytical capabilities. There are also secret sources of<br />
information. CIA operations officers collect such information from agents abroad and from defectors who<br />
provide information obtainable in no other way.<br />
Finally, technical collection—electronics and satellite photography—plays an indispensable role in<br />
modern intelligence, such as monitoring arms control agreements and providing direct support to military<br />
forces.<br />
3. Processing<br />
... involves converting the vast amount of information collected to a form usable by analysts. This is done<br />
through a variety of methods including decryption, language translations, and data reduction.<br />
4. All-<strong>Source</strong> Analysis and Production<br />
... is the conversion of basic information into finished intelligence. It includes integrating, evaluating, and<br />
analyzing all available data—which is often fragmented and even contradictory—and preparing<br />
intelligence products. Analysts, who are subject-matter specialists, consider the information's reliability,<br />
validity, and relevance. They integrate data into a coherent whole, put the evaluated information in<br />
context, and produce finished intelligence that includes assessments of events and judgments about the<br />
implications of the information for the United States.<br />
The CIA devotes the bulk of its resources to providing strategic intelligence to policymakers. It performs<br />
this important function by monitoring events, warning decisionmakers about threats to the United States,<br />
and forecasting developments. The subjects involved may concern different regions, problems, or<br />
personalities in various contexts—political, geographic, economic, military, scientific, or biographic.<br />
Current events, capabilities, and future trends are examined.<br />
The CIA produces numerous written reports, which may be brief—one page or less—or lengthy studies.<br />
They may involve current intelligence, which is of immediate importance, or long-range assessments. The<br />
Agency presents some finished intelligence in oral briefings. The CIA also participates in the drafting and<br />
production of National <strong>Intelligence</strong> Estimates, which reflect the collective judgments of the <strong>Intelligence</strong><br />
Community.<br />
5. Dissemination<br />
21
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The last step, which logically feeds into the first, is the distribution of the finished intelligence to the<br />
consumers, the same policymakers whose needs initiated the intelligence requirements. Finished<br />
intelligence is provided daily to the President and key national security advisers. The policymakers, the<br />
recipients of finished intelligence, then make decisions based on the information, and these decisions<br />
may lead to the levying of more requirements, thus triggering the <strong>Intelligence</strong> Cycle.<br />
22
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
MARCH 6, 2010<br />
MiningThe Internet For <strong>Intelligence</strong><br />
HOW MUCH DATA IS GENERATED ON INTERNET EVERY YEAR/MONTH/DAY?<br />
According to Neilson Online currently there are more than 1,733,993,741 internet users. How much data<br />
are these users generating ?<br />
Few numbers to understand how much data is generated every year.<br />
Email<br />
* 90 trillion – The number of emails sent on the Internet in 2009.<br />
* 247 billion – Average number of email messages per day.<br />
* 1.4 billion – The number of email users worldwide.<br />
* 100 million – New email users since the year before.<br />
* 81% – The percentage of emails that were spam.<br />
* 92% – Peak spam levels late in the year.<br />
* 24% – Increase in spam since last year.<br />
* 200 billion – The number of spam emails per day (assuming 81% are spam).<br />
Websites<br />
* 234 million – The number of websites as of December 2009.<br />
* 47 million – Added websites in 2009.<br />
Web servers<br />
* 13.9% – The growth of Apache websites in 2009.<br />
* -22.1% – The growth of IIS websites in 2009.<br />
* 35.0% – The growth of Google GFE websites in 2009.<br />
* 384.4% – The growth of Nginx websites in 2009.<br />
* -72.4% – The growth of Lighttpd websites in 2009.<br />
Domain names<br />
* 81.8 million – .COM domain names at the end of 2009.<br />
* 12.3 million – .NET domain names at the end of 2009.<br />
* 7.8 million – .ORG domain names at the end of 2009.<br />
* 76.3 million – The number of country code top-level domains (e.g. .CN, .UK, .DE, etc.).<br />
* 187 million – The number of domain names across all top-level domains (October 2009).<br />
* 8% – The increase in domain names since the year before.<br />
Internet users<br />
* 1.73 billion – Internet users worldwide (September 2009).<br />
* 18% – Increase in Internet users since the previous year.<br />
* 738,257,230 – Internet users in Asia.<br />
* 418,029,796 – Internet users in Europe.<br />
* 252,908,000 – Internet users in North America.<br />
* 179,031,479 – Internet users in Latin America / Caribbean.<br />
* 67,371,700 – Internet users in Africa.<br />
* 57,425,046 – Internet users in the Middle East.<br />
* 20,970,490 – Internet users in Oceania / Australia.<br />
Social media<br />
* 126 million – The number of blogs on the Internet (as tracked by BlogPulse).<br />
* 84% – Percent of social network sites with more women than men.<br />
* 27.3 million – Number of tweets on Twitter per day (November, 2009)<br />
* 57% – Percentage of Twitter’s user base located in the United States.<br />
* 4.25 million – People following @aplusk (Ashton Kutcher, Twitter’s most followed user).<br />
* 350 million – People on Facebook.<br />
* 50% – Percentage of Facebook users that log in every day.<br />
* 500,000 – The number of active Facebook applications.<br />
Images<br />
23
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
* 4 billion – Photos hosted by Flickr (October 2009).<br />
* 2.5 billion – Photos uploaded each month to Facebook.<br />
* 30 billion – At the current rate, the number of photos uploaded to Facebook per year.<br />
Videos<br />
* 1 billion – The total number of videos YouTube serves in one day.<br />
* 12.2 billion – Videos viewed per month on YouTube in the US (November 2009).<br />
* 924 million – Videos viewed per month on Hulu in the US (November 2009).<br />
* 182 – The number of online videos the average Internet user watches in a month (USA).<br />
* 82% – Percentage of Internet users that view videos online (USA).<br />
* 39.4% – YouTube online video market share (USA).<br />
* 81.9% – Percentage of embedded videos on blogs that are YouTube videos.<br />
Web browsers<br />
* 62.7% – Internet Explorer<br />
* 24.6% – Firefox<br />
* 4.6% – Chrome<br />
* 4.5% – Safari<br />
* 2.4% – Opera<br />
* 1.2% – Other<br />
Malicious software<br />
* 148,000 – New zombie computers created per day (used in botnets for sending spam, etc.)<br />
* 2.6 million – Amount of malicious code threats at the start of 2009 (viruses, trojans, etc.)<br />
* 921,143 – The number of new malicious code signatures added by Symantec in Q4 2009.<br />
(<strong>Source</strong>: http://hadoop-karma.blogspot.com/2010/03/how-much-data-is-generated-on-internet.html)<br />
Megabytes, Gigabytes, Terabytes... What Are They?<br />
These terms are usually used in the world of computing to describe disk space, or data storage space,<br />
and system memory. For instance, just a few years ago we were describing hard drive space using the<br />
term Megabytes. Today, Gigabytes is the most common term being used to describe the size of a hard<br />
drive. In the not so distant future, Terabyte will be a common term. But what are they? This is where it<br />
gets quite confusing because there are at least three accepted definitions of each term.<br />
According to the IBM Dictionary of computing, when used to describe disk storage capacity, a megabyte<br />
is 1,000,000 bytes in decimal notation. But when the term megabyte is used for real and virtual storage,<br />
and channel volume, 2 to the 20th power or 1,048,576 bytes is the appropriate notation. According to the<br />
Microsoft Press Computer Dictionary, a megabyte means either 1,000,000 bytes or 1,048,576 bytes.<br />
According to Eric S. Raymond in The New Hacker's Dictionary, a megabyte is always 1,048,576 bytes on<br />
the argument that bytes should naturally be computed in powers of two. So which definition do most<br />
people conform to?<br />
When referring to a megabyte for disk storage, the hard drive manufacturers use the standard that a<br />
megabyte is 1,000,000 bytes. This means that when you buy an 80 Gigabyte Hard drive you will get a<br />
total of 80,000,000,000 bytes of available storage. This is where it gets confusing because Windows uses<br />
the 1,048,576 byte rule so when you look at the Windows drive properties an 80 Gigabyte drive will report<br />
a capacity of 74.56 Gigabytes and a 250 Gigabyte drive will only yield 232 Gigabytes of available storage<br />
space. Anybody confused yet? With three accepted definitions, there will always be some confusion so I<br />
will try to simplify the definitions a little.<br />
The 1000 can be replaced with 1024 and still be correct using the other acceptable standards. Both of<br />
these standards are correct depending on what type of storage you are referring.<br />
24
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Processor or Virtual Storage Disk Storage<br />
· 1 Bit = Binary Digit<br />
· 8 Bits = 1 Byte<br />
· 1024 Bytes = 1 Kilobyte<br />
· 1024 Kilobytes = 1 Megabyte<br />
· 1024 Megabytes = 1 Gigabyte<br />
· 1024 Gigabytes = 1 Terabyte<br />
· 1024 Terabytes = 1 Petabyte<br />
· 1024 Petabytes = 1 Exabyte<br />
· 1024 Exabytes = 1 Zettabyte<br />
· 1024 Zettabytes = 1 Yottabyte<br />
· 1024 Yottabytes = 1 Brontobyte<br />
· 1024 Brontobytes = 1 Geopbyte<br />
· 1 Bit = Binary Digit<br />
· 8 Bits = 1 Byte<br />
· 1000 Bytes = 1 Kilobyte<br />
· 1000 Kilobytes = 1 Megabyte<br />
· 1000 Megabytes = 1 Gigabyte<br />
· 1000 Gigabytes = 1 Terabyte<br />
· 1000 Terabytes = 1 Petabyte<br />
· 1000 Petabytes = 1 Exabyte<br />
· 1000 Exabytes = 1 Zettabyte<br />
· 1000 Zettabytes = 1 Yottabyte<br />
· 1000 Yottabytes = 1 Brontobyte<br />
· 1000 Brontobytes = 1 Geopbyte<br />
This is based on the IBM Dictionary of computing method to describe disk storage - the simplest.<br />
<strong>Source</strong>: http://www.whatsabyte.com/<br />
Now let's go into a little more detail.<br />
Bit: A Bit is the smallest unit of data that a computer uses. It can be used to represent two states of<br />
information, such as Yes or No.<br />
Byte: A Byte is equal to 8 Bits. A Byte can represent 256 states of information, for example, numbers or a<br />
combination of numbers and letters. 1 Byte could be equal to one character. 10 Bytes could be equal to a<br />
word. 100 Bytes would equal an average sentence.<br />
Kilobyte: A Kilobyte is approximately 1,000 Bytes, actually 1,024 Bytes depending on which definition is<br />
used. 1 Kilobyte would be equal to this paragraph you are reading, whereas 100 Kilobytes would equal an<br />
entire page.<br />
Megabyte: A Megabyte is approximately 1,000 Kilobytes. In the early days of computing, a Megabyte<br />
was considered to be a large amount of data. These days with a 500 Gigabyte hard drive on a computer<br />
being common, a Megabyte doesn't seem like much anymore. One of those old 3-1/2 inch floppy disks<br />
can hold 1.44 Megabytes or the equivalent of a small book. 100 Megabytes might hold a couple volumes<br />
of Encyclopedias. 600 Megabytes is about the amount of data that will fit on a CD-ROM disk.<br />
Gigabyte: A Gigabyte is approximately 1,000 Megabytes. A Gigabyte is still a very common term used<br />
these days when referring to disk space or drive storage. 1 Gigabyte of data is almost twice the amount of<br />
data that a CD-ROM can hold. But it's about one thousand times the capacity of a 3-1/2 floppy disk. 1<br />
Gigabyte could hold the contents of about 10 yards of books on a shelf. 100 Gigabytes could hold the<br />
entire library floor of academic journals.<br />
Terabyte: A Terabyte is approximately one trillion bytes, or 1,000 Gigabytes. There was a time that I<br />
never thought I would see a 1 Terabyte hard drive, now one and two terabyte drives are the normal specs<br />
for many new computers. To put it in some perspective, a Terabyte could hold about 3.6 million 300<br />
Kilobyte images or maybe about 300 hours of good quality video. A Terabyte could hold 1,000 copies of<br />
the Encyclopedia Britannica. Ten Terabytes could hold the printed collection of the Library of Congress.<br />
That's a lot of data.<br />
Petabyte: A Petabyte is approximately 1,000 Terabytes or one million Gigabytes. It's hard to visualize<br />
what a Petabyte could hold. 1 Petabyte could hold approximately 20 million 4-door filing cabinets full of<br />
text. It could hold 500 billion pages of standard printed text. It would take about 500 million floppy disks to<br />
store the same amount of data.<br />
25
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Exabyte: An Exabyte is approximately 1,000 Petabytes. Another way to look at it is that an Exabyte is<br />
approximately one quintillion bytes or one billion Gigabytes. There is not much to compare an Exabyte to.<br />
It has been said that 5 Exabytes would be equal to all of the words ever spoken by mankind.<br />
Zettabyte: A Zettabyte is approximately 1,000 Exabytes. There is nothing to compare a Zettabyte to but<br />
to say that it would take a whole lot of ones and zeroes to fill it up.<br />
Yottabyte: A Yottabyte is approximately 1,000 Zettabytes. It would take approximately 11 trillion years to<br />
download a Yottabyte file from the Internet using high-power broadband. You can compare it to the World<br />
Wide Web as the entire Internet almost takes up about a Yottabyte.<br />
Brontobyte: A Brontobyte is (you guessed it) approximately 1,000 Yottabytes. The only thing there is to<br />
say about a Brontobyte is that it is a 1 followed by 27 zeroes!<br />
Geopbyte: A Geopbyte is about 1000 Brontobytes! Not sure why this term was created. I'm doubting that<br />
anyone alive today will ever see a Geopbyte hard drive. One way of looking at a geopbyte is 15267<br />
6504600 2283229 4012496 7031205 376 bytes!<br />
Now you should have a good understanding of megabytes, gigabytes, terabytes and everything in<br />
between. Now if we can just figure out what a WhatsAByte is......:)<br />
DATA IS ABUNDANT, INFORMATION IS USEFUL, KNOWLEDGE IS PRECIOUS.<br />
Data. – Data is raw and it’s abundant. It simply exists and has no significance beyond its existence . It<br />
can exist in any form, usable or not. It does not have meaning of itself. Collecting users activity log will<br />
produces data.<br />
Information. – Information is data that has been given meaning by way of relational connection.<br />
Knowledge. - Knowledge is the appropriate collection of information, such that its intent is to be useful.<br />
Internet users are generating petabytes of data every day. Millions of users access billions of web pages<br />
every millisecond, creating hundreds of server logs with every keystroke and mouse click. Having only<br />
user log data is not useful. To give better service to user and generate money for business it is required<br />
to process raw data and collect information which can be used for providing knowledge to users and<br />
advertisers. <strong>Source</strong>: http://www.whatsabyte.com/<br />
Based on these figures, I opine that intelligence exists out there just waiting to be tapped. Oh, come on<br />
now, you do have search engines to help research that data; it’s only 8 zetabytes! Lots of data but guess<br />
what, even Google which is considered currently the best search engine, has only indexed about 170<br />
terabytes. Now you know why I recommend using more than one search engine with good keywords to<br />
assist.<br />
Key Army Access Sites<br />
NOTE: Several links require password access.<br />
To access Intelink or to apply for a remote access account, go to https://www.intelink.gov<br />
US Army <strong>Intelligence</strong> Center Mission:<br />
The United States Army <strong>Intelligence</strong> Center's mission is Leading, Training, Equipping and<br />
Supporting the world's premier corps of Military <strong>Intelligence</strong> Professionals who are imbued with<br />
a warrior spirit, self-discipline and mutual respect.<br />
26
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The 304th Military <strong>Intelligence</strong> Battalion's Mission:<br />
https://icon.army.mil/anon/ikn_website/index.cfm?organization=304th%20MI%20Battalion<br />
The 304th Military <strong>Intelligence</strong> Battalion conducts officer training at the tactical and operational<br />
levels in support of Army, Joint, Interagency and Multinational Commands; producing competent<br />
MI professionals who are grounded in the warrior ethos and Army values and ready to deploy in<br />
support of an Army at war; simultaneously the Battalion ensures the welfare of Soldiers,<br />
civilians, and their families.<br />
<strong>Intelligence</strong> Knowledge Network (IKN):<br />
https://icon.army.mil/<br />
IKN is a Knowledge Management tool that enables <strong>Intelligence</strong> soldiers all over the world to<br />
communicate, collaborate and investigate. It hosts discussion forums, serves as a single point<br />
of entry to get to USAIC and other <strong>Intelligence</strong> Community websites, and hosts a variety of<br />
public and private web applications that support the <strong>Intelligence</strong> Community. In order to ensure<br />
that IKN continues to meet your needs, we encourage you to provide us with feedback.<br />
Must Haves References<br />
Core <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Documents & Guides<br />
NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook<br />
http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSIN<br />
T%20Handbook%20v1.2%20%2d%20Jan%202002.pdf<br />
NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Reader<br />
http://www.oss.net/dynamaster/file_archive/030201/254633082e785f8fe44f546bf5c9f1ed/NATO%20OSIN<br />
T%20Reader%20FINAL%2011OCT02.pdf<br />
<strong>Intelligence</strong> Exploitation Of The Internet<br />
http://www.oss.net/dynamaster/file_archive/030201/1c0160cde7302e1c718edb08884ca7d7/<strong>Intelligence</strong>%<br />
20Exploitation%20of%20the%20Internet%20FINAL%2018NOV02.pdf<br />
INSCOM <strong>OSINT</strong> Operations Handbook http://nipr.intelink.gov/inscom/docs/inscom_hb_v1.pdf<br />
https://www.intelink.gov/inscom/docs/inscom_hb_v1.pdf<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> FM 2-22.9 http://www.fas.org/irp/doddir/army/fmi2-22-9.pdf<br />
Untangling The WEB 2007 Edition http://nipr.intelink.gov/nsa/UTW/index.html<br />
https://www.intelink.gov/nsa/UTW/index.html<br />
<strong>Open</strong> <strong>Source</strong> Exploitation: A Guide For <strong>Intelligence</strong> Analysts<br />
http://nipr.intelink.gov/osis/training/osint_handbook_apr_04_edition.pdf<br />
https://www.intelink.gov/osis/training/osint_handbook_apr_04_edition.pdf<br />
Internet Detective a free online tutorial designed to help students develop the critical thinking<br />
required for their Internet research. The tutorial offers practical advice on evaluating the quality of<br />
websites and highlights the need for care when selecting online information sources.<br />
http://www.vts.intute.ac.uk/detective/<br />
27
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
See also<br />
One-Page <strong>OSINT</strong> <strong>Link</strong> Guide at http://www.oss.net/BASIC<br />
<strong>Directory</strong> to 30,000 pages sortable and searchable by speaker/author, year, topic, or community:<br />
http://www.oss.net/LIBRARY also re-sorted and available at http://www.oss.net/COMMUNITIES<br />
Seminal Chapter on <strong>OSINT</strong> as a Strategic All-<strong>Source</strong> <strong>Intelligence</strong> Element: http://www.oss.net/<strong>OSINT</strong>-S<br />
Seminal Chapter on <strong>OSINT</strong> as an Operational Resource Element http://www.oss.net/<strong>OSINT</strong>-O<br />
Utilization of Internet Resources for <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (Ran Hock) http://www.onstrat.com/osint<br />
<strong>OSINT</strong> <strong>Link</strong>s Collection (UK) http://www.osint.org.uk/links.html<br />
Military <strong>Intelligence</strong> Students (new to IPB/COAs/MDMP or just need a refresher) give these<br />
sites a visit.<br />
http://www.s2company.com/index.php<br />
http://www.armytoolbag.com/<br />
<strong>Global</strong> Incidents (interactive maps)<br />
Terrorism and Political Violence Threat Map 2011 (great interactive map)<br />
http://www.aon.com/risk-services/political-riskmap2/map/Interactive_Risk_Map/2011_Terrorism_Political_Violence_Map/index.html<br />
Unrest in the Arab World on Google Maps<br />
http://edition.cnn.com/SPECIALS/2011/arab.unrest/index.html<br />
http://www.mibazaar.com/meprotests.html<br />
Maersk – Track ships in real time. (we certainly do make it easy for pirates!)<br />
http://www.maerskfleet.com/#live-map<br />
Mexico Under Seige: The Drug War at Our Doorstep http://projects.latimes.com/mexico-drugwar/#/its-a-war<br />
CIA World Fact Book<br />
http://visunetdemos.demos.ibm.com/blogsamples/factbook2/FactBookSE.html<br />
Terrorist Groups Interactive Map http://www.nctc.gov/site/map/map.html<br />
Conflict Map http://nobelprize.org/educational_games/peace/conflictmap/conflictmap.html<br />
Tracking The Threat http://www.trackingthethreat.com/<br />
Nuclear Terrorism Blast Maps http://www.nuclearterror.org/blastmaps.html<br />
Worldwide Incidents Tracking System https://wits.nctc.gov/FederalDiscoverWITS/index.do?N=0<br />
Mexican Drug Cartels In The United States<br />
http://www.cnn.com/interactive/2009/05/world/map.mexican.cartels/index.html<br />
Food And Drug Incident Mapping (map displays food/medicine items…Spurious, Adulterated,<br />
Counterfeit, Contaminated, Tampered-With, Misbranded/Mislabeled, Recalled, Expired, and otherwise<br />
dangers products such as Food, Medicine, Tobacco, Alcohol, Meat/Seafood, and sometimes things like<br />
toys or jewelry, animal feed, and anything else that comes into contact with humans or things we<br />
consume) http://food.globalincidentmap.com/home.php<br />
Outbreaks <strong>Global</strong> Incident Map http://outbreaks.globalincidentmap.com/home.php<br />
Health Map <strong>Global</strong> Disease Alert Map http://www.healthmap.org/en<br />
Piracy Watch http://vfdemo.idvsolutions.com/piracy/<br />
Piracy Map 2005 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />
4<br />
28
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Piracy Map 2006 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />
3<br />
Piracy Map 2007 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />
2<br />
Piracy Map 2008 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=89<br />
Piracy Map 2009 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=21<br />
9<br />
Mapping Gang Related Activity In North America http://gangs.globalincidentmap.com/home.php<br />
USCG Ship Traffic Density Plot http://www.amver.com/density.asp<br />
Today’s Front Pages (interactive) http://www.newseum.org/todaysfrontpages/flash/default.asp<br />
News Map http://muti.co.za/static/newsmap.html<br />
Reuters AlertNet<br />
http://www.alertnet.org/map/index.htm?ct=2&style=2&ex_iso=MX,NE,TH,CD,KE<br />
Silobreaker (for those familiar with Analyst Notebook, I think you’ll like this)<br />
http://www.silobreaker.com/<br />
<strong>Global</strong> Terrorism Database http://209.232.239.37/gtd1/<br />
Interactive <strong>Global</strong> Incident Map (Terrorism Events and Other Suspicious Activity)<br />
http://www.globalincidentmap.com/<br />
PlanetData http://www.planetdata.net/worldnews/newsmap.php<br />
Google News Map http://douweosinga.com/projects/googlenewsmap<br />
Alert Map Actual Incidents http://visz.rsoe.hu/alertmap/woalert.php?lang=eng<br />
Baghdad: Mapping The Violence<br />
http://news.bbc.co.uk/2/shared/spl/hi/in_depth/baghdad_navigator/<br />
Interactive Map Beta http://www.alertnet.org/map/<br />
Public <strong>Intelligence</strong> in The Public Interest http://meta2.com/pdb/<br />
RSOE Emergency And Disaster Information Service From Budapest, Hungary<br />
http://visz.rsoe.hu/alertmap/<br />
The <strong>Global</strong> Terrorism Database (GTD) is an open-source database including information on<br />
terrorist events around the world since 1970 (currently updated through 2004). Unlike many other event<br />
databases, the GTD includes systematic data on international as well as domestic terrorist incidents that<br />
have occurred during this time period and now includes almost 80,000 cases. For each GTD incident,<br />
information is available on the date and location of the incident, the weapons used and nature of the<br />
target, the number of casualties, and -- when identifiable -- the identity of the perpetrator.<br />
http://www.start.umd.edu/data/gtd/<br />
Tracking The Threat (is database of open source information about the Al Qaeda terrorist<br />
network, developed as a research project of the FMS Advanced Systems Group. Our goal is to apply new<br />
technologies and software engineering approaches to open source intelligence while providing<br />
researchers and analysts with information about Al Qaeda) http://www.trackingthethreat.com/<br />
LiveLeak http://www.liveleak.com/live<br />
Ogle Earth Ogle Earth brings you news about virtual globes, with a special focus on Google Earth.<br />
http://www.ogleearth.com/<br />
Mapping The Future http://mappingthefuture.csis.org/imagemap.shtml<br />
http://mappingthefuture.csis.org/mappingthefuturebig2.pdf<br />
<strong>Global</strong>is - an interactive world map <strong>Global</strong>is is an interactive world atlas where you decide what<br />
is to be displayed on the map. <strong>Global</strong>is aims to create an understanding for similarities and differences in<br />
human societies, as well as how we influence life on the planet. This is primarily done using visual<br />
means. http://globalis.gvu.unu.edu/<br />
How To Use <strong>Global</strong>is http://globalis.gvu.unu.edu/doc.cfm?page=help<br />
LiveShips Map (See where water vessels are located at any time, Vessel positions may be up to<br />
one hour old or incomplete.) http://www.marinetraffic.com/ais/<br />
Vessel Tracker http://www.vesseltracker.com/en/Home.html<br />
29
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Access by Topic<br />
911 Final Report<br />
Acquisition<br />
911 Commission Final Report http://vivisimo.com/911<br />
Defense Acquisition University http://www.dau.mil/<br />
Office Of Naval Research http://www.onr.navy.mil/02/<br />
Office Of The Under Secretary Of Defense http://www.acq.osd.mil/<br />
Defense Procurement And Acquisition Policy http://www.acq.osd.mil/dpap/<br />
DoD Acquisition Information http://mems.ida.org/acquisition/dodacquisition.html<br />
Afghanistan/Pakistan<br />
Map is linked to original on web for more detail.<br />
LiveLeak Afghanistan http://www.liveleak.com/c/afghanistan<br />
Afghanistan Provincial Reconstruction Team Handbook<br />
http://usacac.army.mil/cac2/call/docs/11-16/toc.asp<br />
Afghan Security Forces Order of Battle (OOB)<br />
http://www.longwarjournal.org/oob/afghanistan/index.php<br />
Opium Survey 2011 All Regions<br />
http://www.unodc.org/documents/afghanistan//Opium_Surveys/Winter_Rapid_Assessment/Winter_asses<br />
sment_Phase_12_FINAL.pdf<br />
Paramilitary Terrorist Insurgent Groups http://cryptome.org/dodi/af-insurgents.zip<br />
UN Maps Out Afghan Security Interactive Maps<br />
http://online.wsj.com/article/SB10001424052970203568004576043842922347526.html?mod=WSJ_hp_L<br />
EFTTopStories<br />
Afghanistan War Videos http://www.afghanistanwarvideos.com/the-tau-of-terrorism<br />
30
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Afghanistan Facilities http://www.globalsecurity.org/military/facility/afghanistan.htm<br />
Afghanistan Maps http://www.globalsecurity.org/military/world/afghanistan/maps.htm<br />
Kajaki Dam Afghanistan http://cryptome.org/eyeball/kajaki-dam/kajaki-dam.htm<br />
Afghanistan Special Coverage http://www.thrall.org/special/af.html<br />
Afghanistan Maps http://www.lib.utexas.edu/maps/afghanistan.html<br />
All Afghanistan News<br />
http://topics.nytimes.com/top/news/international/countriesandterritories/afghanistan/index.html?scp=1spot&sq=afghanistan&st=cse<br />
AfPak Daily Brief has terrific analysis from experts and publishes a daily brief of the latest<br />
news from the region. http://www.pbs.org/wgbh/pages/frontline/talibanlines/etc/links.html<br />
Wikileaks http://wikileaks.org/wiki/Category:Afghanistan<br />
Civil-Military Overview https://cmo.act.nato.int/Pages/CMOwelcome.aspx<br />
The Afghanistan Airport Guide<br />
http://www.the-airport-guide.com/search.php?by=country&search=Afghanistan<br />
Airports and Bases http://eyeball-series.org/af-bases/af-bases.htm<br />
Asadabad Fire Base Helicopter Landing Zone<br />
Bagram<br />
Gardez South Helicopter Landing Zone<br />
Herat<br />
Jalalabad<br />
Kabul International<br />
Kandahar<br />
Khost<br />
Kunduz<br />
Maimana<br />
Marnah Ghar<br />
Mazar I Sharif<br />
Sheberghan<br />
Shindand<br />
Tereen<br />
Pakistan Maps. I have included Pakistan because of their common border and the role being<br />
played out by the insurgents. http://www.nps.edu/Programs/CCS/Pakistan_Index.html<br />
Afghanistan Information Management Services (great source for various maps) Should be of<br />
interest to all branches. http://www.aims.org.af/root.aspx?seckeyz=39<br />
Kabul Specific Maps http://www.nps.edu/Programs/CCS/Kabul.html<br />
Afghanistan<br />
https://www.intelink.gov/sharepoint/osp/Afghanistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Afghanistan Order of Battle 2007 FOUO (listed as FOUO but yet anyone can have access to it)<br />
http://cryptome.org/dodi/afghan-battle.zip<br />
Afghanistan Terrain Analysis FOUO (can be accessed by anyone)<br />
http://cryptome.org/dodi/afghan-terrain.zip<br />
Winning In Afghanistan http://cryptome.com/0001/afghan-win.htm<br />
Africa<br />
Africa <strong>Intelligence</strong> http://www.africaintelligence.com/<br />
Business Council For Africa http://www.bcafrica.co.uk/<br />
AFRICOM Search by Country (great interactive map) http://www.africom.mil/interactiveMap.asp<br />
Civil-Military Overview https://cmo.act.nato.int/Pages/CMOwelcome.aspx<br />
AFRICOM<br />
31
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
https://www.intelink.gov/sharepoint/osp/AFRICOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
AFRICOM Command Overview (labeled FOUO but in the public domain) africom-overview.zip<br />
http://cryptome.org/dodi/africom-02.zip<br />
Terrorism and U.S. Counter-Terrorism Programs in Africa: An Overview<br />
http://www.ccc.nps.navy.mil/si/2007/Jan/piomboJan07.pdf<br />
Center For African Studies http://ica.stanford.edu/?q=afr<br />
Africa Online http://www.metrostage.com/africa_online.htm<br />
African States List http://www.metrostage.com/africa_list.htm<br />
The African Continent http://www.maryknollafrica.org/AfricaMap.htm<br />
Africa Facts http://www.maryknollafrica.org/Facts2.htm<br />
http://www.calacademy.org/exhibits/africa/exhibit/facts/index.html<br />
Index Of Maps For Africa http://www.lib.utexas.edu/maps/africa/<br />
Democracy Index http://www.economist.com/media/pdf/DEMOCRACY_INDEX_2007_v3.pdf<br />
Index Of Country Information http://geoinfo.uneca.org/sdiafrica/country%20information/<br />
The Index On Africa http://www.afrika.no/index/index.html<br />
African Studies Center http://www.africa.upenn.edu/Home_Page/Country.html<br />
Agriculture<br />
Agricultural Terrorism http://www.mipt.org/Agricultural-Terrorism.asp<br />
http://cns.miis.edu/pubs/npr/vol07/73/73casa.pdf<br />
Economic Research Service http://www.ers.usda.gov/<br />
http://www.ers.usda.gov/statefacts/<br />
http://www.usda.gov/homelandsecurity/<br />
Al Qaeda/Taliban<br />
The Jawa Report http://mypetjawa.mu.nu/archives/197125.php<br />
High-Tech Terror: Al-Qaeda’s Use of New Technology<br />
http://fletcher.tufts.edu/forum/archives/pdfs/30-2pdfs/brachman.pdf<br />
The Al Qaeda Manual http://www.disastercenter.com/terror/index.htm<br />
http://www.geocities.com/m_alu3dad4/<br />
http://www.thesmokinggun.com/archive/jihadmanual.html<br />
Documents from the Harmony Database http://www.ctc.usma.edu/harmony_docs.asp<br />
How To Be A Jihadi: Talibans Training Secrets<br />
http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/08/16/wtaliban116.xml<br />
Tracking The Threat (is database of open source information about the Al Qaeda terrorist<br />
network, developed as a research project of the FMS Advanced Systems Group. Our goal is to apply new<br />
technologies and software engineering approaches to open source intelligence while providing<br />
researchers and analysts with information about Al Qaeda) http://www.trackingthethreat.com/<br />
Aljazeera<br />
Aljazeera On You Tube http://www.youtube.com/aljazeeraenglish<br />
http://english.aljazeera.net/<br />
http://english.aljazeera.net/watch_now/<br />
32
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Ammunition Plants and Depots<br />
25 Ammunition Plants http://cryptome.org/eyeball/ammo/ammo-eyeball.htm<br />
Area/International Codes<br />
Area Code Listing by Number http://www.bennetyee.org/ucsd-pages/area.html<br />
All Area Codes http://www.allareacodes.com/area_code_listings_by_state.htm<br />
Canadian Code Availability http://www.cnac.ca/mapcodes.htm<br />
Geographic Areas http://www.loc.gov/marc/geoareas/<br />
U.S. Area Codes and Time Zones<br />
http://www.nanpa.com/area_code_maps/usmaps/USA_NPA_63_2_100.jpg<br />
Area Codes Map http://www.nanpa.com/area_code_maps/ac_map_static.html<br />
http://www.nanpa.com/area_code_maps/ac_map_flash.html<br />
International Dialing Codes http://www.aglobalworld.com/cgi-local/codes.pl<br />
Armies Of The World<br />
Aviation<br />
Armed Forces Of The World<br />
http://www.strategypage.com/fyeo/howtomakewar/databases/armies/default.asp<br />
From Wikipedia http://en.wikipedia.org/wiki/Army<br />
Armies Of The World http://topgun.rin.ru/cgi-bin/texts.pl?mode=select&category=state&lng=eng<br />
Combined Arms Research Library http://www-cgsc.army.mil/carl/gateway/military_arm_int.asp<br />
Conscription And Armies Of The World http://www.c3.hu/~farkashe/english/countries.htm<br />
World Map Showing Top 10 Countries With Largest Armies In The World<br />
http://www.mapsofworld.com/world-top-ten/world-top-ten-countries-with-largest-armies-map.html<br />
List Of Countries By Size Of Armed Forces<br />
http://en.wikipedia.org/wiki/List_of_countries_by_size_of_armed_forces<br />
Rank Insignia http://hemsidor.torget.se/users/k/klix/grader_e.html<br />
The Worlds Armed Forces <strong>Link</strong>s http://www.armedforces.co.uk/linksworldarmies.htm<br />
Armed Forces of the World Discussion Board<br />
http://www.strategypage.com/militaryforums/30-14422.aspx<br />
Track Planes in Real-Time with Google Maps (we just continue to make it easier for terrorists like<br />
Al Qaeda to shoot down an aircraft. Aircraft and airports are very secure and getting inside poses a high<br />
degree of risk, however, shooting down an aircraft away from the terminal would make a statement that<br />
aviation still is not that safe.) http://planefinder.net/<br />
Airport Law Enforcement Agencies Network (ALEAN) http://www.alean.com/<br />
World Aero Data http://worldaerodata.com/<br />
Worldwide Airfield Maps http://www.airfieldmaps.co.uk/<br />
Thirty Thousand Feet http://www.thirtythousandfeet.com/airports.htm<br />
World Aeronautical Database http://www.worldaerodata.com/<br />
World Airport Database http://www.world-airport-database.com/<br />
http://www.tyzo.com/suppliers/airports.html<br />
World Airport Codes http://www.world-airport-codes.com/<br />
Airports of The World http://www.flightstats.com/go/Airport/airportsOfTheWorld.do<br />
World Airport Dirctory http://airportz.info/<br />
33
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.azworldairports.com/azworld/p2430.cfm<br />
The Airport Guide http://www.the-airport-guide.com/index.php<br />
Aviation Magazines http://www.world-newspapers.com/aviation.html<br />
Airport directory, flight planning, weather http://map.aeroplanner.com/mapping/chart/aptsel.cfm<br />
US military bases (Air Force Bases, Navy Bases, Marines Bases, Coast Guard Air Stations and<br />
Army Air Fields) all over the world. http://www.globemaster.de/bases.html<br />
Airport Search https://www.afd.scott.af.mil/<br />
Airport Information http://www.airnav.com/airports/<br />
Airport hotels, limo, quick aids http://www.quickaid.com/<br />
Flight planning & aviation weather http://www.baseops.net/<br />
Air traffic publications library http://nwp.natca.net/Administration/Documents/Airtrafficpublications/<br />
Aviation crime prevention http://www.acpi.org/<br />
Aviation weather at BASEOPS http://www.baseops.net/metro.html<br />
Defense Internet NOTAM Service https://www.notams.jcs.mil/<br />
Regulatory Support Division http://afs600.faa.gov/default.htm<br />
National Aviation Safety Data Analysis Center<br />
https://www.nasdac.faa.gov/servlet/page?_pageid=213,215&_dad=nasdac&_schema=NASDAC<br />
Interagency Airspace Coordination http://www.fs.fed.us/r6/fire/aviation/airspace/web/index.html<br />
National Air Traffic Controllers Association http://www.natca.org/<br />
National Transportation Safety Board http://www.ntsb.gov/<br />
U.S. Military Aviation http://www.globalsecurity.org/<br />
World Aeronautical Database http://www.worldaerodata.com/<br />
Airports Quick Aid http://www.quickaid.com/<br />
Airports Serving Mexican Border Region http://www.borderplanning.fhwa.dot.gov/maps.asp<br />
Pilot Getaways http://www.landings.com/<br />
FAA Notices To Airmen http://www.faa.gov/NTAP/<br />
Airport Taxi Diagrams http://www.aopa.org/asf/publications/taxi/<br />
Airport Codes Of The World http://www.photius.com/wfb2001/airport_codes_alpha.html<br />
Air Force Overviews (In this section you can find lots of information on several Air Forces. Orders<br />
of battle, databases, aircraft overviews of Armed Forces all over the world are presented here.)<br />
http://www.scramble.nl/airforces.htm<br />
Air Power Australia (includes other countries) http://www.ausairpower.net/<br />
Banking & Finance<br />
Biometrics<br />
Banking & Financial Crimes<br />
http://encyclopedia.thefreedictionary.com/banking+and+financial+crimes<br />
Financial Crimes Enforcement Network http://www.fincen.gov/index.html<br />
http://www.ncjrs.org/ondcppubs/publications/policy/99ndcsbudget/financial.html<br />
Financial Scandals http://www.ex.ac.uk/~RDavies/arian/scandals/<br />
Countering Financial Crime Risks in Information Security<br />
http://www.fsa.gov.uk/pubs/other/fcrime_sector.pdf<br />
Money Laundering and Financial Crimes http://www.state.gov/g/inl/rls/nrcrpt/2001/rpt/8487.htm<br />
Money Laundering, Terrorism and Financial Institutions<br />
http://www.civicresearchinstitute.com/moneylaundering/fedreg02.html<br />
Money Laundering http://www.moneylaundering.com/links/<br />
Transnational Threats http://www.csis.org/tnt/rc/finance.html<br />
United States Secret Service http://www.secretservice.gov/financial_crimes.shtml<br />
34
BLOGS<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Biometrics Task Force http://www.biometrics.dod.mil/<br />
Combined Arms Center http://usacac.army.mil/cac2/call/index.asp<br />
Biometrics Enterprise Center http://biometricesc.mi.army.mil/default.aspx<br />
Introduction to Biometrics http://www.biometrics.org/html/introduction.html<br />
DoD Biometrics<br />
http://www.biometrics.org/bc2007/presentations/Thu_Sep_13/Session_I/13_Dee_DOD.pdf<br />
Where Do We Biometrics Want To Go<br />
http://ec.europa.eu/research/science-society/pdf/biometrics/16-max_snijder_en.pdf<br />
Biometric Training http://biometricesc.mi.army.mil/training/default.aspx<br />
<strong>Link</strong>s to Biometric Technology Websites http://www.biometrics.org/links.htm<br />
Biometrics 101 Tutorial<br />
http://www.biometrics.dod.mil/ReferenceTutorials/Biometrics101/tabid/86/Default.aspx<br />
Biometrics Glossary<br />
http://www.biometrics.dod.mil/ReferenceTutorials/BiometricsGlossary/tabid/87/Default.aspx<br />
By David F. Carr DOD: Be wary of social media's 'loose lips'<br />
In an earlier era, “loose lips sink ships” was the military’s warning not to let even small details<br />
about military movements and operations slip in casual conversation. In contrast, social media Web sites<br />
today thrive on loose lips, making it even tougher to maintain operational security. Even the smallest<br />
details shared on social media sites can play a role in security breaches.<br />
WASHINGTON — Everyone from troops in the field to the highest brass and civilian leaders will be<br />
allowed to Twitter, blog and use Facebook and other social networking sites on the military's nonclassified<br />
computer network, the Pentagon has announced.<br />
The new policy follows a seven-month review in which the Defense Department weighed the threats and<br />
benefits of allowing the wide use of emerging Internet capabilities. It essentially seeks to manage the<br />
risks while acknowledging the Internet is proving a powerful tool for a myriad of tasks including recruiting,<br />
public relations, collaboration with a wide range of people and for communications between troops and<br />
their families.<br />
To guard security, it allows commanders to cut off access – on a temporary basis only – if that's required<br />
to safeguard a mission or reserve bandwidth for official use. The new directive also makes practices<br />
uniform across the entire department, in which different commands previously blocked certain things<br />
while others didn't. Visiting sites for pornography, gambling or hate-crime activities is still prohibited on<br />
military computers.<br />
"We need to take advantage of these capabilities that are out there – this Web 2.0 phenomena," said<br />
David M. Wennergren, deputy assistant secretary of defense for information technology. "The idea is be<br />
responsible and use these tools to help get the job done."<br />
The new directive means that YouTube, MySpace and more than a dozen sites blocked by the Pentagon<br />
in May 2007 will be unblocked, he said. The Pentagon said at the time that the use of video sites in<br />
particular was straining its network and using too much of its bandwidth. But Wennergren said Friday that<br />
the move failed to stem the use of bandwidth because people just went to alternate sites.<br />
http://www.fcw.com/Articles/2009/06/22/Operational-Security-Presentation.aspx<br />
BLOGS, like social sites, are good sources of information harvesting for intelligence purposes if<br />
you have the time and patience, especially the time. Good keyword searching will cut down on the time<br />
35
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
you spend on BLOGS if your only reason for being there is to harvest information. It is very easy to get<br />
distracted though with all the videos that appear daily and you have to be focused on the task. I think that<br />
too much information is being passed around. A good analyst, foreign or domestic, can put together<br />
enough information from BLOGS to build a good intelligence file. However, I realize that people are not<br />
going to shut them down and too many folks out there want access to them.<br />
Public <strong>Intelligence</strong> http://www.phibetaiota.net/<br />
World Blogs (One of the Web’s largest and most comprehensive directories of World<br />
Blogs, sorted by country and region.) http://www.worldpress.org/blogs.htm<br />
Top 100 Blogs http://technorati.com/pop/blogs/<br />
Fresh brewed news plus stewing views http://www.memeorandum.com/<br />
<strong>Global</strong> Politics, Economics & Ideas http://www.foreignpolicy.com/resources/bgn.php<br />
http://www.foreignpolicy.com/resources/links.php<br />
Infoshop http://www.infoshop.org/inews/index.php?topic=16<br />
Rantburg http://rantburg.com/index.php<br />
Counterterrorism http://counterterrorismblog.org/<br />
Technorati (scours the blogosphere) http://www.technorati.com/<br />
Informed Comment http://www.juancole.com/<br />
Excellent Blog on Iranian Naval Capabilities<br />
http://www.freerepublic.com/focus/f-news/1790191/posts<br />
Iranian Blogs http://www.iraniansblogs.com/<br />
Local Blogdigger http://local.blogdigger.com/index.html<br />
Google Blog Search http://blogsearch.google.com/<br />
World Blogs (One of the Web’s largest and most comprehensive directories of World Blogs, sorted by<br />
country and region.)<br />
BLOGS, like social sites, are good sources of information harvesting for intelligence purposes if you have<br />
the time and patience, especially the time. Good keyword searching will cut down on the time you spend<br />
on BLOGS if your only reason for being there is to harvest information. It is<br />
very easy to get distracted though with all the videos that appear daily and<br />
you have to be focused on the task. Personally, I think that too much<br />
information is being passed around. A good analyst, foreign or domestic,<br />
can put together enough information from BLOGS to build a good<br />
intelligence file. However, I realize that people are not going to shut them<br />
down and too many folks out there want access to them. Be careful how<br />
you use them. Once you post information to a Blog it is basically there<br />
forever.<br />
Africa<br />
Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi,<br />
Cameroon, Cape Verde, Chad, Congo, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Ivory<br />
Coast, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritius, Morocco, Mozambique,<br />
Namibia, Niger, Nigeria, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, South Africa,<br />
Swaziland, Tanzania, Togo, Tunisia, Uganda, Zambia, Zimbabwe<br />
Americas<br />
36
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Antigua and Barbuda, Argentina, Bahamas, Barbados, Belize, Bermuda, Bolivia, Brazil,<br />
British Virgin Islands, Canada, Cayman Islands, Chile, Colombia, Columbia, Costa Rica,<br />
Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Grenada, Guatemala, Guyana,<br />
Haiti, Honduras, Jamaica, Mexico, Montserrat, Nicaragua, Panama, Paraguay, Peru, Saint<br />
Kitts and Nevis, Saint Lucia, Saint Maarten, Saint Vincent and the Grenadines, Suriname,<br />
Trinidad, Trinidad and Tobago, Trinidad and Togago, Turks and Caicos, United<br />
States/<strong>Global</strong>, United States/Puerto Rico, Uruguay, Venezuela<br />
Asia-Pacific<br />
Afghanistan, Australia, Bangladesh, Cambodia, China, Cook Islands, Fiji, Hong Kong, India,<br />
Indonesia, Japan, Kazakstan, Korea, Kyrgyzstan, Malaysia, Mongolia, Myanmar, Nepal, New<br />
Zealand, Pakistan, Philippines, Singapore, South Korea, Sri Lanka, Taiwan, Thailand,<br />
Uzbekistan, Vietnam<br />
Europe<br />
Albania, Andorra, Armenia, Austria, Belarus, Belgium, Bulgaria, Chechnya, Denmark,<br />
Estonia, Finland, France, Georgia, Germany, Greece, Hungary, Ireland, Italy, Lithuania,<br />
Luxembourg, Malta, Moldova, Netherlands, Norway, Poland, Portugal, Romania, Russia,<br />
Slovenia, Spain, Trinidad and Tobago, Turkey, Ukraine, United Kingdom/Great Britain,<br />
United Kingdom/Scotland, United Kingdom/Wales<br />
Middle East<br />
Bahrain, Egypt, Iran, Iraq, Israel and the Occupied Territories, Jordan, Kuwait, Lebanon,<br />
Libya, Oman, Saudi Arabia, Sudan, Syria, United Arab Emirates, Yemen<br />
37
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Bomb Threat Stand-Off Distances<br />
Chart http://www.nctc.gov/docs/2006_calendar_bomb_stand_chart.pdf<br />
38
Bridges<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Top ten links to bridges http://www.tenlinks.com/engineering/civil/bridges.htm<br />
Bridges of the world http://glasssteelandstone.com/ByTypeBridges.html<br />
Famous bridges of the world http://www.civl.port.ac.uk/comp_prog/bridges1/<br />
http://architecture.about.com/od/famousbridges/<br />
Bridge technology http://www.fhwa.dot.gov/bridge/<br />
Steel bridges in the world http://www.sbi.se/omraden/o_dokument.asp?dId=84<br />
http://www.sbi.se/uploaded/dokument/files/Steel%20Bridges%20by%20SBI_ver3.03.pdf<br />
Bridges in 3D http://www.3dphoto.net/stereo/world/topics/bridges.html<br />
Bridges in the United States<br />
http://www.4reference.net/encyclopedias/wikipedia/Bridges_in_the_United_States.html<br />
http://encyclopedia.thefreedictionary.com/Bridges+in+the+United+States<br />
http://en.wikipedia.org/wiki/List_of_bridges_in_the_United_States<br />
Timber bridges in the U.S. http://www.tfhrc.gov/pubrds/winter97/p97wi32.htm<br />
Number Of Bridges In the U.S. (As of October 2004 there are 594,470 highway bridges in the<br />
United States. This includes all bridges of 20 foot or greater length that carry roadways open to the public.<br />
It does not include railroad bridges.) <strong>Source</strong>: November 2004 issue of Better Roads. They have been<br />
reporting these numbers, broken down by state, annually since 1979.<br />
http://www.abcdpittsburgh.org/FAQ1.htm<br />
Total Bridges by State http://www.statemaster.com/graph/trn_bri_tot_num-transportationbridges-total-number<br />
Center for Army Lessons Learned (CALL)<br />
CALL https://call2.army.mil/Login.aspx?ReturnUrl=%2fdefault.aspx<br />
Central <strong>Intelligence</strong> Agency<br />
CIA Records Search Tool http://www.fas.org/irp/cia/product/index.html<br />
The Shorthand of Experience (This true story of an exceptional spy has been reconstructed from<br />
records of the postwar debriefings of participants and witnesses to his adventures). This is the story of<br />
two men who broke nearly every rule in the spy’s handbook, and were right.<br />
http://cryptome.org/0003/cia-shorthand.pdf<br />
Interactive CIA World Fact Book<br />
http://visunetdemos.demos.ibm.com/blogsamples/factbook2/FactBookSE.html<br />
Hypnotism and Military Applications http://cryptome.org/0003/cia-hypnotism1.pdf<br />
Hypnotism and Covert Operations http://cryptome.org/0003/cia-hypnotism2.pdf<br />
CIA Torture Memos Declassified http://cryptome.org/olc-cia-torture.zip<br />
Details of 'Covered Up' CIA Flights to Poland http://cryptome.org/0001/cia-pl-flights.htm<br />
http://www.signonsandiego.com/news/2010/feb/22/details-posted-on-alleged-cia-flights-to-poland/<br />
CIA Assigned Polish Spies for Its Use in 2002 http://cryptome.org/0001/cia-pl-spies.htm<br />
The CIA Memory Hole<br />
http://www.trinicenter.com/modules.php?name=News&new_topic=85<br />
http://www.propagandamatrix.com/articles/november2006/051106Torture.htm<br />
CIA Classifies Cryptome Dossier http://cryptome.org/0002/<br />
CAMS Around the World<br />
39
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
(why would CAMS be included in this handout? Imagine being told you have to deploy to a certain<br />
country to conduct an operation. You are told the weather is 40 degrees with a heavy overcast and it is<br />
drizzling. You can only imagine an image of what it looks like. However, with a weather cam of the area<br />
the image is vivid and in real time. Most major cities around the world have cams showing certain parts of<br />
the city which can be very helpful when planning an operation. They can show areas to avoid and roads<br />
that support your equipment.)<br />
World Web Cams http://www.fisgonia.com/<br />
Live weather images http://www.weatherimages.org/weathercams/<br />
http://cirrus.sprl.umich.edu/wxnet/wxcam.html<br />
Worldwide WEB Cams http://www.leonardsworlds.com/countries.html<br />
http://skiwillie.com/cams.htm<br />
http://www.arvada.com/spider/webcams/<br />
http://www.rt66.com/ozone/cam.htm<br />
ABC7 WEB Cam http://abclocal.go.com/kabc/news/032301_FS_web_cam.html<br />
US/Worldwide Airport WEB Cams http://www.leonardsworlds.com/airports/airframe.html<br />
http://www.leonardsworlds.com/capitals/index.html<br />
EarthCam http://www.earthcam.com/<br />
EarthCam Map Search http://www.earthcam.com/mapsearch/<br />
http://search.earthcam.com/search_cam.php?offset=0&cat=WEA<br />
CAMSCAPE http://www.camscape.com/<br />
WEBCAM <strong>Directory</strong> http://members.tripod.com/~Barusa/webcams/intlwx.htm<br />
http://www.leonardsworlds.com/camera.html<br />
Railroad Cams http://www.railroaddata.com/rrlinks/Webcams/United_States/index.html<br />
WEB Cam Directories<br />
http://www.leonardsworlds.com/webcam_directories/webcam_directories.htm<br />
Weather CAMS http://www.weatherwatchers.org/wxcam/<br />
Chemical/Biological/Radiological<br />
How Terrorists Might Infect U.S. Poultry with Bird Flu<br />
http://publicintelligence.info/DHS-AvianFlu.pdf<br />
CBRNE Terrorism Newsletter http://www.cbrne-terrorism-newsletter.com/<br />
Radiation Dose Chart<br />
http://sourcesandmethods.blogspot.com/2011/04/understanding-radiation-dosage-levels.html<br />
Chemical Terrorism Fact Sheet http://cryptome.org/phosphine.pdf<br />
WMD Manual for First Responders http://cryptome.org/wmd-manual.zip<br />
Biological Attack Fact Sheet<br />
http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/BiologicalAttack.aspx<br />
Chemical Attack Fact Sheet<br />
http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/ChemicalAttack.aspx<br />
Nuclear Attack Fact Sheet<br />
http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/NuclearAttack.aspx<br />
Radiological Attack Fact Sheet<br />
http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks/RadiologicalAttack.as<br />
px<br />
Chemical and Biological Defense http://www.cbiac.apgea.army.mil/<br />
http://www.cbaci.org/cbaci/index.html<br />
GLADBAD – A searchable database of databases<br />
http://www.chem.gla.ac.uk/protein/jeremy/database/DBform.html<br />
Chemical Stockpile Emergency Preparedness Plan http://emc.ornl.gov/CSEPPweb/<br />
Emergency Preparedness and Response http://www.bt.cdc.gov/<br />
40
China<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Biological and Chemical Terrorism http://www.cdc.gov/mmwr/preview/mmwrhtml/rr4904a1.htm<br />
http://www.cdc.gov/mmwr/PDF/RR/RR4904.pdf<br />
http://www.stimson.org/cbw/?SN=CB2001121259<br />
Bioterrorism http://www.academicinfo.net/terrorismbio.html<br />
Chemical Terrorism http://www.health.state.ny.us/nysdoh/bt/chemical_terrorism/chemterr.htm<br />
http://www.cidrap.umn.edu/cidrap/content/other/chem/index.html<br />
http://www.health.state.mn.us/divs/eh/emergency/chemical/index.htm<br />
http://www.unc.edu/depts/spice/chemical.html<br />
Chemical Agents http://www.bt.cdc.gov/agent/agentlistchem.asp<br />
http://cdp.dhs.gov/pdfs/agert/Chemical_Agents.pdf<br />
Responding to Chemical Terrorism http://www.opcw.org/resp/<br />
Chemical and Biological Weapons Resource Page http://www.unc.edu/depts/spice/chemical.html<br />
The most dangerous U.S. chemical facilities http://cryptome.org/chem/chem-danger.htm<br />
http://eyeball-series.org/chem/51chem-eyeball.htm<br />
Biological Agents http://cdp.dhs.gov/pdfs/agert/Biological_Agents.pdf<br />
Radiological Materials and Nuclear Weapons<br />
http://cdp.dhs.gov/pdfs/agert/Radiological_Materials.pdf<br />
Chem/Bio/Nuclear Anti Terrorism http://www.nbcnco.com/<br />
Chemical Agents http://www.bt.cdc.gov/agent/agentlistchem.asp<br />
Chemical Terrorism Wall Chart http://www.unc.edu/depts/spice/chemical.html<br />
http://www.unc.edu/depts/spice/chart.pdf<br />
http://www.unc.edu/depts/spice/bioter2.pdf<br />
Bioterrorist Agents http://www.informedsource.info/images/bioterrorism%20chart.pdf<br />
Chemical Terrorism Agents and Syndromes<br />
http://www.informedsource.info/images/chemical-terrorism.pdf<br />
Chemical and Biological Weapons Resource Page http://cns.miis.edu/research/cbw/index.htm<br />
Glossary Of BioChem Terrorism http://www.yourdictionary.com/library/terror.html#geography<br />
Chemical And Biological Weapon Site http://www.cdi.org/issues/cbw/<br />
Chemical Casualty https://ccc.apgea.army.mil/<br />
Anthrax http://www.nctc.gov/site/technical/anthrax.html<br />
Biological Threats http://www.nctc.gov/site/technical/biological_threats.html<br />
Chemical Agents http://www.nctc.gov/site/technical/chemical_agents.html<br />
Indicators of a Possible Chemical Incident<br />
http://www.nctc.gov/site/technical/chemical_incident.html<br />
Ricin http://www.nctc.gov/site/technical/ricin.html<br />
Chinese Aircraft Carrier http://www.snopes.com/photos/military/chinacarrier.asp<br />
http://www.truthorfiction.com/rumors/c/China-New-Aircraft-Carrier.htm<br />
http://www.bbc.co.uk/news/world-asia-pacific-13692558<br />
China Military Power Mashup China Powerful Military News, images and videos information<br />
http://www.china-defense-mashup.com/<br />
Chinese Stealth Aircraft Photos (Clint Eastwood where are you?)<br />
http://cryptome.org/0003/cn-stealth.pdf<br />
http://bbs.rednet.cn/thread-24610276-1-1.html<br />
Military and Security Developments Involving the People’s Republic of China 2010<br />
http://www.globalsecurity.org/military/library/report/2010/2010-prc-military-power.pdf<br />
Wikileaks http://wikileaks.org/wiki/Category:China<br />
Chinese Military Power http://www.sinodefence.com/<br />
http://www.comw.org/cmp/<br />
41
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.sinodefence.com/military/default.asp<br />
China<br />
https://www.intelink.gov/sharepoint/osp/China%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Military Power Of The People’s Republic Of China 2009<br />
http://www.defenselink.mil/pubs/pdfs/China_Military_Power_Report_2009.pdf<br />
PRC Airports And Bases http://eyeball-series.org/cn-bases/cn-bases.htm<br />
PRC Military Air Bases http://eyeball-series.org/cn-mil-air2/cn-mil-air2.htm<br />
China's Nuclear Weapons Facilities http://eyeball-series.org/prc-nukes/prc-nukes.htm<br />
This shows selected PRC nuclear weapons testing sites, research and manufacturing facilities,<br />
missile defense sites, satellite launch facilities, weapons storage areas and a submarine base.<br />
Compare to US Nuclear Weapons Facilities: http://eyeball-series.org/nwsa/nwsa-eyeball.htm<br />
http://eyeball-series.org/kumsc-eyeball/kumsc-eyeball.htm<br />
http://eyeball-series.org/pantex-eyeball.htm<br />
http://eyeball-series.org/daf-eyeball.htm<br />
http://eyeball-series.org/lanl/lanl-eyeball.htm<br />
http://eyeball-series.org/llnl/llnl-eyeball.htm<br />
http://eyeball-series.org/ornl-eyeball.htm<br />
http://eyeball-series.org/nellis-eyeball.htm<br />
http://eyeball-series.org/cnws-eyeball.htm<br />
http://eyeball-series.org/kings/kings-eyeball.htm<br />
http://eyeball-series.org/bangor-eyeball.htm<br />
http://www.atomicarchive.com/Almanac/PRCFacilities.shtml<br />
http://www.fas.org/nuke/guide/china/index.html<br />
http://www.globalsecurity.org/wmd/world/china/nuke.htm<br />
http://www.nti.org/db/china/wnwmdat.htm<br />
http://www.cdi.org/issues/nukef&f/database/chnukes.html<br />
http://www.nuclearfiles.org/menu/key-issues/nuclear-weapons/issues/facilities/chinese-nuclear-weaponsfacilities.htm<br />
Maps of China http://www.maps-of-china.com/index.shtml<br />
The China Post News http://www.chinapost.com.tw/<br />
Submarines<br />
http://www.strategypage.com/fyeo/howtomakewar/databases/submarine_database/submarines.asp<br />
China Brief http://www.jamestown.org/publications_view.php?publication_id=4<br />
http://www.jamestown.org/publications_archives.php?publication_id=4<br />
Chinese-Russian exercise with ships, tank, aircraft etc.<br />
http://video.google.com/videoplay?docid=-8842216285861816122<br />
http://video.google.com/videoplay?docid=1457349235872084447<br />
Military Power of the People’s Republic of China<br />
http://www.globalsecurity.org/military/library/report/2006/2006-prc-military-power.htm<br />
Chinese Military Power http://www.comw.org/cmp/<br />
Chinese Defence Today http://www.sinodefence.com/<br />
China Leadership Monitor http://www.hoover.org/publications/clm<br />
China Today (military weapons and equipment) http://www.chinatoday.com/arm/<br />
Chinese Air/Land/Sea Strike Missiles http://www.softwar.net/c801.html<br />
The New Chinese Air Force http://www.softwar.net/plaaf.htm<br />
Chinese Missile Page http://www.softwar.net/dongfeng.html<br />
People’s Daily Online (English version) http://english.peopledaily.com.cn/<br />
http://english.people.com.cn/rss/China.xml<br />
China Air & Naval Power http://china-pla.blogspot.com/<br />
Sino Defence http://www.sinodefence.com/<br />
China's J-10: An Imagery Analysis<br />
http://intellibriefs.blogspot.com/2008/01/chinas-j-10-imagery-analysis.html<br />
42
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Hypothetical attack on U.S. outlined by China<br />
http://www.airforcetimes.com/news/2008/01/airforce_china_strategy_080121/<br />
The Chinese SAM Network http://geimint.blogspot.com/2008/01/chinese-sam-network.html<br />
China’s Emerging Air-To-Air Missiles<br />
http://www.strategycenter.net/research/pubID.181/pub_detail.asp<br />
China’s Military Power Reports http://www.defenselink.mil/pubs/china.html<br />
China’s Cyber-Militia<br />
http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948<br />
China’s Navy Into The Wild Blue Yonder<br />
http://www.economist.com/world/asia/displaystory.cfm?story_id=11496828<br />
Chinese Nuclear Forces http://www.thebulletin.org/files/064003009.pdf<br />
China Air And Naval Power http://china-pla.blogspot.com/<br />
China Defense Today http://www.sinodefence.com/<br />
Military Aviation http://cnair.top81.cn/link.htm<br />
Collective <strong>Intelligence</strong><br />
Initiatives To Harness The Power Of Collective <strong>Intelligence</strong> http://www.gizmag.com/go/6310/<br />
Good Thinking http://www.gizmag.com/goodthinking/<br />
Are You Thinking What I’m Thinking<br />
http://technology.timesonline.co.uk/printFriendly/0,,2140-7-2400772-18670,00.html<br />
Handbook Of Collective <strong>Intelligence</strong> http://www.socialtext.net/mit-cci-hci/index.cgi<br />
Collective <strong>Intelligence</strong> Networks http://colabria.sharepointsite.net/cin/default.aspx<br />
COLLECTIVE INTELLIGENCE: Creating a Prosperous World at Peace http://www.oss.net/CIB<br />
Computer Forensics<br />
Anti-Forensics http://cryptome.org/0003/anti-forensics.pdf<br />
COFFEE (free Computer Online Forensic Evidence Extractor Tools)<br />
Incident Response Collection Report http://tools.phantombyte.com/<br />
First Responder Evidence Disk (FRED)<br />
http://www.forensicswiki.org/wiki/First_Responder%27s_Evidence_Disk<br />
Windows Forensic Toolchest http://www.foolmoon.net/security/wft/<br />
Forensic Acquisition Utilities http://www.gmgsystemsinc.com/fau/<br />
Windows Forensic Toolkit http://www.governmentsecurity.org/archive/t4532.html<br />
Windows Memory Forensics Toolkit http://forensic.seccure.net/<br />
The Forensic Toolkit (WIN NT 4.0 SP3)<br />
http://www.foundstone.com/us/resources/proddesc/forensictoolkit.htm<br />
Counterintelligence And Espionage<br />
Counterintelligence And Espionage News http://cicentre.com/<br />
Counterterrorism<br />
43
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The Counter Terrorist Magazine http://digital.ipcprintservices.com/publication/?i=62670<br />
National Counterterrorism Center http://www.nctc.gov/site/index.html<br />
Counterterrorism Calendar 2011 (free for download)<br />
http://www.nctc.gov/site/pdfs/ct_calendar_2011.pdf<br />
WayBack Machine http://www.archive.org/web/web.php<br />
International Institute For Counterterrorism http://www.ict.org.il/<br />
Countering Suicide Terrorism<br />
http://www.ict.org.il/var/119/51563-Countering%20Suicide%20Terrorism.pdf<br />
MIPT Terrorism Knowledge Base http://www.tkb.org/Home2.jsp<br />
Counterterrorism Blog<br />
http://counterterrorismblog.org/2007/08/on_isna_and_doj_response_to_fa.php<br />
Counterterrorism Websites And Centers http://counterterrorismblog.org/websites/<br />
Stormwarning’s Counterterrorism<br />
http://moonagewebdream.blogs.com/storms_counter_terrorism/technology/index.html<br />
Counterterrorism Articles<br />
http://web.archive.org/web/20041210150855/www.ci-ce-ct.com/article/showfaq.asp?fldAuto=3<br />
http://web.archive.org/web/20041208225438/www.ci-ce-ct.com/article/default.asp<br />
The Counter Terrorist http://www.thecounterterroristmag.com/<br />
The Islamic Counter Terrorism Center http://wiki.arcs.com/index.php?title=ICC<br />
National Counterterrorism Center http://www.nctc.gov/site/index.html<br />
Terrorist Document Indicators http://www.nctc.gov/site/technical/documents.html<br />
International Analyst Network http://www.analyst-network.com/news.php<br />
Country <strong>Link</strong>s/Studies<br />
Country Profiles http://www.nti.org/e_research/profiles/index.html<br />
PDF Queen http://www.pdfqueen.com/<br />
World Gazetteer http://www.world-gazetteer.com/<br />
<strong>Global</strong> Gazetteer Version 2 http://www.fallingrain.com/world/<br />
Country Studies http://www.country-studies.com<br />
http://countrystudies.us/<br />
http://reference.allrefer.com/country-guide-study/<br />
Country Analysis Briefs http://www.eia.doe.gov/cabs/index.html<br />
Wikileaks http://wikileaks.org/wiki/Category:Countries<br />
The Economist Country Briefings http://www.economist.com/countries/<br />
Recommend this awesome interactive screen saver from The Economist with country statistics<br />
http://www.economist.com/screensaver/<br />
Countries of The World With Photos http://www.theodora.com/wfb/<br />
UNDATA A World of Information (23 databases with 60 million records)<br />
http://data.un.org/<br />
Asia And The Pacific<br />
http://www.iie.com/research/researcharea.cfm?ResearchTopicID=50&ParentTopicID=7#koreas<br />
ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/<br />
News Map http://muti.co.za/static/newsmap.html<br />
NationMaster (Welcome to NationMaster, a massive central data source and a handy way to graphically<br />
compare nations. NationMaster is a vast compilation of data from such sources as the CIA World Factbook, UN, and<br />
OECD. You can generate maps and graphs on all kinds of statistics with ease.) We want to be the web's one-stop<br />
resource for country statistics on everything from soldiers to wall plug voltages.<br />
http://www.nationmaster.com/index.php<br />
StateMaster (A unique statistical database which allows you to research and compare a multitude of<br />
different data on US states. We have compiled information from various primary sources such as the US Census<br />
Bureau, the FBI, and the National Center for Educational Statistics. More than just a mere collection of various data,<br />
StateMaster goes beyond the numbers to provide you with visualization technology like pie charts, maps, graphs and<br />
scatterplots. We also have thousands of map and flag images, state profiles, and correlations.) We have stats on<br />
44
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
everything from toothless residents to percentage of carpoolers. Our database is increasing all the time, so be sure to<br />
check back with us regularly. http://www.statemaster.com/index.php<br />
Lonely Planet Guide http://www.lonelyplanet.com/<br />
About Countries http://www.alsintl.com/countries/countrylist.htm<br />
Country Facts http://www.politinfo.com/infodesk/countryfacts/<br />
World Facts http://www.travelblog.org/World/<br />
http://worldfacts.us/<br />
http://www.worldoffacts.com/<br />
http://www.worldoffacts.com/countries/<br />
International Crisis Group http://www.crisisgroup.org/home/index.cfm?l=1<br />
Ethnologue: Languages Of The World http://www.ethnologue.org/home.asp<br />
Country Assessment: Iran http://www.isis-online.org/publications/iran/index.html<br />
Country Assessment: Korean Peninsula http://www.isis-online.org/publications/dprk/index.html<br />
ISIS Publications http://www.isis-online.org/publications/index.html#country<br />
International Monetary Fund Country Information http://www.imf.org/external/country/index.htm<br />
Country Info http://www.awesomelibrary.org/Library/Local_Information/Local_Information.html<br />
Country Studies http://www.exxun.com/<br />
http://countrystudies.us/<br />
http://www.country-studies.com/<br />
http://lcweb2.loc.gov/frd/cs/cshome.html<br />
Country Profiles http://www.fundforpeace.org/programs/fsi/fsiprofiles.php<br />
http://lcweb2.loc.gov/frd/cs/profiles.html<br />
http://news.bbc.co.uk/2/hi/europe/country_profiles/<br />
http://www.fco.gov.uk/servlet/Front?pagename=<strong>Open</strong>Market/Xcelerate/ShowPage&c=Page&cid=100702<br />
9394365<br />
http://plasma.nationalgeographic.com/mapmachine/countryprofiles.html<br />
Geographic Names http://www.exxun.com/esgn/gn_geonames_1.html<br />
Country Analysis Briefs http://www.eia.doe.gov/emeu/cabs/contents.html<br />
GeoHive <strong>Global</strong> Statistics http://www.geohive.com/<br />
Nations of the World http://www.nationmaster.com/countries<br />
Country Based Search Engines http://www.philb.com/countryse.htm<br />
Asia and Eastern Europe Information and Analysis http://www.axisglobe.com/<br />
Field Support Modules http://fieldsupport.lingnet.org/index.html<br />
Iraq/Afghanistan https://www.atsc.army.mil/crc/index.asp<br />
The World Fact Book (CIA) https://www.cia.gov/cia/publications/factbook/index.html<br />
Portals to The World http://www.loc.gov/rr/international/portals.html<br />
Geo Teacher Country Studies http://home.att.net/~rmmwms/students/countrystudies.html<br />
Country Reports http://www.countryreports.org/<br />
Geographic http://www.geographic.org/<br />
International Crisis Group http://www.crisisgroup.org/home/index.cfm<br />
Center For Strategic And International Studies<br />
http://www.csis.org/component/option,com_csis_pubs/Itemid,131/<br />
Field Support Modules Language Help (This site is provided as a service by the Defense<br />
Language Institute Foreign Language Center, Presidio of Monterrey, California. It is intended to provide<br />
basic information and language support for personnel entering a new theater of operations.)<br />
http://fieldsupport.lingnet.org/<br />
South Asia Analysis Group (The objective of the group is to advance strategic analysis and<br />
contribute to the expansion of knowledge of Indian and International security and promote public<br />
understanding. In so doing, the SAAG seeks to address the decision makers, strategic planners,<br />
academics and the media in South Asia and the world at large.) http://www.saag.org/<br />
UniMaps http://unimaps.com/index.html<br />
Reuters Foundation Interactive Maps<br />
http://www.alertnet.org/map/index.htm?x=256&y=256&scale=1&bpolygon=&iso=&fillId=&ex_iso=&ex_fillId<br />
=&slevel=1&style=2<br />
Countries Of The World http://www.theodora.com/wfb/abc_world_fact_book.html<br />
Search Beat http://regional.searchbeat.com/<br />
45
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Africa <strong>Intelligence</strong> http://www.africaintelligence.com/<br />
Eurasianet http://www.eurasianet.org/index.shtml<br />
<strong>Global</strong> Research http://www.globalresearch.ca/index.php?context=home<br />
CENTCOM Area of Responsibility Interactive Map<br />
http://www.centcom.mil/sites/uscentcom2/Misc/centcom_aor.aspx<br />
<strong>Global</strong> Gazetteer http://www.fallingrain.com/world/<br />
Control Risks http://www.crg.com/<br />
TradePort http://www.tradeport.org/countries/<br />
Background Notes http://www.state.gov/www/background_notes/<br />
IMF Staff Country Reports in Full Text http://www.imf.org/external/pubs/CAT/scr.cfm<br />
Virtual Tourist http://www.virtualtourist.com/<br />
NewsNow (I placed this site here because of the regional newsfeeds on the left hand column.<br />
Example: go to regional feed and click on a country and see the news as it is happening for that<br />
area. Good site for real-time incident reporting) http://www.newsnow.co.uk/<br />
GeoCommons (A place to explore, create and share intelligent maps and geographic data. And<br />
it’s totally free! Access more than 1,500 (and counting) geodata sets on population, environment,<br />
health, education, crime, politics, traffic, employment and everything in between. Move beyond<br />
pushpins on maps to intuitive and exciting visualizations of geographic data. Create and share<br />
intelligent maps to answer questions, gain insight & make decisions.)<br />
http://www.geocommons.com/<br />
World Maps http://www.justmaps.org/<br />
UCLA International Institute http://www.international.ucla.edu/<br />
Country Files (Complete files of geographic names for geopolitical arteas)<br />
http://earth-info.nga.mil/gns/html/namefiles.htm\<br />
The Joshua Project: Mission is to convert people to Christianity. However, the site contains a<br />
wealth of information w/ respect to various peoples in the region, their respective languages and it can<br />
come with a picture so one is familiar with the dress associated with that culture.<br />
http://www.joshuaproject.net/<br />
Regional & Country Information http://www.escapeartist.com/global8/countries.htm<br />
Country Reports On Human Right Practices For 2006 Vol 1 http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=110_cong_senate_committee_prints&docid=f:33723.wais.pdf<br />
Country Reports On Human Right Practices For 2006 Vol 2 http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=110_cong_senate_committee_prints&docid=f:41618.wais.pdf<br />
Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (awesome site for the<br />
open source analyst) http://www.onstrat.com/osint/<br />
U.S. Department Of State http://www.state.gov/countries/<br />
Places Of Peace And Power http://www.sacredsites.com/middle_east/iraq/iraq.html<br />
<strong>Global</strong>is is an interactive world atlas where you decide what is to be displayed on the map.<br />
<strong>Global</strong>is aims to create an understanding for similarities and differences in human societies, as well as<br />
how we influence life on the planet. This is primarily done using visual means.<br />
http://globalis.gvu.unu.edu/<br />
How To Use <strong>Global</strong>is http://globalis.gvu.unu.edu/doc.cfm?page=help<br />
Country And Culture Studies http://www.dcswift.com/military/country.html<br />
Geography Network http://www.geographynetwork.com/<br />
Crime & Justice<br />
Oakland Crime Spotting (interactive) Map http://oakland.crimespotting.org/#dtstart=2009-11-<br />
17T23:59:59-07:00&lon=-122.270&dtend=2009-11-24T23:59:59-<br />
07:00&zoom=14&types=AA,Mu,Ro,SA,DP,Na,Al,Pr,Th,VT,Va,Bu,Ar&lat=37.806&hours=0-23<br />
International Justice Statistics http://www.ojp.usdoj.gov/bjs/ijs.htm<br />
Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/orgcrime.htm<br />
http://www.lib.msu.edu/harris23/crimjust/fedsites.htm<br />
National Alliance of Gang Investigators Associations http://www.nagia.org/mara_salvatrucha.htm<br />
46
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Mara Salvatrucha Street Gang (Al Queda's Friends)<br />
http://www.freerepublic.com/focus/f-news/1263555/posts<br />
Crime and Justice http://www.crimeandjustice.us/<br />
http://crimeandjustice.i8.com/<br />
National Statistics http://www.statistics.gov.uk/CCI/nscl.asp?ID=5004<br />
National Criminal Justice Reference Service http://www.ncjrs.org/<br />
<strong>Open</strong> <strong>Directory</strong> for Crime & Justice http://dmoz.org/Society/Issues/Crime_and_Justice/<br />
True Crime & Justice http://www.karisable.com/crime.htm<br />
Bureau of Justice Statistics http://www.ojp.usdoj.gov/bjs/<br />
http://www.ojp.usdoj.gov/bjs/glance.htm<br />
http://www.ojp.usdoj.gov/bjs/dtdata.htm<br />
Center for Crime & Justice Studies http://www.kcl.ac.uk/depsta/rel/ccjs/home.htm<br />
Crime Spider http://www.crimespider.com/<br />
Crime and Criminal Justice Web <strong>Link</strong>s http://www.crimenews2000.com/links/<br />
Missing Children WEB Sites http://www.activemostwanted.com/missingchildren.html<br />
Interpol http://www.interpol.int/<br />
<strong>Link</strong>s to Criminal Justice Resources http://www.criminaljustice-online.com/<br />
Chicago Crime Incidents Map http://gis.chicagopolice.org/<br />
SpotCrime (online source of crime information throughout the united Staes; just select the state<br />
for interactive information) http://www.spotcrime.com/<br />
Environmental Protection Agency Criminal Enforcement http://www.epa.gov/fugitives/<br />
Cryptome (controversial site but has good information)<br />
Eyeball Series http://www.cryptome.org/<br />
http://eyeball-series.org/<br />
Crytome Archive 1996 to Present http://cryptome.org/cryptome-archive.htm<br />
Critical Thinking<br />
This free web-based training is provided as an introduction to Anacapa’s scheduled and on-site<br />
courses in intelligence analysis. Upon completion of all three training modules, you may obtain a<br />
certificate of completion. Click on a link below to go to each module.<br />
http://www.anacapatraining.com/company/index.html<br />
1. Introduction to <strong>Intelligence</strong> Analysis<br />
(1 to 2 Hours)<br />
2. Data Collection Tradeoffs<br />
(2-3 Hours)<br />
3. Critical Thinking Strategies<br />
(2-3 Hours)<br />
Essentials Of Critrical Thinking http://www.free-ed.net/free-ed/TextResources/critThink_01.asp<br />
1. Critical Thinking Basics<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
47
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
2. The Anatomy and Varieties of Arguments<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
Multiple-Choice Quiz<br />
3. Clear Thinking, Critical Thinking, and Clear Writing<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
4. Credibility<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
5. Persuasion through Rhetoric: Common Devices and Techniques<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
6. More Rhetorical Devices: Psychological and Related Fallacies<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
Multiple-Choice Quiz<br />
7. More Fallacies<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
48
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
8. Deductive Arguments I: Categorical Logic Categorical Claims<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
9. Deductive Arguments II: Truth-Functional Logic<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
10. Inductive Arguments Analogical Arguments<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
11. Causal Arguments<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
12. Moral, Legal, and Aesthetic Reasoning<br />
Topic Overview<br />
What You Should Learn<br />
Frequently Asked Questions<br />
Tips on Applications<br />
Important Terms<br />
True/False Quiz<br />
Multiple-Choice Quiz<br />
49
Cuba<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Teaching Critical Thinking: Lessons From Cognitive Science<br />
http://frank.itlab.us/forgetting/teaching_critical_thinking.pdf<br />
The Critical Thinking Community http://www.criticalthinking.org/<br />
Military Air Bases And Airports http://eyeball-series.org/cu-mil-air/cu-mil-air.htm<br />
Bauta<br />
Bayamo<br />
Cabaiguán<br />
Camaguey<br />
Guáimaro Northeast<br />
Guantánamo (Cuba)<br />
Guantanamo Naval Base (US)<br />
Guane<br />
Holguín<br />
Las Tunas<br />
Manzanillo<br />
Matanzas<br />
Mayari<br />
Morón<br />
Morón Northeast<br />
Querejeta (Havana)<br />
Sagua de Tánamo<br />
San Antonio de los Baños<br />
San Luis Pinar L Rio<br />
Santa Fe<br />
Santiago de Cuba<br />
Santiago de las Vegas (Havana)<br />
Trinidad<br />
Trinidad East<br />
Villa Clara<br />
Wajay (Havana)<br />
ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/cuba.htm<br />
Cultural <strong>Intelligence</strong><br />
Foreign Language Guide http://www.design-training.com/art/foreign-language-guide.html<br />
Center For Advanced Operational Culture Training http://www.tecom.usmc.mil/caocl/<br />
Socio-Cultural AND Language Resources http://www.au.af.mil/culture/<br />
Cultural Awareness And The Military http://www.au.af.mil/au/aul/bibs/culture.htm<br />
Defense Language Institute http://www.dliflc.edu/index.html<br />
Center For Advanced Culture Learning http://www.tecom.usmc.mil/caocl/<br />
Small Wars Journal (material on cultural intelligence)<br />
http://www.google.com/custom?domains=smallwarsjournal.com&q=cultural&sitesearch=smallwarsjournal.<br />
com&sa=Search&client=pub-9082475459908859&forid=1&ie=ISO-8859-1&oe=ISO-8859-<br />
1&flav=0000&sig=jxaC0TjM5-C-<br />
A0ca&cof=GALT%3A%23008000%3BGL%3A1%3BDIV%3A%23336699%3BVLC%3A663399%3BAH%3<br />
Acenter%3BBGC%3AFFFFFF%3BLBGC%3A336699%3BALC%3A0000FF%3BLC%3A0000FF%3BT%3<br />
A000000%3BGFNT%3A0000FF%3BGIMP%3A0000FF%3BFORID%3A1&hl=en<br />
50
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The American Military Advisor: Dealing With Senior Foreign Officials In The ISLAMIC World<br />
http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB869.pdf<br />
Arabic For Dummies http://www.dmos.info/eng/Arabic%20For%20Dummies.pdf<br />
A Defence of Cultural <strong>Intelligence</strong><br />
http://www.knowledge-finder.com/psychology/defence-cultural-intelligence.html<br />
Cultural Awareness http://wrc.lingnet.org/culmil.htm<br />
A Guide to Working with People from Other Cultures<br />
http://ctb.ku.edu/tools/en/sub_section_main_1170.htm<br />
Cultural <strong>Intelligence</strong><br />
http://www.valuebasedmanagement.net/methods_earley_cultural_intelligence.html<br />
Cultural <strong>Intelligence</strong> and Modern Management<br />
http://www.1000ventures.com/ebooks/bec_ebooks_cimm.html<br />
http://www.1000ventures.com/business_guide/crosscuttings/cultural_intelligence.html<br />
http://www.bkpub.com/static/culturalintelligence.pdf<br />
Avoiding a Napoleonic Ulcer: Bridging the Gap of Cultural <strong>Intelligence</strong> (Or, Have We Focused on<br />
the Wrong Transformation?)<br />
http://www.mcu.usmc.mil/mcwar/irp/Documents/CJCS%20Essay%20-%20Smith.pdf<br />
Culture and Technologies of Control<br />
http://slash.autonomedia.org/analysis/02/11/05/1432210.shtml<br />
University of Military <strong>Intelligence</strong> http://128.196.21.240/cultural/default.asp<br />
Religion and Beliefs http://www.earthstation9.com/index.html?aircraf6.htm<br />
Cultural Studies http://www.mcia.osis.gov/culture.htm<br />
Iraqi Culture Smart Card (printable version) http://cryptome.org/iraq-culture.htm<br />
http://www.fas.org/irp/doddir/usmc/iraqsmart-0506.pdf<br />
Pew <strong>Global</strong> Attitudes Project (a series of worldwide public opinion surveys) http://pewglobal.org/<br />
Multicultural<br />
http://www.awesomelibrary.org/Classroom/Social_Studies/Multicultural/Multicultural.html<br />
Muslim American Society http://www.masnet.org/<br />
Field Support Modules http://fieldsupport.lingnet.org/afghanistan.html<br />
Iraq/Afghanistan https://www.atsc.army.mil/crc/index.asp<br />
Culture <strong>Link</strong> http://www.culturelink.org/<br />
Middle Eastern Culture http://www.shira.net/culture.htm<br />
http://www.albany.edu/history/middle-east/culture.htm<br />
<strong>Global</strong> Connections http://www.pbs.org/wgbh/globalconnections/mideast/themes/culture/<br />
Cultural Awareness Documents http://cgsc.leavenworth.army.mil/carl/resources/biblio/cultural.asp<br />
http://www.au.af.mil/au/awc/awcgate/awc-lesn.htm<br />
The Iraq Culture Smart Card http://cryptome.org/iraq-culture.htm<br />
Kwikpoint Visual Language Translators http://www.kwikpoint.com/index.html<br />
Arab Culture Comparative Cultural Patterns<br />
http://www.sagepub.com/upm-data/11712_Chapter9.pdf<br />
Languages Of The World http://www.nvtc.gov/<br />
Cultural Understanding and Language Proficiency https://www.us.army.mil/suite/portal/index.jsp<br />
The Joshua Project: Mission is to convert people to Christianity. However, the site contains a<br />
wealth of information w/ respect to various peoples in the region, their respective languages and it can<br />
come with a picture so one is familiar with the dress associated with that culture.<br />
http://www.joshuaproject.net/<br />
North Korean Short Video Clips http://www.vbs.tv/shows/north-korea/<br />
Interactive Map: Sunni And Shia : The Worlds of Islam<br />
http://www.pbs.org/wnet/wideangle/shows/iran/map.html<br />
Islamic Holy Places http://en.wikipedia.org/wiki/Category:Islamic_holy_places<br />
Online Readings In Psychology And Culture<br />
http://www.ac.wwu.edu/~culture/contents_complete.htm<br />
51
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Cyber & Information Warfare<br />
CERT Coordination Center http://www.cert.org/<br />
Information Operations http://www.au.af.mil/au/awc/awcgate/awc-info.htm<br />
Information Operations http://www.tno.nl/instit/fel/infoops/<br />
Information Warfare and Information Security on the WEB http://www.fas.org/irp/wwwinfo.html<br />
http://www.comw.org/rma/fulltext/infowar.html<br />
http://gib.squat.net/infowar/<br />
Institute for the Advanced Study of Information Warfare http://www.psycom.net/iwar.1.html<br />
infowar: Term Contexts For 'weapon'<br />
http://www.twurled-world.com/Infowar/Update2/V_infowar_TERM_weapon.htm<br />
The Information Warfare Site http://www.iwar.org.uk/<br />
Ms. Guidance: Cyber War http://www.t0.or.at/msguide/cyberwar.htm<br />
Cyber Warfare and Information Security http://securefrontiers.com/index.php?sectionID=25<br />
The Security Portal for Information System Security Professionals<br />
http://www.infosyssec.com/infosyssec/infowar1.htm<br />
Georgetown Essays on Information Warfare<br />
http://www.cs.georgetown.edu/~denning/infosec/iw-essays/<br />
Books on subject<br />
http://www.amazon.com/exec/obidos/ASIN/0275974235/102-7751075-0251322<br />
http://www.amazon.com/exec/obidos/ASIN/0072132604/102-7751075-0251322<br />
http://www.au.af.mil/au/aul/bibs/infowar/if.htm<br />
Frontline: CyberWar (How real is the threat of war in cyberspace, and what does the White House<br />
know that the rest of us don't? FRONTLINE investigates a new war using embedded malicious code,<br />
probes and pings, and other weapons aimed directly at America's power grid, water supply, and<br />
transportation systems. Examples include The Slammer (Super Bowl Sunday), Nimda (a week after 9/11),<br />
Code Red (summer 2001), and Moonlight Maze (from Russia's Academy of Science). View the entire 52<br />
minute program here in six consecutive chapters.)<br />
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/view/<br />
China’s Cyber-Militia<br />
http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948<br />
Databases (Some Searchable)<br />
Wayback Machine (The Internet Archive is building a digital library of Internet sites and other<br />
cultural artifacts in digital form. Like a paper library, we provide free access to researchers, historians,<br />
scholars, and the general public [works extremely well with URL addresses])<br />
http://www.archive.org/index.php<br />
UNDATA A World of Information (23 databases with 60 million records)<br />
http://data.un.org/<br />
Federal Statistics http://www.fedstats.gov/<br />
Databases By Subject http://www.uflib.ufl.edu/subjects.html<br />
WEB Finding Tools http://library.nps.navy.mil/home/netsearch.htm<br />
World Basic Information Library http://wbil.fmso.osis.gov/<br />
Digital National Security Archive http://nsarchive.chadwyck.com/<br />
ProQuest http://proquest.umi.com/pqdweb<br />
http://proquest.umi.com/pqdweb?RQT=573&TS=1083434519&clientId=26841&LASTSRCHMODE=3<br />
American Religion Data Archive http://www.thearda.com/arda.asp?Show=Home<br />
Army Libraries <strong>Directory</strong> http://www.libraries.army.mil/<br />
CountryWatch http://www.countrywatch.com/<br />
Early Bird http://ebird.afis.osd.mil/<br />
Databases http://library.nps.navy.mil/home/databases.htm<br />
52
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Databases and Electronic Resources http://www.lib.monash.edu.au/databases/<br />
Databases in Military Science http://library.nps.navy.mil/home/databasesmil.htm<br />
EBSCO Support http://support.epnet.com/CustSupport/Customer/Search.aspx<br />
http://web35.epnet.com/selectdb.asp?tb=1&_ug=sid+0603E65C%2DB41B%2D4AF8%2DBB48%2D2EA7<br />
F7E7980E%40sessionmgr6+cp+1+1444&_us=dstb+DB+sm+DB+1D03&_uso=hd+False+C560&daerr=tr<br />
ue<br />
Britannica Online http://www.britannica.com/<br />
Federal Government Resources on the WEB http://www.lib.umich.edu/govdocs/federal.html?<br />
Google’s Uncle Sam http://www.google.com/unclesam<br />
Government Search http://www.queryserver.com/government.htm<br />
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />
Libraries on the WEB http://sunsite.berkeley.edu/Libweb/<br />
FirstGov http://www.firstgov.gov/<br />
Jane’s Online Research http://online.janes.com/public/login/homeLogin.html<br />
The Educator’s Reference Desk http://www.eduref.org/<br />
Pro Fusion http://www.profusion.com/index.htm<br />
RootsWeb http://www.rootsweb.com/<br />
Government Databases http://library.stmarytx.edu/acadlib/doc/electronic/dbases.htm<br />
Government Printing Office http://www.gpoaccess.gov/<br />
Search Systems http://www.searchsystems.net/<br />
U.S. National Archives and Records Administration http://www.archives.gov/index.html<br />
National Inventory of Dams http://crunch.tec.army.mil/nid/webpages/nid.cfm<br />
Navigating the Military Internet<br />
http://cc.msnscache.com/cache.aspx?q=852058223709&lang=en-US&FORM=CVRE3<br />
Naval War College Library http://www.nwc.navy.mil/LIBDB/dblinks/ezlibRemote.htm<br />
Pentagon Library http://www.hqda.army.mil/library/databases.htm<br />
UNBISNET http://unbisnet.un.org/<br />
Periscope http://www.militaryperiscope.com/index1.shtml<br />
Reference Desk http://www.earthstation9.com/index.html?aircraf6.htm<br />
Organized Crime and Corruption Bibliographic Database Search<br />
http://www.yorku.ca/nathanson/search.htm<br />
DOD and Military Electronic Journals http://www.au.af.mil/au/aul/periodicals/dodelecj.htm<br />
The Wednesday Report - Canada's Aerospace and Defence Weekly<br />
http://twr.mobrien.com/index.shtml<br />
Direct Search http://www.freepint.com/gary/direct.htm<br />
The Invisible WEB http://www.invisible-web.net/<br />
Complete Planet http://aip.completeplanet.com/aipengines/browse?thisPage=%2Fbrowse%2Fbrowse.jsp&successPage=%2Fbrowse%2Fbrowse.jsp&error<br />
Flag=&errorMsg=&event=loadPageEvent&directPage=&directSection=4&treeQueryExpr=&treeQueryTyp<br />
e=phrase&treeQueryTarget=tree<br />
U.S. Federal Government Agencies Database http://www.lib.duke.edu/texis/uslinks/uslinks<br />
The Academic Web <strong>Link</strong> Database Project http://cybermetrics.wlv.ac.uk/database/<br />
Patent Searching http://www.bl.uk/collections/patents.html<br />
Databases On The World Wide WEB http://www.wehi.edu.au/resources/databases.html<br />
Federal Bulletin Board GPO Access http://fedbbs.access.gpo.gov/<br />
GPO Access Online http://www.gpoaccess.gov/databases.html<br />
Google Scholar http://scholar.google.com/<br />
Cold War Black Projects http://area51specialprojects.com/<br />
Find Databases http://wwwapp.cc.columbia.edu/ldpd/app/rti/index.jsp<br />
Those Dark Hiding Places http://library.rider.edu/scholarly/rlackie/Invisible/Inv_Web_Main.html<br />
Georgetown University Library http://www.library.georgetown.edu/advisor/index.cfm<br />
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />
Government Information Databases http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html<br />
Nuclear Weapons Database http://www.cdi.org/nuclear/database/<br />
53
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Terrorism Database Project http://www.rand.org/ise/projects/terrorismdatabase/<br />
Ballistic Missiles http://www.missilethreat.com/missiles/<br />
Terrorist Attacks and Organizations Database<br />
http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/<br />
Military Factory http://www.militaryfactory.com/<br />
The Jamestown Foundation http://www.jamestown.org/<br />
Lookups (easily search over 30 databases for the information you want)<br />
http://www.melissadata.com/lookups/index.htm<br />
International Programs Center (part of the population division of the U.S. Census Bureau)<br />
http://www.census.gov/ipc/www/<br />
Sustainable World (This site has been developed to help government officials, students,<br />
researchers and others interested in development issues to find free [or at least reasonably<br />
Affordable] sources of national economic and social data online)<br />
http://www.sustainableworld.com/<br />
Searchable Terrorism Knowledge Database http://www.tkb.org/AdvancedSearch.jsp<br />
Latin America Data Base (LADB is the first Internet-based news service in English about Latin<br />
America, publishing in-depth coverage of Latin American affairs since 1986)<br />
http://ladb.unm.edu/<br />
ResearchBuzz (News about search engines, databases, and other information collections)<br />
http://www.researchbuzz.com/wp/<br />
Hudson Institute http://www.hudson.org/<br />
(Center on Islam, Democracy, and the Future of the Muslim World)<br />
http://www.futureofmuslimworld.com/<br />
Science & Technology Database http://www.stn-international.de/<br />
International Database US Census Bureau http://www.census.gov/ipc/www/idbnew.html<br />
Guide to Foreign and International Legal Databases http://www.law.nyu.edu/library/foreign_intl/<br />
The Middle East Media Research Institute http://www.memri.org/index.html<br />
<strong>Global</strong> Terrorism Analysis http://jamestown.org/terrorism/archives.php?publication_id=15<br />
The National Security Archive http://www.gwu.edu/~nsarchiv/<br />
STINET MultiSearch (STINET MultiSearch is a STINET feature intended to assist the DOD<br />
community to access pertinent scientific and technical information over a wide range of sources)<br />
http://multisearch.dtic.mil/<br />
Public STINET http://stinet.dtic.mil/<br />
Energy Files (At this site you will find over 500 databases and Web sites containing information<br />
and resources pertaining to science and technology of interest to the Department of Energy, with an<br />
emphasis on the physical sciences) http://energyfiles.osti.gov/<br />
Science Research (a free, publicly available web portal allowing access to numerous scientific<br />
journals and public science databases. It allows students, teachers, professors, researchers, and the<br />
general public to access pertinent science information quickly and easily)<br />
http://www.scienceresearch.com/search/<br />
Terrorism Monitor Archives http://www.jamestown.org/terrorism/archives.php?publication_id=9<br />
International Relations And Security Network http://www.isn.ethz.ch/<br />
Monterrey Institute Of International Studies http://www.cns.miis.edu/<br />
<strong>Directory</strong> of <strong>Open</strong> Access Journals http://www.doaj.org/<br />
Satellite Database<br />
http://www.ucsusa.org/global_security/space_weapons/satellite_database.html<br />
Search For Buildings Anywhere On Earth http://www.emporis.com/en/<br />
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html<br />
http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />
Databases by Subject http://www-library.st-andrews.ac.uk/External/databasessubject.html<br />
http://www.co.henrico.va.us/library/DB&Web/ERpubsubj.htm<br />
http://www.uflib.ufl.edu/subjects.html<br />
USGS Map Databases http://education.usgs.gov/common/map_databases.htm<br />
BUBL LINK Catalogue: Selected Internet resources covering all academic subject areas.<br />
http://www.bubl.ac.uk/<br />
54
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Authoratory (The content of Authoratory is produced by a computer program analyzing millions<br />
of articles indexed by PubMed. The articles published by each author are carefully inspected to create a<br />
personalized report. All of the reports all available here on the Authoratory web site)<br />
http://www.authoratory.com/<br />
Telecommunications Database http://www.telcodata.us/<br />
MIPT Terrorism Knowledge Base http://www.tkb.org/Home.jsp<br />
<strong>Directory</strong> Of <strong>Open</strong> Access Journals (Welcome to the <strong>Directory</strong> of <strong>Open</strong> Access Journals. This<br />
service covers free, full text, quality controlled scientific and scholarly journals. We aim to cover all<br />
subjects and languages. There are now 2686 journals in the directory. Currently 803 journals are<br />
searchable at article level. As of today 133242 articles are included in the DOAJ service<br />
http://www.doaj.org/<br />
FedWorld http://www.fedworld.gov/<br />
The University of Michigan Library Documents Center http://www.lib.umich.edu/govdocs/<br />
The Library of Congress http://www.loc.gov/index.html<br />
International Terrorist Symbols Database http://www.adl.org/terrorism/symbols/default.asp<br />
EUROPA European Union Databases By Subject<br />
http://europa.eu/geninfo/info/guide/dbsubject/index_en.htm<br />
Government Databases By Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html<br />
The Best Online Research Apps/Sites You’ve Never Heard Of<br />
http://oedb.org/library/features/best-online-research-sites<br />
Joint Information Systems Committee http://www.jisc.ac.uk/<br />
<strong>Global</strong> Terrorism Database http://www.start.umd.edu/data/gtd/<br />
Nation Master http://www.nationmaster.com/index.php<br />
State Master http://www.statemaster.com/index.php<br />
National Defense Mega <strong>Directory</strong> http://www.nationaldefensemegadirectory.com/<br />
Datamining Tools<br />
Defense<br />
NationMaster http://www.nationmaster.com/index.php<br />
Tools For Data Mining http://www.ncbi.nlm.nih.gov/Tools/<br />
Air Force Research <strong>Link</strong> http://www.af.mil/search/<br />
Airport Search https://www.afd.scott.af.mil/<br />
Association of the United States Army (AUSA) http://www.ausa.org/www/ILW.nsf<br />
CENTCOM http://www.centcom.mil/contactus.htm<br />
Center for Defense Information http://cdi.org/<br />
Defense Technical Information Center http://www.dtic.mil/<br />
Defense <strong>Link</strong> http://www.defenselink.mil/<br />
Defense News http://www.defensenews.com/<br />
DoD Almanac http://www.defenselink.mil/pubs/almanac/<br />
Military Resources http://www.earthstation9.com/index.html?aircraf6.htm<br />
<strong>Global</strong> Security http://www.globalsecurity.org/<br />
Military Equipment http://library.nps.navy.mil/home/equipment.htm#contents<br />
Lessons Learned http://www.au.af.mil/au/awc/awcgate/awc-lesn.htm<br />
Coast Guard http://www.uscg.mil/units.html<br />
http://www.uscg.mil/USCG.shtm<br />
55
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Demographics & Religion (See Also Religion)<br />
Religion by Location and Name http://www.adherents.com/<br />
Religions of the World http://library.thinkquest.org/28505/inde1.html<br />
http://www.bbc.net.uk/worldservice/people/features/world_religions/index.shtml<br />
http://www.wcc-coe.org/wcc/links/religs.html<br />
http://www.religioustolerance.org/worldrel.htm<br />
http://religionworld.org/religions.html<br />
U.S. Census Bureau http://factfinder.census.gov/home/saff/main.html?_lang=en<br />
American Religion Data Archive http://www.thearda.com/arda.asp?Show=Home<br />
Hartford Institute for Religion Research http://hirr.hartsem.edu/<br />
Western Religions http://www.mrdowling.com/605westr.html<br />
Religion <strong>Link</strong>s http://web.ask.com/search?q=%22demographics+and+religion%22&page=<br />
http://dir.yahoo.com/society_and_culture/religion_and_spirituality/faiths_and_practices/<br />
Major World Religions http://www.omsakthi.org/religions.html<br />
A Comparative Analysis of The Major World Religions http://www.comparativereligion.com/<br />
The Religion of The Taliban<br />
http://www.globalsecurity.org/military/library/report/2001/Deobandi_Islam.pdf<br />
Holy Qur'an Resources on the Internet http://www.quran.org.uk/<br />
A Brief Guide to Understanding Islam http://www.islam-guide.com/<br />
Salam Iran http://www.salamiran.org/<br />
Understanding Islam and Muslims http://www.islamicity.com/Mosque/uiatm/un_islam.htm<br />
Interactive Map: Sunni And Shia : The Worlds of Islam<br />
http://www.pbs.org/wnet/wideangle/shows/iran/map.html<br />
Denial and Deception<br />
Background Briefing on Enemy Denial and Deception<br />
http://www.defenselink.mil/transcripts/2001/t10242001_t1024dd.html<br />
Denial and Deception Strategy<br />
http://www.defenselink.mil/news/Oct2001/011024-D-6570C-009.pdf<br />
The Security Situation in the Taiwan Strait<br />
http://www.jinsa.org/articles/articles.html/function/view/categoryid/169/documentid/564/history/3,2360,652<br />
,169,564<br />
Department of Homeland Security<br />
The Department of Homeland Security <strong>Open</strong> <strong>Source</strong> Enterprise (DHS-OSE) has just released<br />
two new daily <strong>Open</strong> <strong>Source</strong> products to the Homeland Security Central website on Intelink-U<br />
(https://www.intelink.gov/hls) and the Homeland Security Information Network-<strong>Intelligence</strong> (https://hsinintel.dhs.gov/).<br />
With the large success of the DHS Daily Cyber Report, the DHS-OSE has started reporting open source<br />
information on medical and health related hazards, as well as human smuggling and trafficking.<br />
Respectively, these new open source products are titled: DHS Daily Infectious Diseases Report & DHS<br />
Daily Human Trafficking Report.<br />
Listed below is a short description of each:<br />
� The DHS Daily Infectious Diseases Report is collected each weekday as a summary of medical<br />
and health related hazards published from open-source information concerning the homeland.<br />
� The DHS Daily Human Trafficking Report is collected each weekday as a summary of human<br />
smuggling/trafficking related open-source information.<br />
56
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Each of these new products along with the Daily Cyber Report are available for PDF download at<br />
the above secure web addresses and are available via unclassified e-mail subscription. There are also<br />
several other new open source reports to be released that focus on:<br />
� Drug Trafficking,<br />
� Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE),<br />
� Illicit Commercial Trafficking, and<br />
� Weapons Trafficking<br />
These DHS-OSE open source products originate from Internet sources and open source<br />
information. They are unclassified products that can be widely distributed. Point of contact is Tom <strong>Link</strong> at<br />
thomas.link@dhs.gov or tom.link@ugov.gov<br />
Vehicle Guideline http://www.nbpc.net/Miscellaneous/VEHICLE_.PDF<br />
Surveillance Truck http://eyeball-series.org/dhs-truck.htm<br />
DHS Daily <strong>Open</strong> <strong>Source</strong> Infrastructure Report<br />
http://www.dhs.gov/xinfoshare/programs/editorial_0542.shtm<br />
The Department of Homeland <strong>Open</strong> <strong>Source</strong> Enterprise has launched their "Introduction to <strong>Open</strong><br />
<strong>Source</strong>" Online Training Modules to Intelink-U. https://www.intelink.gov/sites/dhs-ose/training/default.aspx<br />
Threat Assessment: Hotels<br />
https://www.ndpci.us/members/modules/dms/file_retrieve.php?function=view&obj_id=1127<br />
Department of Justice<br />
USDOJ Search Engine<br />
http://searchjustice.usdoj.gov/search?site=default_collection&client=default_frontend&output=xml_no_dtd<br />
&proxystylesheet=default_frontend&proxycustom=<br />
Department of The Treasury<br />
Specially Designated Nationals and Blocked Persons<br />
http://www.treas.gov/offices/enforcement/ofac/sdn/t11sdn.pdf<br />
http://www.treas.gov/offices/enforcement/ofac/sdn/index.shtml<br />
Directories of the World<br />
Webmaster World http://www.webmasterworld.com/forum17/<br />
Infobel http://www.infobel.com/world/default.asp<br />
International White and Yellow Pages http://www.wayp.com/<br />
Iran Online Yellow Pages http://www.iranianyellowpages.com/<br />
<strong>Link</strong>s to the World Directories http://www.leg.state.mn.us/lrl/links/direct.asp<br />
http://www.tradebusiness.com/countries/countriesa.html<br />
http://www.globalyp.com/world.htm#Bermuda<br />
http://www.infospace.com/home/white-pages/world<br />
NumberWay http://numberway.com/<br />
The <strong>Global</strong> Yellow Pages http://www.globalyp.com/<br />
World Business Directories http://web.idirect.com/~tiger/exportdr.htm<br />
Worldwide Yellow Pages http://www.cybercity-online.net/wwyp.html<br />
http://www.yellowpagesworld.com/<br />
57
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Domain Name Servers<br />
All Domains http://www.allwhois.com/<br />
WHOIS Database Search http://www.arin.net/whois/index.html<br />
Host Name to IP Address http://www.hcidata.co.uk/host2ip.htm<br />
Internet Query Tools http://www.demon.net/external/<br />
DNS Lookup http://hunterftp.hunter.com/scripts/dnslookup.html<br />
http://www.zoneedit.com/lookup.html?ad=goto&kw=nslookup<br />
DNS Stuff http://hunterftp.hunter.com/scripts/dnslookup.html<br />
http://webreference.com/cgi-bin/nslookup.cgi<br />
http://www.dnsstuff.com/<br />
Search and Register Domain Names http://namedroppers.com/<br />
Domain Name Search http://www.wizbit.net/whois2.php<br />
http://domainsearch.com/<br />
Domain Surfer http://domainsurfer.com/<br />
Domainator http://www.e-gineer.com/domainator/index.phtml<br />
Geektools http://www.geektools.com/whois.php<br />
InterNic http://www.internic.net/whois.html<br />
Multiple DNS Lookup http://www.bankes.com/nslookup.htm<br />
Webserver Search http://news.netcraft.com/<br />
Query the APNIC Whois Database http://www.apnic.net/apnic-bin/whois.pl<br />
RIPE Whois Search http://www.ripe.net/perl/whois<br />
Check Domain http://www.checkdomain.com/<br />
Super DNS Lookup http://cgibin.erols.com/ziring/cgi-bin/nsgate/gate.pl<br />
Network Administrators Guide http://www.ibiblio.org/mdw/LDP/nag/node1.html<br />
Query Tools http://www.wdi.co.uk/testTools/querytools.phtml<br />
Internet Tools http://www.wowarea.com/english/help/tools.htm<br />
Drugs and Terrorism, Drug Cartels, And Criminal Organizations<br />
At least seven major Mexican Drug Trafficking Organizations (DTOs) are primarily responsible for the $39<br />
billion drug trade that floods narcotics across the U.S.-Mexico border. These opportunistic cartels form<br />
loose alliances that are only as strong as the narcotics proceeds fueling them. The DEA refers to several<br />
as "poly drug" organizations because they traffic cocaine, marijuana, heroin, and meth.<br />
Here's a guide to the most active, and largest, cartels:<br />
Mexican Federation (Sinaloa Cartel): The Sinaloa Federation, which is also known as the Pacific Cartel<br />
or Golden Triangle Alliance, was formed in the 1970s by Mexico's four major crime syndicates. By the<br />
1990s, the cartel had grown to the size of the Colombian Medellin Cartel in its heyday and, in 2008,<br />
apparently split into several warring factions, including the Beltran-Leyva Organization. The Federation<br />
directs a large-scale transportation network for various narcotics, including shipping multi-ton quantities of<br />
cocaine from South America. Joaquin "El Chapo" Guzman Loera has been leading the cartel since 1995.<br />
Arellano-Felix Organization (Tijuana Cartel): Seven brothers and four sisters inherited the cartel from<br />
Miguel Angel Felix Gallardo, who was jailed in 1989 for the kidnapping and murder of DEA agent Enrique<br />
"Kike" Camerena Salazar, among other crimes. Earlier this year, current leaders Teodoro "El Teo" Garcia<br />
Simental, Raydel "El Muletas" Lopez Uriarte, and brother Manuel were arrested.<br />
Carrillo-Fuentes DTO (Juarez Cartel): Since the early 1990s, this cartel has controlled the smuggling<br />
corridor from Juarez-El Paso southeast to Ojinaga, Chihuaha, using extreme violence and intimidation.<br />
After the death of founder Amado Carrillo Fuentes in a Mexican hospital as a result of botched plastic<br />
58
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
surgery, brother and current leader Vicente took over. The cartel has been battling the Sinaloa Cartel,<br />
and relies on the Barrio Azteca gang in El Paso, Dallas, and Austin to distribute cocaine.<br />
Gulf Cartel: The cartel's primary areas of operation include Nuevo Laredo, Miguel Aleman, Reynosa, and<br />
Matamoros in the Mexican state of Tamaulipas. The poly drug Gulf Cartel also operates in Nuevo Leon<br />
and Michoacan and is the primary supplier of the Atlanta area.<br />
Los Zetas Cartel: As the one-time enforcers for the Gulf Cartel, the paramilitary Zetas are one of the<br />
most powerful and violent cartels in Mexico. The cartel was formed when Gulf hired a small group of<br />
deserters from the Mexican Army Special Forces that may have received counter-insurgency training at<br />
Fort Benning, Ga. The group split off and created its own cartel in early 2010.<br />
La Familia Michoacana Cartel: This unique cartel, which achieved the federal government's Kingpin<br />
Designation Act list in April 2009, began in 2004 as armed vigilantes who portrayed themselves as crime<br />
fighters, stating their goal of eradicating meth. The group's practice of placing poorly spelled notes near<br />
the decapitated heads of rivals (especially in Uruapan) is part of its propaganda campaign. The cartel<br />
exhibits religious tendencies and cult-like behavior, requiring members to join group prayer sessions and<br />
wear La Familia logos. The group now produces meth in hilly Michoacan and intelligence officials believe<br />
it pays millions a month in bribe money to politicians.<br />
Beltran-Leyva Organization: In 2008, Arturo Beltran Leyva separated from the Sinaloa Cartel and now<br />
transports multi-ton quantities of cocaine and marijuana into Arizona, California, Illinois, New York, and<br />
Texas.<br />
InSight Map: The Dangerous Journey North for Migrants<br />
http://www.insightcrime.org/component/k2/itemlist/category/330-maps<br />
Drug Related Interactive Maps http://www.insightcrime.org/<br />
The Drug Violence in Mexico http://justiceinmexico.org/resources-2/drug-violence/<br />
Blog Del Narco (WARNING – EXTREMELY GRAPHIC VIDEOS) http://www.blogdelnarco.com/<br />
Field Guide to Mexican Drug Cartels<br />
http://www.policemag.com/Channel/Gangs/Articles/2010/11/A-Field-Guide-to-Mexican-Drug-<br />
Cartels.aspx<br />
Drug Cartel Challenge Coin<br />
http://www.policemag.com/Blog/Gangs/Story/2011/01/Drug-Cartel-Badge-Recovered.aspx<br />
Street Terms - The Street Terms database contains over 2,300 street terms that refer to specific<br />
drug types or drug activity. The database is used by police officers, parents, treatment providers and<br />
others who require a better understanding of drug culture.<br />
http://www.whitehousedrugpolicy.gov/streetterms/<br />
Los Narcos (has not been updated) http://drugcartelinfo.blogspot.com/<br />
PROJECT GUNRUNNER A Cartel Focused Strategy September 2010 (UNCLASSIFIED//LAW<br />
ENFORCEMENT SENSITIVE) http://msnbcmedia.msn.com/i/msnbc/sections/news/Cartel_Strategy.pdf<br />
Tracking Mexico's Drug Cartels http://www.stratfor.com/theme/tracking_mexicos_drug_cartels<br />
Narco Mexico http://narcocartels.blogspot.com/<br />
National Threat Assessments http://www.justice.gov/ndic/topics/ndtas.htm#Top<br />
Drug Cartel Facts: Drug cartels are criminal organization developed with the primary purpose of<br />
promoting and controlling drug trafficking operations. They range from loosely managed<br />
agreements among various drug traffickers to formalized commercial enterprises…<br />
http://www.freebase.com/view/en/drug_cartel<br />
Mexican Drug Cartels In The United States<br />
http://www.cnn.com/interactive/2009/05/world/map.mexican.cartels/index.html<br />
The Southern Front (The U.S.Border on the Mexico border is divided into 9 sectors. Click on each<br />
sector for more detailed information.) http://www.foxnews.com/hannity/sfmap/<br />
Drug Cartels and Other Organized Crime Groups<br />
http://www.drugstory.org/drug_traffic/cartel_organized.asp<br />
The Narco News Bulletin (I would treat this one lightly, credibility is suspect)<br />
59
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.narconews.com/<br />
Drug War Clock http://www.drugsense.org/wodclock.htm<br />
Drugs and Terrorism: A New Perspective (dated but useful)<br />
http://www.dea.gov/pubs/intel/02039/02039.html<br />
How Drug Prohibition Finances and Otherwise Enables Terrorism<br />
http://www.cfdp.ca/eoterror.htm<br />
How the Drug War in Afghanistan Undermines America’s War on Terror<br />
http://www.cato.org/pubs/fpbriefs/fpb84.pdf<br />
The <strong>Link</strong>s Between Drug Prohibition and Terrorism http://www.cfdp.ca/terror.htm<br />
Useful Sites http://faculty.maxwell.syr.edu/levitsky/useful_websites.htm<br />
Afghanistan Drugs and Terrorism http://wwwc.house.gov/international_relations/108/91798.pdf<br />
Crime, Drug Prohibition and Terrorism: An Inevitable Convergence http://www.narcoterror.org/<br />
Mini Submarine http://www.saag.org/%5Cpapers14%5Cpaper1312.html<br />
Common Sense for Drug Policy http://www.csdp.org/news/news/colombia.htm<br />
The Real Drug Lords http://www.serendipity.li/cia/blum1.html<br />
Mexico Fights US Drug War http://www.csdp.org/news/news/mexico.htm<br />
The <strong>Global</strong>ization Of The Drug Trade http://www.unesco.org/most/sourdren.pdf<br />
Drugs And Criminal Organizations http://www.interpol.int/Public/Drugs/default.asp<br />
The Media Awareness Project - A worldwide network dedicated to drug policy reform. We inform<br />
public opinion and promote balanced media coverage. http://mapinc.org/<br />
Drug Smuggling Techniques/Methods<br />
You can hide drugs up your anus or vagina but a good customs agent will find them if<br />
they’re suspicious. There are also experts who make a living packing suitcases and<br />
rucksacks. It is possible to do it in a way that doesn’t show up on x-rays and that feels<br />
genuinely like part of the baggage. It’s an acquired skill however and the customs boys<br />
know exactly what to look for. Another popular method is to buy platform shoes and cut<br />
out a space in the heels. This is hardly original but if you decide to try this please at least<br />
get used to wearing the things first. You’ll look a little conspicuous overbalancing as you<br />
walk through the airport.<br />
Narco Subs http://www.wibw.com/internationalnews/headlines/97515289.html<br />
http://af11.wordpress.com/2010/06/30/narco-subs-latest-in-evolution-of-drug-smuggling-methods/<br />
http://articles.cnn.com/2010-06-29/world/vbs.colombian.narcosubs_1_colombian-navy-traffickerssmuggling?_s=PM:WORLD<br />
http://militarytimes.com/blogs/scoopdeck/2010/07/06/will-new-long-range-narco-subs-change-the-game/<br />
http://www.chron.com/disp/story.mpl/world/7081395.html<br />
http://www.militaryphotos.net/forums/showthread.php?188255-Narco-subs-(drug-runners)-thread<br />
http://covertshores.blogspot.com/2010/06/narco-submarines-torpedoes-and-semi.html<br />
http://afp.google.com/article/ALeqM5idRpyWrlCB67LHzjut5kSMOyDARw<br />
http://insightcrime.org/insight-latest-news/item/1618-colombia-seizes-2-narco-submarines-in-a-week<br />
Cocaine Submarines – Great video by National Geographic on cocaine submarines.<br />
http://www.documentarytube.com/cocainesubmarines?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+DocumentaryTub<br />
e+%28Documentary+Tube%29<br />
Colombian traffickers are using a new secret weapon smuggling cocaine north – drug submarines.<br />
Up to 30 meters long and almost impossible to detect, are capable of delivering several tons of cocaine in<br />
one shipment. Dozens of submarines are believed to be operating between the coasts of Colombia and<br />
Mexico, and police estimate that another 70 will be built next year alone. NGC is U.S. Drug Enforcement<br />
Agency and the Colombian military agents in search of drug submarine construction in some of the most<br />
60
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
remote jungles of the planet. Here, where the malaria-infested mosquitoes swarm narco-generals and<br />
heavy hand of the local population, there are at least 300 known cocaine laboratories and finished<br />
countless drug submarines and their factories. In hard-fought war against drug trafficking, an estimated<br />
catch comes in: a surprisingly sophisticated sub built by hand in the jungle.<br />
Mexican Drug Cartels Reach Into The U.S.<br />
Mexico Under Seige: The Drug War at Our Doorstep http://projects.latimes.com/mexico-drug-war/#/its-awar<br />
Maps are interactive hyperlinked<br />
61
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Areas of cartel influence and dispute<br />
62
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Drug cartels moving into the US<br />
63
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Mexico’s Drug Killings<br />
http://online.wsj.com/article/SB10001424052748704288204575362862267177490.html?mod=<br />
WSJ_hpp_LEFTTopStories#project%3DMEXDRUGWARS0912%26articleTabs%3Dinteractive<br />
Drug Killings in Mexico (Annual Totals)<br />
2006 Drug Killings by State<br />
Total Number of Drug Killings [ image| methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2007 Drug Killings by State<br />
Total Number of Drug Killings [ image| methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2008 Drug Killings by State (as of June 27, 2008)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2008 Drug Killings by State (as of August 29, 2008)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2008 Drug Killings by State (as of October 31, 2008)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2008 Drug Killings by State (as of December 26, 2008)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
64
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
2009 Drug Killings by State (as of February 27, 2009)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2009 Drug Killings by State (as of May 1, 2009)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2009 Drug Killings by State (as of July 3, 2009)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2009 Drug Killings by State (as of August 28, 2009)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2009 Drug Killings by State (as of October 30, 2009)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2009 Drug Killings by State (as of December 31, 2009)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2010 Drug Killings by State (as of April 30, 2010)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2010 Drug Killings by State (as of July 2, 2010)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2010 Drug Killings by State (as of September 3, 2010)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2010 Drug Killings by State (as of November 3, 2010)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
2010 Drug Killings by State (as of December 31, 2010)<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
Drug Killings in Mexico (Bi-monthly)<br />
January through February 2008<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
March through April 2008<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
May through June 2008<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
July through August 2008<br />
Total Number of Drug Killings [ image | methodology ]<br />
65
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
September through October 2008<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
November through December 2008<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
January through February 2009<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
March through April 2009<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
May through June 2009<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
July through August 2009<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
September through October 2009<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
November through December 2009<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
January through February 2010<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
March through April 2010<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings<br />
[ image | methodology ]<br />
May through June 2010<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
July through August 2010<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
September through October 2010<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
November through December 2010<br />
Total Number of Drug Killings [ image | methodology ]<br />
Proportion and Percentage of Drug Killings [ image | methodology ]<br />
66
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Drug Trafficking Through Central America (Great Interactive Map)<br />
http://www1.stratfor.com/images/interactive/Central_american_roads.htm<br />
67
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Economic/Financial<br />
Agora Financial's 5 Minute Forecast http://www.agorafinancial.com/5min/<br />
Behind Enemy Lines http://realestateandhousing2.blogspot.com/<br />
Bespoke Investment Group http://bespokeinvest.typepad.com/<br />
Clusterf*ck Nation http://jameshowardkunstler.typepad.com/<br />
Depression2.tv http://www.depression2.tv/d2/<br />
ETF Digest http://www.etfdigest.com/davesDaily.php<br />
Financial Armageddon http://www.financialarmageddon.com/<br />
Fund My Mutual Fund http://www.fundmymutualfund.com/<br />
Interest Rate Roundup http://interestrateroundup.blogspot.com/<br />
Jim Sinclair's Mineset http://www.jsmineset.com/<br />
Kitco.com (Contributed Commentaries) http://www.kitco.com/ind/index_date.html<br />
Mish's <strong>Global</strong> Economic Analysis http://globaleconomicanalysis.blogspot.com/<br />
Money and Markets http://www.moneyandmarkets.com/index.php<br />
Of Two Minds http://www.oftwominds.com/blog.html<br />
Patrick.net http://patrick.net/housing/crash.html<br />
Red Hot Resources http://www.redhotresources.blogspot.com/<br />
Roseman Eruptions http://rosemanblog.sovereignsociety.com/<br />
The Real Deal http://realdealfinancial.blogspot.com/<br />
24hGOLD http://www.24hgold.com/default.aspx<br />
Seeking Alpha http://seekingalpha.com/<br />
El Paso <strong>Intelligence</strong> Center (EPIC)<br />
El Paso <strong>Intelligence</strong> Center (EPIC) http://www.justice.gov/dea/programs/epic.htm<br />
Tattoos Associated with the Barrio Azteca Gang<br />
http://info.publicintelligence.net/mexicoconsulateattacks.pdf<br />
Blue Meth http://info.publicintelligence.net/EPICBlueMeth.pdf<br />
E-Mail Lookups<br />
411 Locate http://www.411locate.com/index1.htm<br />
AnyWho http://anywho.com/<br />
Search Detective http://www.searchdetective.net/<br />
InfoSpace http://www.infospace.com/home/white-pages/reverse-email<br />
Email Address <strong>Link</strong>s http://www.emailaddresses.com/email_lookup_large.htm<br />
http://www.nedsite.nl/search/people.htm#email<br />
http://www.infobel.com/teldir/teldir.asp?page=/eng/more/email<br />
Reverse Lookup and Email Search http://www.freeality.com/finde.htm<br />
http://www.searchdetective.net/email.html<br />
MetaEmailSearchAgent http://mesa.rrzn.uni-hannover.de/<br />
PeopleSearchNet<br />
http://peoplesearch.net/peoplesearch/peoplesearch_reverse_email_address.html<br />
The Ultimate Email <strong>Directory</strong> http://theultimates.com/email/<br />
World Email http://www.worldemail.com/<br />
68
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Embassies of the World<br />
Energy<br />
<strong>Directory</strong> of Arab embassies and consulates in London<br />
http://www.arabcentre.co.uk/arab-embassy.aspx<br />
World Embassy Database http://www.tyzo.com/planning/embassies.html<br />
Embassy of the Republic of Armenia http://www.armeniaemb.org/<br />
Websites of U.S. Embassies and Consulates http://usembassy.state.gov/<br />
Turkish Embassies in America and World http://www.turkish-media.com/en/us_tr_embassies.htm<br />
Index of Foreign Embassies in Australia<br />
http://www.info.dfat.gov.au/Info/WebProtocol/WebProtocol.nsf/homeforma?openform&D<br />
Embassy Search http://www.embassiesabroad.com/search.cfm<br />
Embassies of the World http://www.countriesandcities.com/embassies/<br />
EmbassyWorld http://www.embassyworld.com/embassy/inside_usa.htm<br />
http://www.embassyworld.com/embassy/directory.htm<br />
http://www.embassyworld.com/<br />
http://www.escapeartist.com/embassy1/embassy1.htm<br />
Embassies and Consulates http://dir.yahoo.com/Government/Embassies_and_Consulates/<br />
http://www.dfait-maeci.gc.ca/world/embassies/menu-en.asp<br />
Foreign Embassies of Washington, D.C. http://www.embassy.org/embassies/<br />
Chiefs of State and Cabinet Members of Foreign Governments<br />
http://www.cia.gov/cia/publications/chiefs/<br />
http://www.lawresearch.com/v2/global/cichiefs.htm<br />
http://www.chame.com.br/world/chiefs/index.html<br />
Foreign Governments http://www.library.northwestern.edu/govpub/resource/internat/foreign.html<br />
http://www.lib.umich.edu/govdocs/foreign.html<br />
http://www.gksoft.com/govt/<br />
http://www.diplomaticnet.com/uk/ministries/paises/<br />
The Oil Drum (discussions about energy and our future. ) http://theoildrum.com/<br />
<strong>Global</strong> Energy Network Institute http://www.geni.org/globalenergy/index2.shtml<br />
Center for <strong>Global</strong> Energy Studies http://www.cges.co.uk/<br />
Energy Central http://www.energycentral.com/<br />
Energy <strong>Intelligence</strong> http://www.energyintel.com/<br />
Electric Power Research Institute http://www.epri.com/<br />
Energy Market Maps http://cryptome.sabotage.org/energy-eyeball.htm<br />
http://www.eia.doe.gov/emeu/reps/eimap/ei_contents.html<br />
California On-Line Energy Maps http://www.energy.ca.gov/maps/index.html<br />
Department of Nuclear Energy<br />
http://www.iaea.org/worldatom/Programmes/Nuclear_Energy/index.html<br />
Databases and Directories http://www.platts.com/Databases%20&%20Directories/<br />
Renewable Energy Projects http://www.crest.org/index.html<br />
The Coming <strong>Global</strong> Energy Crisis http://www.energycrisis.org/<br />
U.S. Department of Energy http://www.ciac.org/ciac/<br />
World Energy Council http://www.worldenergy.org/wec-geis/<br />
Energy Review http://archive.wn.com/2004/07/21/1400/energyreview/<br />
Fauxtography a term used to describe instances of photojournalism (most coming from sources<br />
in the Middle East) in which photos have been either misrepresented by staging or other means, or<br />
69
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
manipulated with computer software. <strong>Source</strong>:<br />
http://mediamythbusters.com/index.php?title=Fauxtography<br />
Federal Government<br />
Bureau of Indian Affairs http://www.doi.gov/bureau-indian-affairs.html<br />
Department of Agriculture http://www.usda.gov/wps/portal/usdahome<br />
Department of Defense http://www.defenselink.mil/<br />
Department of Commerce http://www.commerce.gov/<br />
Department of Education http://www.ed.gov/index.jhtml<br />
Department of Emergency Management http://www.snodem.org/training/<br />
Department of Health and Human Services http://www.dhhs.gov/<br />
Department of Labor http://www.dol.gov/<br />
Department of State http://www.state.gov/<br />
Department of the Treasury http://www.ustreas.gov/<br />
Department of Veterans Affairs http://www.va.gov/<br />
Department of Homeland Security http://www.dhs.gov/dhspublic/<br />
Department of the Interior http://www.doi.gov/<br />
Department of Justice http://www.usdoj.gov/<br />
Department of Transportation http://www.usdoj.gov/<br />
Energy Information Agency http://www.eia.doe.gov/<br />
Department of Energy http://www.doe.gov/engine/content.do<br />
Food and Drug Administration http://www.fda.gov/<br />
Federal Aviation Administration http://www.faa.gov/<br />
Federal Emergency Management Agency http://www.fema.gov/<br />
White House http://www.whitehouse.gov/<br />
<strong>Link</strong>s to Government WEB Sites http://www.fedworld.gov/gov-links.html<br />
http://www.fedworld.gov/gov-links2.html<br />
http://www.lib.lsu.edu/gov/fedgov.html<br />
http://www.nvcc.edu/alexandria/library/instruction/esl/esl007/government.htm<br />
http://www.lib.lsu.edu/gov/alpha<br />
http://www.nwc.navy.mil/library/4Resources/GovtHomPage.htm<br />
Minerals Management Service http://www.mms.gov/<br />
Nuclear Regulatory Commission http://www.nrc.gov/<br />
Government Search http://www.queryserver.com/government.htm<br />
http://www.searchgov.com/<br />
The Federal WEB Locator http://www.infoctr.edu/fwl/<br />
Citizenship and Immigration Services http://uscis.gov/graphics/index.htm<br />
Office of Management and Budget http://www.whitehouse.gov/OMB/<br />
Government Executive http://www.govexec.com/<br />
First Gov (US Government official web site) http://www.firstgov.gov/<br />
Complete U.S. Federal Government Agencies <strong>Directory</strong> (Hierarchical)<br />
http://www.lib.lsu.edu/gov/tree<br />
Complete U.S. Federal Government Agencies <strong>Directory</strong> (Alphabetical)<br />
http://www.lib.lsu.edu/gov/alpha<br />
70
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Gangs (includes gangs in the Military)<br />
L.A. County Sheriff Improvised/Disguised Weapons Guide<br />
http://publicintelligence.info/LA-DisguisedWeapons.pdf<br />
New York City Police Department The Gang Manual<br />
http://publicintelligence.info/NYPDGANGMANUAL.PDF<br />
Bronx Bloods Members Communicating Through PlayStation Network (NOTE: Classification for<br />
this is U/LES, however it is obtained on the web) http://publicintelligence.info/FBI-BloodsPSN.pdf<br />
Texas Gang Threat Assessment 2010 http://www.insightcrime.org/investigations/governmentmultilaterals/item/1009-texas-department-of-public-safety-texas-gang-threat-assessment-2010<br />
Interpreting Gangster Clothing<br />
http://www.policemag.com/Channel/Gangs/PhotoGallery/2010/02/Gangster-Clothing.aspx<br />
Gangs in The Military (According to the FBI, 15,000 men and women in the U.S. military have ties<br />
to notorious American gangs such as MS-13, the Crips, the Bloods, and the Gangster Disciples.)<br />
http://www.policemag.com/Videos/Channel/Gangs/2011/01/Gangs-In-the-Military-Part-1.aspx<br />
Gang tattoos are an excellent tool for law enforcement and corrections officers to use to identify<br />
known or suspected gang members. This gallery includes examples of tattoos worn by predominanly<br />
Hispanic gangs such as the Mexican Mafia, MS-13, and the Latin Kings. The number "13" is used<br />
because M (or La Eme) is the thirteenth letter of the alphabet and is used to signify the Mexican Mafia,<br />
which uses Sureños—gangs that swear allegiance to the Mexican Mafia—to carry out its orders from<br />
prison. http://www.policemag.com/Channel/Gangs/PhotoGallery/2009/08/Gang-Tattoos-Hispanic.aspx<br />
Latin King’s Gang Signs Video<br />
http://www.policemag.com/Videos/Channel/Gangs/2010/09/Latin-King-s-Gang-Signs.aspx<br />
Tattoos Associated with the Barrio Azteca Gang<br />
http://info.publicintelligence.net/mexicoconsulateattacks.pdf<br />
Investigating Gang Homicides - A gang murder investigation requires your best detective skills to<br />
solve the crime and protect the witnesses.<br />
http://www.policemag.com/Channel/Gangs/Articles/2010/10/Investigating-Gang-Homicides.aspx<br />
Gangs United (if there was reason to be concerned, what is now happening in S. Texas is more<br />
disturbibg) http://threatswatch.org/rapidrecon/2010/11/gangs-united/<br />
Gang Book<br />
https://docs.google.com/viewer?a=v&pid=gmail&attid=0.1&thid=12c6ec4f372a0a0d&mt=applicati<br />
on/pdf&url=https://mail.google.com/mail/?ui%3D2%26ik%3D00892a2f0d%26view%3Datt%26th%<br />
3D12c6ec4f372a0a0d%26attid%3D0.1%26disp%3Dattd%26zw&sig=AHIEtbR3U6DArH21pObsw<br />
vl2qri4qR6f-w&pli=1<br />
The Barrio Azteca Trial and the Prison Gang-Cartel Interface<br />
http://www.stratfor.com/weekly/20081119_barrio_azteca_trial_and_prison_gang_cartel_interface<br />
Gangs In The U.S. http://www.accuracyproject.org/GangAcronyms-US.html<br />
Gangs Northwest Gangs: This website was made to give general information on street gang<br />
activity in the Northwest region of the United States. http://www.nwgangs.com/8001.html<br />
Gang Graffiti Photos http://www.flickr.com/photos/northwestgangs/<br />
Mapping Gang Related Activity In North America http://gangs.globalincidentmap.com/home.php<br />
Know Gangs: Recent Gang Videos http://www.knowgangs.com/gang_resources/menu.php<br />
http://www.knowgangs.com/<br />
All Crip Gangs in Los Angeles County http://www.streetgangs.com/crips/index.html<br />
Organized Crime Web <strong>Link</strong>s http://www.yorku.ca/nathanson/<strong>Link</strong>s/links.htm<br />
Gangs 101 http://www.lincolnnet.net/users/lrttrapp/block/gangs101.htm<br />
Gangs Or Us http://www.gangsorus.com/<br />
71
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Gangs http://www.geocities.com/Athens/4111/nogangs.html<br />
http://www.angelfire.com/biz4/stopvarriowar/gps.html<br />
Gang <strong>Intelligence</strong> Unit<br />
http://www.charmeck.org/Departments/Police/About+Us/Departments/Gang+<strong>Intelligence</strong>+Unit.htm<br />
Motorcycle Gangs Or Mafia http://www.nagia.org/Motorcycle_Gangs.htm<br />
Organized Crime And Political Corruption http://www.ipsn.org/<br />
Gangs Before Thrasher http://gangresearch.net/Archives/UIC/Courses/history/beforethrash.html<br />
Gang Research http://gangresearch.net/<br />
http://www.uic.edu/orgs/kbc/<br />
http://tigger.uic.edu/~huk/Gang%20History/Citygangs.html<br />
http://www.ericdigests.org/pre-9216/gangs.htm<br />
Gangs Around The World http://www.uic.edu/orgs/kbc/gangresources/Intgangs.html<br />
http://gangresearch.net/<strong>Global</strong>ization/regions/intgangs.html<br />
Identifying Gang Members http://www.polksheriff.org/library/gangs/identifying.html<br />
Gang Symbols/Signs http://www.velocity.net/~acekc/gangsymbols.htm<br />
http://www.velocity.net/~acekc/gangsign.htm<br />
http://ga.essortment.com/gangsignsands_reyp.htm<br />
Gang Awareness http://www.sanantonio.gov/sapd/pdf/Awareness.pdf<br />
Gang Handbook http://www.gov.mb.ca/justice/safe/gangproof/ganghandbook2004.pdf<br />
Gangs In Texas http://www.oag.state.tx.us/AG_Publications/pdfs/97gang.pdf<br />
Clantone 14 http://www.clantone.net/mainpage.html<br />
Gangs Speak For Themselves http://tigger.uic.edu/~huk/Gang%20History/Gangs.html<br />
All Blood Gangs In Los Angeles County http://www.streetgangs.com/bloods/<br />
Crips http://www.streetgangs.com/crips/<br />
Hispanic Gangs In Los Angeles County http://www.streetgangs.com/hispanic/<br />
Asian Gangs In Los Angeles County http://www.streetgangs.com/asian/<br />
18 th Street Gang http://www.streetgangs.com/18thstreet.html<br />
Territory Maps of Gangs in Los Angeles http://www.streetgangs.com/maps/<br />
Female Gangs In America http://www.uic.edu/orgs/kbc/Female.html<br />
http://www.angelfire.com/theforce/gps0/FemaleGangs.html<br />
Street Gang Websites & Related <strong>Link</strong>s http://www.angelfire.com/biz4/stopvarriowar/gps.html<br />
Know Gangs http://www.knowgangs.com/gang_001.htm<br />
Mara Salvatrucha http://www.the-solution.org/ms13.htm<br />
http://home.comcast.net/~jackhydn1/structure.htm<br />
http://www.islandpacket.com/news/local/story/5711073p-5115080c.html<br />
http://www.flickr.com/photos/brianwisconsin/search/tags:MS-13/<br />
http://www.rockawave.com/news/2005/0708/Front_Page/003.html<br />
http://home.comcast.net/~jackhydn1/FFXPolicePres.pdf<br />
Gang Prevention Publications<br />
http://www.dojconnect.com/docs/resources/Gang_Prevention_Resources.pdf<br />
Gang Profiles http://cryptome.org/13gangs.htm<br />
Gang and Security Threat Group Awareness http://www.dc.state.fl.us/pub/gangs/index.html<br />
The Psychology of Criminal Behaviour http://www.athabascau.ca/courses/crjs/360/index.html<br />
Bloods And Crips http://www.dc.state.fl.us/pub/gangs/la.html<br />
Street Gangs: A Dead End http://www.fmuniv.edu/urbanaffairs/Street%20Gangs.pdf<br />
The Reality Of Gangs http://www.ncpc.org/cms/cms-upload/ncpc/files/gangs.pdf<br />
Youth Gangs http://www.ed.gov/admins/lead/safety/training/gangs/day1_pdf.pdf<br />
Gangs Or Us http://www.gangsorus.com/graffiti.html<br />
2005 National Gang Threat Assessment<br />
http://www.stripes.com/07/feb07/gangs/2005_NAGIA_Assessment.pdf<br />
Review Of Gang Activity Affecting The Army<br />
http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf<br />
Gang-Related Activity in the US Armed Forces Increasing<br />
http://www.stripes.com/07/feb07/gangs/ncis_gangs.pdf<br />
Gangs In The Military Video http://www.militaryspot.com/videos/video72.htm<br />
Gang Activity In The U.S. Military http://usmilitary.about.com/od/justicelawlegislation/a/gangs.htm<br />
72
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Gang Signs http://zimmer.csufresno.edu/~haralds/htmlfiles/gang-signs.html<br />
Gangs Spreading In The Military<br />
http://www.cbsnews.com/stories/2007/07/28/eveningnews/main3107316.shtml?source=RSSattr=HOME_<br />
3107316<br />
Gang Related Activity In The Armed Forces<br />
http://militarytimes.com/static/projects/pages/ngic_gangs.pdf<br />
Gang Activity Threat Assessment http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf<br />
List Of California Street Gangs http://en.wikipedia.org/wiki/List_of_California_street_gangs<br />
Gang Signal http://en.wikipedia.org/wiki/Gang_signal<br />
Gang Awareness Guide http://www.state.nj.us/oag/gang-signs-bro.pdf<br />
Gang Hand Signs from Gang Members<br />
http://www.hiphopmusicclassic.com/Gang-Hand-Signs-from-Gang-Members.html<br />
<strong>Global</strong> Incidents Interactive Maps<br />
Maersk – Track ships in real time. (we certainly do make it easy for pirates!)<br />
http://www.maerskfleet.com/#live-map<br />
Ship Tracking http://www.sailwx.info/shiptrack/shiplocations.phtml<br />
Ships Map http://www.marinetraffic.com/ais/<br />
http://www.boat-project.com/cruises/ais.php<br />
VesselTracker http://www.vesseltracker.com/en/Googleearth.html<br />
http://www.digital-seas.com/<br />
Forgotten Conflicts http://www.msnbc.msn.com/id/28584056/ns/world_news/<br />
A <strong>Global</strong> Display of Terrorism and Other Suspicious Activity (requires a paid subscription)<br />
http://www.globalincidentmap.com/map.php<br />
North American Hazmat Situations and Deployments Map<br />
http://hazmat.globalincidentmap.com/map.php<br />
Displaying Actual and Suspected Cases of H1N1 North American Influenza<br />
http://outbreaks.globalincidentmap.com/home.php<br />
Gang Activity and Arrests http://gangs.globalincidentmap.com/home.php<br />
Canadian/Mexican/USA Border Security Incidents http://border.globalincidentmap.com/<br />
Domestic Terrorism Tracking System (requires a paid subscription)<br />
http://www.domesticterrormap.com/<br />
Displaying Amber Alerts Nationwide http://amberalerts.globalincidentmap.com/home.php<br />
Presidential Threat Map http://president.globalincidentmap.com/<br />
Continuously Updated <strong>Global</strong> Display of Aviation Incidents and Accidents<br />
http://aviation.globalincidentmap.com/<br />
Continuously Updated Display of Major Drug Interdictions http://drugs.globalincidentmap.com/<br />
<strong>Global</strong> Threats/Conflict<br />
Conflict, Security, and Development 2011<br />
http://wdr2011.worldbank.org/sites/default/files/WDR2011_Overview.pdf<br />
Threats Watch http://threatswatch.org/<br />
Conflict Map (Great interactive maps for various subjects)<br />
http://nobelprize.org/educational_games/peace/conflictmap/<br />
Forgotten Conflicts http://www.msnbc.msn.com/id/28584056/ns/world_news/<br />
Exploring <strong>Global</strong> Conflict http://www.uwm.edu/Dept/CIS/conflict/congeneral.html<br />
<strong>Global</strong> Threats and Challenges http://www.ceip.org/files/projects/npp/resources/dia020701.htm<br />
73
Google<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.fas.org/irp/congress/1997_hr/s970205d.htm<br />
http://www.fas.org/irp/congress/2002_hr/031902wilson.pdf<br />
<strong>Global</strong> Trends 2015 http://www.odci.gov/cia/reports/globaltrends2015/index.html<br />
Identity Fraud: A Critical National and <strong>Global</strong> Threat<br />
http://www.lexisnexis.com/presscenter/hottopics/ECIReportFINAL.pdf<br />
Threat Assessments http://www.ceip.org/files/nonprolif/resources/intelligence.asp<br />
http://www.ceip.org/files/nonprolif/templates/article.asp?NewsID=5022<br />
National Threat Assessment Center http://www.secretservice.gov/ntac.shtml<br />
World Threats http://www.worldthreats.com/<br />
Hot Spots Around The Globe<br />
http://www.cnn.com/interactive/maps/world/fullpage.global.conflict/world.index.html<br />
The World At War: Current Conflicts http://www.globalsecurity.org/military/world/war/index.html<br />
Inventory Of Conflict And Environment<br />
http://www.american.edu/projects/mandala/TED/ice/iceall.htm<br />
Google Earth http://earth.google.com/<br />
French Alternative to Google Earth http://www.geoportail.fr/<br />
Google Alerts (Don’t waste time on searches when Google can do it for you. Type in the<br />
keywords or phrases and get the results as they occur or once a day) http://www.google.com/alerts<br />
Google Answers (Ask a question, set a price get an answer) http://answers.google.com/answers/<br />
Catalogs (Search and browse mail-order catalogs) http://catalogs.google.com/<br />
Directories (Browse the web by topic) http://www.google.com/dirhp<br />
Froogle (Shop smarter with Google) http://froogle.google.com/<br />
Groups (Create mailing lists and discussion groups)<br />
http://groups-beta.google.com/grphp?hl=en&tab=wg<br />
Images (Search for images on the web) http://www.google.com/imghp?hl=en&tab=wi<br />
Labs (Try out new Google products) http://labs.google.com/<br />
Local (Find local businesses and services) http://local.google.com/<br />
Maps (View maps and get directions) http://maps.google.com/<br />
News (Search thousands of news stories) http://news.google.com/nwshp?hl=en&gl=us<br />
Print (Search the full text of books) http://print.google.com/<br />
Scholar (Search scholarly papers) http://scholar.google.com/<br />
Special Searches (Search within specific topics)<br />
http://www.google.com/intl/en/options/specialsearches.html<br />
University Search (Search a specific school's website)<br />
http://www.google.com/intl/en/options/universities.html<br />
WEB Search Features (Do more with search) http://www.google.com/help/features.html<br />
A 3D interface to the planet http://earth.google.com/<br />
Blog Search http://blogsearch.google.com/<br />
Simply Google http://www.usabilityviews.com/simply_google.htm<br />
Search Mash http://www.searchmash.com/<br />
Google Hacks And Others<br />
Google Hacks Book Online<br />
http://richardsprague.blogspot.com/2007/01/complex-google-searches.html<br />
Safari Tech Books Online (Why buy them when you can read them online)<br />
http://proquest.safaribooksonline.com/?uicode=califa<br />
Hack Public Records http://tuvutayik.blogspot.com/2007/01/hack-ga-public-records-search.html<br />
74
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Googling Your Dinner http://www.amgeekwilltravel.com/?p=162<br />
55 Ways To Have Fun With Google http://www.55fun.com/<br />
Free Copy http://www.55fun.com/book.pdf<br />
Google Hacking Mini Guide<br />
http://www.informit.com/articles/printerfriendly.asp?p=170880&rl=1p=170880&rl=1<br />
Computer Science Reference Books<br />
http://shahid-tutesworld.blogspot.com/2007/01/hacking-section.html<br />
Ten Government Hacks<br />
http://www.hackszine.com/blog/archive/2007/01/10_government_hacks.html<br />
Hacks<br />
http://www.hackszine.com/blog/archive/2007/01/map_your_books.html?CMP=OTC-7G2N43923558<br />
Download Free MP3 http://www.indiecom.net/node/166<br />
Google Hacks http://www.hackemate.com.ar/textos/O'Reilly%20books/O'Reilly%20-<br />
20Google%20Hacks,%201st%20Edition.pdf<br />
Programming For You http://programming4you.wordpress.com/2007/02/13/google-hacks/<br />
Exploring Google’s Hidden Features<br />
http://www.informit.com/articles/printerfriendly.asp?p=675528&rl=1<br />
Free E-Books http://mohitarnold.blogspot.com/2007/03/free-e-books.html<br />
http://ebook.blogfa.com/8603.aspx<br />
Google Hacks E-Books<br />
http://www.news.youmule.com/2007/04/01/pc-technician-street-smarts-and-google-hacks-ebooks/<br />
Google Hacks N Stuff http://raaff.gempax.net/?p=46<br />
2600 The Hacker Quarterly http://www.2600.com/<br />
PGP Documents http://www.menet.umn.edu/docs/software/pgp/pgp.html<br />
PGP4Dummies http://www.zabalaza.net/pgp/pgp4dummies.pdf<br />
Hamas<br />
Hamas On You Tube http://www.youtube.com/user/PaldfTV<br />
Hate Groups<br />
The Hate <strong>Directory</strong> (Hate groups on the internet) http://www.hatedirectory.com/<br />
http://www.hatedirectory.com/hatedir.pdf<br />
Hate Groups Interactive Map http://www.splcenter.org/get-informed/hate-map<br />
75
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Hezbollah<br />
Hezbollah cracked the code<br />
http://www.newsday.com/news/nationworld/world/ny-wocode184896831sep18,0,3091818.story?coll=nyworld-promo<br />
Hizbollah And The Lebanese Crisis http://www.gees.org/documentos/Documen-02610.pdf<br />
Homeland Security (See Also Department of Homeland Security)<br />
Homeland Security Network News<br />
https://webmail.us.army.mil/attach/text/html?sid=&mbox=INBOX&charset=escaped_unicode&uid=22489&<br />
number=2&process=js&filename=text/html<br />
http://www.homelandsecuritynet.com/<br />
Homeland Security Digital Library https://www.hsdl.org/<br />
HomeLand Security Today http://hstoday.us/<br />
Gateway to Homeland Security http://www.au.af.mil/au/awc/awcgate/awc-hmld.htm<br />
Brookings Institution Project on Homeland Security<br />
http://www.brook.edu/dybdocroot/fp/projects/homeland/homeland.htm<br />
Center for State Homeland Security<br />
http://www.cshs-us.org/CSHS/cshs.nsf/Main/CounterTerrorismReports<br />
Department of Homeland Security http://www.dhs.gov/dhspublic/<br />
Are You Ready? http://www.fema.gov/areyouready/<br />
GAO Homeland Security http://www.gao.gov/docsearch/featured/homelandsecurity.html<br />
Homeland Security Monitor http://www.homelandsecuritymonitor.com/index.htm<br />
State Homeland Security WEB Sites http://www.nga.org/cda/files/HOMESECSTRUCTURES.PDF<br />
http://www.nga.org/center/security/<br />
Homeland Security Guidelines http://cryptome.org/homesec-kyagb.htm<br />
Homeland Security Weekly http://www.homelandsecurityweekly.com/lastissue.html<br />
National Homeland Security Knowledge Bas http://www.twotigersonline.com/resources.html<br />
The Heritage Foundation http://www.heritage.org/Research/HomelandDefense/index.cfm<br />
Online References and Resources http://chppm-www.apgea.army.mil/HomelandSecurity/<br />
http://www.globalsecurity.org/security/index.html<br />
Department of Homeland Security Spy Vehicle http://cryptome.org/dhs-truck.htm<br />
Homeland Security Online http://www.hitechcj.com/homelandsecurity/<br />
Homeland Security Solutions International http://www.homelandsecurityssi.com/<br />
Human Trafficking<br />
76
HUMINT<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Ending Modern Day Slavery<br />
http://thecnnfreedomproject.blogs.cnn.com/2011/07/29/a-profitable-enterprise/<br />
Human Trafficking Search http://www.humantraffickingsearch.net/<br />
Trafficking Protection Act of 2000 http://www.state.gov/g/tip/rls/tiprpt/2004/<br />
Campaign Against the Trafficking of Women and Girls<br />
http://www.hrw.org/about/projects/traffcamp/intro.html<br />
Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/human.htm<br />
Facts About Human Trafficking http://www.state.gov/r/pa/ei/rls/33109.htm<br />
http://www.worldrevolution.org/guidepage/humantrafficking/overview<br />
Human Trafficking and Modern-Day Slavery http://www.gvnet.com/humantrafficking/<br />
http://www.polarisproject.org/polarisproject/<br />
http://www.acf.dhhs.gov/trafficking/<br />
http://www.unodc.org/unodc/en/trafficking_human_beings.html<br />
A WEB <strong>Source</strong> for Combating Human Trafficking http://humantrafficking.org/<br />
Children and Human Trafficking http://www.interpol.int/Public/THB/default.asp<br />
United Nations: Trafficking<br />
http://www.unodc.org/unodc/en/publications/publications_trafficking.html<br />
Responses to Human Trafficking http://usinfo.state.gov/journals/itgic/0603/ijge/ijge0603.htm<br />
Trafficking <strong>Link</strong>s http://www.unodc.org/unodc/en/trafficking_links.html<br />
Interactive Map: Human Trafficking Worldwide<br />
http://www.pbs.org/wnet/wideangle/shows/dying/map_albania.html<br />
People Smuggling http://www.interpol.int/Public/THB/PeopleSmuggling/Default.asp<br />
Trafficking https://www.atsc.army.mil/crc/Trafflicking/index.htm<br />
Trafficking In Human Beings http://www.interpol.int/Public/THB/default.asp<br />
HUMan INTelligence http://en.wikipedia.org/wiki/HUMINT<br />
White Paper 1997 http://www.fas.org/irp/doddir/army/wht-ppr.htm<br />
Identity Theft<br />
What to do if you are a victim of identity theft? Place a fraud alert on your credit reports by<br />
notifying all credit reporting agencies.<br />
Experian P. O. Box 9532, Allen, TX 75013-9595 Tel: 888-397-3742<br />
Equifax P. O. Box 740241, Atlanta, GA 30374-0241 Tel: 800-685-1111<br />
Trans Union P. O. Box 6790, Fullerton, CA 92834 Tel: 800-680-7289<br />
Innovis Data Solutions P.O. Box 1534, Columbus, OH Tel: 877-261-7685<br />
Identity Theft and Terrorism http://www.privacymatters.com/identity-theft-information/identitytheft-and-terrorism.aspx<br />
Credit Card Fraud http://www.identity-theft-help.us/credit.card.fraud.htm<br />
How To Commit Credit Card Fraud http://www.clean-credit.us/identity-theft-how.htm<br />
http://www.identity-theft-help.us/how.to.commit.fraud%20.htm<br />
77
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.identity-theft-help.us/how.to.commit.identity.theft%20.htm<br />
Identity Theft: A Quiz for Consumers http://www.usdoj.gov/criminal/fraud/idquiz.pdf<br />
Identity Theft and Fraud http://www.usdoj.gov/criminal/fraud/idtheft.html<br />
Identity Theft Resources http://www.privacyrights.org/identity.htm<br />
Identity Theft Prevention and Survival http://www.identitytheft.org/<br />
Take Charge: Fighting Back Against Identity Theft<br />
http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm<br />
Identity Theft in The U.S<br />
http://www.cnn.com/interactive/us/0516/map.state.theft.rankings/frameset.exclude.html<br />
http://www.cnn.com/interactive/us/0516/map.state.theft.rankings/frameset.exclude.html<br />
Image, Audio, Video Finder<br />
PureVideo http://www.purevideo.com/<br />
Webseek http://persia.ee.columbia.edu:8008/<br />
Image Seeker http://corbis.ltutech.com/<br />
Google Image Search http://www.google.com/imghp?hl=en&tab=wi<br />
Ditto http://www.ditto.com/<br />
NASA http://nix.nasa.gov/<br />
Jupiter Images http://www.jupiterimages.com/en/<br />
Singing Fish http://search.singingfish.com/sfw/home.jsp<br />
Flickr http://www.flickr.com/<br />
Middle East Media Research Institute http://www.memritv.org/subjects.asp<br />
The MEMRI Economic NBlpog http://www.memrieconomicblog.org/<br />
http://www.memri.org/<br />
Webshots http://webshots.com/<br />
Excellent Video Clips From The Middle East http://memritv.org/default.asp<br />
PureVideo http://www.purevideo.com/<br />
YouTube http://youtube.com/<br />
GoogleVideo http://video.google.com/<br />
Daily Motion http://www.dailymotion.com/us<br />
Myspace http://myspace.com/<br />
Stage6 http://stage6.divx.com/<br />
Metacafe http://www.metacafe.com/<br />
Break http://break.com/<br />
Metatube http://www.metatube.net/<br />
Yahoo Video http://video.yahoo.com/<br />
Ifilm http://www.ifilm.com/<br />
Educate Earth http://www.educatedearth.net/index.php<br />
StupidVideos http://stupidvideos.com/<br />
FileCabinet http://filecabi.com/<br />
Hi5 http://hi5.com/<br />
Pandora http://pandora.com/<br />
MTV http://www.mtv.com/<br />
PhotoBucket http://photobucket.com/<br />
OnAirToday (a collection of latest feeds from various sources. More feeds).. http://www.onairtoday.com/<br />
Flixxy http://www.flixxy.com/<br />
Zoomr : Recent startup that is shaping up to take on Flickr. Have just announced they will be<br />
increasing monthly limits on free and paid accounts to more than what Flickr offers.<br />
Vmix : Founded by the people behind MP3.com, Vmix offers photo and video sharing along with<br />
the ability to create you own slideshows. A busy-looking site that seems to have quite a bit of traffic.<br />
78
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Flickr : The daddy of photo-sharing sites, the first in the breed of web 2.0 photo sites, allows you<br />
to create galleries, tag photos etc. The biggest in terms of traffic and was acquired by Yahoo.<br />
Fotki : Founded in 1998 Fotki has been around for ages in relation to a lot on this list, it offers a<br />
range of services such as photo-sharing, photo-printing, photo-selling and blogging.<br />
Fotolog : Large photo blogging community - claims to have a staggering 1.5 billion page views<br />
and receive over 20 million unique visitors per month which is backed up by its alexa ranking of 33.<br />
Fototopic : Another site that has been around a few years; since 1999. Offers gallery services and<br />
also prints and your photos on to various gifts within their store.<br />
Glowfoto : A basic photo sharing site that offers galleries and the option to upload via mobile<br />
phone. 25million photos have been uploaded by 73k users so far.<br />
MyPhotoAlbum : Photo sharing with the usual features and also offers printing; currently offering<br />
15 free prints to new users. Has had 32million photos uploaded so far.<br />
Panoramio : Photo storage and a mapping feature via a mashup with google maps. Each photo<br />
gets linked with the place it was taken. 2GB storage included for free.<br />
Ringo : No, not the beatle but a rather smart-looking site which combines photo sharing with<br />
social networking. Every week you get your friends newest photos and comments delivered to you. One<br />
of the better-looking sites.<br />
Zoomonga : A nice-looking site but the rather stingy 20mb of uploads per month on the free plan<br />
could be why it doesnt look exactly busy.<br />
Webshots : Another huge site owned by Cnet. Provides the usual photo sharing features plus a<br />
desktop utility for organising photos, prints on gifts etc.<br />
Photobucket : The favourite of myspace users, provides free and paid accounts for image hosting<br />
and video hosting along with the ability to create a flash slideshow. Have harnessed viral marketing to a<br />
tee and provide most of the image hosting for myspace and other social networks.<br />
PBase : Not the easiest on the eye but seems to have gained huge traffic since it was established<br />
in 1999. Very basic features and a huge member’s forum.<br />
OrangePics : A basic site that emphasizes ease of use and safety of your photos. Currently<br />
offering your first full year for free, after which is an annual charge of $24.95.<br />
Phanfare : Offers unlimited storage for a monthly fee of $6.95 to host your photos and video clips.<br />
Also provides downloadable organisation software.<br />
SmugMug : Really nicely designed site that offers accounts from $59.95 per year with a free trial.<br />
The user galleries are nice to look at and you can include video in these.<br />
Dropshots : Front end looks nice and clean and the features are up to scratch but viewing the<br />
sample gallery lets the site down - cluttered and ugly.<br />
Slide : Another site that has taken advantage of myspace to create viral marketing. Users upload<br />
photos and create slideshows using the editor and then post them to their profile or blog etc. Controls are<br />
nice and easy to use, will do well unless myspace bring out their own slideshow tools.<br />
Photosite : Provides photo sharing but you get the impression the site is more about selling prints<br />
and gifts than that. looks a touch too corporate although the drag and drop tools sound impressive.<br />
23HQ : Nice site which provides completely free accounts, basic features such as galleries,<br />
tagging and photogroups; where you can form your own community of friends and chat and share each<br />
other’s photos.<br />
Kodak Gallery : Goes under the name of a photo sharing site but looks very corporate and set up<br />
to flog merchandise rather than provide a nice website experience.<br />
Zoto : Nice site with good features such as geo-tagging, photo blogging and the usual community<br />
features such as browsing by interest. Free version with the option to upgrade to a pro account for $24.95<br />
per year.<br />
Snapfish : Another corporate site run by Hewlett Packard, offers photo sharing and digital prints<br />
of your snaps.<br />
Flukiest : Photo, Video and music sharing with the ability to upload via mobile phone or a<br />
personalised Flukiest email address.<br />
Imagestation : Sonys photo sharing offering, much better looking the Kodaks or HPs. Usual<br />
features with printing options but also the ability to upload via your psp.<br />
PictureTrail : Another site that is combining photo sharing and social networking. Provides<br />
myspace style customisable profiles and some nice flash widgets to create 3d cubes of your photos, heart<br />
shapes, slideshows, screensavers and loads more bits and bobs.<br />
79
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Hello : Great domain and Googles offering which is designed to work in tandem with their picasa<br />
image organising software which they acquired. Picasa is great piece of software and helps you find<br />
pictures you had long forgotten about. it seems that hello allows you to send images to your friends like<br />
and instant messager or to your blogger blog.<br />
Parazz : Parazz is a nifty looking site which offers drag and drop uploading, slideshow creation<br />
with the option to add a soundtrack, camera phone uploads and a colour theme editor. They provide a<br />
free version or pro version for $29 a year.<br />
Zeec : Clean looking site with nice user galleries, offers the choice of uploading via your pc or<br />
mac with their software or via mobile phone.<br />
Funtigo : A site offering photo scrapbooks, users can deesign each album or Web page the way<br />
you they like by adding text, backgrounds, clipart and animated text to their pages. Nice features and as<br />
myspace found out, people like to customise their pages.<br />
IMINT<br />
GEOINT Online (A website that is unifying existing NGA web-based capabilities for online, ondemand<br />
discovery of and access to geospatial intelligence (GEOINT) content, services, expertise, and<br />
support. GEOINT Online is an element of the strategy to transform NGA from solely a product producer<br />
to a GEOINT Services Provider with integrated access to GEOINT content, services, expertise and<br />
support.)<br />
https://www.geoint-online.net/_layouts/NGA/GO/Logon/logon.aspx?<strong>Source</strong>=https://www.geoint-online.net/<br />
IMINT And Analysis (<strong>Open</strong> source military analysis, strategic thinking, and Google Earth imagery<br />
interpretation) http://geimint.blogspot.com/<br />
Imagery <strong>Intelligence</strong> Part I and II http://dataink.blogspot.com/2007/03/imagery-intelligence.html<br />
http://dataink.blogspot.com/2007/10/imagery-intelligence-part-ii.html<br />
IMINT 101 Introduction To Imagery <strong>Intelligence</strong> http://ftp.fas.org/irp/imint/imint_101.htm<br />
Do It Yourself Imagery Analysis<br />
http://geimint.blogspot.com/2008/01/effective-searching-in-google-earth.html<br />
HUMINT, IMINT, MASINT, SIGINT, <strong>OSINT</strong>: Finding What Shouldn’t Be Found<br />
http://risrecbooks.blogspot.com/2008/02/humint-imint-masint-sigint-osint.html<br />
Satellite Sensors (Learn more about each sensor and view sample satellite imagery)<br />
ALOS<br />
ASTER<br />
CARTOSAT-1<br />
CBERS-2<br />
FORMOSAT-2<br />
GeoEye-1<br />
IKONOS<br />
LANDSAT 7<br />
QuickBird<br />
SPOT-5<br />
WorldView-1<br />
Counter IMINT: The Syrian Deception<br />
http://verificationthoughts.blogspot.com/2008/05/syrian-deception.html<br />
Army Geospatial Center http://www.agc.army.mil/<br />
Information Dominance/Operations<br />
Information Operations Air Force Doctrine<br />
http://www.dtic.mil/doctrine/jel/service_pubs/afdd2_5.pdf<br />
INFORMATION OPERATIONS: Putting the ‘I” Back Into DIME (Army SSI Monograph)<br />
80
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=642<br />
Improvised Explosive Devices<br />
Including Explosively Formed Projectiles/Improvised Rocket Assisted Mortars<br />
Indicators and Warnings for Homemade Explosives (FOUO – Publicly available)<br />
http://www.scribd.com/doc/51604956/Indicators-and-Warnings-for-Homemade-Explosives-USA-2007<br />
UPS Printer Bomb Plot<br />
http://occident.blogspot.com/2010/11/third-issue-of-inspire-magazine-from-al.html<br />
List of Explosive Materials http://cryptome.org/0002/atf111710.htm<br />
Strategic Influence of the Improvised Explosive Device http://cryptome.org/0002/auag-ied.htm<br />
IED Defeat (The mission of the BCKS IED-Defeat Community of Practice is to facilitate<br />
collaborative discussions and sharing of knowledge to defeat the IED threat.)<br />
https://forums.bcks.army.mil/secure/communitybrowser.aspx?id=131710&lang=en-US<br />
IED Fact Sheet http://www.nae.edu/15081.aspx<br />
Videos On YouTube http://www.youtube.com/watch?v=PEsReCOcAyM&feature=related<br />
Improvised Rocket Assisted Mortars/Munitions<br />
http://www.longwarjournal.org/archives/2008/06/mahdi_army_uses_flyi.php<br />
http://www.defensereview.com/modules.php?name=News&file=article&sid=1153<br />
http://en.wikipedia.org/wiki/Lob_bomb<br />
http://holgerawakens.blogspot.com/2008/07/who-is-using-improvised-rocket-assisted.html<br />
General Information http://www.securitydriver.com/aic/stories/article-114.html<br />
http://www.securitydriver.com/aic/<br />
http://www.bombshock.com/fronts/explosive.html<br />
http://en.wikipedia.org/wiki/Improvised_explosive_device<br />
http://www.globalsecurity.org/military/intro/ied.htm<br />
http://www.globalsecurity.org/military/intro/ied-iraq.htm<br />
IEDs and Convoy Protection http://security.lifesafety.ca/2004articles/2004sec0048.htm<br />
IED: A weapons Profile http://www.defense-update.com/features/du-3-04/IED.htm<br />
Miscellaneous Explosives used as IEDs http://www.emergency.com/explosives-misc.htm<br />
Overseas Bomb Threat Awareness http://www.state.gov/m/ds/rls/rpt/19726.htm<br />
Potential Indicators of Threats Involving Vehicle Borne IEDs<br />
http://www.iwar.org.uk/homesec/resources/dhs-bulletin/vbieds.htm<br />
http://www.emergency.com/2004/Potential_Indicators_VBIEDS_files/frame.htm<br />
http://www.usembassyjakarta.org/consular/vbied_vehicles.html<br />
The Mechanics of a Living Bomb http://www.waronline.org/en/terror/suicide.htm<br />
Threat Resolution http://www.trltd.com/iedd.php<br />
Security Advice http://www.mi5.gov.uk/output/Page268.html<br />
Potential Indicators http://www.iwar.org.uk/homesec/resources/dhs-bulletin/vbieds.htm<br />
Terrorist IED Handbook http://www.williambowles.info/articles/app_e.pdf<br />
Tanks Take A Beating http://www.combat-diaries.co.uk/diary25/diary25military.htm<br />
Explosives http://cdp.dhs.gov/pdfs/agert/Explosive_Devices.pdf<br />
Recognizing Explosive Devices http://cryptome.org/ieds.htm<br />
http://cryptome.org/ieds.pdf<br />
Common Chemicals As Precursors Of Improvised Explosive Devices: The Challenges Of<br />
Defeating Domestic Terrorism<br />
http://www.mipt.org/pdf/NPS-Thesis-Common-Chemicals-Precursors.pdf<br />
Explosive Applications for Industry and Defense<br />
http://www.engineersaustralia.org.au/shadomx/apps/fms/fmsdownload.cfm?file_uuid=E8FD073B-9386-<br />
FFB8-C9EA-478E5D773DBD&siteName=ieaust<br />
Soft Recovery of Explosively Formed Penetrators<br />
http://www.dtic.mil/ndia/22ndISB2005/thursday/lambert2.pdf<br />
81
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
TM 31-210 Improvised Munitions Handbook http://cryptome.org/tm-31-210.htm<br />
IED Subjects On MyIntelink<br />
https://www.intelink.gov/search/default.aspx?targetPage=%2Fsearch%2Fdefault.aspx&q=Improvised+ex<br />
plosive+devices+ppt&btnSearch=Search&intelSite=www.intelink.gov%2Fblogs&intelSite=www.intelink.go<br />
v%2Fdiscussion&intelSite=www.intelink.gov%2Fwiki&intelSite=www.intelink.gov%2Finteldocs&intelSiteOt<br />
her=true<br />
DAIIS IED Products<br />
https://www.intelink.gov/sharepoint/Products/Forms/AllItems.aspx?RootFolder=%2fProducts%2fIED&Vie<br />
w=%7b78903FCC%2dEE86%2d4CCD%2d9F3A%2d467033F9F41B%7d<br />
IED Trigger http://cryptome.org/ied-trigger.htm<br />
IEDs The Technology http://www.ndrf.dk/documents/groupp/SS05-Dullum.pdf<br />
IED/EFP Articles Of Interest http://blog.wired.com/defense/2007/09/mrap-v-superbom.html<br />
The Struggle To Defeat Roadside Bombs<br />
http://www.washingtonpost.com/wp-srv/world/specials/leftofboom/index.html?hpid=topnews<br />
LiveLeak (good source for IED/EFP videos) http://www.liveleak.com/<br />
Bomb Threat Stand Off Distances http://www.nctc.gov/site/technical/bomb_threat.html<br />
Plastic Explosives http://www.nctc.gov/site/technical/plastic_explosives.html<br />
<strong>Intelligence</strong> Disciplines<br />
List of <strong>Intelligence</strong> Gathering Disciplines<br />
http://en.wikipedia.org/wiki/List_of_intelligence_gathering_disciplines<br />
Military <strong>Intelligence</strong> Disciplines https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/10536-<br />
1/FM/2-<br />
0/chap5.htm;jsessionid=1qxjKkqWHmdBk1QyZNDyvG0mqFs2zChgycs11LjVl5dqH4jM7DFz!997318943<br />
<strong>Intelligence</strong> Resources<br />
<strong>Intelligence</strong> Online http://www.intelligenceonline.com/<br />
<strong>Intelligence</strong> Tradecraft And Analysis http://jiox.blogspot.com/<br />
<strong>Intelligence</strong> Resources http://www.intelligenceisthefuture.com/resources.htm<br />
Studies in <strong>Intelligence</strong> http://www.cia.gov/csi/studies/vol50no2/html_files/index.html<br />
The <strong>Intelligence</strong> Officer’s Bookshelf<br />
http://www.cia.gov/csi/studies/vol50no2/html_files/Bookshelf_10.htm<br />
Police <strong>Intelligence</strong> Operations http://www.fas.org/irp/doddir/army/fm3-19-50.pdf<br />
World Check – Reducing Risk Through <strong>Intelligence</strong> http://www.world-check.com/<br />
<strong>Intelligence</strong> Journals<br />
http://www.columbia.edu/cu/lweb/indiv/lehman/guides/intell.html#background<br />
International <strong>Intelligence</strong> Agencies<br />
Interactive Map of All World’s <strong>Intelligence</strong> Agencies<br />
http://sourcesandmethods.blogspot.com/2010/07/interactive-map-of-all-of-worlds.html<br />
International Government <strong>Intelligence</strong> Agencies<br />
http://members.tripod.com/spylopedia/ind-intlagen.htm<br />
International <strong>Link</strong>s http://www.route66patrol.com/INTLINKS.htm<br />
MILNET: <strong>Intelligence</strong> Agencies by Function http://www.milnet.com/iagency.htm<br />
World <strong>Intelligence</strong> and Security Agencies http://www.fas.org/irp/world/index.html<br />
82
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
List of <strong>Intelligence</strong> Agencies http://www.sagal.com/ajax/<br />
http://www.loyola.edu/dept/politics/intel.html<br />
Internet Privacy and Security<br />
Interpol<br />
Ad-Aware http://www.lavasoft.de/software/adaware/<br />
Analyzer http://analyzer.polito.it/30alpha/<br />
Bugnosis http://www.bugnosis.org/<br />
Cybercrime http://www.cybercrime.gov/<br />
CERT http://www.cert.org/<br />
Hacker and Spyware Protection http://www.looknstop.com/En/index2.htm<br />
Email Security and Privacy http://www.stealthmessage.com/<br />
Home Network Security http://www.cert.org/tech_tips/home_networks.html<br />
Privacy and Security http://www.markusjansson.net/eienbid.html<br />
Lavasoft http://www.lavasoftusa.com/<br />
Leak Test http://grc.com/lt/leaktest.htm<br />
Setting up Security Zones http://www.microsoft.com/windows/ie/using/howto/security/setup.mspx<br />
Shields Up http://grc.com/su-firewalls.htm<br />
Anti Spyware Tools http://www.spychecker.com/home.html<br />
Spyware Reviews http://removespyware.net/<br />
Guide to Online Privacy http://www.cdt.org/privacy/guide/basic/topten.html<br />
Virus List http://www.viruslist.com/en/index.html<br />
WebWasher http://www.webwasher.com/<br />
Snooper http://snoop.cdt.org/<br />
Security Advisers http://www.wilders.org/<br />
Spyware and Adware Removal http://www.paretologic.com/xoftspy/lp/14/<br />
Top Secret Software http://www.topsecretsoftware.com/index.html<br />
Interpol Home Page http://www.interpol.int/<br />
Interpol Wanted Terrorism http://www.interpol.int/Public/Wanted/Search/Recent.asp<br />
Iran/Iranian Military<br />
Natanz Uranium Enrichment Complex, Iran, 2002-2010<br />
http://cryptome.org/eyeball/natanz/natanz.htm<br />
http://publicintelligence.net/iran-nuclear-site-natanz-uranium-enrichment-site/<br />
Iran’s Naval Forces http://www.fas.org/irp/agency/oni/iran-navy.pdf<br />
Iran's Nuclear Program: Status, Risks, and Consequences<br />
http://www.nae.edu/Publications/TheBridge/Archives/19804/19819.aspx<br />
Military Power of Iran 2010<br />
http://media.washingtontimes.com/media/docs/2010/Apr/20/Iran_Military_Report.pdf<br />
Iranian Military Video http://www.iranian.com/main/2010/jan/iranian-military<br />
Iran’s Military Capabilities http://ezinearticles.com/?Irans-Military-Capabilities&id=348597<br />
Iran Military Guide http://www.globalsecurity.org/military/world/iran/index.html<br />
Wikileaks http://wikileaks.org/wiki/Category:Iran<br />
Iran https://www.intelink.gov/sharepoint/osp/Iran%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
83
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Imperial Iranian Ground Forces http://www.sarbazan.com/iigf.htm<br />
http://www.sarbaz.org/<br />
Iranian Army http://encyclopedia.thefreedictionary.com/Iranian+Army<br />
Iranian Army Order Of Battle http://encyclopedia.thefreedictionary.com/Iranian+Army<br />
Missiles http://www.sarbaz.org/homepage2.htm<br />
Iran Nuclear Resources http://www.parstimes.com/INR.html<br />
Iran’s Ballistic Missiles (interactive) http://www.msnbc.msn.com/id/6559399<br />
Iranian Military http://www.travelblog.org/World/ir-mil.html<br />
http://www.saaye.com/files/csis/<br />
Country Assessment: Iran http://www.isis-online.org/publications/iran/index.html<br />
Iran’s Nuclear Facilities http://www.globalsecurity.org/wmd/world/iran/nuke-fac.htm<br />
http://cns.miis.edu/pubs/reports/pdfs/iranrpt.pdf<br />
http://www.atomicarchive.com/Almanac/IranFacilities_static.shtml<br />
Order of Battle http://www.exisle.net/mb/index.php?showtopic=34883.<br />
http://www.exisle.net/mb/lofiversion/index.php/t34883.html<br />
Iran Military Forum http://www.network54.com/Forum/391461/<br />
http://www.iranmilitaryforum.com/<br />
Tehran and Bushehr Nuclear Reactors http://cryptome.org/tnrc/tnrc-eyeball.htm<br />
Iran’s Nuclear Facilities http://cns.miis.edu/pubs/reports/pdfs/iranrpt.pdf<br />
http://www.nti.org/e_research/profiles/3119_3120.html<br />
http://www.nti.org/e_research/profiles/Iran/index.html<br />
WMD Related Facilities (cut and paste geographic coordinates into google earth for good<br />
locations of facilities) http://www.johnstonsarchive.net/nuclear/iranmap.html<br />
Iran Resources http://www.aftabdaily.net/<br />
Irans Nuclear Network http://www.msnbc.msn.com/id/6979727/<br />
Iranian Nuclear Facilities http://www.globalsecurity.org/wmd/world/iran/nuke-fac.htm<br />
Iranian Nuclear Facilities Video<br />
http://www.farsitube.com/videos/Political/Iranian_Nuclear_Facilities<br />
Iranian Warships http://www.globalsecurity.org/military/world/iran/ships.htm<br />
Naval Bases http://www.globalsecurity.org/military/world/iran/navy-base.htm<br />
Excellent Blog on Iranian Naval Capabilities<br />
http://www.freerepublic.com/focus/f-news/1790191/posts<br />
Iran Defence http://www.irandefence.net/showthread.php?t=4808<br />
How Iran Would Apply its Assymetric Naval Warfare Doctrine in The Future Conflict<br />
http://www.marshallcenter.org/site-graphic/lang-en/page-occpapers-research-<br />
1/static/xdocs/research/static/occpapers/occ-paper_10-en.pdf<br />
Ammunition And Metallurgy Industries Group http://www.diomil.ir/en/amig.aspx<br />
Spy Photos Reveal 'Secret Launch Site' For Iran's Long-Range Missiles<br />
http://www.timesonline.co.uk/tol/news/world/middle_east/article3724048.ece<br />
<strong>Open</strong> <strong>Source</strong> Readings On Iran<br />
http://uskowioniran.blogspot.com/2008/04/open-source-readings-on-iran.html<br />
Tehran Nuclear Research Center<br />
http://www.globalsecurity.org/wmd/world/iran/tehran-tnrc.htm<br />
Satellite Imagery of the Tehran Nuclear Research Center<br />
http://www.globalsecurity.org/wmd/world/iran/tehran-tnrc-imagery.htm<br />
Esfahan / Isfahan Nuclear Technology Center N32°40' E51°40'<br />
http://www.fas.org/nuke/guide/iran/facility/esfahan.htm<br />
Nuclear Program Of Iran http://en.wikipedia.org/wiki/Nuclear_program_of_Iran<br />
Nuclear Facilities http://www.nti.org/e_research/profiles/Iran/3119_3268.html<br />
Iran Special Collection http://cns.miis.edu/research/iran/index.htm<br />
Iran Nuclear Resources http://www.parstimes.com/INR.html<br />
84
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Iran’s Nuclear Sites http://www.nti.org/e_research/profiles_pdfs/Iran/iran_nuclear_sites.pdf<br />
85
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
86
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.google.com/hostednews/afp/article/ALeqM5hnl-<br />
YPuDmONcoBmmS8_G91LxdryA?docId=CNG.041943dc452c61a507ee986061b49f<br />
2d.f21<br />
Iraninan Websites<br />
Kamangir.net http://kamangir.net/<br />
<strong>Link</strong>s To Iranian Websites http://clibrary.um.ac.ir/iranianwebsites.htm<br />
http://www.birmingham.gov.uk/GenerateContent?CONTENT_ITEM_ID=24062&CONTENT_ITEM_TYPE=<br />
0&MENU_ID=260<br />
Toronto Iranians http://www.torontoiranians.com/modules/mylinks/<br />
Iranian <strong>Link</strong> http://www.angelfire.com/pe/iran/<br />
Excellent Blog on Iranian Naval Capabilities<br />
http://www.freerepublic.com/focus/f-news/1790191/posts<br />
Iranian Blogs http://www.iraniansblogs.com/<br />
87
Iraq<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
LiveLeak Iraq http://www.liveleak.com/c/iraq<br />
Iraq Provincial Reconstruction Team Handbook<br />
http://usacac.army.mil/cac2/call/docs/11-03/toc.asp<br />
Iraqi Order of Battle June 2010<br />
http://www.understandingwar.org/files/IraqOrbat_DecthruJune.pdf<br />
Wikileaks http://wikileaks.org/wiki/Category:Iraq<br />
Iraq<br />
https://www.intelink.gov/sharepoint/osp/Iraq%20%20<strong>OSINT</strong>%20Library/Forms/AllItems.aspx<br />
Iraq Blogs http://www.hereinreality.com/iraq_blogs.html<br />
http://www.progressiveaustin.org/blogs.htm<br />
Iraqi Airfields http://www.globalsecurity.org/military/world/iraq/airfields.htm<br />
Iraq’s 55 Most Wanted<br />
http://www.globalsecurity.org/wmd/library/news/iraq/2003/030411-d-6570c-001.pdf<br />
http://www.globalsecurity.org/wmd/library/news/iraq/2003/030411-d-6570c-002.pdf<br />
http://www.globalsecurity.org/wmd/library/news/iraq/2003/iraq-030412-centcom03.htm<br />
http://www.globalsecurity.org/wmd/library/news/iraq/2003/05/iraq-030515-centcom_top55.htm<br />
Target Iraq http://www.globalsecurity.org/military/ops/iraq.htm<br />
The Iraqi Resistance (very controversial sites, you may be offended)<br />
http://www.albasrah.net/images/moqawama/index1.htm<br />
http://www.albasrah.net/<br />
Iraq Daily http://www.iraqdaily.com/<br />
Future of Iraq Portal http://www.justinalexander.net/iraq/index.html<br />
U.S. Military Facilities in Iraq http://www.globalsecurity.org/military/facility/iraq-intro.htm<br />
Iraqi Insurgent Sniper Training http://www.military.com/ppt/iraqi_insurgent_sniper_training.htm<br />
OIF Items of Interest http://www.psywarrior.com/OpnIraqiFreedomcont1.html<br />
http://www.psywarrior.com/OpnIraqiFreedomcont2.html<br />
http://www.psywarrior.com/OpnIraqiFreedomcont3.html<br />
Iraq War News http://www.indybay.org/international/iraq/<br />
Iraq Watch http://www.iraqwatch.org/index.html<br />
Jihad in Iraq: Hope and Dangers<br />
https://www.opensource.gov/portal/server.pt/gateway/PTARGS_0_0_200_240_51_43/http%3B/apps.ope<br />
nsource.gov%3B7011/opensource.gov/content/Display/4727998/GMP20040728000229001.pdf<br />
The Fight For Iraq: A Regional Powerplay http://www.msnbc.msn.com/id/17722026<br />
U.S. Embassy Iraq http://eyeball-series.org/usemb-iq/usemb-iq.htm<br />
Multi National Security Transition Command - Iraq The Multi-National Security Transition<br />
Command - Iraq (MNSTC-I) Mission is to assist the Iraqi Government in the development, organization,<br />
training, equipping, and sustainment of Iraqi Security Forces (ISF) and ministries capable of defeating<br />
terrorism and providing a stable environment in which representative government, individual freedom, the<br />
rule of law, and the free market economy can evolve and which, in time, will contribute to Iraq's external<br />
security and the security of the Gulf Region. http://www.mnstci.iraq.centcom.mil/<br />
Alive In Baghdad http://www.aliveinbaghdad.org/<br />
An Introduction To The Country And People<br />
http://www.globalsecurity.org/military/library/report/2003/iraq-intro-handbook_usmc-dec2003.pdf<br />
Humanitarian Information Center For Iraq<br />
http://www.humanitarianinfo.org/iraq/psw_satellites/mosul/index.asp<br />
Special Inspector General For Iraq Reconstruction<br />
http://www.sigir.mil/reports/QuarterlyReports/Oct07/pictures.aspx<br />
Iraqi Army http://en.wikipedia.org/wiki/Iraqi_Army<br />
Sacred Sites Of Iraq http://www.sacredsites.com/middle_east/iraq/iraq.html<br />
88
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Islam/Islamic Websites<br />
World Almanac of Islamism http://almanac.afpc.org/<br />
Islam By Country http://www.thefullwiki.org/Islam_by_country<br />
Resource <strong>Link</strong>s on Islam and Christianity http://www.answering-islam.org/links.html<br />
Answering Islam http://www.answering-islam.org/index.html<br />
Islam and Terrorism http://www.answering-islam.org/Terrorism/index.html<br />
<strong>Global</strong> Muslim Population http://pewforum.org/docs/?DocID=451<br />
<strong>Directory</strong> Of Islamic Websites http://www.islamicsites.com/<br />
http://www.mathaba.net/www/islamic/index.shtml<br />
Top Islamic Sites http://www.topislamicsites.com/<br />
<strong>Link</strong>s For Muslim Children http://www.islamicgarden.com/page1002.html<br />
Radical Islamic Sites http://www.threeworldwars.com/f/radical-islamic-websites.htm<br />
General Islamic Sites http://islamicwell.com/general_articles.htm<br />
Sites Of Interest http://www.convertstoislam.com/Sites/sites.html<br />
Hudson Institute (Center on Islam, Democracy, and the Future of the Muslim World)<br />
http://www.futureofmuslimworld.com/<br />
Virtually Islamic http://virtuallyislamic.blogspot.com/<br />
Islam Online http://www.islamonline.net/english/index.shtml<br />
Islam Undressed http://www.islamundressed.com/<br />
IslamiCity http://www.islamicity.com/<br />
Middle East Media Research Institute http://www.memri.org/<br />
Islamic Heraldry<br />
Introduction To Islamic Heraldry<br />
http://freepages.family.rootsweb.ancestry.com/~heraldry/oldpage_islam.html<br />
http://users.panola.com/AAGHS/manluk.html<br />
The American Military Advisor: Dealing With Senior Foreign Officials In The ISLAMIC World<br />
http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB869.pdf<br />
Islamic Terror Groups<br />
Islamic Terorism http://en.wikipedia.org/wiki/Islamic_terrorism<br />
Islamic Terrorr Groups (Pacific)<br />
Law Enforcement Guide For Identifying Potential Violent Terrorists In The<br />
Asia-Pacific Region https://www.intelink.gov/Reference/301MI/20060518.pdf<br />
Islamic Terror Groups (USA)<br />
Islamic Fundamentalist Networks in the United States http://www.esuhistoryprof.com/mapof.htm<br />
89
Israel<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Jerusalem Center for Public Affairs http://www.jcpa.org/JCPA/index.asp<br />
Middle Eastern Strategic Threats Interactive Map<br />
http://www.jcpa.org/JCPA/Templates/showpage.asp?DBID=&LNGID=&TMID=84&FID=550&PID=0<br />
Maps of Israel http://www.embassyworld.com/maps/Maps_Of_Israel.html<br />
Israeli War Criminals http://cryptome.org/0002/il-war-criminals.htm<br />
il-war-criminals.htm<br />
Israel’s Top Secret Base Exposed on Facebook<br />
http://www.themedialine.org/news/news_detail.asp?NewsID=29330<br />
Wikileaks http://wikileaks.org/wiki/Category:Israel<br />
http://wikileaks.org/wiki/Category:Israel_and_Occupied_Territories<br />
Nuclear Weapons http://www.fas.org/nuke/guide/israel/nuke/<br />
http://nuclearweaponarchive.org/Israel/index.html<br />
Israel/Palestine<br />
https://www.intelink.gov/sharepoint/osp/Israel%20%20Palestine%20<strong>OSINT</strong>%20Products/Forms/AllItems.<br />
aspx<br />
Israel's Dimona Nuclear Weapons Factory In 3D, and other Israeli videos<br />
http://www.youtube.com/watch?v=bbjgDERSuiI<br />
New Weapon To Get Terrorists http://www.youtube.com/watch?v=iv7Kn0mOTsE&feature=related<br />
Israeli Blogs http://www.ringsurf.com/ring/ilblogs/<br />
http://judaism.about.com/od/israeliblogs/Israeli_Blogs.htm<br />
Israeli Special Forces http://www.isayeret.com/<br />
Israeli Military Facilities http://cryptome.org/idf/idf-eyeball.htm<br />
Soreq Nuclear Research Center http://cryptome.org/soreq-eyeball.htm<br />
Israel Signal Facilities http://cryptome.org/ilsig-eyeball.htm<br />
Gaza Strip http://www.lib.utexas.edu/maps/middle_east_and_asia/gaza_strip_may_2005.jpg<br />
http://cryptome.org/kerem/kerem-eyeball.htm<br />
Israel <strong>Intelligence</strong> Agencies http://www.fas.org/irp/world/israel/index.html<br />
Mossad http://www.mossad.gov.il/Mohr<br />
Mossad English Version<br />
http://www.mossad.gov.il/Mohr/MohrTopNav/MohrEnglish/MohrAboutUs/<br />
Jerusalem Center for Public Affairs http://www.jcpa.org/brief/brief-list.htm#te<br />
Israeli Air Force <strong>Intelligence</strong> Unit http://video.google.com/videoplay?docid=279277445708481896<br />
Israel/Lebanon Conflict http://www.gearthblog.com/blog/archives/2006/07/israellebanon_c.html<br />
Israel/Palestinian ProCon http://www.israelipalestinianprocon.org/<br />
Israel Science And Technology<br />
http://www.science.co.il/Transportation-Companies.asp?s=software<br />
Israel Defense Forces<br />
http://www.sap.com/platform/netweaver/pdf/CS_Israeli_Defense_Forces.pdf<br />
Export And International Cooperation Institue<br />
http://www.export.gov.il/Eng/_Articles/Article.asp?ArticleID=3363&CategoryID<br />
What Would An Israeli Ground Invasion Look Like<br />
http://www.mcculloughsite.net/stingray/2006/07/17/what-would-an-israeli-ground-invasion-look-like.php<br />
Gisrael Digital Mapping http://www.gisrael.co.il/<br />
Israeli Torture Prison http://eyeball-series.org/facility-1391/facility-1391.htm<br />
General Israeli Military & Weapons Articles http://www.nogw.com/ilweapons.html<br />
Israeli/Palestinian Order of Battle http://imeu.net/news/article0015300.shtml<br />
90
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The Secret Arsenal of The Jewish State 2003 (interactive graphic) Best to type the link into the URL<br />
box. Will not function by clicking on it.<br />
http://www.islamonline.net/Arabic/Media/2003/03/article1.shtml<br />
Type link directly into URL box; clicking will not function http://www.nogw.com/ilweapons.html<br />
Despite Israel's refusal to acknowledge its nuclear weapons status, its secret arsenal is an open secret<br />
that Israeli policy makers don't go out of their way to deny. From its beginnings in the mid-1960s, Israel's<br />
program has developed into one that rivals those of larger powers like France and Britain. Here, based on<br />
interviews with U.S. intelligence officials and nuclear experts, is a portrait of Israel's strategic weapons<br />
programs. http://www.sweetliberty.org/issues/israel/strategic/index.shtml<br />
Click on a symbol or location for more about Israel's secret arsenal.<br />
Mideast endgame: an interactive guide<br />
91
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Israel's Nuclear Facilities http://www.atomicarchive.com/Almanac/IsraeliFacilities_static.shtml<br />
92
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The following sites can be found in Google Earth or Bing Maps 3D by copying and pasting the latitudes<br />
and longitudes into the search box.<br />
Negev Nuclear Research Center, Dimona<br />
Negev Nuclear Research Center. Plutonium production and extraction facilities, along with other<br />
weapons-related infrastructure.<br />
31.001504°N, 35.146723°E<br />
Eilabun<br />
Eilabun is Israel's second weapons storage facility. Tactical nuclear shells and land mines are<br />
among its contents.<br />
32.760226°N, 35.412077°E<br />
Kfar Zekharya<br />
Suspected nuclear missile base and bomb storage storage facility.<br />
31.766267°N, 34.88142°E<br />
Nahal Soreq<br />
Soreq is the equivalent of the U.S. national weapons laboratories. The lab handles weapons design<br />
and construction as well as research.<br />
31.766267°N, 34.88142°E<br />
Yodefat<br />
Suspected nuclear weapons assembly facility.<br />
32.85093°N, 35.27916°E<br />
Tirosh<br />
Reportedly one of two Israeli nuclear weapons storage facilities. It is speculated that that Tirosh is<br />
the strategic weapons storage site, while Eilabun is the tactical weapons storage site.<br />
31.751963°N, 34.863524°E<br />
Rafael<br />
Rafael has been responsible for the actual assembly of Israeli nuclear weapons.<br />
32.889534°N, 35.09119°E<br />
93
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Language Training<br />
Foreign Service Institute Free Online Language Training<br />
http://fsi-language-courses.org/Content.php<br />
Language/Web Site Translators Online (In Other Words)<br />
Free Translation Sites<br />
http://www1.ncaa.org/membership/enforcement/amateurism/international/translation<br />
http://www.humanitas-international.org/newstran/more-trans.htm<br />
Translation Sites http://www.lib.utexas.edu/refsites/dictionaries.html<br />
Translation Web Sites<br />
http://www.birmingham.gov.uk/GenerateContent?CONTENT_ITEM_ID=18591&CONTENT_ITEM_TYPE=<br />
0&MENU_ID=260<br />
<strong>Link</strong>s To Online Translators http://www.omniglot.com/links/translation.htm<br />
Omniglot: Writng Systems And Languages Of The World http://www.omniglot.com/<br />
Free Translation http://www.freetranslation.com/<br />
Online Translator http://www.online-translator.com/text.asp?lang=en<br />
World Lingo http://www1.worldlingo.com/en/products_services/worldlingo_translator.html<br />
FreeLang http://www.freelang.net/<br />
Law Enforcement Support<br />
AELE Law Enforcement http://www.aele.org/<br />
Search the Library of Case Summaries (AELE has a free search tool covering more than 30,000<br />
case summaries, since 1975) http://www.aele.org/htdig/common/search.html<br />
Espanol For Law Enforcement (Course Goal: To attain a working knowledge of the Spanish<br />
language and apply that knowledge to law enforcement situations.)<br />
http://www.espanolforlawenforcement.gov/<br />
Crime Spider - For almost 10 years Crime Spider has looked for the best crime and law<br />
enforcement sites and categorized topics so you don't have to sort through hundreds of sites to find the<br />
one that fits the bill. You can easily find the information you want at Crime Spider. Whether you are doing<br />
research on criminalistics, forensic anthropology, FBI, unsolved murders, homicide investigation<br />
techniques, child abuse, domestic violence, the death penalty, terrorism, criminal justice, law and courts,<br />
behavioral profiling, gang violence, juvenile crime, missing persons, serial killers or mass murderers,<br />
criminals, police, crime scene photos, we can help you find the crime information you want. We also have<br />
tips for people searches and protecting your privacy as well as features on specific topics of interest to<br />
crime and law enforcement professionals, such as links to police jobs sites and crime scene investigation<br />
supplies. http://www.crimespider.com/<br />
Shield 4492: Search, Find, Investigate (more than 1,600 links to free open source Internet sites<br />
that are useful in developing investigative leads, identifying assets and conducting research. Please read<br />
disclaimer) http://www.shield4492.com/<br />
Law Enforcement Spy Guide http://cryptome.org/le-spy-guide.zip<br />
FaceBook Law Enforcement Spy Guides<br />
http://publicintelligence.net/confidential-facebook-law-enforcement-subpoena-guides-2007-2010/<br />
94
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Lessons Learned<br />
Marine Corps Center For Lessons Learned https://www.mccll.usmc.mil/<br />
https://www.mccll.usmc.mil/index.cfm?disp=links.cfm<br />
Library Resources<br />
World Category User http://www.worldcat.org/<br />
In this video you'll learn how to create a List on WorldCat.org and get some good ideas on fun<br />
things to do with WorldCat Lists. http://www.youtube.com/watch?v=vos5ivBeZ5c<br />
WorldCat Facebook Application. This Facebook Application gives you access to WorldCat<br />
searches and user-created lists from personalized pages within your Facebook account. The application<br />
includes a Home screen with WorldCat search box, as well as quick links to WorldCat searches based on<br />
topics listed in your Facebook profile as personal interests. The application also includes:<br />
a built-in advanced WorldCat search<br />
a panel that allows you to invite other Facebook friends to install WorldCat<br />
a "Something to Read" panel that displays books recently added to WorldCat lists<br />
a "Favorite WorldCat Lists" panel where you can track your own lists or those of other WorldCat users<br />
http://www.worldcat.org/toolbars/default.jsp<br />
American Library Association http://www.ala.org/ala/iro/intlassocorgconf/libraryassociations.htm<br />
Virtual Law Library http://www.chanrobles.com/lawlib1.htm<br />
The Library Index Worldwide http://www.libdex.com/country.html<br />
http://www.libdex.com/<br />
Libraries and Catalogs Worldwide http://www.library.upenn.edu/catalogs/worldwide.html<br />
Libraries Around the World http://alexandra.di.uoa.gr/NewSite/<strong>Link</strong>s/TT/OtherLibraries.html<br />
http://journalfinder.uncg.edu/uncg/worldlibs.asp<br />
http://www.librarytechnology.org/libwebcats/<br />
http://www.libraryspot.com/libraries/nationallibraries.htm<br />
http://www.ifla.org/VI/2/p2/national-libraries.htm<br />
http://library.usask.ca/catalogs/world.html<br />
Library Servers http://sunsite3.berkeley.edu/Libweb/<br />
Virtual Library http://www.iisg.nl/~w3vl/<br />
http://vlib.org/<br />
Museums Around the World http://vlmp.museophile.com/world.html<br />
Virtual Library Museum Pages http://vlmp.museophile.com/<br />
New York Public Library Digital Gallery http://digitalgallery.nypl.org/nypldigital/index.cfm<br />
Awesome Library http://www.awesomelibrary.org/<br />
Center For Research Libraries (The Center for Research Libraries (CRL) is a consortium of North<br />
American universities, colleges and independent research libraries. The consortium acquires and<br />
preserves newspapers, journals, documents, archives and other traditional and digital resources<br />
for research and teaching) http://www.crl.edu/content.asp?l1=1<br />
Library Search Engines http://www.allsearchengines.com/libraries.html<br />
LibraryThing http://www.librarything.com/<br />
<strong>Link</strong> Analysis Tools/Software<br />
95
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Liquefied Natural Gas Facilities<br />
Liquefied Natural Gas Facilities http://eyeball-series.org/lng/lng-eyeball.htm<br />
Liquefied Natural Gas Facilities in The U.S. http://www.ferc.gov/industries/lng.asp<br />
Major Commands (MACOMS)<br />
AFRICOM http://www.africom.mil/<br />
EUCOM http://www.eucom.mil/english/index.asp<br />
SOUTHCOM http://www.southcom.mil/appssc/index.php<br />
PACOM http://www.pacom.mil/index.shtml<br />
CENTCOM http://www.centcom.mil/<br />
CENTCOM Area of Responsibility Interactive Map<br />
http://www.centcom.mil/en/countries/aor/<br />
SOCOM http://www.socom.mil/<br />
STRATCOM http://www.stratcom.mil/<br />
TRANSCOM http://www.transcom.mil/<br />
FORSCOM http://www.forscom.army.mil/<br />
Army Medical Dept AMEDD http://www.armymedicine.army.mil/<br />
Eighth US Army http://8tharmy.korea.army.mil/<br />
Space and Missile Defense Command USASMDC<br />
http://www.army.mil/info/organization/unitsandcommands/commandstructure/smdc/<br />
Third US Army/US Army Forces Central Command http://www.arcent.army.mil/<br />
INSCOM http://www.inscom.army.mil/Default.aspx?text=off&size=12pt<br />
Army Material Command AMC<br />
http://www.army.mil/info/organization/unitsandcommands/commandstructure/amc/<br />
Military District of Washington http://www.mdw.army.mil/<br />
US Army Pacific UARPAC<br />
http://www.army.mil/info/organization/unitsandcommands/commandstructure/usarpac/<br />
US Army Readiness Command USAREC http://www.usarec.army.mil/<br />
US Army Training and Doctrine TRADOC<br />
http://www.army.mil/info/organization/unitsandcommands/commandstructure/tradoc/<br />
Surface Deployment and Distribution Command SDDC (formerly Military Traffic Management<br />
Command) http://www.sddc.army.mil/Public/Home<br />
Installation Management Command (IMCOM) http://www.imcom.army.mil/hq/about/news/<br />
Sheppard Air Force Base http://www.sheppard.af.mil/news/socialmedia/index.asp<br />
Marine Corps http://marines.dodlive.mil/social-media/<br />
http://www.marines.mil/usmc/Pages/SocialMedia.aspx<br />
Military Health System http://www.health.mil/2011MHSConference/socialmedia.aspx<br />
Map is <strong>Link</strong>ed to Defenselink.com<br />
96
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
97
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Mapping and Related Material<br />
Geo Names https://www.geonames.org/<br />
Shaded Relief https://www.shadedrelief.com/<br />
Relief Shading http://www.reliefshading.com/<br />
Where Am I? How to determine latitude and longitude given a street address, city, state, province,<br />
territory, country or whatever. http://www.hmssurprise.org/Resources/whereami.html<br />
http://www.ajmsoft.com/geocode.php<br />
http://stevemorse.org/jcal/latlon.php<br />
Tactical Digital Hologram (This map with use of a flashlight or other light source brings out a 3D<br />
image of the terrain) http://www.peostri.army.mil/PRODUCTS/TDH/<br />
Free Relief Maps for Google Maps (Maps-For-Free has produced a nice Google Maps application<br />
that lets you view a number of relief map layers. Not only can you use the application to view the relief<br />
maps you can add them to your own Google Maps. Maps-For-Free offers free relief maps and other<br />
additional layers which can easily be integrated into your own Google Map projects)<br />
http://www.maps-for-free.com:80/<br />
Wikimapia http://www.wikimapia.org/<br />
Free Geography Tools http://freegeographytools.com/<br />
Maps Compare (Maps Compare is a website with four different on-line map services on one page.<br />
The site places Google Maps, the Google Earth browser plugin, Yahoo Maps and Bing Maps beside each<br />
other, which can be quite useful if you want to compare the map coverage provided by each provider in<br />
different locations) http://geshout.com/mapscompare/all.php<br />
Buncha Maps (Map comparison sites always seem to be very popular. One of the most popular<br />
searches on Google Maps Mania seems to be for sites that let you view the different online map providers<br />
side-by-side. Buncha Maps is a new application that lets you view Google Maps, Bing Maps, ESRI Maps<br />
and OSM all in the same window. Actions in all four maps are synchronised, so if you pan and zoom in<br />
any of the maps the other maps will also show the selected view) http://swingley.appspot.com/maps/four<br />
Dual Maps (Dual Maps is a map creation tool that allows anybody to make an embeddable map<br />
that includes a Google Map, a Google Maps Street View and a Virtual Earth Bird's Eye view of the same<br />
location. You can choose between the various options of either map service, which means you can have<br />
98
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
the Google satellite view alongside Virtual Earth's Bird's Eye view or the satellite/aerial View in both maps<br />
etc) http://www.mashedworld.com:80/DualMaps.aspx<br />
World Gazetteer http://www.world-gazetteer.com/<br />
Afghanistan Information Management Services http://www.aims.org.af/root.aspx?seckeyz=39<br />
Map Resources http://www.ndu.edu/library/Map/map.cfm<br />
Quick Maps http://www.theodora.com/maps/<br />
Le Monde Diplomatique English Edtion Maps http://mondediplo.com/maps/<br />
US Geological Survey manages and distributes many kinds of maps. The following links provide a<br />
wealth of information about USGS maps.<br />
Army Geospatial Center http://www.agc.army.mil/<br />
Information about the many kinds of US Geological Survey maps available is at<br />
http://erg.usgs.gov/isb/pubs/booklets/usgsmaps/usgsmaps.html#Top<br />
Information about US Geological Survey topographic (topo) map symbols is at<br />
http://erg.usgs.gov/isb/pubs/booklets/symbols/<br />
An explanation of map scale is at http://erg.usgs.gov/isb/pubs/factsheets/fs01502.html<br />
Information about US Geological Survey topographic map standards is at<br />
http://nationalmap.gov/gio/standards/<br />
More information about map datums on USGS topographic maps is available at the following<br />
links: http://geology.er.usgs.gov/eespteam/GISLab/Cyprus/datums.htm<br />
http://www.ngs.noaa.gov/faq.shtml#WhatNAD<br />
USGS Store http://store.usgs.gov/b2c_usgs/b2c/start/(xcm=r3standardpitrex_prd)/.do<br />
Geospatial Data Navigator (password required) https://gdn.geointel.nga.mil/gdn/gdn.cgi?<br />
Army Geospatial Center http://www.agc.army.mil/tio/index.html<br />
GIS For Dummies http://www.dmos.info/eng/GIS%20For%20Dummies.pdf<br />
GIS Internet Resources http://www.agc.army.mil/gis/<br />
Soviet Maps http://www.sovietmaps.com/index.htm<br />
Maps Of War http://www.mapsofwar.com/<br />
Maps and Driving Directions http://www.reverse-lookup.com/maps.htm<br />
Maps and References http://www.cgrer.uiowa.edu/servers/servers_references.html<br />
CIA World Fact Book http://www.odci.gov/cia/publications/factbook/<br />
Leading source of land information. Note: Learn to use this one and you’ll be quite impressed.<br />
http://edcwww.cr.usgs.gov/<br />
Free Aerial Maps. Note: Learn to use and you’ll get great results.<br />
http://www.sightquest.com/travel/free-aerial-maps-3838.htm<br />
Free GIS http://freegis.org/<br />
ESRI ArcGIS http://www.esri.com/<br />
Free Books On GIS Best Practices http://www.esri.com/showcase/best-practices/index.html<br />
GIS in the Earth Sciences & Map Library http://www.lib.berkeley.edu/EART/gis.html<br />
Latitude/Longitude Distance Calculation http://jan.ucc.nau.edu/~cvm/latlongdist.html<br />
Latitude-Longitude of US Cities http://www.realestate3d.com/gps/latlong.htm<br />
Maps of Countries and Territories http://www.sitesatlas.com/Maps/index.htm<br />
The Map Library http://www.un.org/depts/dhl/maplib/maplib.htm<br />
What do Map Scales Represent http://id.water.usgs.gov/reference/map_scales.html<br />
MapMachine http://plasma.nationalgeographic.com/mapmachine/<br />
Mapquest http://www.mapquest.com/<br />
Map Resources http://www.ndu.edu/library/maps.html<br />
Maps Around the World http://maps.searchking.com/<br />
All The Worlds Maps http://www.embassyworld.com/maps/maps.html<br />
Perry-Castañeda Library Map Collection http://www.lib.utexas.edu/maps/<br />
http://www.lib.utexas.edu/maps/map_sites/map_sites.html<br />
MAPTECH http://mapserver.maptech.com/homepage/index.cfm<br />
Mileage Calculator http://www.symsys.com/~ingram/mileage/index.php<br />
Online Maps to Everywhere http://www.multimap.com/<br />
Quick Maps http://www.theodora.com/maps/abc_world_maps.html<br />
Map Centre http://www.reliefweb.int/rw/rwb.nsf/doc114?<strong>Open</strong>Form<br />
Terraserver http://www.terraserver.com/<br />
99
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Spot Image http://www.spot.com/html/SICORP/_401_.php<br />
Topozone http://www.topozone.com/default.asp<br />
United Nations cartographic Section http://www.un.org/Depts/Cartographic/english/htmain.htm<br />
Maporama http://www.maporama.com/share/<br />
World Atlas http://www.worldatlas.com/<br />
What’s Your Latitude/Longitude<br />
http://www.studyworksonline.com/cda/content/explorations/0,,NAV2-5_SEP374,00.shtml<br />
3D Contour Maps http://field.hypermart.net/<br />
<strong>Link</strong>s to Map Resources (no longer updated but still useful)<br />
http://monarch.gsu.edu/jcrampton/maps<br />
Google Maps http://maps.google.com/<br />
TerraServer-USA http://www.terraserver.microsoft.com/<br />
GlobeXplorer http://www.globexplorer.com/<br />
Space Imaging http://spaceimaging.com/<br />
The World Of Maps http://www.maps.ethz.ch/<br />
National Map Viewer http://nationalmap.gov/<br />
http://nmviewogc.cr.usgs.gov/viewer.htm<br />
DigitalGlobe http://www.digitalglobe.com/<br />
GIS Software http://www.gisdevelopment.net/downloads/gis/index.htm<br />
Superpages http://yellowpages.superpages.com/yp.basic.jsp?<br />
TerraFly http://www.terrafly.com/<br />
Mapper http://mapper.acme.com/<br />
Comet Web Search http://search.starware.com/<br />
Traffic Reports For 60 Cities<br />
http://autos.msn.com/everyday/trafficreport.aspx?metro=PHX&src=QL<br />
Earth Satellite Corporation http://www.mdafederal.com/home<br />
National Geographic Map Machine http://plasma.nationalgeographic.com/mapmachine/<br />
Windows Live Local http://local.live.com/<br />
Online Map Creation http://www.aquarius.geomar.de/omc/<br />
Planiglobe Beta http://www.planiglobe.com/omc_set.html<br />
Mapquest Complete List Of Maps http://www.mapquest.com/atlas/main.adp?region=index<br />
ReliefWeb http://www.reliefweb.int/mapc/<br />
http://www.reliefweb.int/rw/rwb.nsf/doc114?<strong>Open</strong>Form<br />
National Guard DMS Portal http://ngbcdmaps.gtri.gatech.edu/<br />
Earth Browser http://www.earthbrowser.com/index.html<br />
Reference Maps http://www.exxun.com/exon/rm__index.html<br />
Flash Earth http://www.flashearth.com/<br />
Maps of the world (3,728 country maps) http://maps.nationmaster.com/<br />
Gheos World Guide (click on gheos world guide) http://gheos.com/atlas/<br />
Maps Of War (Interactive) http://www.mapsofwar.com/ind/imperial-history.html<br />
Digital Ortho Image Center For Kentucky http://kymartian.ky.gov/doqq/<br />
Mapserver.Maptech<br />
http://mapserver.maptech.com/homepage/index.cfm?CFID=3094259&CFTOKEN=52789276<br />
Geo Community http://www.geocomm.com/<br />
<strong>Open</strong> <strong>Source</strong> Center Map Library https://www.intelink.gov/maps/<br />
National Geospatial-<strong>Intelligence</strong> Agency http://nga-earth.org/<br />
Web Based Access And Retrieval Port https://warp.nga.mil/<br />
PlanetData http://www.planetdata.net/map/<br />
UniMaps http://unimaps.com/index.html<br />
Europe Atlas http://euratlas.com/<br />
UniMaps <strong>Link</strong>s. High detail maps showing language distribution in Africa, Europe, Latin America,<br />
Canada and the Basque country. http://www.muturzikin.com/en.html<br />
UniMaps <strong>Link</strong>s. Maps and commentaries of most countries, historic and current.<br />
http://www.zum.de/whkmla/index.html<br />
Reuters Foundation Interactive Maps<br />
100
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.alertnet.org/map/index.htm?x=256&y=256&scale=1&bpolygon=&iso=&fillId=&ex_iso=&ex_fillId<br />
=&slevel=1&style=2<br />
MultiMap http://www.multimap.com/map/places.cgi<br />
ReliefWeb http://www.reliefweb.int/rw/rwb.nsf/doc114?<strong>Open</strong>Form<br />
USGS Map Databases http://education.usgs.gov/common/map_databases.htm<br />
Maps And Geospatial Information http://www.library.cornell.edu/olinuris/ref/maps/map.htm<br />
ArcGis Explorer http://www.esri.com/software/arcgis/explorer/index.html<br />
GeoEye http://www.geoeye.com/default.htm<br />
<strong>Open</strong> <strong>Source</strong> Center Map Library https://www.intelink.gov/maps/<br />
GeoCommons (A place to explore, create and share intelligent maps and geographic data. And<br />
it’s totally free! Access more than 1,500 (and counting) geodata sets on population, environment,<br />
health, education, crime, politics, traffic, employment and everything in between. Move beyond<br />
pushpins on maps to intuitive and exciting visualizations of geographic data. Create and share<br />
intelligent maps to answer questions, gain insight & make decisions.)<br />
http://www.geocommons.com/<br />
World Maps http://www.justmaps.org/<br />
Interactive World Map<br />
http://images.google.com/imgres?imgurl=http://www.nationsonline.org/maps/continents_map_sm.jpg&img<br />
refurl=http://www.nationsonline.org/oneworld/small_continents_map.htm&h=306&w=603&sz=76&hl=en&s<br />
tart=20&um=1&tbnid=u8U7ZseNhY3BoM:&tbnh=69&tbnw=135&prev=/images%3Fq%3Dworld%2Bmap<br />
%26start%3D18%26ndsp%3D18%26svnum%3D10%26um%3D1%26hl%3Den%26newwindow%3D1%2<br />
6safe%3Dactive%26sa%3DN<br />
ExpertGPS http://www.expertgps.com/<br />
MultiMap http://www.multimap.com/<br />
Introduction To Geographic Names http://gnswww.nga.mil/geonames/GNS/index.jsp<br />
http://earth-info.nga.mil/gns/html/namefiles.htm<br />
My Facts Page Atlas And Maps http://www.refdesk.com/factmaps.html<br />
Nation Master: Maps Of The World http://maps.nationmaster.com/<br />
Humanitarian Information Center For Iraq<br />
http://www.humanitarianinfo.org/iraq/psw_satellites/mosul/index.asp<br />
Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (awesome site for the<br />
open source analyst) http://www.onstrat.com/osint/<br />
Marine Corps<br />
One-Eight Basetrack is an experimental media project, tracking the deployment of 1/8 – 1st<br />
Battalion, Eighth Marines, throughout the duration of their deployment to southern Afghanistan. A small<br />
team of mobile media operators is embedded with the battalion, transmitting their reports and reflections<br />
from Helmand province as they travel across the battalion’s area of operations.<br />
http://googlemapsmania.blogspot.com/2011/08/follow-eighth-marines-on-googlemaps.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+GoogleMapsMania+<br />
%28Google+Maps+Mania%29<br />
http://basetrack.org/<br />
Marine Corps <strong>Intelligence</strong> and Security Doctrine http://www.fas.org/irp/doddir/usmc/index.html<br />
Medical <strong>Intelligence</strong><br />
Disaster Preparedness Capacity Map http://preparedness.interaction.org/map<br />
Swine Flu Pandemic Interactive Map http://www.edutube.org/interactive/swine-flu-pandemicinteractive-map<br />
Find Flu Shots Near You http://www.pandemicflu.gov/whereyoulive/index.html<br />
101
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Visual Medical Dictionary (mapping drug-disease relationships)<br />
http://www.curehunter.com/public/dictionary.do<br />
Centers For Disease Control and Prevention http://www.cdc.gov/<br />
Country Medical Briefings http://www.who.int/countries/en/<br />
Timeline of influenza A( H1N1) cases<br />
http://www.who.int/csr/disease/swineflu/interactive_map/en/index.html<br />
Maps and Atlases: Public Health Maps http://library.humboldt.edu/~rls/geospatial/pubhealth.htm<br />
<strong>Global</strong> Network of Neglected Tropical Diseases<br />
http://www.usatoday.com/news/health/swine-flu-map-timeline.htm<br />
http://www.sabin.org/map/4<br />
Tracking The <strong>Global</strong> Spread of Swine Flu<br />
http://www.usatoday.com/news/health/swine-flu-map-timeline.htm<br />
Tracking Swine Flu Cases Worldwide<br />
http://www.nytimes.com/interactive/2009/04/27/us/20090427-flu-update-graphic.html<br />
<strong>Global</strong> Atlas of Infectious Diseases http://gamapserver.who.int/<strong>Global</strong>Atlas/home.asp<br />
http://gamapserver.who.int/<strong>Global</strong>Atlas/InteractiveMap/MainFrame2.asp<br />
Diseases: Ignored <strong>Global</strong> Killers<br />
http://www.globalissues.org/article/218/diseases-ignored-global-killers<br />
<strong>Global</strong> Diseas Alert Map http://www.healthmap.org/en<br />
Outbreaks <strong>Global</strong> Incident Map http://outbreaks.globalincidentmap.com/home.php<br />
PandemicFlu http://www.pandemicflu.gov/<br />
Pandemic Influenza Watchboard http://fhp.osd.mil/aiWatchboard/<br />
Health Map <strong>Global</strong> Disease Alert Map http://www.healthmap.org/en<br />
Common Infectious Diseases Worldwide http://www.infoplease.com/ipa/A0903696.html<br />
Travelers’ Health http://www.cdc.gov/travel/destinat.htm<br />
http://www.cdc.gov/travel/<br />
Third World Traveler http://www.thirdworldtraveler.com/Disease/diseases.html<br />
Health Informatics World Wide http://www.hiww.org/<br />
Medical World Search http://www.mwsearch.com/<br />
Virtual Naval Hospital http://www.vnh.org/<br />
World Health Organization http://www.who.int/en/<br />
Armed Forces Medical <strong>Intelligence</strong> Center (AFMIC) http://www.afmic.osis.gov/osis/afmic.html<br />
http://www.afmic.detrick.army.mil/<br />
<strong>Global</strong> Health Facts http://www.globalhealthfacts.org/<br />
Medical World Search http://www.mwsearch.com/<br />
Medical http://www.awesomelibrary.org/Library/Reference_and_Periodicals/Medical/Medical.html<br />
Avian Bird Flu Information http://www.emergencyemail.org/avianbirdfluresources.asp<br />
From Wikipedia http://en.wikipedia.org/wiki/Armed_Forces_Medical_<strong>Intelligence</strong>_Center<br />
Medical <strong>Intelligence</strong> (Air Force) http://www.phsource.us/PH/MI/index.htm<br />
Infectious Diseases http://usamriid.detrick.army.mil/<br />
Centers For Disease Control http://www.cdc.gov/<br />
PubMed is a service of the U.S. National Library of Medicine that includes over 16 million<br />
citations from MEDLINE and other life science journals for biomedical articles back to the 1950s. PubMed<br />
includes links to full text articles and other related resources.<br />
http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?DB=pubmed<br />
Madigan Medical Library http://www.mamc.amedd.army.mil/medlib/ml_hmeindex.asp<br />
National Library Of Medicine http://www.nlm.nih.gov/<br />
Medical Handbook and Instructions For Operational Medic<br />
http://www.tacmed.dk/EngMOTPRT.pdf<br />
Military Magazines<br />
Military Magazines http://www.world-newspapers.com/military.html<br />
102
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Asian Military Review (Asian Military Review is an ABC audited publication that is read and<br />
discussed by most of the key decision makers and advisors to militaries in Asia-Pacific. Since 1993, it has<br />
become widely recognised as an authoritative provider of unbiased and objective information to its Asian<br />
readership comprising of military, government, industry and academia.)<br />
http://www.asianmilitaryreview.com/<br />
Joint Forces Quarterly http://www.ndu.edu/inss/Press/NDUPress_JFQ_List.htm<br />
Your Magazines Anytime Anywhere<br />
http://www.qmags.com/default.asp?sessionID=47263C12BECA1CEDF070E73F4<br />
The World Guide To Aircraft Magazines http://www.aeroflight.co.uk/mags/worldmag.htm<br />
Periscope http://www.militaryperiscope.com/index1.shtml<br />
Military Operations in Urban Terrain (MOUT)<br />
Irregular Warfare Center http://www.irregularwarfare.org/Concepts.html<br />
Small Wars Council http://council.smallwarsjournal.com/<br />
Center For Army Lessons Learned http://call.army.mil/<br />
http://www.inscom.osis.gov/ngic/NGIC-1122-0062-01/ART5.htm<br />
Close Combat in The Urban Environment<br />
http://www.globalsecurity.org/military/library/report/2001/closecombat2.ppt#1<br />
Military Operations In Urban Terrain<br />
http://www.inscom.osis.gov/ngic/NGIC-1122-0062-01/ART4.htm<br />
http://www.globalsecurity.org/military/ops/mout.htm<br />
The MOUT Homepage http://www.geocities.com/Pentagon/6453/techa.html<br />
Theater of Urban Warfare<br />
http://www.globalsecurity.org/org/news/2003/030328-urbanwarfare01.htm<br />
Urban Operations: A Historical Casebook<br />
http://www.globalsecurity.org/military/library/report/2002/urbanoperationsintro.htm<br />
Urban Battle Fields of South Asia Lessons Learned from Sri Lanka, India, and Pakistan<br />
http://www.rand.org/pubs/monographs/2004/RAND_MG210.pdf<br />
Small Wars Journal (lots of reference material on MOUT) http://www.smallwarsjournal.com/<br />
The Urban Operations Journal http://urbanoperations.8media.org/<br />
Street Smart: <strong>Intelligence</strong> Preparation of the Battlefield for Urban Operations<br />
http://www.rand.org/pubs/monograph_reports/MR1287/index.html<br />
Small Wars Center of Excellence http://www.smallwars.quantico.usmc.mil/sw_manual.asp<br />
Small Wars Registered User http://www.smallwars.quantico.usmc.mil/RegsiteredUser.pdf<br />
Unrestricted Warfare http://www.jhuapl.edu/urw_symposium/pages/proceedings.htm<br />
Irregular Warfare Special Study<br />
http://merln.ndu.edu/archive/DigitalCollections/IrregWarfareSpecialStudy.pdf<br />
Irregular Warfare Specialty Track http://www.usma.edu/dmi/irregular_warfare.htm<br />
A Ner Era Of Irregular Warfare<br />
http://www.usma.edu/dmi/IWmsgs/A%20Canadian%20Perspective%20of%20Irregular%20Warfare.pdf<br />
Irregular Military http://en.wikipedia.org/wiki/Irregular_military<br />
The U.S. Army And Irregular Warfare http://www.wooster.edu/history/jgates/book-contents.html<br />
History Of Irregular Warfare<br />
http://www.sais-jhu.edu/programs/ir/strategic/courses/docs/irregular_warfare_syllabus.pdf<br />
Some Thoughts On Irregular Warfare https://www.cia.gov/csi/studies/96unclass/iregular.htm<br />
Complex Irregular Warfare<br />
http://www.fpri.org/enotes/20060106.military.hoffman.complexirregularwarfare.html<br />
Small Wars Journal http://smallwarsjournal.com/index.php<br />
Small Wars Journal Research <strong>Link</strong>s http://smallwarsjournal.com/research/#OnlineJournalFree<br />
Minimanual Of The Urban Guerilla http://news.skilluminati.com/?p=33<br />
Chinese Report On Unrestricted Warfare http://news.skilluminati.com/?p=14<br />
Counterinsurgency Army Web Page<br />
103
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
https://www.us.army.mil/suite/page/451386?c=YmVuLmJlbmF2aWRlcw==<br />
Unrestricted Wrafare Symposium 2007<br />
http://www.jhuapl.edu/urw_symposium/pages/proceedings/2007/chapters/URW%202007%20Book.pdf<br />
http://www.jhuapl.edu/urw_symposium/pages/proceedings2007.htm<br />
Unrestricted Warfare http://www.cryptome.org/cuw.htm<br />
Small Wars And Low Intensity Conflicts Currently Taking Place Throughout The World<br />
http://www.smallwars.quantico.usmc.mil/sw_today.asp<br />
Militia Groups<br />
Note: Many links are very much inactive or have been discontinued, however, a good keyword<br />
searh with the listed names will turn out excellent results.<br />
Rise in Militia Groups http://www.breitbart.com/article.php?id=D9A140QG0&show_article=1<br />
Militias by State http://www.mathaba.net/www/militia/index.shtml<br />
http://www.indexoftheweb.com/Patriot/Militia.htm<br />
Militia <strong>Link</strong>s http://www.angelfire.com/ny3/captbly/militia.html<br />
Missile Threat<br />
Missile Proliferation http://www.fas.org/irp/threat/missile/index.html<br />
Missile Threat http://missilethreat.com/<br />
Missile Database http://www.missilethreat.com/missiles/<br />
Missile Index (database of world's missile systems) http://missile.index.ne.jp/en/<br />
Muslim Brotherhood<br />
Official Web Site in English http://www.ikhwanweb.com/articles.php?pid=10005<br />
Muslim Brotherhood Movement Homepage http://www.ummah.net/ikhwan/<br />
Muslim Brotherhood in Syria: http://www.jimsyr.com/<br />
Muslim Brotherhood in Jordan: http://www.ikhwan-jor.org/<br />
Muslim Brotherhood Unspec: www.angelfire.com/mac/ikhwan/<br />
Muslim Brotherhood discussion forum Unspec:<br />
http://www.ikhwan.net/vb/forumdisplay.php?s=&forumid=16<br />
Muslim Brotherhood in Cairo: http://www.dayra23.com/<br />
Muslim Brotherhood Unspec: http://www.ikhwanonline.com/<br />
Muslim Brotherhood in English: http://www.ikhwanweb.com<br />
Libyan site affiliated with the Muslim Brotherhood: http://www.almukhtar.org/index.cfm<br />
Word Worker’s Organization (global communist group) http://www.iraqresistance.net/<br />
Muslim Access http://www.muslimaccess.com/<br />
The Muslim Brotherhood English Web Site<br />
http://www.ikhwanweb.com/Home.asp?zPage=Systems&System=PressR&Lang=E<br />
Muslim Brotherhood From Wikipedia http://en.wikipedia.org/wiki/Muslim_Brotherhood<br />
Hamas And The Muslim Brotherhood<br />
http://www.israelipalestinianprocon.org/bin/procon/procon.cgi?database=5%2dQ%2dSubs%2edb&comm<br />
and=viewone&id=13&op=t<br />
Radical Islam Videos<br />
http://uk.youtube.com/results?search_query=dispatches+undercover+mosque<br />
104
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
National/International Most Wanted WEB Sites<br />
Active Most Wanted http://activemostwanted.com/<br />
Most Wanted Criminal http://musician.8k.com/<br />
America’s Most Wanted http://www.amw.com/<br />
Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/fedsites.htm<br />
Interpol http://www.interpol.int/<br />
Interpol National Wanted WEB Site http://www.interpol.int/Public/Wanted/Fugitives/<strong>Link</strong>s.asp<br />
Most Wanted <strong>Link</strong>s http://dir.yahoo.com/Society_and_Culture/Crime/Law_Enforcement/Wanted/<br />
Most Wanted and Crime Stoppers http://www.officer.com/wanted.htm<br />
The Worlds Most Wanted http://www.mostwanted.org/<br />
Ten Most Wanted http://www.fbi.gov/wanted/topten/fugitives/fugitives.htm<br />
Most Wanted Terrorists http://www.fbi.gov/wanted/terrorists/fugitives.htm<br />
Crime Alert http://www.fbi.gov/wanted/alert/alert.htm<br />
National Security Agency (NSA) http://www.nsa.gov/<br />
NSA $3.2B Expansion for CyberWar http://publicintelligence.net/nsa-site-m-cybercom/<br />
Newspapers Around The World<br />
ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/<br />
News Voyager http://newspaperlinks.net/voyager.cfm<br />
Newspapers - USA And Worldwide http://www.refdesk.com/paper.html<br />
United States Newspapers http://www.50states.com/news/<br />
NEWSEUM The Newseum displays these daily newspaper front pages in their original, unedited<br />
form. Some front pages may contain material that is objectionable to some visitors. Viewer discretion is<br />
advised. http://www.newseum.org/todaysfrontpages/default.asp<br />
Pakistan Daily Times http://www.dailytimes.com.pk/default.asp?date=7/31/2008<br />
Asia Times http://www.atimes.com/<br />
The Paperboy http://www.thepaperboy.com/<br />
Newspapers 24 http://www.newspapers24.com/<br />
Newspaper Index http://www.newspaperindex.com/<br />
Find Nespapers http://www.findnewspapers.com/<br />
Today’s Front Pages (interactive) http://www.newseum.org/todaysfrontpages/flash/default.asp<br />
The Internet Public Library http://www.ipl.org/div/news/<br />
Newspapers of the World http://www.actualidad.com/<br />
http://www.geocities.com/~oberoi/newspapr.html<br />
Newspapers on the Worldwide WEB http://www.gt.kth.se/publishing/news.html<br />
USA and Worldwide http://www.refdesk.com/paper.html<br />
Newspapers http://www.newspapers.com/<br />
http://www.pressdisplay.com/pressdisplay/viewer.aspx<br />
Online Newspapers http://www.onlinenewspapers.com/<br />
World Newspapers http://www.world-newspapers.com/<br />
Aljazeera http://english.aljazeera.net/<br />
Aljazeera In English http://english.aljazeera.net/HomePage<br />
News And Audio In 33 Languages http://www.bbc.co.uk/worldservice/languages/<br />
ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/<br />
Newsmap is an application that visually reflects the constantly changing landscape of the Google<br />
News news aggregator. http://www.marumushi.com/apps/newsmap/newsmap.cfm<br />
105
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Nongovernment Organizations (NGOs)<br />
Search for organisations in our database of 393 AlertNet member organisations from 92<br />
countries. http://www.alertnet.org/member_directory.htm<br />
North Korea/Korean Military<br />
North Korea Profile http://www.nti.org/e_research/profiles/NK/index.html<br />
Lost world: Scenes from North Korea's closed society<br />
http://www.independent.co.uk/news/world/asia/lost-world-scenes-from-north-koreas-closed-society-<br />
2332102.html<br />
North Korea Web Page http://www.korea-dpr.com/<br />
Multimedia: North Korea in 2011 To coincide with the launch of our new blog on North Korea,<br />
Crisis Group has produced a multimedia presentation that looks at the history and current state of the<br />
"Hermit Kingdom". The presentation features an audio slideshow with fascinating and rare pictures from<br />
inside North Korea and commentary by Daniel Pinkston, Crisis Group's North East Asia Deputy Project<br />
Director. You can also explore the country's history, economy and military through background texts,<br />
interactive timelines and maps.<br />
http://www.crisisgroup.org/en/publication-type/multimedia/interactive-north-korea.aspx<br />
http://www.crisisgroup.org/en/publication-type/blogs/strong-and-prosperous/south-korean-ballistic-missileranges.aspx<br />
North Korean Attack on Yeonpyeong Island<br />
http://web.stratfor.com/images/asia/DigitalGlobe_North_Korean_Attack_11-.23.pdf<br />
nderground Airfields http://geimint.blogspot.com/2010/07/underground-airfieldsdprk.html<br />
Online Spies Spot North Korea’s Underground Airfields<br />
http://www.wired.com/dangerroom/2010/07/online-spies-spot-north-koreas-undergroundairfields/#ixzz0ti6gIDZf<br />
North Korea's Choice: Bombs over Electricity<br />
http://www.nae.edu/Publications/TheBridge/Archives/19804/19821.aspx<br />
North Korea Uncovered With Google Earth<br />
http://www.nkeconwatch.com/north-korea-uncovered-google-earth/<br />
North Korea<br />
https://www.intelink.gov/sharepoint/osp/North%20Korea%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
North Korea’s Secrets http://www.gadling.com/2009/06/01/phd-student-curtis-melvin-usesgoogle-maps-to-uncover-north-kore/<br />
List of North Korean Airports http://www.ourairports.com/countries/KP/airports.html<br />
North Korean Military Airbases http://eyeball-series.org/nk-mil-air/nk-mil-air.htm<br />
South of Anch'ang-ni<br />
North of Changch'an-ni<br />
Chông-ch'on<br />
Hwangju-up<br />
Kaech'on-up<br />
West of Kangdong-up<br />
Kusong<br />
Kwanso-ri<br />
Orang-up<br />
106
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
P'abal-li<br />
Pangp'o-ri<br />
North of Pyongyang<br />
North of Samjiyon-up<br />
North of Sanbon-dong<br />
Sindangan-dong<br />
Sinuiju<br />
Southwest of Sinp'yông-ni<br />
Toran-gol<br />
Wonsan<br />
Yongang-ni<br />
North of Yonghung-ni<br />
South of Yonghung-ni<br />
North Korean Homepage http://www.korea-dpr.com/<br />
Capability Analysis of North Korean Special Forces<br />
http://www.drc-jpn.org/AR-6E/fujimoto-e02.htm<br />
Korean Peninsula http://www.ceip.org/files/nonprolif/countries/country.asp?ID=5&country=korea<br />
North Korean Tactics http://www.globalsecurity.org/wmd/library/news/dprk/2001/korea.pdf<br />
North Korean Special Weapons Guide http://fas.org/nuke/guide/dprk/<br />
North Korean Special Forces http://www.specwarnet.com/asia/NKSF.htm<br />
Military of North Korea<br />
http://www.absoluteastronomy.com/encyclopedia/M/Mi/Military_of_North_Korea.htm<br />
Country Assessment: Korean Peninsula http://www.isis-online.org/publications/dprk/index.html<br />
North Korea Missile Launch Furor http://cryptome.org/dprk-furor/dprk-eyeball.htm<br />
Google Earthing The North Korean Military<br />
http://www.radioopensource.org/google-earthing-the-north-korean-military/<br />
North Korean Military Guide http://www.globalsecurity.org/military/world/dprk/<br />
North Korean Military Capabilities<br />
http://militaryhistory.about.com/od/currentconflicts/a/koreanmilitary_2.htm<br />
North Korean News http://www.kcna.co.jp/index-e.htm<br />
North Korean Nuclear Test Sites<br />
http://web.stratfor.com/images/asia/map/N_Korea-Nuke-test-5.jpg<br />
http://cryptome.org/dprk-test.htm<br />
The Nuclear-Armed Planet http://www.msnbc.msn.com/id/12269198/<br />
State Department Notes http://www.state.gov/r/pa/ei/bgn/2792.htm<br />
Background Note North Korea<br />
http://militaryhistory.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=militaryhistory&cdn=education&t<br />
m=12&gps=115_9_1148_694&f=10&tt=14&bt=0&bts=0&zu=http%3A//www.state.gov/r/pa/ei/bgn/2792.ht<br />
m<br />
North Korea Special Weapons Guide<br />
http://militaryhistory.about.com/gi/dynamic/offsite.htm?zi=1/XJ/Ya&sdn=militaryhistory&cdn=education&t<br />
m=159&gps=155_5_1148_694&f=10&tt=14&bt=0&bts=0&zu=http%3A//www.fas.org/nuke/guide/dprk/inde<br />
x.html<br />
Short Video Clips http://www.vbs.tv/shows/north-korea/<br />
North Korea On The Precipe Of Famine<br />
http://www.petersoninstitute.org/publications/pb/pb08-6.pdf<br />
The North Korean Food Crisis http://www.iie.com/events/event_detail.cfm?EventID=70<br />
North Korea Special Collection http://cns.miis.edu/research/korea/<br />
Yongbyon Nuclear Scientific Research Center<br />
http://en.wikipedia.org/wiki/Yongbyon_Nuclear_Scientific_Research_Center<br />
Nuclear Weapons Program http://www.fas.org/nuke/guide/dprk/nuke/index.html<br />
107
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Nuclear Overview http://www.nti.org/e_research/profiles/NK/Nuclear/index.html<br />
Country Assessments: Korean Peninsula http://www.isis-online.org/publications/dprk/index.html<br />
Nuclear Power Plants and WMD Series (Cryptome)<br />
nuclear-protest.htm Nuclear Protest Photos April 10, 2011<br />
daiichi-photos5.htm Fukushima Daiichi Nuclear Plant Photos 5 April 9, 2011<br />
npp-seismic.zip Seimic Isolation of Nuclear Power Plants April 9, 2011 (1.4)<br />
daiichi-assess.pdf Fukushima Daiichi Reactors Condition Assessment April 7, 2011<br />
iaea-ns-g-1-6.pdf Safety Guide for Seismic Design of Nuke Plants April 7, 2011<br />
daiichi-photos4.htm Fukushima Daiichi Nuclear Plant Photos 4 April 6, 2011<br />
nuke-disassembly.zip Taking Apart a Nuclear Bomb April 6, 2011 (5.2MB)<br />
fp-npp.zip Fire Protection of Nuclear Power Plants April 6, 2011 (1MB)<br />
DIY Nuke (offsite) How To Build A Nuclear Bomb April 6, 2011<br />
daiichi-photos3.htm Fukushima Daiichi Nuclear Plant Hi-Res Photos 3 April 5, 2011<br />
ge-bwr6.zip General Electric Boiling Water Reactor-Daiichi April 4, 2011 (7.2MB)<br />
daiichi-photos2.htm Fukushima Daiichi Nuclear Plant Hi-Res Photos 2 April 3, 2011<br />
daiichi-photos.htm Fukushima Daiichi Nuclear Plant Hi-Res Photos April 2, 2011<br />
fukushima-areva.zip Steps of the Fukushima Daiichi Incident by Areva April 1, 2011 (3.7MB)<br />
japan-npp.htm Japan Nuclear Power Plants Eyeball April 1, 2011<br />
gao-11-447r.htm Federal Reserve Banks InfoSys Controls Need Fix March 31, 2011<br />
isfsi-security.pdf US Nuclear Spent Fuel Storage Security March 30, 2011 (410KB)<br />
isfsi-eyeball.htm US Nuclear Spent Fuel Storage Casks Eyeball March 24, 2011<br />
jnpp-safety.zip Japan Nuclear Power Station Safety Design March 17, 2011 (2.4MB)<br />
108
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Guide (offsite) Responding to a Nuclear Emergency March 17, 2011<br />
NISA GOV (offsite) Japan Nuclear and Industrial Safety Agency March 17, 2011<br />
JNES NGO (offsite) Japan Nuclear Energy Safety Organization March 17, 2011<br />
GE Hot Rods (offsite) General Elctric Spent Nuclear Fuel Rods Threat March 16, 2011<br />
DG JP (offsite) Digital Globe Images of Japan Quake Damage March 15, 2011<br />
Megadeath (offsite) Reducing Consequences of Nuclear Detonation March 11, 2011<br />
secnav-5510-35b.pdf Navy Nuclear Weapons Personnel Reliability March 3, 2011 (361KB)<br />
HBG-TENPP.pdf HBGary Targeting Exelon Nuclear Power Plant February 13, 2011<br />
NPP (offsite) Nuclear Power Reactor Inspections 12/27/2010 February 4, 2011<br />
nw-council.pdf Megadeath Nuclear Weapons Council December 25, 2010<br />
nw-effects.pdf Megadeath Nuclear Weapons Effects December 25, 2010<br />
nw-survive.pdf Megadeath Nuclear Weapons Effects Survivabilty December 25, 2010<br />
nw-info.pdf Megadeath Nuclear Weapons Info Classification December 25, 2010<br />
doe-452-z.pdf Control of Megadeath Nuclear Weapons Data December 25, 2010<br />
cnwdi.pdf Control of Megadeath Nuclear Weapons Design Info December 25, 2010<br />
dnfsb122710.pdf Hazards of Nuclear Weapons Waste Storage December 24, 2010<br />
nrc120110.pdf NRC Sets Nuclear Info Safeguards for Toshiba November 30, 2010<br />
wmd-risks.pdf Nuclear Weapons Disassembly Risks 2010 September 21, 2010<br />
doe072710.htm Compensation for Nuclear Damage July 28, 2010<br />
mega-kill.zip Nuclear Weapon Effects July 20, 2010 (2.1MB<br />
A-bomb (offsite) Touring US Atomic Bomb Facilities Photos July 15, 2010<br />
Chernobyl (offsite) Touring Chernobyl Facilities Photos July 15, 2010<br />
dodi-3150-10.pdf DoD Response to US Nuclear Weapon Incidents July 3, 2010<br />
opnav-8110-18c.zip Navy Nuclear Weapons System Safety Program July 2, 2010 (5.5MB)<br />
secnav-5710-28.pdf Navy Compliance with US-IAEA Nuke Safeguards July 2, 2010<br />
nuke-sites.htm US IAEA-Declared Nuclear Sites Eyeball June 4, 2009<br />
nuke-air.htm Nuclear Weapons Air Shipment Eyeball December 26, 2008<br />
alert-nukes.htm Alert Nuclear Weapons Storage Facilities Eyeball November 20, 2008<br />
nuke-offshore.htm US Nuclear Weapons Storage Offshore Eyeball August 23, 2008<br />
pantex-gertie.htm Pantex Gravel Gertie Eyeball August 19, 2008<br />
prc-nukes.htm China's Nuclear Weapons Facilities Eyeball May 28, 2008<br />
syrian-site.htm Syrian Alleged and North Korean Reactors April 26, 2008<br />
negev-eyeball.htm Negev Nuclear Research Center Eyeball January 12, 2008<br />
pantex-birdseye.htm Pantex Nuclear Warhead Facility Birdseye January 6, 2007<br />
juragua-eyeball.htm Cuban Juragua Nuclear Power Plant Eyeball November 24, 2007<br />
turkey-birdseye.htm Turkey Point Nuclear Power Plant Birdseye November 23, 2007<br />
peach-npp.htm Peach Bottom Atomic Power Plant Birdseye November 11, 2007<br />
sequoyah-npp.htm Sequoyah Nuclear Power Plant Birdseye November 11, 2007<br />
pilgrim-npp.htm Pilgrim Nuclear Power Plant Birdseye November 11, 2007<br />
fitz-birdseye.htm Fitzpatrick Nuclear Power Plant Birdseye August 4, 2007<br />
boomer-refit.htm Nuclear Boomer Refit Birdseye June 30, 2007<br />
san-onofre-npp.htm San Onofre Nuclear Power Plant Birdseye December 16, 2006<br />
nwsa-eyeball.htm Nuclear Weapon Storage Areas Eyeball Update November 27, 2006<br />
chornobyl-npp.htm RU Chornobyl Nuclear Power Plant Eyeball November 13, 2006<br />
kursk-npp.htm RU Kursk Nuclear Power Plant Eyeball November 13, 2006<br />
ignalina-npp.htm RU-LT Ignalina Nuclear Power Plant Eyeball November 13, 2006<br />
smolensk-npp.htm RU Smolensk Nuclear Power Plant Eyeball November 13, 2006<br />
st-pete-npp.htm RU St Petersburg Nuclear Power Plant Eyeball November 13, 2006<br />
lesnoy.htm Russian Lesnoy Nuclear Complex Eyeball November 8, 2006<br />
seversk.htm Russian Seversk Nuclear Complex Eyeball November 7, 2006<br />
ozersk.htm Russian Ozersk Nuclear Complex Eyeball November 7, 2006<br />
dprk-test.htm North Korea Nuclear Test Site Eyeball Revised October 14, 2006<br />
lanl-eyeball.htm Los Alamos National Laboratory Eyeball Update September 13, 2006<br />
bangor-eyeball.htm Bangor Submarine Base-Nuclear Weapons Storage August 31, 2006<br />
kings-eyeball.htm Kings Bay Submarine Base-Nuclear Weapons Storage August 31, 2006<br />
109
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
tnrc-eyeball.htm Tehran and Bushehr Nuclear Reactors Eyeball August 25, 2006<br />
soreq-eyeball.htm Eyeballing Israel Soreq Nuclear Research Center June 27, 2006<br />
npp2-eyeball.htm Eyeballing US Nuclear Plants and Facilities 2 June 16, 2006<br />
perry-birdseye.htm Perry Nuclear Power Plant Birdseye February 22, 2006<br />
indian-birdseye.htm Indian Point Nuclear Generating Station Birdseye February 21, 2006<br />
tmi-birdseye.htm Three Mile Island Nuclear Power Plant Birdseye February 21, 2006<br />
62npp-eyeball.htm Eyeballing 104 Nuclear Reactors/63 Power Plants January 17, 2006<br />
kumsc-birdseye.htm Kirtland Nuclear Storage Complex Birdseye December 25, 2005<br />
kumsc2-eyeball.htm Eyeballing Kirtland Nuclear Weapons Storage 2004 August 20, 2005<br />
mcg-nps-eyeball.htm Eyeballing McGuire Nuclear Power Station March 2, 2005<br />
dresden-eyeball.htm Eyeballing Dresden Nuclear Power Plant March 1, 2005<br />
braid-eyeball.htm Eyeballing Braidwood Generating Station March 1, 2005<br />
salem-eyeball.htm Eyeballing Salem-Hope Creek Nuclear Power Plant February 28, 2005<br />
oyster-eyeball.htm Eyeballing Oyster Creek Nuclear Power Station February 28, 2005<br />
barkbig-eyeball.htm Big Eyeballing Barksdale Nuclear Weapons Storage May 1, 2004<br />
gray-eyeball.htm Eyeballing Gray AFB Nuclear Weapons Storage Area April 10, 2004<br />
bark-eyeball.htm Eyeballing the Barksdale AFB Nuclear WSA December 14, 2003<br />
nuke-fuze.htm Nuclear Weapons Arming and Fuzing August 31, 2003<br />
laken-eyeball.htm Eyeballing US Nuclear Weapons Storage in Britain July 28, 2003<br />
dnws-eyeball.htm Eyeballing Defense Nuclear Weapons School January 3, 2003<br />
wipp-eyeball.htm Eyeballing the WIPP Nuclear Waste Target September 9, 2002<br />
daf-eyeball.htm Eyeballing Nuclear Device Assembly Facilities August 12, 2002<br />
hanford-eyeball.htm Eyeballing Hanford Nuclear Reservation July 9, 2002<br />
pantex-eyeball.htm Eyeballing Pantex Nuclear Warhead Plant June 26, 2002<br />
nwsa-eyeball.htm US Nuclear Weapons Storage Areas June 17, 2002<br />
nellis-eyeball.htm Eyeballing Nellis Nuclear Weapons Storage Area June 14, 2002<br />
dcnpp-eyeball.htm Eyeballing the Diablo Canyon Nuclear Power Plant June 7, 2002<br />
ccnpp-eyeball.htm Eyeballing Calvert Cliffs Nuclear Power Plant June 7, 2002<br />
pnpp-eyeball.htm Eyeballing the Pilgrim Nuclear Power Plant June 7, 2002<br />
mnpp-eyeball.htm Eyeballing the Millstone Nuclear Power Plant June 7, 2002<br />
snpp-eyeball.htm Eyeballing the Seabrook Nuclear Power Plant June 7, 2002<br />
ornl-eyeball.htm Eyeballing Oak Ridge National Laboratory July 21, 2002<br />
llnl-eyeball.htm Eyeballing Lawrence Livermore National Lab May 21, 2002<br />
ymp-eyeball.htm Eyeballing the Yucca Mountain Project May 10, 2002<br />
nts-eyeball.htm Eyeballing the Nevada Nuclear Test Site April 28, 2002<br />
anl-eyeball.htm Eyeballing Argonne National Laboratory April 28, 2002<br />
ipngs-eyeball.htm Eyeballing Indian Point Nuclear Generating Sta. April 28, 2002<br />
The Cryptome Eyeball Series began in March 2002<br />
Compilation below in progress<br />
tp-terr.htm TerrPanel on WMD Terrorism (Full HTML 314K) December 18, 1999<br />
tp-terr.zip TerrPanel on WMD Terrorism (Full Zipped 108K) December 18, 1999<br />
tp-terr-pt2.htm TerrPanel Report on Domestic WMD Terrorism Pt2 December 18, 1999<br />
tp-terr-pt1.htm TerrPanel Report on Domestic WMD Terrorism Pt1 December 17, 1999<br />
wmdp112699.txt WMD Terrorism Panel Meet November 26, 1999<br />
HM (offsite) Nuclear Weapons Secrecy /SA November 17, 1999<br />
hasc102699.htm Mini Nuke Sabotage October 27, 1999<br />
Nukes (offsite) US Stored Nuclear Weapons in Many Nations October 20, 1999<br />
doe101599.txt Secret Nuke Meet, DE U-235 to CN October 15, 1999<br />
srb090199.htm Samuel Berger on Curbing WMD September 2, 1999<br />
wmdp082399.htm WMD Terrorism Panel Meeting August 23, 1999<br />
onns081699.txt Access to Classified and Special Nuclear Info August 16, 1999<br />
nrc072999.txt Digital Nuke Safety Workshop July 29, 1999<br />
hr1555-yak3.txt Senate Debate on Intel 2000/Nuclear Security July 23, 1999<br />
110
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
hr1555-amend.txt Agency for Nuclear Stewardship July 23, 1999<br />
smallpox-wmd.htm The Demon in the Freezer: Smallpox Bioterror July 17, 1999<br />
nrc071699.htm Safety of Nuke Digital Systems July 16, 1999<br />
wmd-curb Urge WMD Curb July 15, 1999<br />
Terr Panel (offsite) Panel on Domestic WMD Terrorism June 8, 1999<br />
rudocs-gertz.htm Top Secret US Reports on Russian Nuclear Defense May 31, 1999<br />
s1059-393-94.txt Senators Jaw Spying/Nuke Threats May 28, 1999<br />
fbi-wmd.htm FBI on WMD Combat April 30, 1999<br />
cia-wmd.htm CIA on WMD Proliferation April 30, 1999<br />
doe040199.txt Nuclear Safety Plan, Right April 1, 1999<br />
wmd-panel.htm WMD, Inc. Launched April 6, 1999<br />
nrc032999.txt Nuclear Emergency Plans March 29, 1999<br />
uk-nuke.htm UK Atomic Weapons Site Redevelopment February 9, 1999<br />
cia020299.htm CIA's Tenet on WMD, Russia, China, North Korea February 6, 1999<br />
nuke-y2k.htm Nukes Need Y2K TLC December 4, 1998<br />
wjc111298.htm Clinton Letter on WMD November 13, 1998<br />
doe100798.txt Secret Hazards at the Pantex Nuke Farm October 7, 1998<br />
dwmd98.htm Conference Report on Defense Against WMD 98 Act October 2, 1998<br />
RAID (offsite) WMD Response Team Locations Ocotber 1, 1998<br />
hr3616-14.txt Defense Against WMD Act of 1998 September 24, 1998<br />
doe090998.txt Nuke Hazards Meets September 9, 1998<br />
nrc080398.txt Access to Classified Nuclear Information (102K) August 3, 1998<br />
wmd-export.htm Tightening Weapons Export Controls July 29, 1998<br />
hd105-271.htm Report to Congress on Proliferation of WMD July 15, 1998<br />
iaea060198.htm IAEA Says Iraq Nuclear File Not Closed June 22, 1998<br />
dod-rra-wmd.htm DoD on Regional Rapid Assessment of WMD May 22, 1998<br />
nrc050798.txt NRC Fees for Personnel Investigations May 7, 1998<br />
nrc042398.txt IEEE Safety Criteria for Nuke Plants April 23, 1998<br />
nrc040698.txt AF TRIGA Reactor April 6, 1998<br />
dod-wmd DoD Policy: Weapons of Mass Destruct (offsite) March 28, 1998<br />
nuke-future Spread of WMD and US Nuclear Strategy (132K) March 18, 1998<br />
disarm-nukes Nuclear Weapons Abolition Campaign (offsite) March 15, 1998<br />
wmd-lugar.txt Sen Lugar: Combating WMD March 14, 1998<br />
bpm021198.txt US-IAEA Nuclear Safeguards Agreement February 11, 1998<br />
nrc012898.txt Nuke Plant to North Korea February 5, 1998<br />
nrc012998.txt Generic Letter on Y2K Readiness for Nuke Plants January 29, 1998<br />
pd98-10.htm Prez OKs China's Nuclear Controls January 16, 1998<br />
mercier.htm Terrorists, WMD, and the US Army Reserve January 6, 1998<br />
doe010298.htm Defense Nuclear Facilities Safety Plan January 2, 1998<br />
wmd-combat.htm Commission on Combating Weapons of Mass Death December 20, 1997<br />
nsam-160.htm PK Crypto: Permissive <strong>Link</strong> for Nuclear Weapons December 17, 1997<br />
fbi-wmd.htm FBI Response to Weapons of Mass Destruction December 10, 1997<br />
dod-domprep.htm Domestic Preparedness for WMD Terrorism (113K) December 1, 1997<br />
ndp-wmd.htm Panel Says Defense Should Focus On WMD Terrorism November 29, 1997<br />
nuke-sec.htm News Report: Nuclear Weapons Labs Security November 8, 1997<br />
rced-97-229.txt GAO Report: Nuclear Weapons Labs Security (122K) November 8, 1997<br />
dnfsb102197.txt Defense Nuclear Facilities Safety Board FOIA October 21, 1997<br />
hanford.htm Report on Hanford Nuke Waste Fiasco August 19, 1997<br />
emp-merkle.htm Non-Nuclear EMP: Threat to Military July 20, 1997<br />
doe060497-2.txt Nuclear Explosives Personnel Assurance Program June 5, 1997<br />
wmd022797.txt WMD Report March 14, 1997<br />
no111496.txt POTUS on Proliferation of WMD March 14, 1997<br />
wmd092796.txt WMD Report March 14, 1997<br />
wmd092995.txt WMD Report March 14, 1997<br />
wmd060995.txt WMD Report March 14, 1997 (108K)<br />
wmd100694.txt WMD Report March 14, 1997<br />
111
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
taggants.htm NRC on Tagging Explosives January 24, 1997<br />
Nuclear Reactors and Storage and Other Items of Interest<br />
Nuclear Threat Initiative http://www.nti.org/index.php<br />
Natanz Uranium Enrichment Complex, Iran, 2002-2010<br />
http://cryptome.org/eyeball/natanz/natanz.htm<br />
http://publicintelligence.net/iran-nuclear-site-natanz-uranium-enrichment-site/<br />
Plutonium Secretly Secured http://cryptome.org/eyeball/kurchatov/kurchatov.htm<br />
http://cryptome.org/eyeball/bn-350/bn-350.htm<br />
Search and Access 24M Nuclear Waste Documents http://www.lsnnet.gov/home.aspx?pg=home<br />
Archive of Nuclear Data http://www.nrdc.org/nuclear/nudb/datainx.asp<br />
http://www.nrdc.org/search.asp?cof=FORID%3A11&ie=UTF-<br />
8&q=nuclear&cx=001024953138106184952%3Alevppyfplwy&hq=-inurl%3Ahttps&t=iframe#851<br />
How many people live near a nuclear power plant in the USA?<br />
http://opendata.zeit.de/nuclear-reactors-usa/#/en/<br />
Find a Reactor Near You http://tools.voanews2.com/nuclear_reactors/<br />
The World’s Nuclear Power Reactors Interactive Map http://www.netgis.de/atom_gmaps/<br />
http://maptd.com/map/earthquake_activity_vs_nuclear_power_plants/<br />
Lance Nuclear Missile Handbook lance-guide.zip<br />
Nuclear Sites Declaration nuke-sites.zip<br />
Israel's Dimona Nuclear Weapons Factory In 3D http://www.youtube.com/watch?v=bbjgDERSuiI<br />
The Virtual Nuclear Tourist (Includes Individual State Maps of Nuclear Waste Transportation<br />
Routes) http://www.nucleartourist.com/<br />
Peach Bottom Atomic Power Plant http://eyeball-series.org/peach-npp/peach-npp.htm<br />
Sequoyah Nuclear Power Plant http://eyeball-series.org/sequoyah-npp/sequoyah-npp.htm<br />
Pilgrim Nuclear Power Plant http://eyeball-series.org/pilgrim-npp/pilgrim-npp.htm<br />
Turkey Point Nuclear Power Plant http://eyeball-series.org/turkey/turkey-birdseye.htm<br />
Cuban Juragua Nuclear Power Plant http://eyeball-series.org/juragua/juragua-eyeball.htm<br />
Pantex Nuclear Warhead Facility Birdseye<br />
http://eyeball-series.org/pantex-birdseye/pantex-birdseye.htm<br />
Negev Nuclear Research Center http://eyeball-series.org/negev-eyeball/negev-eyeball.htm<br />
Alert Nuclear Weapons Storage Facilities http://eyeball-series.org/alert-nukes/alert-nukes.htm<br />
Nuclear Weapons Air Shipment http://eyeball-series.org/nuke-air/nuke-air.htm<br />
China's Nuclear Weapons Facilities http://eyeball-series.org/prc-nukes/prc-nukes.htm<br />
US Nuclear Weapons Storage Offshore http://eyeball-series.org/nuke-offshore/nuke-offshore.htm<br />
Barksdale Air Force Base Nuclear Weapons Storage Area<br />
http://eyeball-series.org/barkbig-eyeball.htm<br />
63 US Nuclear Power Plants http://cryptome.org/npp/62npp-eyeball.htm<br />
Indian Point Nuclear Generating Station http://eyeball-series.org/ipngs-eyeball.htm<br />
Pantex Plant http://eyeball-series.org/pantex-eyeball.htm<br />
Barksdale Air Force Base WSA http://eyeball-series.org/bark-eyeball.htm<br />
Calvert Cliffs Nuclear Power Plant http://eyeball-series.org/ccnpp-eyeball.htm<br />
Defense Nuclear Weapons School (DNWS) http://eyeball-series.org/dnws-eyeball.htm<br />
Diablo Canyon Nuclear Power Plant http://eyeball-series.org/dcnpp-eyeball.htm<br />
Gray Air Force Base Storage http://eyeball-series.org/gray-eyeball.htm<br />
Hanford Nuclear Material Processing http://eyeball-series.org/hanford-eyeball.htm<br />
Kirtland Underground Storage http://cryptome.org/kumsc-eyeball.htm<br />
http://cryptome.org/kumsc2-eyeball.htm<br />
Los Alamos National Laboratory http://cryptome.org/lanl/lanl-eyeball.htm<br />
Millstone Nuclear Power Plant http://eyeball-series.org/mnpp-eyeball.htm<br />
Nellis Air Force Base http://eyeball-series.org/nellis-eyeball.htm<br />
Waste Isolation Pilot Plant http://eyeball-series.org/wipp-eyeball.htm<br />
112
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Pilgrim Nuclear Power Plant http://eyeball-series.org/pnpp-eyeball.htm<br />
Seabrook Nuclear Power Plant http://eyeball-series.org/snpp-eyeball.htm<br />
US Nuclear Weapons Storage in Britain http://eyeball-series.org/laken-eyeball.htm<br />
Nukedump http://cryptome.org/nukedump.jpg<br />
International Nuclear Safety Center http://www.insc.anl.gov/pwrmaps/map/world_map.php<br />
List of Power Reactor Units http://www.nrc.gov/reactors/operating/list-power-reactorunits.html<br />
http://www.eia.doe.gov/cneaf/nuclear/page/at_a_glance/reactors/states.html<br />
Nuclear Guide http://wn.com/s/nuclearguide/index.html<br />
US Nuclear Reactors<br />
http://www.eia.doe.gov/cneaf/nuclear/page/at_a_glance/reactors/nuke1.html<br />
Dresden Nuclear Power Plant http://cryptome.org/dresden-eyeball.htm<br />
Braidwood Nuclear Power Plant http://cryptome.org/braid-eyeball.htm<br />
Salem-Hope Creek Nuclear Power Plant http://cryptome.org/salem-eyeball.htm<br />
Oyster Creek Nuclear Power Station http://cryptome.org/oyster-eyeball.htm<br />
McGuire Nuclear Power Station http://cryptome.org/mcg-nps-eyeball.htm<br />
Braidwood Generating Station http://cryptome.org/braid-eyeball.htm<br />
Selected US Nuclear Power Plants and Facilities http://cryptome.org/npp2/npp2-eyeball.htm<br />
Kirtland Nuclear Storage http://eyeball-series.org/kumsc-birdseye.htm<br />
<strong>Global</strong> Stocks of Nuclear Explosive Materials<br />
http://www.isis-online.org/global_stocks/end2003/tableofcontents.html<br />
Nuclear Weapons Programs Worldwide: An Historical Overview<br />
http://www.isis-online.org/mapproject/introduction.html<br />
Nevada Test Site http://cryptome.org/nts-eyeball.htm<br />
Knolls Atomic Power Laboratory http://cryptome.org/kapl-eyeball.htm<br />
Bettis Atomic Power Laboratory http://cryptome.org/bettis-eyeball.htm<br />
International Nuclear Safety Center (maps of reactors around the world) http://www.insc.anl.gov/<br />
World Information Service on Energy (world nuclear fuel facilities)<br />
http://www.wise-uranium.org/index.html<br />
Proliferation News and Resources http://www.carnegieendowment.org/npp/<br />
(includes deadly maps) http://www.carnegieendowment.org/static/npp/deadlymaps.cfm<br />
Nevada Test Site for Divine Strake http://cryptome.org/nts/nts-eyeball.htm<br />
Three Mile Island http://cryptome.org/tmi-birdseye.htm<br />
Nuclear Security Advisory Council http://www.ransac.org/<br />
Nuclear Threat Initiative http://www.nti.org/<br />
Atomic Archive http://www.atomicarchive.com/<br />
Soreq Nuclear Research Center http://cryptome.org/soreq-eyeball.htm<br />
Selected US Nuclear Power Plants and Facilities http://eyeball-series.org/npp2/npp2-eyeball.htm<br />
Naval Submarine Base Kings Bay and Nuclear Weapons Storage Area<br />
http://eyeball-series.org/kings-eyeball.htm<br />
Bangor Submarine Base Kings Bay and Nuclear Weapons Storage Area<br />
http://eyeball-series.org/bangor-eyeball.htm<br />
Nuclear Weapons http://www.johnstonsarchive.net/nuclear/index.html<br />
Atomic Archive http://www.atomicarchive.com/index.shtml<br />
The Nuclear-Armed Planet http://www.msnbc.msn.com/id/12269198/<br />
San Onofre Nuclear Power Plant http://cryptome.org/san-onofre/san-onofre-npp.htm<br />
The Atomic Bomb Website http://www.vce.com/grable.html<br />
Fitzpatrick Nine Mile Point Nuclear Power Plant http://cryptome.org/fitz/fitz-birdseye.htm<br />
Breaking Into A Power Station In 3 Easy Steps<br />
http://www.news.com/8301-10784_3-9914896-7.html?tag=blogFeed<br />
Nuclear Terrorism<br />
How to Build a Nuclear Bomb<br />
113
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.nationbooks.org/book/136/How%20to%20Build%20a%20Nuclear%20Bomb<br />
Nuclear Posture Review Report 2010<br />
http://www.globalsecurity.org/wmd/library/policy/national/2010-nuclear-posture-review.pdf<br />
Nuclear Dangers http://www.nae.edu/File.aspx?id=19815<br />
The Virtual Nuclear Tourist (Includes Individual State Maps of Nuclear Waste Transportation<br />
Routes) How much easier can we make it? http://www.nucleartourist.com/<br />
Create your own blast map by simply entering a zip code<br />
http://www.nuclearterror.org/blastmaps.html<br />
Video footage of nuclear explosions http://nuclearfiles.org/revideos/filmindex2.html<br />
<strong>Link</strong>s http://www.nuclearterror.org/links.html<br />
Nuclear Weapon Effects Calculator<br />
http://www.fas.org/main/content.jsp?formAction=297&contentId=367<br />
Oil<br />
Bibliography for the Study of Oil and War http://www.endgame.org/oilwars-biblio.htm<br />
World Oil Market and Oil Price Chronologies: 1970 – 2003<br />
http://www.eia.doe.gov/emeu/cabs/chron.html<br />
Oil Demand<br />
http://www.eia.doe.gov/pub/oil_gas/petroleum/analysis_publications/oil_market_basics/Demand_text.htm<br />
Energy Review http://archive.wn.com/2004/07/21/1400/energyreview/<br />
OPEC http://www.opecnews.com/<br />
PeakOil http://www.peakoil.org/<br />
The Oil Wars: Parts 1 and 2 http://www.angelfire.com/ab/trogl/oilwar/<br />
http://www.angelfire.com/ab/trogl/oilwar/part2.html<br />
World Energy "Areas To Watch" http://www.eia.doe.gov/emeu/cabs/hot.html<br />
Online Services<br />
Army A-Z http://www.army.mil/a-z/<br />
<strong>Open</strong> <strong>Source</strong> Center (formerly the Foreign Broadcast Information Service)<br />
Log-In (requires registration) http://www.opensource.gov<br />
<strong>Open</strong> <strong>Source</strong> Center Map Library https://www.intelink.gov/maps/<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> <strong>Link</strong>s<br />
<strong>OSINT</strong> <strong>Global</strong> – <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> from across the globe http://www.osintglobal.com/<br />
OSINFO – <strong>Open</strong> <strong>Source</strong>s Information http://www.opensourcesinfo.org/<br />
All <strong>Source</strong> <strong>Intelligence</strong> Group http://www.the35fgroup.com/<br />
<strong>OSINT</strong> and Momentum http://smallwarsjournal.com/blog/2010/11/i-came-across-the-following/<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://osint4progressives.blogspot.com/<br />
<strong>OSINT</strong> News http://osintnews.blogspot.com/<br />
AFCEA <strong>Intelligence</strong> Serving <strong>Intelligence</strong> Professionals<br />
http://www.afcea.org/mission/intel/default.asp<br />
NightWatch http://www.afcea.org/mission/intel/nightwatch.asp<br />
<strong>Intelligence</strong> Online http://www.intelligenceonline.com/<br />
114
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Army <strong>Open</strong> <strong>Source</strong> Portal (requires access) This link provides <strong>OSINT</strong> products on the following<br />
areas: https://www.intelink.gov/sharepoint/osp/default.aspx<br />
Iraq<br />
https://www.intelink.gov/sharepoint/osp/Iraq%20%20<strong>OSINT</strong>%20Library/Forms/AllItems.aspx<br />
AFRICOM<br />
https://www.intelink.gov/sharepoint/osp/AFRICOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Afghanistan<br />
https://www.intelink.gov/sharepoint/osp/Afghanistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
CENTCOM<br />
https://www.intelink.gov/sharepoint/osp/CENTCOM%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Counternarcotics<br />
https://www.intelink.gov/sharepoint/osp/Counternarcotics%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
China<br />
https://www.intelink.gov/sharepoint/osp/China%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Homeland Security<br />
https://www.intelink.gov/sharepoint/osp/Homeland%20Security%20<strong>OSINT</strong>%20Products/Forms/AllItems.a<br />
spx<br />
EUCOM<br />
https://www.intelink.gov/sharepoint/osp/EUCOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Science and Technology<br />
https://www.intelink.gov/sharepoint/osp/Science%20%20Technology%20<strong>OSINT</strong>%20Products/Forms/AllIt<br />
ems.aspx<br />
Iran https://www.intelink.gov/sharepoint/osp/Iran%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Terrorism<br />
https://www.intelink.gov/sharepoint/osp/Terrorism%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Israel/Palestine<br />
https://www.intelink.gov/sharepoint/osp/Israel%20%20Palestine%20<strong>OSINT</strong>%20Products/Forms/AllItems.<br />
aspx<br />
WMD https://www.intelink.gov/sharepoint/osp/WMD/Forms/AllItems.aspx<br />
North Korea<br />
https://www.intelink.gov/sharepoint/osp/North%20Korea%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
NORTHCOM<br />
https://www.intelink.gov/sharepoint/osp/NORTHCOM_<strong>OSINT</strong>_Products/Forms/AllItems.aspx<br />
PACOM<br />
https://www.intelink.gov/sharepoint/osp/PACOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Pakistan<br />
https://www.intelink.gov/sharepoint/osp/Pakistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Russia<br />
https://www.intelink.gov/sharepoint/osp/Russia%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
SOUTHCOM<br />
https://www.intelink.gov/sharepoint/osp/SOUTHCOM%20AOR%20<strong>OSINT</strong>%20Products/Forms/AllItems.a<br />
spx<br />
Foreign Military Studies Office http://fmso.leavenworth.army.mil/RESRCHLK.htm<br />
Naval <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://www.nosi.org/<br />
Naval <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Blogspot http://nosint.blogspot.com/<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong><br />
http://www.oss.net/extra/tools/parser/index.cgi?url=/html/parse/index.html<br />
<strong>Open</strong> <strong>Source</strong> Research Forum http://www.geocities.com/levittcm/<br />
Expanding <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://www.isanet.org/noarchive/hulnick2.html<br />
<strong>Open</strong>–<strong>Source</strong> <strong>Intelligence</strong> From the Airwaves<br />
http://www.cia.gov/csi/studies/fall_winter_2001/article04.html<br />
<strong>Open</strong> <strong>Source</strong> Collection http://www.fas.org/irp/nsa/ioss/threat96/part06.htm<br />
Carnegie Endowment http://www.carnegieendowment.org/<br />
Small Wars Journal (lots of reference material and the site is created on-the-fly daily)<br />
http://www.smallwarsjournal.com/<br />
115
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
World Facts http://worldfacts.us/<br />
Power and Interest News Report (independent organization that utilizes open source intelligence<br />
to provide conflict analysis services in the context of international relations)<br />
http://www.pinr.com/index.php<br />
Center for Media and DemocracyCenter for Media and Democracy http://www.prwatch.org/<br />
Strategy Page http://www.strategypage.com/<br />
Intellibriefs http://intellibriefs.blogspot.com/<br />
SiloBreaker (for those of you familiar with Crimelink and Analyst Notebook link diagrams, this site<br />
should be of great interest to you. Try it, you’ll like it!) http://www.silobreaker.com/<br />
<strong>Global</strong> Challenges Research http://www.axisglobe.com/<br />
<strong>Global</strong> Research http://www.globalresearch.ca/index.php?context=home<br />
Defence News (World News Network) http://defencenews.com/<br />
National <strong>Intelligence</strong> Council http://www.odci.gov/nic/NIC_home.html<br />
U.S. <strong>Intelligence</strong> Community http://www.intelligence.gov/<br />
STRATFOR http://www.stratfor.com/index.php<br />
Stratfor Free <strong>Intelligence</strong> Reports<br />
https://www.stratfor.com/subscriptions/free-weekly-intelligence-reports.php<br />
National Security <strong>Link</strong>s http://www.blueriver.net/%7Ewyrm/natlsec.html<br />
Research and <strong>Intelligence</strong> http://www.airsecurity.com/research.htm<br />
Worldwide <strong>Intelligence</strong> Agencies http://www.fas.org/irp/world/index.html<br />
National Drug <strong>Intelligence</strong> Center http://www.usdoj.gov/ndic/products.htm<br />
Gateway to <strong>Intelligence</strong> http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm<br />
Strategic <strong>Intelligence</strong> <strong>Link</strong>s http://www.loyola.edu/dept/politics/intel.html<br />
Gathering and Exposing <strong>Intelligence</strong> Online http://www.internet-intelligence.org/<br />
Nation Master: Where Statistics Come Alive (build your own charts)<br />
http://www.nationmaster.com/graph-T/agr_ban_imp_sha&int=5&id=EUR<br />
<strong>Intelligence</strong> Resources http://www.globalsecurity.org/intell/index.html<br />
Your Comprehensive <strong>Source</strong> for <strong>OSINT</strong> & SIGINT 24/7 http://mediavillage.net/test/<br />
Threats <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Gateway (requires easy registration)<br />
http://www.tosig.com/tosig/tosig.html<br />
Literally <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> http://osint.blox.pl/html<br />
Wikipedia <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Inputs http://en.wikipedia.org/wiki/<strong>Open</strong>_source_intelligence<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Search Engine http://www.intelligencesearch.com/<br />
World-Check Reducing Risk Through <strong>Intelligence</strong> http://www.world-check.com/<br />
Africa <strong>Intelligence</strong> http://www.africaintelligence.com/<br />
Strategic Analysis And <strong>OSINT</strong> (An informative blog on issues related to its title)<br />
http://strategicanalysis.i-blog.gr/<br />
The <strong>Intelligence</strong> Summit (open source news)<br />
http://intelligence-summit.blogspot.com/2006/11/open-source-news_13.html<br />
Startegic Analysis And <strong>OSINT</strong> Management http://strategicanalysis.i-blog.gr/<br />
Intellnet: The <strong>Intelligence</strong> Network http://www.intellnet.org<br />
Bangladesh <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Monitors (Archive of South Asian <strong>Intelligence</strong> monitored<br />
from Dhaka, Bangladesh. Daily updates and news on low intensity Regional warfare, study of National<br />
Liberation Movements, Moves by <strong>Intelligence</strong> agencies, Espionage debriefs, National Security agenda,<br />
Corruption, <strong>Global</strong> Jihad, The US Empire ~~ and our pet peeve The India. Inc DISCLAIMER: This site is<br />
a Bangladesh Citizens Initiative on the Net and is in no way connected to any Government or <strong>Intelligence</strong><br />
agency.) http://bdosintmonitors.blogspot.com/2007/05/bdosint-monitors-digest-number-753.html<br />
Noah Schahtman http://www.noahshachtman.com/<br />
International Security Research and <strong>Intelligence</strong> Agency http://www.isria.info/<br />
The <strong>Intelligence</strong> Network: IntellNet is dedicated to providing individuals and groups aggregated<br />
news and documents from around the world in an easy-to-access and understand format. Founded in<br />
early 2000 as a private project to more easily disseminate information, during the 4 years since its<br />
creation IntellNet proved itself to be a great source of knowledge. With today's re-launch, The <strong>Intelligence</strong><br />
Network will stand upon the shoulders of giants in order to see further and push higher; expanding upon<br />
the very foundations of the U.S. <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>) community. http://www.intellnet.org/<br />
Space War Your World At War<br />
116
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.spacewar.com/reports/<strong>Open</strong>_<strong>Source</strong>_<strong>Intelligence</strong>_999.html<br />
Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong><br />
http://www.onstrat.com/osint/<br />
IntelliBriefs http://intellibriefs.blogspot.com/2006_03_19_archive.html<br />
<strong>Global</strong> <strong>Intelligence</strong> http://www.isria.info/index2.php<br />
Strategy Page http://www.strategypage.com/default.asp<br />
<strong>Source</strong>s And Methods<br />
http://sourcesandmethods.blogspot.com/2008/01/bahraini-foreign-minister-speaks-iiss.html<br />
SITE <strong>Intelligence</strong> Group Monitoring Service ("By monitoring terrorist and extremist websites and<br />
penetrating password-protected Al Qaeda linked sites, SITE provides a state-of-the-art intelligence<br />
service to both practitioners and analysts to understand the adversary." - Rohan Gunaratna, Author,<br />
Inside Al Qaeda: <strong>Global</strong> Network of Terror (Columbia University Press) Studying the primary source<br />
propaganda, training manuals, and chatter of terrorists offers insight into terrorists and their activities that<br />
can not be obtained anywhere else. Failing to monitor terrorist propaganda is a failure in intelligence. To<br />
fulfill this need, the SITE <strong>Intelligence</strong> Group offers its Monitoring Service, which provides numerous daily<br />
translations of terrorist propaganda and multimedia from primary source terrorist websites.)<br />
https://www.siteintelgroup.com/_layouts/SiteIntel/aboutsite.aspx?setnav=About%20SITE<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong>: A Strategic Enabler Of National Security<br />
http://se1.isn.ch/serviceengine/FileContent?serviceID=PublishingHouse&fileid=B5D36B62-0E20-BC0B-<br />
DD2E-C12E73D54892&lng=en<br />
Utilization Of Internet Tools And Resources For <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (awesome site for the<br />
open source analyst) http://www.onstrat.com/osint/<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Support<br />
National Virtual Translation Center (The National Virtual Translation Center (NVTC) was<br />
established in February, 2003 " for the purpose of providing timely and accurate translations of foreign<br />
intelligence for all elements of the <strong>Intelligence</strong> Community.) http://www.nvtc.gov/<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Training<br />
Department Of Homeland Security (requires password)<br />
I have nothing but good things to say about these folks; they provide a superb service. I have<br />
taken all the courses below to include several webinar training sessions and I highly recommend them to<br />
the serious open source analyst.<br />
https://www.intelink.gov/sites/dhs-ose/training/default.aspx<br />
Module 1 - The Value and Definition of <strong>Open</strong> <strong>Source</strong><br />
Module 2 - Assessing Reliability of <strong>Source</strong>s<br />
Module 3 - Search Engines<br />
Module 4 - The Deep Web<br />
Module 5 - The Use of RSS<br />
Module 6 - Social Bookmarking<br />
Module 7 - Introduction to Anonymization<br />
Module 8 - Intelink<br />
Module 9 - <strong>Open</strong><strong>Source</strong>.gov<br />
Module 10 - Non-Internet <strong>Open</strong> <strong>Source</strong><br />
Module 11 - Blogosphere<br />
Module 12 - Virtual Worlds New!!<br />
117
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Toddington Training Solutions http://training.toddington.com/<br />
Proposed Training http://www.reuser.biz/<br />
International Relations And Security Network http://www.isn.ethz.ch/edu/training/osint.cfm<br />
InfoSphere http://www.infosphere.se/extra/pod/?id=142&module_instance=1&action=pod_show<br />
http://www.infosphere.se/extra/pod/?id=117&module_instance=1&action=pod_show<br />
<strong>Open</strong> <strong>Source</strong> Solutions http://www.oss.net/<br />
<strong>OSINT</strong> Training Ltd http://www.linkedin.com/in/osint<br />
<strong>OSINT</strong> Training http://opensourceintelligencetraining.com/index.htm<br />
INSCOM <strong>Intelligence</strong> Analyst Training Program https://www.us.army.mil/suite/portal/index.jsp<br />
The idea with this training course is to help students understand how to gain intelligence on<br />
people or organizations using Internet based open source intelligence. Although the course is presented<br />
by Paterva the course does not center just on Maltego technology. The training course focuses on the<br />
underlying technology and tecniques and tries to give students insight in how the tool collects and<br />
correlates the information. http://www.paterva.com/web4/index.php/services<br />
<strong>OSINT</strong> Exploitation and The Criminal Threat<br />
This section is devoted to technology that is very easily exploitable by criminals. I use the word “criminal”<br />
as an umbrella term for anything from gangs to terrorists, human/drug/weapon smugglers to burglars, and<br />
anything in between. In other words, it is all-encompassing. It is not difficult to think like a criminal; all of<br />
us have at some point thought about doing something cruel. But for the most part we do not carry out our<br />
thoughts into action because we are law abiding citizens and we are rational people. Think about the time<br />
when a neighbor, a friend, girlfriend, boyfriend, or relative did something to displease us. Human nature,<br />
and psychology, says get even and do something back. But again, we are rational people. What I am<br />
trying to drive here is the point that all of us are capable of evil thought and it does not matter who we are.<br />
We just don’t admit to it. Remember Jimmy Carter and lust; not necessarily evil though. How about Bill<br />
Clinton and “I did not inhale “. They admitted to things in the hope that by doing this they would get<br />
positive results but instead those innocent comments came back to haunt them and they became the butt<br />
end of jokes. So, go ahead! Think like a human or drug smuggler. Think like a terrorist. Think like a gang<br />
banger. Think like a drug cartel boss. But most of all think! How can I exploit technology to further my<br />
criminal enterprise? By doing this brand of thinking you help law enforcement counter the threat whatever<br />
it may be or at least make them aware of the type of countermeasures to employ.<br />
Why is it that most of the <strong>OSINT</strong> discussions are held behind firewalls and there is a requirement for<br />
passwords to access the subject? No, enough! I am going out on a limb and invite all to it. What a<br />
contradiction in terms. <strong>Open</strong> source but yet very hush, hush. We are not fooling anyone. Even criminals<br />
know how to exploit open source information and create intelligence from it. When I told a good friend of<br />
mine of what I intended to do, this is what he had to say. “We are not dealing with ignorant or stupid<br />
people. These people come from our professions, the computer industry, are computer engineers, etc. If<br />
you check open source you will see the bad guys asking for people with these skills. Not putting the<br />
information out in the open or in a book because the bad guys will find out and use it is only for those that<br />
are new to the game, do not understand the criminal element or their MO. In addition not having this<br />
information will hinder us as the new people to the game may not even know we know... Bad guys leave<br />
trails when they get sloppy and they do.”<br />
Personal Drones: When and where does it end? That is, making it easier for the enemy. Let’s go<br />
beyond celebrity stalking and spying on your neighbors. Drug Cartels, human and drug smugglers are<br />
always on the lookout for anything that will make their activities more successful. Let’s role play: I am a<br />
smuggler (humans or drugs) and I have lookouts on high hills overlooking the border fence reporting<br />
activities back to me, however, they are static and cannot maneuver from their high points. I can utilize<br />
drones to hover over the fence/border for 360 degree coverage. I can see where the Border Patrol vehicle<br />
is on the other side of the fence; something my lookout even on a high point cannot observe. I can also<br />
118
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
determine how long it takes for the patrol to make a round of the area. What else can I make out? What<br />
they look like and now I can make contact with them when they are off duty for possible bribery. The<br />
options are without limits. I have millions at my disposal. I will buy several for the kids along the border to<br />
enjoy flying while I interleave my own surveillance drone into the mix. I could also land mine on the other<br />
side to lay in wait and observe. Granted the batteries do not last long but I don’t need that much<br />
downtime. As soon as I observe what I need, I can bring my craft back over the fence and send another<br />
to lie in wait or do other types of collection. I can hire techies and have them experiment with the drones<br />
to extend their range and battery life. Does it sound far fetched? I don’t think so.<br />
Pandora’s Box<br />
http://www.dailymail.co.uk/sciencetech/article-1327343/Personal-recreation-drones-developed.html<br />
http://robotsrule.com/html/ar-parrot-drone.php?ref=drone1#video<br />
When The Drones Come Marching In<br />
http://techcrunch.com/2011/01/29/drones/#<br />
The Nano Humminbird http://www.avinc.com/<br />
http://www.engineeringtv.com/video/AeroVironment-Wasp-and-Switchbl<br />
Smartphone Applications<br />
Now here are two apps no self respecting terrorist or smuggler should be without; Compass and<br />
GpsCompassMap. My intentions are not of sounding heartless or to delve into the macabre but rather to<br />
point out the control criminals obtain with this technology. The following examples deal mostly with<br />
Google Earth and how it has been utilized by terrorists. With the newer applications one does not need<br />
the desktop or laptop computer but a simple smartphone with all the bells and whistles of a regular CPU.<br />
The other advantage is that you do not leave as large an electronic footprint. The smartphone GPS is<br />
turned on as needed to avoid detection. There are other ways also.<br />
No doubt you have heard or read about Iraqi insurgents having Google Earth imagery of British military<br />
bases (http://news.nationalgeographic.com/news/2007/03/070312-google-censor.html).<br />
There are indications that the gunmen who stormed Mumbai on November 26, and the people who<br />
trained them, were technically literate. The group appears to have used complex GPS systems to<br />
navigate their way to Mumbai by sea. They communicated by satellite phone, used mobile phones with<br />
several different SIM cards, and may have monitored events as the siege unfolded via handheld<br />
Blackberry web browsers<br />
(http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article5311241.ece).<br />
Israel’s fears in regards to Google Earth’s satellite imaging tools have come to fruition. Members of<br />
Palestine’s al-Aqsa Martyrs Brigade, a group aligned with the Fatah political party, has admitted to using<br />
Google Earth for mapping targets for rocket strikes. Khaled Jaabari, the group’s commander, has said<br />
that they are using Google Earth images to check details against their own maps in order to find sensitive<br />
areas that are vulnerable to strikes (http://mashable.com/2007/10/25/missile-attacks-israel-google-earth/).<br />
Compass – I have tried this one and although still a little quirky it gives GR8 results. I can just begin to<br />
imagine the ways a criminal can put this technology to use. It is accurate when it comes to the<br />
coordinates and addresses. I cross referenced it with Google Earth, also on my smartphone, and it is right<br />
119
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
on. Using those two in concert give excellent results. Very handy for a criminal away from built up areas<br />
where all they want are coordinates that can be saved and returned to at a later date. I think you get my<br />
implication here.<br />
GpsCompassMap – Another great little app. Combine Google Earth, Compass and this one and you<br />
have some power at your disposal. This one could replace Compass altogether but the more apps to<br />
cross check for accuracy, the better. Criminals are sure to fall in love with this one. It is extremely<br />
accurate. Went home for lunch and adjusted all the settings for the round-trip. It tells how many satellites<br />
are available and the number it is taking advantage of. Speed (miles, kilometers, knots, etc) of vehicle is<br />
very accurate as I compared it to my speedometer. As you leave the departure point the screen adjusts to<br />
show the entire track and at the end shows distance traveled. Geo coordiantes which change according<br />
to location are a great feature. Superb tool for smugglers on the Southwest (Arizona/Mexico) Border but<br />
that’s as far as I go.<br />
Untraceable Encrypted Blackberrys - Mexico has no reliable register of handsets, mobile numbers, or<br />
users. Vendors are unregistered and sell the phones and SIM cards for cash, no questions asked. In<br />
other words, the cartels have nothing to worry about until such a time that Mexico makes strides to<br />
establish an official registry. (http://www.theage.com.au/national/bikies-trafficking-in-data-secrecy-usingmexican-blackberrys-20110205-1aht9.html)<br />
<strong>Open</strong> <strong>Source</strong> Software<br />
(necessary for the sharing of all forms of information)<br />
The Free Software Portal http://en.wikipedia.org/wiki/Portal:Free_software<br />
STRONG ANGEL TOOZL http://www.strongangel3.net<br />
Operations Security (OPSEC)<br />
Government contractor Frazier-Masonry provides detailed photographs of some of their contract<br />
work. Clients include Navy SEALS, NCIS, Marine Corp Special Operations Command West, EOD and<br />
various other agencies in and around Southern California. The work of these mostly U.S. Navy agencies<br />
is highly sensitive and the release of such photos, which reveal location, building lay-out and structural<br />
nature is a serious violation of Operational Security(OPSEC). Posted on social networking site.<br />
http://cryptome.org/0001/frazier.htm<br />
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x6407146<br />
Organized Crime<br />
Criminal Justice Resources http://www.lib.msu.edu/harris23/crimjust/orgcrime.htm<br />
Organized Crime Web <strong>Link</strong>s http://www.yorku.ca/nathanson/<strong>Link</strong>s/links.htm#General_Overview<br />
http://www.yorku.ca/nathanson/default.htm<br />
Organized Crime Database Search http://www.yorku.ca/nathanson/search.htm<br />
Organized Crime Selected Resources<br />
http://www.questia.com/Index.jsp?CRID=organized_crime&OFFID=se5<br />
120
Pakistan<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Pakistan’s Tribal Belt Interactive Map http://www.cfr.org/publication/18405/<br />
Wikileaks http://wikileaks.org/wiki/Category:Pakistan<br />
Pakistan Airport Guide<br />
http://www.the-airport-guide.com/search.php?by=country&search=Pakistan<br />
Pakistan Maps http://www.nps.edu/Programs/CCS/Pakistan_Index.html<br />
Pakistan Airports And Bases http://eyeball-series.org/pk-bases/pk-bases.htm<br />
Pakistan<br />
https://www.intelink.gov/sharepoint/osp/Pakistan%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Patriot Groups<br />
Patriot Groups in The United States and Their Geographical Locations<br />
http://www.pa-aware.org/who-are-terrorists/pdfs/C-13.pdf<br />
Anti Government Patriot Groups http://www.unitedstatesaction.com/anti-govt-patriot-groups.htm<br />
People Finder<br />
Piracy<br />
ZabaSearch http://www.zabasearch.com/<br />
ZoomInfo http://www.zoominfo.com/<br />
IceRocket http://www.icerocket.com/<br />
Spock http://www.spock.com/<br />
PeekYou http://www.peekyou.com/<br />
Pipl http://pipl.com/<br />
Wink http://wink.com/<br />
Maersk – Track ships in real time. (we certainly do make it easy for pirates!)<br />
http://www.maerskfleet.com/#live-map<br />
Ship Tracking http://www.sailwx.info/shiptrack/shiplocations.phtml<br />
Ships Map http://www.marinetraffic.com/ais/<br />
http://www.boat-project.com/cruises/ais.php<br />
VesselTracker http://www.vesseltracker.com/en/Googleearth.html<br />
http://www.digital-seas.com/<br />
Piracy Watch (interactive Map) http://vfdemo.idvsolutions.com/piracy/<br />
Operation Ocean Shield http://www.shipping.nato.int/CounterPir<br />
International Maritime Bureau Piracy Reporting Center<br />
http://www.icc-ccs.org/index.php?option=com_content&view=article&id=30&Itemid=12<br />
Piracy Map 2005 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />
4<br />
Piracy Map 2006 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />
3<br />
Piracy Map 2007 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10<br />
2<br />
121
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Piracy Map 2008 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=89<br />
Piracy Map 2009 http://www.iccccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=21<br />
9<br />
Piracy News http://www.iccccs.org/index.php?option=com_content&view=category&layout=blog&id=60&Itemid=51<br />
USCG Ship Traffic Density Plot http://www.amver.com/density.asp<br />
Combating Piracy http://www.hansonwade.com/events/combating-piracy-09/index.shtml<br />
Ports Worldwide<br />
<strong>Directory</strong> of Worldwide Ports http://sailings.to/ports-home.html<br />
Port Guide http://www.portguide.com/<br />
International Ports<br />
http://www.mesteel.com/cgi-bin/w3-msql/goto.htm?url=http://www.mesteel.com/countries/intl/ports.htm<br />
Port Index (this one is especially valuable when used in conjunction with Google Earth. Cut and<br />
paste the port names from the alphabetical listing into Google Earth for instant views)<br />
http://www.schednet.com/port_index/port_index.asp<br />
<strong>Link</strong>s to Worldwide Cargo Ports http://www.infomarine.gr/ports/<br />
Ports Worldwide http://www.anlloyd.be/Ports_worldwide/default.html<br />
http://www.sailorschoice.com/worldports/<br />
http://www.ilwu19.com/links/portlinks.htm<br />
Cargo Port <strong>Link</strong>s http://www.hal-pc.org/~nugent/port.html<br />
http://www.mesteel.com/cgi-bin/w3-msql/goto.htm?url=http://www.mesteel.com/countries/intl/ports.htm<br />
Propaganda (anti-U.S.)<br />
Camera/Iraq This site was active between 2004 and 2008 and it may still come in handy for research.<br />
Very much a propaganda site so read with caution.<br />
http://web.archive.org/web/*/http://www.camerairaq.com/2004/05/doctored_photos.html<br />
Public Data On Sex Offenders<br />
The Dru Sjodin National Sex Offender Public Website (NSOPW)<br />
http://www.nsopw.gov/Core/Conditions.aspx<br />
Sex Offenders http://www.criminalcheck.com/<br />
National Sex Offender Public Registry http://www.nsopr.gov/<br />
Valuations and Data for 65,000,000 + Homes (ever wonder why a person with no means of<br />
high income lives in a mansion?) Could it be criminal activity? http://www.zillow.com/<br />
Family Watchdog http://www.familywatchdog.us/<br />
Arizona http://az.gov/webapp/offender/searchZip.do<br />
Florida Sexual Offenders and Predators http://offender.fdle.state.fl.us/offender/homepage.do<br />
Public <strong>Intelligence</strong><br />
A note to everyone: This site publishes documents that have been discovered through open<br />
source methods available to any member of the public. It includes U/FOUO, U/LES, U/FOUO/LES, and<br />
other classifications. However, with the recent release of documents by WikiLeaks I can understand how<br />
122
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
some may feel about releasing more sensitive material. I will not publish any of the material here but<br />
direct you to the site. I will remove this category if you feel too much is being released.<br />
http://publicintelligence.net/<br />
Rail<br />
Amtrak http://www.amtrak.com/servlet/ContentServer?pagename=Amtrak/HomePage<br />
Federal Railroad Administration http://www.fra.dot.gov/<br />
Freight World http://www.freightworld.com/railroads.html<br />
Metra Rail http://www.metrarail.com/<br />
Military Rails http://military.railfan.net/<br />
New York City Transit http://www.mta.nyc.ny.us/nyct/<br />
North American Passenger and Urban Transit<br />
http://www.railserve.com/Passenger/North_America/<br />
Freight Product Information by State http://www.tomorrowsrailroads.org/industry/moving.cfm<br />
Short Line Railroads http://www.uprr.com/customers/shortline/lines/index.shtml<br />
Railroads Page http://www.tours.com/railroads.php<br />
Rail Industry <strong>Link</strong>s http://www.railindustry.com/industry/pages/<br />
Reference/Research Tools<br />
PDF Queen http://www.pdfqueen.com/<br />
Bates Information Services (provides GR8 tips for doing research)<br />
http://batesinfo.com/Writing/Archive/Archive/feb2010.html<br />
Dictionary for translations http://freedict.com/<br />
Dictionary http://dictionary.reference.com/<br />
Thesaurus http://thesaurus.reference.com/<br />
Translator http://dictionary.reference.com/translate/text.html<br />
Encyclopedia http://encyclopedia.com/<br />
Online Encyclopedia http://www.neohumanism.org/<br />
Fast Facts http://www.refdesk.com/facts.html<br />
http://www.refdesk.com/fastfact.html<br />
http://www.freepint.com/gary/handbook.htm<br />
Foreign Words http://foreignword.com/<br />
Librarians Index to the Internet http://lii.org/<br />
One Look Dictionary Search http://onelook.com/<br />
WEB Translation http://www.online-translator.com/srvurl.asp?lang=en<br />
ProQuest http://proquest.umi.com/pqdweb<br />
Translating Dictionaries http://dictionaries.travlang.com/<br />
Word Reference http://wordreference.com/<br />
World Fact Book http://worldfactbook.com/<br />
Your Dictionary http://yourdictionary.com/<br />
Encyclopedia Of The Orient http://i-cias.com/e.o/index.htm<br />
Reference Desk: The Single Best <strong>Source</strong> For Facts http://refdesk.com/<br />
Reference, Facts Look-up, & Library Resources http://www.harrold.org/rfhextra/referenc.html<br />
Religions (see Also Demographics & Religions)<br />
Adherents http://www.adherents.com/<br />
123
Russia<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Major Religions of the World http://www.adherents.com/Religions_By_Adherents.html<br />
Religion Studies http://www.foreignpolicy.com/resources/links.php?cat=35<br />
Russian Military Analysis http://warfare.ru/?linkid=2280&catid=255<br />
Military Website http://warfare.ru/?<br />
Russian Weaponry http://www.youtube.com/watch?v=i0ErfRVHPYE&feature=related<br />
Central Asia http://www.nps.edu/Programs/CCS/Central_Asia_index.html<br />
Russia<br />
https://www.intelink.gov/sharepoint/osp/Russia%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
Russian Strategic Nuclear Forces http://www.russianforces.org/<br />
GRU Spetsnaz Army http://www.spets.dk/spets_stofmrk.htm<br />
Russian Ground Forces http://en.wikipedia.org/wiki/Russian_Ground_Forces<br />
Armed Forces Of The Russian Federation<br />
http://en.wikipedia.org/wiki/Armed_Forces_of_the_Russian_Federation<br />
Russian Strategic Nuclear Forces http://russianforces.org/<br />
Russian Military Bases http://www.kommersant.com/p766827/Russia,_military_bases/<br />
Moscow Region http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_4.gif<br />
http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_5.gif<br />
Missile Strategic Forces http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_0.gif<br />
Space Forces http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_1.gif<br />
Airborne Forces http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_2.gif<br />
World’s Armed Forces Forum http://www.network54.com/Forum/211833/page-11<br />
Russian Analytical Digest http://www.isn.ethz.ch/news/rad/<br />
Russian Air Force Order Of Battle http://www.scramble.nl/ru.htm<br />
Russian Navy Order Of Battle http://www.rkka.org/russiran/russnavy.html<br />
Russian Army Order of Battle – 1996<br />
http://www.fas.org/nuke/guide/russia/agency/army-oob.htm<br />
Russian Order Of Battle <strong>Link</strong>s http://demo.carrot2.org/demotable/search?in=Web&q=russian+order+of+battle&s=100&alg=Lingo&opts=h<br />
Russian Collectibles https://www.collectrussia.com/index.cfm<br />
http://www.sovietawards.com/forum/vbclassified.php?s=022589c82ee918a1bc349bd20683482a&do=ad&id=166<br />
http://www.soviet-awards.com/<br />
Satellite and Space Views (real time)<br />
Satellite and Space Views http://www.leonardsworlds.com/info/satellite.htm<br />
Space Imaging http://spaceimaging.com/<br />
Real Time Satellite Tracking http://www.n2yo.com/?s=24786<br />
Search Engines & Meta Search Engines<br />
(includes Arabic And Other Language Search Engines)<br />
Powerset – technology that attempts to mine meaning out of web pages -- specifically,<br />
Wikipedia articles. This isn't a general-purpose search engine, but it is a tremendous tool if you are<br />
looking for information on a subject that spans a number of Wikipedia articles, or that has a number of<br />
meanings. http://www.powerset.com/<br />
Hakia – Same as Powerset above. http://www.hakia.com/<br />
124
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
The Top 100 Alternative Search Engines<br />
http://www.readwriteweb.com/archives/top_100_alternative_search_engines_mar07.php<br />
http://altsearchengines.com/2007/12/31/top-100-alternative-search-engines-of-the-year/<br />
Search Engine Watch (tips on conducting good searches)<br />
http://searchenginewatch.com/sereport/<br />
International Search Engines http://www.arnoldit.com/lists/intlsearch.asp<br />
Search Engine Listing http://www.arnoldit.com/lists/searchlist.html<br />
Search Engines of The World<br />
http://www.escapeartist.com/Search_Engines/Search_Engines.html<br />
Search Engine Colossus http://www.searchenginecolossus.com/<br />
Quick Click To Search Engines http://www.aresearchguide.com/2quick.html<br />
Ixquick (It can search in 17 languages, including Chinese and Turkish) http://www.ixquick.com/<br />
ResearchBuzz (designed to cover the world of Internet research)<br />
http://www.researchbuzz.org/wp/<br />
Country Based Search Engines http://www.philb.com/countryse.htm<br />
SearchEzee http://www.searchezee.com/<br />
QuickFindIt http://www.quickfindit.com/<br />
All Search Engines http://www.allsearchengines.com/<br />
Foreign Search Engines http://www.allsearchengines.com/foreign.html<br />
Search.Com http://www.search.com/<br />
Meta Crawler http://www.metacrawler.com/<br />
Pandia Search Central http://www.pandia.com/<br />
Mamma The Mother Of All Search Engines http://www.mamma.com/<br />
Weblog Search Engines http://www.daypop.com/<br />
http://www.blogsearchengine.com/<br />
http://www.blogdigger.com/<br />
http://www.technorati.com/<br />
Search Engine Optimization http://www.seochat.com/<br />
KartOO (is a metasearch engine with visual display interfaces. When you click on OK, KartOO<br />
launches the query to a set of search engines, gathers the results, compiles them and represents them in<br />
a series of interactive maps through a proprietary algorithm. http://www.kartoo.com/en_index.htm<br />
Quintura http://www.quintura.com/<br />
Country Based Search Engines http://www.philb.com/countryse.htm<br />
Search Engine Guide http://www.searchengineguide.com/<br />
Webbrain (results in tree structure) http://www.webbrain.com/html/default_win.html<br />
ChaCha http://www.chacha.com/<br />
Dog Pile http://www.dogpile.com/<br />
Zuula (takes advantage of 16 search engines) http://www.zuula.com/<br />
Planetsearch (takes advantage of 16 search engines) http://www.planetsearch.com/<br />
GoshMe (You may not know but there are more than half a million search engines out there on<br />
the Internet, with exclusive content and features. GoshMe will be the way to discover them, and even<br />
better, the key to know when and how to use them.) http://www.goshme.com/login.jsp<br />
Yahoo Short Cur Cheat Sheets http://help.yahoo.com/help/us/ysearch/tips/tips-01.html<br />
WayBack Machine (Browse through over 150 billion web pages archived from 1996 to a few<br />
months ago. To start surfing the Wayback, type in the web address of a site or page where you would like<br />
to start, and press enter. Then select from the archived dates available. The resulting pages point to other<br />
archived pages at as close a date as possible. Keyword searching is not currently supported.) Note: If you<br />
find some links in this handout that no longer work you can get some practice with this site. Copy and<br />
paste the URL that is no longer active into the wayback machine. This should take you back to how the<br />
web page existed. Then by using keywords it’s possible you may be able to reach the new site with new<br />
and updated content. http://www.archive.org/web/web.php<br />
Search Engine For Arabic Speakers http://www.ayna.com/<br />
SearchMash http://www.searchmash.com/<br />
CrossEngine http://www.crossengine.com/<br />
125
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Factbites (A search engine that is calibrated for searchers rather than for surfers. I don't want to<br />
find the hottest web site about Britney Spears; I want information on best practices for call centers, or<br />
background on the California mortgage industry.) http://www.factbites.com/<br />
Intelways (Intelways.com, formerly CrossEngine and before that, mrSAPO, isn't a metasearch<br />
engine; you type in your query and then select which search engine to use. Intelways provides one-click<br />
access to around 300 different search tools, organised by broad channels.) http://www.intelways.com/<br />
Alt Search Engines http://altsearchengines.com/archives/<br />
http://altsearchengines.com/wp-content/uploads/2007/11/the-top-100-alternative-search-enginesnovember-2007.pdf<br />
Goshme http://beta3.goshme.com/<br />
Taya It (Arabic) Tayait offers their users the ability to search in the following language modes:<br />
Morphological Search: Results include all inflictions of the keyword. Expanded Search: Results include<br />
all derivatives of the keyword. Synonyms (Thesaurus): Return all synonyms and dialectical variants.<br />
Cross Language: The ability to input English words to search through Arabic Documents Phrase: The<br />
ability to link multiple keywords more loosely or tightly. http://www.tayait.com/<br />
YamLi (Arabic) http://www.yamli.com/<br />
Ayna (Arabic) http://www.ayna.com/<br />
Araby (Arabic) http://www.araby.com/<br />
Le Moteur (French) http://lemoteur.orange.fr/<br />
Carrot Clustering Engine An open source search-results-clustering engine, just recently out in<br />
beta. In a nutshell, it takes search results, analyzes them and, on the fly, creates groups of the most<br />
common concepts or terms from those results. Since this is all done by algorithms rather than by humans,<br />
expect the odd result every once in a while. (BatesInformation Services, www.BatesInfo.com/tip.html)<br />
http://demo.carrot2.org/demo-stable/main<br />
Tianamo has developed a visually search engine that represents your search results as a terrain<br />
map. You decide if it has utility. http://search.tianamo.com/index2.php<br />
Semantics – in a nutshell, the study of words. Great site of 302 semantic web videos and<br />
podcasts. http://www.semanticfocus.com/blog/entry/title/302-semantic-web-videos-and-podcasts/<br />
Secret Armies<br />
Secret Armies http://www.secretarmies.com/index.html<br />
Secure Email<br />
Perfectly Private http://www.perfectlyprivate.com/<br />
Hush Mail https://www.hushmail.com/?PHPSESSID=bf416cbe6609e186dd2a7da3720296f4<br />
Mail2WEB http://mail2web.com/<br />
Crypto Heaven http://www.cryptoheaven.com/secure-email.htm<br />
The Case For Secure Email http://luxsci.com/extranet/articles/email-security.html<br />
Shopping Malls<br />
List of shopping malls in the United States<br />
http://en.wikipedia.org/wiki/List_of_shopping_malls_in_the_United_States<br />
Mall of America http://www.mallofamerica.com/<br />
Shopping Mall Studies http://www.easternct.edu/depts/amerst/Malls.htm<br />
Largest Shopping Malls in The US http://www.easternct.edu/depts/amerst/MallsLarge.htm<br />
126
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Social Engineering<br />
Social engineering is the act of manipulating people into performing actions or divulging<br />
confidential information. The term typically applies to trickery or deception for the purpose of information<br />
gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with<br />
the victim.<br />
Social Engineering Fundamentals, Part I: Hacker Tactics<br />
http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics<br />
Social Engineering Fundamentals, Part II: Combat Strategies<br />
http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies<br />
Social Networking<br />
Social networking sites can be especially useful for the analyst. Many of the sites are used by<br />
terrorists, gangs, criminals and others with less than honorable intentions. Careful analysis of these open<br />
source worlds can yield intelligence you never knew existed. Like a jigsaw puzzle, you may have to visit<br />
several sites (as the enemy does to post bits and pieces of information so as to not leave a trail) to bring it<br />
all together. This is the heart of analysis: bringing it all together to monitor the beat.<br />
Social Media Training Sites http://kommein.com/25-free-online-social-media-classes/<br />
http://kommein.com/25-social-media-how-tos-resources-tutorials-and-lessons/<br />
http://www.newsu.org/<br />
http://www.afspc.af.mil/shared/media/document/AFD-100521-024.pdf<br />
http://www.defense.gov/socialmedia/education-and-training.aspx/<br />
http://businessjournalism.org/wp-content/uploads/2011/02/Social-Media-101-Handout.pdf<br />
http://businessjournalism.org/wp-content/uploads/2011/02/Social-Media-202-Handout.pdf<br />
http://businessjournalism.org/wp-content/uploads/2011/02/Social-Media-303-Handout.pdf<br />
http://businessjournalism.org/wp-content/uploads/2010/03/Soc-Media-handout.pdf<br />
U.S. Central Command http://www.centcom.mil/faq-on-security-for-social-media<br />
DoD Social Media Hub http://www.defense.gov/socialmedia/<br />
US Army Social Media Handbook 2011 http://www.slideshare.net/USArmySocialMedia/armysocial-media-handbook-2011<br />
US Army Official Blog http://armylive.dodlive.mil/index.php/category/social-media/<br />
National Nuclear Security Administration http://nnsa.energy.gov/mediaroom/socialmedia<br />
Department of Homeland Security http://www.dhs.gov/xabout/gc_1238684422624.shtm<br />
Military Home Front<br />
http://www.militaryhomefront.dod.mil/portal/page/mhf/MHF/MHF_HOME_1?section_id=20.110.500.10.0.0<br />
.0.0.0<br />
Indiana National Guard http://www.in.ng.mil/Home/SocialMediaHub/tabid/1120/Default.aspx<br />
West Point http://www.usma.edu/Dcomm/smedia/list.html<br />
NASA http://www.jpl.nasa.gov/social/<br />
Installation Management Command (IMCOM) http://www.imcom.army.mil/hq/about/news/<br />
Social Networking <strong>Intelligence</strong> Web Search. This is a custom Google search that goes through<br />
various social networking and other similar sites to maximize your intelligence search capabilities and<br />
efficiency by reducing the clutter and false positives you are likely to encounter when searching the web.<br />
http://www.google.com/cse/home?cx=013791148858571516042:ntbykhk-kus<br />
Kurrently - A real-time search engine for Facebook and Twitter (just for the heck of it, I searched for<br />
“drug cartels” and very interesting conversations were taking place) http://www.kurrently.com/<br />
SPY (spy can listen in on the social media conversations you're interested in. What do you want<br />
to listen for?) http://www.spy.appspot.com/<br />
Spokeo (not your grandmas phone book) http://www.spokeo.com/<br />
Searching for Saddam. A five-part series on how the U.S. military used social networking to<br />
capture the Iraqi dictator. http://www.slate.com/id/2245228/<br />
127
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Top Ten http://social-networking-websites-review.toptenreviews.com/<br />
List Of Social Networking Sites http://en.wikipedia.org/wiki/List_of_social_networking_websites<br />
2010 Social Network Analysis Report http://www.ignitesocialmedia.com/2010-social-networkanalysis-report/#mixx<br />
Software/Tools For The <strong>Open</strong> <strong>Source</strong> Analyst<br />
Badoo.com<br />
Bebo.com<br />
Digg.com<br />
Facebook.com<br />
Fark.com<br />
Flickr.com<br />
Flixster.com<br />
Foursquare.com<br />
Friendster.com<br />
Gather.com<br />
Habbo.com<br />
Hi5.com<br />
Iambored.com<br />
Identi.ca<br />
IndianPad.com<br />
Last.fm<br />
<strong>Link</strong>edin.com<br />
Livejournal.com<br />
Meetup.com<br />
Metafilter.com<br />
Mixx.com<br />
Multiply.com<br />
Myspace.com<br />
Netlog.com<br />
Newsvine.com<br />
Ning.com<br />
Plaxo.com<br />
Plurk.com<br />
Propeller.com<br />
Reddit.com<br />
Reunion.com<br />
Shoutwire.com<br />
Skyrock.com<br />
Stumbleupon.co<br />
m<br />
Teamsugar.com<br />
Tribe.net<br />
Tuenti.com<br />
Twitter.com<br />
Wayn.com<br />
Xanga.com<br />
Yelp.com<br />
YouTube.com<br />
Addict-O-Matic (instantly create a custom page) http://addictomatic.com/<br />
PasteLert (PasteLert is a simple system to search pastebin.com and set up alerts (like google<br />
alerts) for pastebin.com entries. This means you will automatically recieve email whenever your term(s)<br />
is/are found in new pastebin entries! http://www.andrewmohawk.com/pasteLert/<br />
Social Mention (real-time social media search and analysis) http://www.socialmention.com/<br />
Whos Talking http://www.whostalkin.com/<br />
128
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Kurrently - A real-time search engine for Facebook and Twitter (just for the heck of it, I searched for<br />
“drug cartels” and very interesting conversations were taking place) http://www.kurrently.com/<br />
Social Networking <strong>Intelligence</strong> Web Search. This is a custom Google search that goes through<br />
various social networking and other similar sites to maximize your intelligence search capabilities and<br />
efficiency by reducing the clutter and false positives you are likely to encounter when searching the web.<br />
http://www.google.com/cse/home?cx=013791148858571516042:ntbykhk-kus<br />
Analyst Toolbox:A Toolbox For The <strong>Intelligence</strong> Analyst<br />
http://it.ojp.gov/documents/analyst_toolbox.pdf<br />
22 Free Tools for Data Visualization and Analysis (There are many tools around to help turn data<br />
into graphics, but they can carry hefty price tags. The cost can make sense for professionals whose<br />
primary job is to find meaning in mountains of information, but you might not be able to justify such an<br />
expense if you or your users only need a graphics application from time to time, or if your budget for new<br />
tools is somewhat limited. If one of the higher-priced options is out of your reach, there are a surprising<br />
number of highly robust tools for data visualization and analysis that are available at no charge.)<br />
http://www.computerworld.com/s/article/9214755/Image_gallery_22_free_tools_for_data_visualization_an<br />
d_analysis<br />
Tool Category<br />
Multipurpose<br />
visualization<br />
Mapping<br />
Platform<br />
Skill<br />
level<br />
Data stored<br />
or processed<br />
Data Wrangler Data cleaning No No Browser 2 External server No<br />
Google Refine Data cleaning No No Browser 2 Local No<br />
R Project Statistical analysis Yes<br />
Google Fusion<br />
Tables<br />
With<br />
plugin<br />
Linux, Mac OS X, Unix,<br />
Windows XP or later<br />
4 Local No<br />
Visualization app/service Yes Yes Browser 1 External server Yes<br />
Impure Visualization app/service Yes No Browser 3 Varies Yes<br />
Many Eyes Visualization app/service Yes Limited Browser 1<br />
Tableau Public Visualization app/service Yes Yes Windows 3<br />
Public external<br />
server<br />
Public external<br />
server<br />
VIDI Visualization app/service Yes Yes Browser 1 External server Yes<br />
Zoho Reports Visualization app/service Yes No Browser 2 External server Yes<br />
Choosel Framework Yes Yes Chrome, Firefox, Safari 4<br />
Exhibit Library Yes Yes Code editor and browser 4<br />
Google Chart Tools<br />
JavaScript InfoVis<br />
Toolkit<br />
Library and Visualization<br />
app/service<br />
Yes Yes Code editor and browser 2<br />
Library Yes No Code editor and browser 4<br />
Protovis Library Yes Yes Code editor and browser 4<br />
Quantum GIS (QGIS) GIS/mapping: Desktop No Yes<br />
Linux, Unix, Mac OS X,<br />
Windows<br />
Local or external<br />
server<br />
Local or external<br />
server<br />
Local or external<br />
server<br />
Local or external<br />
server<br />
Local or external<br />
server<br />
Designed for<br />
Web<br />
publishing?<br />
Yes<br />
Yes<br />
Not yet<br />
Yes<br />
Yes<br />
Yes<br />
Yes<br />
4 Local With plugin<br />
<strong>Open</strong>HeatMap GIS/mapping: Web No Yes Browser 1 External server Yes<br />
<strong>Open</strong>Layers<br />
GIS/mapping: Web,<br />
Library<br />
<strong>Open</strong>StreetMap GIS/mapping: Web No Yes<br />
No Yes Code editor and browser 4<br />
Browser or desktops<br />
running Java<br />
3<br />
local or external<br />
server<br />
Local or external<br />
server<br />
TimeFlow Temporal data analysis No No Desktops running Java 1 Local No<br />
IBM Word-Cloud<br />
Generator<br />
Word clouds No No Desktops running Java 2 Local As image<br />
Yes<br />
Yes<br />
129
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Tool Category<br />
Multipurpose<br />
visualization<br />
Mapping<br />
Platform<br />
Skill<br />
level<br />
Data stored<br />
or processed<br />
Designed for<br />
Web<br />
publishing?<br />
Gephi Network analysis No No Desktops running Java 4 Local As image<br />
NodeXL Network analysis No No<br />
Excel 2007 and 2010 on<br />
Windows<br />
4 Local As image<br />
8 more free tools for data visualization and analysis<br />
http://blogs.computerworld.com/18212/8_more_free_tools_for_data_visualization_and_analysis<br />
GeoChat It is designed to enable self-organizing group communications by allowing users to link<br />
the field, headquarters, and the local community in a real-time, interactive conversation visualized on the<br />
surface of a map. GeoChat is a tool for group communications based on SMS, email, and Twitter. People<br />
use GeoChat to simplify team communications, logistics and data reporting, and they can extend their<br />
own software applications using the open APIs. GeoChat is a flexible open source group communications<br />
technology that lets team members interact to maintain shared geospatial awareness of who is doing<br />
what where — over any device, on any platform, over any network. GeoChat allows you and your team to<br />
stay in touch one another in a variety of ways: over SMS, over email, and on the surface of a map in a<br />
web browser. Whether you are sitting at a computer with a high-speed Internet connection, or on the go<br />
with your mobile phone, GeoChat lets you react to events on the ground with maximum agility, forming<br />
cross-organizational virtual teams on the fly, linking field to headquarters, and keeping everyone on your<br />
team connected, in sync, and aware of who is doing what, and where.<br />
http://instedd.org/technologies/geochat/<br />
New Tools of Military Soft Power http://www.nationaldefensemagazine.org/Pages/default.aspx<br />
Broadcast Television Tools to Help <strong>Intelligence</strong> Analysts Wade Through Data<br />
http://www.nationaldefensemagazine.org/archive/2011/March/Pages/BroadcastTelevisionToolstoHelpIntel<br />
ligenceAnalystsWadeThroughData.aspx<br />
Granted there are many units out there that do not have the budget to buy or subscribe to<br />
expensive analytical software, but this should not stop the analyst from doing his/her work. There are<br />
abundant resources of freebies that when used in conjunction with each other provide just as powerful<br />
analytical capabilities. I actually view this as a heavy plus (+). When we use expensive commercial<br />
versions of analytical software that give instantaneous analysis/gratification we tend to depend too much<br />
on the outcome and in many cases take the results for granted. When we do this we cheat ourselves from<br />
doing our own critical thinking and critical analysis for good predictive analysis. However, by taking<br />
advantage of the free (or very cheap) community versions and using them together we force ourselves to<br />
do more critical thinking/analysis because we are trying to determine what information to input into one<br />
program based on the output of another program.<br />
Recorded Future (scour the web, extract, analyze and rank, then explore the past, present and<br />
future.) https://www.recordedfuture.com/<br />
IP Locator (Find an Internet user’s geographic location without invading visitor’s privacy<br />
IP Locator Object is a multiplatform API that will help you understand your visitors better by<br />
geographical location. IP Locator Object provides a wealth of information you can use to geotarget.<br />
http://www.melissadata.com/dqt/ip-locator.htm<br />
Sample Output using IP Locator Object<br />
IP Address 216.231.3.166<br />
Latitude 33.4774<br />
Longitude -117.705<br />
130
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
ZIP 92624<br />
Region CALIFORNIA<br />
Name COX COMMUNICATIONS INC<br />
Domain COX.NET<br />
City Name DANA POINT<br />
Country UNITED STATES<br />
Abbreviation US<br />
Google Goggles. You have to try this one and see for yourself. My mind wandered as I gave this<br />
one a spin. Suppose a drug cartel member is interviewed in a strange location, however, in the distance<br />
you are able to distinguish a building and…. What if you found a note at a terrorist location in a different<br />
language. The possibilities are endless. Google Goggles lets you search Google using pictures from your<br />
camera phones. We take an image as input, and using several image recognition backends (object recognition,<br />
place matching, OCR, etc), we return relevant search results.<br />
http://www.google.com/mobile/goggles/#text<br />
Google Squared. Google Squared is an experimental tool that takes a category (like US presidents,<br />
roller coasters, or digital cameras) and attempts to create a starter "square" of information, automatically<br />
fetching and organizing facts from across the web. You can modify your square by removing rows and columns<br />
you don't like--or by adding new rows and columns and having Google Squared attempt to fetch the relevant<br />
facts. Verify and correct the facts in your square by exploring the original sources and investigating other<br />
possible values. If you're happy with your square you can save it and come back to it later. Google Squared<br />
does the grunt work for you, making research fast and easy. I use this one often. You can then export the<br />
results into an excel spreadsheet that you can then modify to suit your needs. Using this one in conjunction<br />
with Google Squared helps fill in the blanks. http://www.google.com/squared<br />
Google News Timeline is a web application that organizes information chronologically. It allows users<br />
to view news and other data sources on a zoomable, graphical timeline. You can navigate through time by<br />
dragging the timeline, setting the "granularity" to weeks, months, years, or decades, or just including a time<br />
period in your query (ie. "1977"). I queried MS-13 and was amazed at the results. Went back to 1996 and was<br />
able to do some raw trend analysis. Did the same thing with “California Gangs”. It will take patience.<br />
Available data sources include recent and historical news, scanned newspapers and magazines, blog posts<br />
and Twitter status messages, sports scores and various types of media like music albums and movies.<br />
Using this one in conjunction with Google Squared helps fill in the blanks.<br />
http://newstimeline.googlelabs.com/<br />
Maltego is an open source intelligence and forensics application. It will offer you timous mining<br />
and gathering of information as well as the representation of this information in a easy to understand<br />
format. Coupled with its graphing libraries, Maltego allows you to identify key relationships between<br />
information and identify previously unknown relationships between them. http://www.paterva.com/web5/<br />
ORA is a dynamic meta-network assessment and analysis tool developed by CASOS at Carnegie<br />
Mellon. It contains hundreds of social network, dynamic network metrics, trail metrics, procedures for<br />
grouping nodes, identifying local patterns, comparing and contrasting networks, groups, and individuals<br />
from a dynamic meta-network perspective. *ORA has been used to examine how networks change<br />
through space and time, contains procedures for moving back and forth between trail data (e.g. who was<br />
where when) and network data (who is connected to whom, who is connected to where …), and has a<br />
variety of geo-spatial network metrics, and change detection techniques. *ORA can handle multi-mode,<br />
multi-plex, multi-level networks. It can identify key players, groups and vulnerabilities, model network<br />
changes over time, and perform COA analysis. It has been tested with large networks (106 nodes per 5<br />
entity classes).Distance based, algorithmic, and statistical procedures for comparing and contrasting<br />
networks are part of this toolkit. http://www.casos.cs.cmu.edu/projects/ora/<br />
Computational Models and Social Network Tools<br />
131
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
http://www.casos.cs.cmu.edu/computational_tools/tools.html<br />
RFFlow is a powerful, yet easy to use, tool for drawing flowcharts, organization charts, and many<br />
other kinds of diagrams. You will quickly create professional-looking charts for documents, presentations,<br />
or the Web. 30 day free trial period; $49.00 thereafter for individual. http://rff.com/<br />
The Brain Simply type in your ideas. Drag and drop files and web pages. Any idea can be linked<br />
to anything else. Using your digital Brain is like cruising through a Web of your thinking. See new<br />
relationships. Discover connections. Go from the big picture of everything to a specific detail in seconds<br />
http://www.thebrain.com/<br />
Analysis Of Competing Hypotheses (ACH), Analysis of Competing Hypotheses is a simple model<br />
for how to think about a complex problem. It takes you through a process for making a well-reasoned,<br />
analytical judgment. It is particularly useful for issues that require careful weighing of alternative<br />
explanations of what has happened, is happening, or is likely to happen in the future. It helps you<br />
overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence analysis<br />
so difficult. ACH is grounded in basic insights from cognitive psychology, decision analysis, and the<br />
scientific method. It helps analysts protect themselves from avoidable error and improve their chances of<br />
making right calls. A free download. http://www2.parc.com/istl/projects/ach/ach.html<br />
SPY (spy can listen in on the social media conversations you're interested in. What do you want<br />
to listen for?) http://www.spy.appspot.com/<br />
Spokeo (not your grandmas phone book) http://www.spokeo.com/<br />
Silobreaker (for those familiar with Analyst Notebook, I think you’ll like this)<br />
http://www.silobreaker.com/<br />
Evolution (It has applications in forensic investigations, law enforcement, intelligence<br />
operations, identity fraud, and identity verification processes). Download the free community edition. It is<br />
not as powerful as the commercial version, which is also very expensive, but has great utility when used<br />
in conjunction with other free sites like Silobreaker. http://www.paterva.com/web2/<br />
A Periodic Table of Visualization Methods (If you've ever wondered how to model something, or<br />
were looking for new ideas for segmenting and presenting complex concepts, this is an incredible online<br />
resource. A neat graphical explanation and example of each "element" (ex; a cycle diagram) appears as<br />
soon as your cursor scrolls over them. For instance, they've color-coded their categories: data, metaphor,<br />
concept, strategy, information, and compound visualisation techniques. As if that were not enough to<br />
spark your brain, the creators also provide clues as to whether the model works best for convergent or<br />
divergent thinking, and whether it is more for an overview vs. detailed perspective.)<br />
http://www.visual-literacy.org/periodic_table/periodic_table.html<br />
Sentinel Visualizer (for those of you who have experience with Crime <strong>Link</strong> and Analyst Notebook<br />
this one should be quite interesting. You can download a 45-day fully functional with all the bells and<br />
whistles copy and take it for a spin, and at the same time train yourself to use the software. It may come<br />
in handy down the road and you can always say you know how to use it) http://www.fmsasg.com/<br />
The Best Ever Freeware Utilities http://www.techsupportalert.com/<br />
Ideas Worth Spreading: Imagine what the open source analyst has at his/her disposal with this<br />
type of technology. View the video and see what I mean http://www.ted.com/index.php/talks/view/id/129<br />
Free Antivirus And Spyware Software http://free.grisoft.com/doc/5390/us/frt/0<br />
Want Your Own Blog? It’s Easy. It’s Free https://www.blogger.com/start<br />
http://wordpress.com/<br />
TOR Anonymizer http://www.torproject.org/<br />
Images (convert 2D to 3D online for free) The 3D face reconstruction may have utility if you only<br />
have a frontal face shot of a suspect.<br />
http://sourcesandmethods.blogspot.com/2008/02/convert-2d-to-3d-online-for-free.html<br />
http://make3d.stanford.edu/<br />
132
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Semantics – in a nutshell, the study of words. Great site of 302 semantic web videos and<br />
podcasts. http://www.semanticfocus.com/blog/entry/title/302-semantic-web-videos-and-podcasts/<br />
NNDB Mapper (a visual tool for exploring the connections between people in NNDB, linking them<br />
together through family relations, corporate boards, movies and TV, political alliances, and shadowy<br />
conspiracy groups. Maps can be saved and shared for others to explore.) http://www.nndb.com/<br />
Generate Maps of the Blogosphere (Generate animated clickable maps of connected blogs from<br />
Blogger . Simply enter the URL of a blog website to start mapping.<br />
http://www.lococitato.com/blogger_map/blogger_map.html<br />
http://www.lococitato.com/<br />
TouchGraph Google Browser (The touch graph google browser reveals the network of<br />
connectivity between websites, as reported by Googles database of related websites)<br />
http://www.touchgraph.com/TGGoogleBrowser.html<br />
SquidMat (The program compares two or more courses of action based on two or more<br />
evaluation criteria. The user arranges the evaluation criteria in descending order of importance and tells<br />
the program how much more important each criterion is than the next lower criterion. These importance<br />
ratings are used to calculate weights for each criterion. SquidMat takes user-supplied values for each<br />
course-of-action/criterion combination and converts them to Z scores. Using the criterion weights, the<br />
program calculates weighted sums for each course of action. The course of action with the highest<br />
weighted sum is considered to be the best. http://faculty.tamu-commerce.edu/jmstauffer/Squidmat/<br />
Decision Matrix Software Download http://www.dcswift.com/military/software.html<br />
NNDB Tracking the Entire World. Not sure if this one has any utility but I throw it in for your<br />
perusal. I had fun with Fidel Castro, Hugo Chavez and Vladimir Putin. NNDB is an intelligence aggregator<br />
that tracks the activities of people we have determined to be noteworthy, both living and dead.<br />
Superficially, it seems much like a "Who's Who" where a noted person's curriculum vitae is available (the<br />
usual information such as date of birth, a biography, and other essential facts.). But it mostly exists to<br />
document the connections between people, many of which are not always obvious. A person's otherwise<br />
inexplicable behavior is often understood by examining the crowd that person has been associating with.<br />
http://www.nndb.com/<br />
Visualization Software: Analysts are great when it comes to understanding relationships. Visual<br />
results jump right at you. If they can query a search engine that produces results in a relational (visual)<br />
format, they immediately grasp the information and start drawing conclusions. Visual results are more<br />
appealing than endless lists of browsing results which are extremely time consuming even when doing<br />
key word searches.<br />
Viewzi is a metasearch engine. It searches not only Google and Yahoo, but also Flickr, YouTube<br />
and other great sources of information to present the search results blended in different “flavors”. You not<br />
only get one, but seemingly countless ways to view your search results, each using thubmnail images,<br />
screenshots and more as visual aids http://www.viewzi.com/<br />
NeXplore lets you choose between three ways of viewing search results. For starters, there is the<br />
regular list of web search results: Title, description and URL. But you get much more than that. Thumbnail<br />
images and pop-up previews which make it easier to browse the search result and decide which to click.<br />
http://www.nexplore.com/<br />
TouchGraph http://touchgraph.com/TGGoogleBrowser.html<br />
Quintura http://quintura.com/<br />
Steganography and Terrorists<br />
Steganography is the science of writing hidden messages in such a way that no one apart from<br />
the sender and intended recipient even realizes there is a hidden message.<br />
Sunday, July 31, 2011<br />
In 2010 Moscow communicated with a ring of alleged spies in America by encoding instructions in<br />
otherwise innocent-looking images on public websites. It’s a process called steganography.<br />
Steganography is a smart way to hide data into other files, called carriers. Modified carriers will look like<br />
133
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
the original ones, without perceptible changes. The advantage of steganography, over cryptography<br />
alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages will<br />
arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.<br />
Today we can use some free tools to create covert transmission for any sensitive data or to protect your<br />
copyright.<br />
Protecting files copyright is by using Watermarking which is the process of embedding information into a<br />
digital signal which may be used to verify its authenticity or the identity of its owners. Still images, video,<br />
music, text, and software are all easily copied and illegally distributed, causing the authors to lose out on<br />
considerable income in royalties.<br />
By embedding identifying information in a file, watermarking software enables authors to control the<br />
distribution of and to verify ownership of their digital information.<br />
The first tool is <strong>Open</strong>Puff a freeware steganography tool for Microsoft Windows created by Cosimo<br />
Oliboni and still maintained as independent software author.<br />
The program is notable for being the first steganography tool (version 1.01 released on December 2004)<br />
that:<br />
� Let’s users hide data in more than a single carrier file. When hidden data are split among a set of<br />
carrier files you get a carrier chain, with no enforced hidden data theoretical size limit (256Mb,<br />
512Mb… depending only on the implementation)<br />
� Implements 4 layers of hidden data obfuscation (cryptography, scrambling, whitening and<br />
encoding)<br />
� Extends deniable cryptography into deniable steganography<br />
The current version is <strong>Open</strong>Puff 3.40 and released on the 18th of July.<br />
Another interesting tool is QuickStego which lets you hide text in pictures so that only other users of<br />
QuickStego can retrieve and read the hidden secret messages.<br />
Once text is hidden in an image the saved picture is still a ‘picture’, it will load just like any other image<br />
and appear as it did before.<br />
The image can be saved, emailed, uploaded to the web as before, the only difference will be that it<br />
contains hidden text<br />
QuickStego Software Free Steganography Software by QuickCrypto<br />
http://quickcrypto.com/free-steganography-software.html<br />
https://www.infosecisland.com/blogview/15439-<br />
Steganography-and-Digital-Watermarking-Tools.html<br />
Steganography & Digital Watermarking - Information Hiding http://www.jjtc.com/Steganography/<br />
What is Steganography? http://www.stegoarchive.com/<br />
OutGuess http://www.outguess.org/<br />
Bin Laden: Steganography Master? http://www.wired.com/news/politics/0,1283,41658,00.html<br />
Steganography Software http://www.securekit.com/<br />
Terrorists Use of Steganography http://www.brendastardom.com/arch.asp?ArchID=48<br />
Steganography: A New Age of Terrorism<br />
http://www.giac.org/practical/GSEC/Stephanie_Betancourt_GSEC.pdf<br />
Did The Hijackers Hide Their Messages? http://www.y2k.msnbc.com/id/3067670/<br />
Steganography: High-Tech Hidden Messages<br />
http://enterprisesecurity.symantec.com/article.cfm?articleid=1314&PID=11610559&EID=0<br />
134
Sudan<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
When a Picture Is Worth a Thousand Secrets: The Debate Over Online Steganography<br />
http://www.benton.org/publibrary/digitalBeat/db103101.html<br />
Steganography for Dummies http://www2.cio.com/research/security/edit/a08012006.html<br />
Conference Papers http://www.jjtc.com/stegdoc/stegdoc.html<br />
Hide And Encrypt Your Files http://www.makeuseof.com/tag/become-a-secret-steganographer/<br />
http://www.makeuseof.com/tag/2-ways-to-hide-porn-important-folders/<br />
Eyes On Darfur http://eyesondarfur.org/index.html<br />
Suicide Bombers<br />
Understanding Suicide Terrorism http://www.interdisciplines.org/terrorism/papers/1<br />
http://www.interdisciplines.org/terrorism<br />
The Cult Of The Suicide Bomber<br />
http://www.independent.co.uk/news/fisk/robert-fisk-the-cult-of-the-suicide-bomber-795649.html<br />
Profiling Islamic Suicide Terrorists http://www.cpt-mi.org/pdf/profiling_arab_terr.pdf<br />
The Face of Terror: Confessions of a Failed Suicide Bomber (video)<br />
http://newsweek.washingtonpost.com/postglobal/islamsadvance/2008/03/suicide_bomber_interview_afgh<br />
anistan.html<br />
Muslim Female Fighters: An Emerging Trend<br />
http://www.jamestown.org/terrorism/news/article.php?articleid=2369824<br />
Female Suicide Bombers http://english.aljazeera.net/NR/exeres/F420CC21-<br />
DF4B-4DF6-AFCC-61C27FBBE851.htm?FRAMELESS=true&NRNODEGUID=%7bF420CC21-DF4B-<br />
4DF6-AFCC-61C27FBBE85<br />
http://www.youtube.com/watch?v=eSpH0wtwRzs<br />
http://www.youtube.com/watch?v=Up1yxJv8IkI<br />
Suicide Bomber Profile<br />
Following is a checklist for observing, reporting, responding and investigating suicide bombing incidents.<br />
It is not designed as a comprehensive or complete list of all considerations in these areas but is<br />
suggestive of the types of common concerns that may affect police and other emergency service<br />
responders. A noted authority on terrorism states that Israeli authorities and psychologists have carefully<br />
developed behavioral profiles that might help security personnel identify a potential suicide bomber. The<br />
following are among the most obvious signs of such persons according to this source.<br />
• The wearing of heavy clothing, no matter what the season. Long coats or skirts may be used to conceal<br />
explosive belts and devices.<br />
• An unusual gait, especially a robotic walk. This could indicate someone forcing or willing himself/herself<br />
to go through with a mission.<br />
• Tunnel vision. The bomber often will be fixated on the target and for that reason will look straight ahead.<br />
He or she also may show signs of irritability, sweating, tics, and other nervous behavior. (The Al Qaeda<br />
terrorist Ahmed Ressam, who was captured at a border crossing in Washington state while driving a car<br />
135
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
filled bomb-making materials, caught the attention of authorities because of his excessive sweating,<br />
furtive eyes, and other nervous movements.)<br />
• The appearance of being drugged. The suicide truck bomber who attacked the U.S. Marine Barracks in<br />
Beirut in 1983 had been drugged before the attack and was tied to the seat of his vehicle.<br />
• Signs of drug use - including, for example, enlarged pupils, fixed stare, and erratic behavior.<br />
• Bags or backpacks (used to carry explosives, nails, and other shrapnel). The bomber generally holds his<br />
or her bag or backpack tightly, sometimes gingerly, and may refuse to be separated from it.<br />
• A fresh shave—a male with a fresh shave and lighter skin on his lower face may be a religious Muslim<br />
zealot who has just shaved his beard so as not to attract attention, and to blend in better with other<br />
people in the vicinity.<br />
• A hand in the pocket or tightly gripping something—this could be someone clutching a detonator or a<br />
trigger for an explosive device. Such triggers, which may be designed in the form of button, usually are<br />
rather stiff so that they may not be set off accidentally. (One Israeli acquaintance described how he and<br />
several guards shot a would-be bomber numerous times, but found his twitching finger still on the<br />
button—and still posing a danger, thereafter.)<br />
• Evasive movements. It seems obvious that anyone who tries to avoid eye contact, or to evade security<br />
cameras and guards, or who appears to be surreptitiously conducting surveillance of a possible target<br />
location, may be a bomber.<br />
Such profiles are valuable not only for law enforcement personnel but for all persons who work in security<br />
or related fields in facilities or other locations that are potential targets or, where intelligence indicates an<br />
elevated risk of a terrorist attack. Programs throughout the United States have successfully recruited key<br />
personnel within the community to act as additional eyes and ears for law enforcement. Mall security<br />
officers for example have been introduced to the above type of profile information in order to more<br />
effectively spot potential terrorist threats. Similarly, community outreach programs provided training to<br />
other persons who are in positions where they are more likely to interact with terrorist cells or operatives,<br />
such as car rental agents, truck rental agents, security storage operators, hotel and motel managers,<br />
school and hospital security officers, and related persons.<br />
Questions<br />
1. Which of the following statements is false?<br />
(a) Suicide bombing attempts have not yet been made within the United States.<br />
(b) Most of what we know presently about suicide bombings has come from experiences<br />
overseas in Israel and Iraq.<br />
(c) A major disadvantage of suicide bombers on foot is the limited amount of explosives<br />
that they can reasonably conceal and carry.<br />
(d) A major advantage of suicide bombers on foot is that they can penetrate targets<br />
not otherwise available to motor vehicles.<br />
2. Which of the following statements is false?<br />
(a) The main advantage of vehicular suicide bombers is the ability to carry large<br />
explosive payloads.<br />
(b) Bloodborne pathogens can be delivered by suicide bombers.<br />
(c) Suicide bombers can and have penetrated heavily fortified compounds.<br />
(d) None of the above is false.<br />
136
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
3. Which of the following statements is false?<br />
(a) Suicide bombers often target location where large numbers of persons gather.<br />
(b) In the preincident phase, surveillance of a target is often performed.<br />
(c) Most commonly, suicide bombers are unmarried males between 16 and 40<br />
years of age.<br />
(d) Females have not been used for suicide bombings.<br />
Answers<br />
1. (a) Suicide bombing attempts have been made within the United States.<br />
2. (d) None of the statements is false.<br />
3. (d) Females have been used as suicide bombers.<br />
Suspicious Packages<br />
How to Handle Suspicious Mail<br />
What constitutes a suspicious letter or parcel? Some typical characteristics which ought to trigger<br />
suspicion include letters or parcels that:<br />
� Have any powdery substance on the outside.<br />
� Are unexpected or from someone unfamiliar to you.<br />
� Have excessive postage, handwritten or poorly typed address, incorrect titles or titles with no<br />
name, or misspellings of common words.<br />
� Are addressed to someone no longer with your organization or are otherwise outdated.<br />
� Have no return address, or have one that can't be verified<br />
as legitimate.<br />
� Are of unusual weight, given their size, or are lopsided or<br />
oddly shaped.<br />
� Have an unusual amount of tape.<br />
� Are marked with restrictive endorsements, such as<br />
"Personal" or "Confidential."<br />
� Have strange odors or stains.<br />
137
Taiwan<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Military Air Bases And Airports http://eyeball-series.org/tw-bases/tw-bases.htm<br />
Cimei Township<br />
Hsinchu Airport<br />
Hualien City<br />
Husi Township<br />
Husi Township 2<br />
Linluo Township North<br />
Linluo Township South<br />
Mituo Township<br />
Quemoy Island<br />
Shueishang Township<br />
Situn District<br />
Song Sang Airport<br />
Taichung Airport<br />
Tainan Airport<br />
Taitung City<br />
Taitung City Military<br />
138
Taliban<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Taiwan International<br />
Taiwan International Military<br />
Wang An Township<br />
Wu Liting Hengchun Airport<br />
All Taliban News<br />
http://topics.nytimes.com/top/reference/timestopics/organizations/t/taliban/index.html<br />
Behind Taliban Lines http://www.pbs.org/wgbh/pages/frontline/talibanlines/etc/links.html<br />
Long War Journal http://www.longwarjournal.org/<br />
Taliban presence, by district and tribal agency, in the Northwest Frontier Province and the<br />
Federally Administered Tribal Agencies, and in some districts in Punjab and Baluchistan.<br />
http://www.longwarjournal.org/maps.php<br />
Taliban Code Of Conduct FOUO (requires password access to Intelink)<br />
https://www.intelink.gov/wiki/Taliban_Code_of_Conduct<br />
Analysis of The Taliban Code of Conduct FOUO<br />
https://www.intelink.gov/wiki/Taliban_Code_of_Conduct<br />
http://www.nps.edu/Programs/CCS/index.html<br />
Technology Theft/Transfer<br />
Technology Magazines http://www.world-newspapers.com/technology.html<br />
Economic And Competitive <strong>Intelligence</strong> http://www.loyola.edu/dept/politics/ecintel.html<br />
Terrorism (includes eco-terrorism)<br />
Terrorism and Political Violence Threat Map 2011 (great interactive map)<br />
http://www.aon.com/risk-services/political-riskmap2/map/Interactive_Risk_Map/2011_Terrorism_Political_Violence_Map/index.html<br />
Action Against Terrorism http://www.coe.int/t/dlapil/codexter/default_en.asp<br />
National Counterterrorism Center http://www.nctc.gov/site/other/wits.html<br />
Worldwide Incidents Tracking System https://wits.nctc.gov/FederalDiscoverWITS/index.do?N=0<br />
Tactics of Eco-Terrorists to Thwart Cops (U/LES) http://cryptome.org/0003/fbi-ecoterrorism.pdf<br />
Country Reports on Terrorism 2009, August 2010<br />
http://www.state.gov/documents/organization/141114.pdf<br />
Terrorism Tracker https://www.terrorismtracker.com/index.php<br />
Terrorist Groups Interactive Map http://www.nctc.gov/site/map/map.html<br />
Terrorist Website Search Engine (kind of dated but still fulfills a requirement)<br />
http://www.google.com/cse/home?cx=012389276654712134826%3Amiiykhqamla<br />
Tracking The Threat http://www.trackingthethreat.com/<br />
Terrorism World http://terrorismworld.com/<br />
Fact Sheets On Terrorist Attacks (The National Academies has prepared, in cooperation with the<br />
Department of Homeland Security, fact sheets on five types of terrorist attacks. Drawing on our many<br />
reviewed publications, the expertise of our members, and the knowledge of other esteemed authorities,<br />
the fact sheets provide reliable, objective information.)<br />
http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks.aspx<br />
Terrorism<br />
https://www.intelink.gov/sharepoint/osp/Terrorism%20<strong>OSINT</strong>%20Products/Forms/AllItems.aspx<br />
139
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Country Reports On Terrorism 2008 http://www.state.gov/documents/organization/122599.pdf<br />
Terrorist Recognition Handbook 2d Edition<br />
http://www.dmos.info/eng/Terrorist%20Recognition%20Handbook.pdf<br />
Map of Worst Terrorist Attacks Worldwide<br />
http://www.johnstonsarchive.net/terrorism/globalterrorism1.html<br />
Terrorist And Criminal Attacks Targeting Children<br />
http://www.johnstonsarchive.net/terrorism/wrjp39ch.html<br />
<strong>Global</strong> Terrorism Analysis<br />
http://www.jamestown.org/terrorism/news/article.php?articleid=2369824<br />
<strong>Global</strong> Terrorism Database http://www.start.umd.edu/data/gtd/<br />
Office of Anti-Terrorism Assistance http://www.diplomaticsecurity.org/<br />
Terrorism http://www.users.fl.net.au/~nds/terror.html<br />
http://www.cdi.org/program/index.cfm?programid=39<br />
http://www.nsi.org/terrorism.html<br />
http://www.awesomelibrary.org/Classroom/Social_Studies/Terrorism/Terrorism.html<br />
War on Terrorism Resource Guides http://personal.ecu.edu/durantd/wot/index.html<br />
International Law Terrorism http://www.un.int/usa/terror.htm<br />
Implementing international action against terrorism http://www.unodc.org/unodc/terrorism.html<br />
UN Action Against Terrorism http://www.un.org/terrorism/<br />
The World's Most Wanted Terrorists http://www.mostwanted.org/Terrorists.html<br />
http://www.fbi.gov/mostwant/terrorists/fugitives.htm<br />
Terrorism Research Center http://www.terrorism.com/<br />
Terrorism Portal http://www.theterrorismportal.com/<br />
Terrorism Resources http://library.nps.navy.mil/home/tgp/tgpndx.htm<br />
http://library.nps.navy.mil/home/tgp/tgp2.htm<br />
http://www.ceip.org/files/projects/npp/resources/terrorism.htm<br />
Terrorist Financing http://www1.oecd.org/FATF/TerFinance_en.htm<br />
War on Terrorism Latest News http://www.terrorismfiles.org/<br />
Terrorism/Counterterrorism Web <strong>Link</strong>s http://www.usip.org/library/topics/terrorism.html<br />
Terrorism Questions and Answers http://www.terrorismanswers.org/home/<br />
http://cfrterrorism.org/thisweek/<br />
http://cfrterrorism.org/index/<br />
Terrorism Disasters http://www.disasters.org/emgold/Terrorism.htm<br />
Terrorism and Terrorists http://jurist.law.pitt.edu/terrorism/terrorism1.htm<br />
Terrorism, Anti-Terrorism, Taliban and Afghanistan <strong>Link</strong>s<br />
http://www.windweaver.com/politics/terrorism.htm<br />
Terrorism 2004 http://www.au.af.mil/au/aul/bibs/terrornew/terrorism.htm<br />
South Asia Terrorism Portal http://www.satp.org/<br />
Terrorism and Homeland Security http://www.rand.org/research_areas/terrorism/<br />
WWW Sites related to Terrorism http://www.sima.co.at/terror.htm<br />
http://www.jmu.edu/orgs/wrni/links.html<br />
http://www.blkbox.com/~guillory/terr.html<br />
Patterns of <strong>Global</strong> Terrorism http://www.mipt.org/Patterns-of-<strong>Global</strong>-Terrorism.asp<br />
International <strong>Global</strong> War on Terrorism http://www.au.af.mil/au/awc/awcgate/cps-terr.htm<br />
Terror Analysis http://www.terroranalysis.com/<br />
Comprehensive Guide to International Terrorist Organizations<br />
http://www.specialoperations.com/Terrorism/SOCGuide/Default.htm<br />
Terrorist Group Profiles<br />
http://www.specialoperations.com/Terrorism/Terrorist_Groups/Default.htm<br />
Terrorism Knowledge Base http://www.tkb.org/Home.jsp<br />
A Military Guide To Terrorism In The 21 st Century<br />
http://www.au.af.mil/au/awc/awcgate/army/guidterr/<br />
Terror Group Emblems http://www.osis.gov/docs/TerrorGroupEmblems.pdf<br />
Fighting Terror http://www.cnn.com/SPECIALS/2004/fighting.terror/index.html<br />
140
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Terrorism Unveiled http://athena.blogs.com/athena/<br />
<strong>Global</strong> Terrorr Alert http://www.globalterroralert.com/<br />
Guide to Research Terrorism and Insurgency<br />
http://www.library.georgetown.edu/guides/terrorism/<br />
http://www.library.georgetown.edu/guides/right.htm#int<br />
Terrorism Database Project http://www.rand.org/ise/projects/terrorismdatabase/<br />
Terrorist Attacks and Organizations<br />
http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/<br />
Terrorism Research http://www.washburn.edu/faculty/aschbley/publications.html<br />
Nuclear Terrorism http://www.nci.org/nci-nt.htm<br />
http://www.nuclearterrorism.org/<br />
http://www.fas.org/irp/crs/RL32595.pdf<br />
What If Terrorists Go Nuclear http://www.cdi.org/terrorism/nuclear.cfm<br />
Targeting The Threat (TrackingTheThreat.com is a database of open source information about<br />
the Al Qaeda terrorist network and you can search the database by terrorist name)<br />
http://www.trackingthethreat.com/index.jsp<br />
Tracking The Terror http://www.cnn.com/US/tracking.terror/archive/<br />
<strong>Global</strong> Terrorism Analysis http://www.jamestown.org/terrorism/<br />
http://www.jamestown.org/terrorism/archives.php?publication_id=9<br />
South Asia Terrorism Updates http://www.satp.org/<br />
Interactive United States/Afghanistan War Machine<br />
http://www.satp.org/satporgtp/usa/Osama.htm#<br />
South Asia Conflict Map http://www.satp.org/satporgtp/southasia/images/Conflict_Map.pdf<br />
Geography Of Terrorism http://www.yourdictionary.com/library/terror.html#geography<br />
Searchable Terrorism Knowledge Database http://www.tkb.org/AdvancedSearch.jsp<br />
Jihadi and Islamist Activities on MySpace.com http://www.nbcnco.com/MySpaceJihad.pdf<br />
A Picture Speaks A Thousand Words http://www.st-andrews.ac.uk/~ilr/emblems/index.html<br />
Terrorism Focus http://jamestown.org/terrorism/news/uploads/tf_002_015.pdf<br />
<strong>Global</strong> Terrorism Analysis http://jamestown.org/terrorism/archives.php?publication_id=15<br />
Terrorism and Crime Studies http://www.loc.gov/rr/frd/terrorism.html<br />
Gobs And Gobs Of Terrorism <strong>Link</strong>s http://library.nps.navy.mil/home/terrorism.htm<br />
World Conflict Quarterly (News, Analyis and Articles on Terrorists & Terrorism)<br />
http://www.globalterrorism101.com/<br />
http://www.globalterrorism101.com/UnderstandingTerrorismSummary.html<br />
How Modern Terrorism Uses The Internet http://www.usip.org/pubs/specialreports/sr116.pdf<br />
Terrorism Archived Records http://rantburg.com/thugburg.php?ORGEX=Al-Qaeda<br />
Congressional Research Service Reports on Terrorism<br />
http://www.fas.org/sgp/crs/terror/index.html<br />
South Asia Terrorism Portal http://www.satp.org/<br />
Combatting Terrorism Center At West Point http://www.ctc.usma.edu/atlas/default.asp<br />
Cross Border Financing http://www.fincen.gov/cross_border/CBFTFS_Complete.pdf<br />
Terrorist Selection And Recruitment http://www.rand.org/pubs/reprints/2006/RAND_RP1214.pdf<br />
Beyond Al Qaeda Parts 1 & 2 http://www.rand.org/pubs/monographs/2006/RAND_MG429.pdf<br />
http://www.rand.org/pubs/monographs/2006/RAND_MG430.pdf<br />
Terrorism And Homeland Security: Documents Available Online<br />
http://www.rand.org/pubs/online/terrorism/index.html<br />
Breaching The Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive<br />
Technologies http://www.rand.org/pubs/monographs/2007/RAND_MG481.pdf<br />
Terrorist Organizations http://www.terrorist-organizations.com/<br />
A Look At The History Of Suicide Attacks<br />
http://www.npr.org/templates/story/story.php?storyId=4760240&sc=emaf<br />
MIPT Terrorism Knowledge Base http://www.tkb.org/Home.jsp<br />
EU Terorrism Situation and Trend Report http://cryptome.org/eu-terrorism.pdf<br />
International Terrorist Symbols Database http://www.adl.org/terrorism/symbols/default.asp<br />
The Islamic Imagery Project: Visual Motifs In Jihadi Internet Propaganda<br />
http://www.ctc.usma.edu/CTC%20--%20Islamic%20Imagery%20Project.pdf<br />
141
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Study Of Terrorism And Response To Terrorism (START) The <strong>Global</strong> Terrorism Database (GTD)<br />
is an open-source database including information on terrorist events around the world since 1970<br />
(currently updated through 2004). Unlike many other event databases, the GTD includes systematic data<br />
on international as well as domestic terrorist incidents that have occurred during this time period and now<br />
includes almost 80,000 cases. For each GTD incident, information is available on the date and location of<br />
the incident, the weapons used and nature of the target, the number of casualties, and -- when<br />
identifiable -- the identity of the perpetrator. http://www.start.umd.edu/data/gtd/<br />
Terrorism General Resources http://c21.maxwell.af.mil/terrorsm.htm<br />
Library Websites On Terrorism And Homeland Security<br />
http://www.library.uiuc.edu/doc/godort/terrorism.htm<br />
Google <strong>Directory</strong> Of Terrorism <strong>Link</strong>s http://directory.google.com/Top/Society/Issues/Terrorism/<br />
Transportation Terrorism <strong>Directory</strong><br />
http://www.siql.com/security/terrorism/transportation_terrorism.htm<br />
Everything Terrorism: Counterterrorism <strong>Directory</strong><br />
http://www.siql.com/security/terrorism/counterterrorism.htm<br />
Osama Bin Laden <strong>Directory</strong> http://www.siql.com/security/terrorism/Osama_bin_Laden.htm<br />
South Asia Terrorism Portal http://www.satp.org/<br />
Terrorism Online http://www.slais.ubc.ca/courses/libr500/04-05-wt1/www/m_au/index.htm<br />
Terrorism News And Media<br />
http://www.kinghost.com.br/diretorio/Society/Issues/Terrorism/News_and_Media/<br />
The Investigative Project On Terrorism http://www.investigativeproject.org/<br />
The Terrorist Network In America 1991-2007 http://www.investigativeproject.org/maps.php<br />
Groups And Networks, Individual Terrorists, Apologists or Extremists, Terrorist Organizations And<br />
Other Groups Of Concern http://www.investigativeproject.org/profile/all/<br />
Terrorism Cases http://www.investigativeproject.org/cases.php<br />
The Investigative Project On Terrorism Audi And Video Clips<br />
http://www.investigativeproject.org/multimedia.php<br />
2005 Terrorism Risk Map http://folk.uio.no/erikro/WWW/corrgr/insurance/terrorismMap.pdf<br />
Terrorism Threat Map 2007<br />
http://www.aon.com/se/se/attachments/Aon%20Terrorism%20map%202007.pdf<br />
Terrorism News (News on Terrorism continually updated from thousands of sources around the<br />
net.) http://www.topix.com/news/terrorism<br />
Terrorism 2002-2005 http://www.fbi.gov/publications/terror/terrorism2002_2005.pdf<br />
Terrorist Recognition Cards http://www.dia.mil/site6_images/cards/index.htm<br />
Rewards For Justice http://www.rewardsforjustice.net/<br />
Wanted Terrorists<br />
http://www.rewardsforjustice.net/index.cfm?page=Wanted_Terrorist&language=english<br />
<strong>Link</strong>s To War On Terror http://www.copleydc.com/cns_links/cns_links_terrorism.htm<br />
Rogues Gallery http://www.rantburg.com/rogues_gallery.php<br />
The <strong>Intelligence</strong> and Terrorism Information Center<br />
http://www.terrorism-info.org.il/site/home/default.asp<br />
Terrorism News (News on Terrorism continually updated from thousands of sources around the<br />
net.) http://www.topix.net/news/terrorism<br />
Terrorism Funding<br />
Terrorism Financing in Saudi Arabia (in Arabic) http://cryptome.org/0002/gao-11-190.zip<br />
http://www.gao.gov/products/GAO-09-883<br />
http://www.gao.gov/new.items/d09883.pdf<br />
Counterterrorism Blog<br />
http://counterterrorismblog.org/2010/09/getting_a_better_handle_on_ter.php<br />
Intel – Terrorism Funding http://werzit.com/intel/terrorism/funding/<br />
142
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
A Banking System Built For Terrorism<br />
http://web.archive.org/web/20041226110228/http://www.ci-cect.com/article/showquestion.asp?faq=3&fldAuto=1393<br />
http://web.archive.org/web/20041210150855/www.ci-ce-ct.com/article/showfaq.asp?fldAuto=3<br />
Hawala Money Laundering<br />
http://www.interpol.int/Public/FinancialCrime/MoneyLaundering/hawala/<br />
http://repositories.cdlib.org/imbs/socdyn/sdeas/vol1/iss2/art6/<br />
Protecting Charitable Organizations<br />
http://www.treas.gov/offices/enforcement/key-issues/protecting/fto.shtml<br />
Terrorist Targets<br />
Potential Terrorist Attack Methods<br />
http://info.publicintelligence.net/PotentialTerroristAttackMethods.pdf<br />
Threat to Critical Infrastructure http://fas.org/irp/threat/terrorism/sup2.pdf<br />
Worship Places (FOUO) http://cryptome.org/worship-sec.pdf<br />
Gambling Places (FOUO) http://cryptome.org/gamble-sec.pdf<br />
Critical Infrastructure Protection<br />
http://www.eei.org/industry_issues/energy_infrastructure/critical_infrastructure_protection/<br />
Prototypes for Targeting America: A Soviet Assessment<br />
http://fmso.leavenworth.army.mil/fmsopubs/ISSUES/prototypes/prototypes.htm<br />
Foreign Terrorists in America http://www.fas.org/irp/congress/1998_hr/s980224c.htm<br />
Terrorist Attacks on Americans 1979-1988<br />
http://www.pbs.org/wgbh/pages/frontline/shows/target/etc/cron.html<br />
Guarding America: Security Guards and U.S. Critical Infrastructure Protection<br />
http://www.fas.org/sgp/crs/RL32670.pdf<br />
Commercial Nuclear Reactor Sites as Terrorist Targets<br />
http://www.neis.org/literature/Reports&Testimonies/Here_today_there_tomorrow_report_10-22-01.pdf<br />
Transportation and The Terrorist Threat<br />
http://www.strom.clemson.edu/opinion/whitehurst/transterror.pdf<br />
Passenger Ferries Could Be Prime Terrorist Targets<br />
http://www.transportationsec.com/ar/security_passenger_ferries_prime/index.htm<br />
Terrorists planning to assemble bombs on planes<br />
http://transportationsec.com/ar/security_terrorists_planning_assemble/index.htm<br />
Target America http://www.pbs.org/wgbh/pages/frontline/shows/target/<br />
Plan Targets Terrorist Use Of Shipping Containers<br />
http://www.newsmax.com/archives/articles/2002/6/7/52635.shtml<br />
Task Force to Bolster Security for Attractive Terrorist Targets<br />
http://www.signonsandiego.com/news/nation/terror/20040419-0736-terrorism-taskforce.html<br />
The Top 100 Terrorist Targets in the United States (if you can steer away from the political<br />
comments, it makes good for further study)<br />
http://www.lilithgallery.com/articles/terrorist_targets.html<br />
Chronology of Major Terrorist Attacks Against U.S. Targets<br />
http://www.freerepublic.com/focus/f-news/1087538/posts<br />
Thoughts on Terrorist Targets http://antiwar.com/utley/?articleid=1900<br />
Terror’s Next Target http://www.iags.org/n0111041.htm<br />
Developing Trends in Terrorist Strategy<br />
http://www.siteinstitute.org/terrorismlibrary/charts_maps/charts_maps_1103218242.pdf<br />
Mapping The Risks http://www.rand.org/pubs/monographs/2004/RAND_MG142.pdf<br />
How Terrorists Plan And Conduct An Attack On Infrastructure Targets<br />
http://www.ibtta.org/files/PDFs/bell_alan.pdf<br />
143
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Terrorist Websites<br />
(some may be quite offensive, especially the multimedia)<br />
The Jihadi Fan Club http://www.youtube.com/user/jihadifanclub<br />
Terrorist Websites, Pages Indexed: 11,700,000<br />
http://www.google.com/coop/cse?cx=012389276654712134826%3Amiiykhqamla<br />
http://clearinghouse.infovlad.net/<br />
http://www.al-ekhlaas.org/forum/<br />
http://www.atsdp.com/<br />
Radical Islamic Websites http://www.threeworldwars.com/f/radical-islamic-websites.htm<br />
The Search For International Terrorist Entities (videos of suicide bombings and attacks on U.S.<br />
Forces) http://siteinstitute.org/index.html<br />
<strong>Global</strong> Terror Alert (videos of suicide bombings and attacks on U.S. Forces) not a terrorist<br />
website but fits in this group http://www.globalterroralert.com/<br />
Terrorist Website Resources http://website-101.info/terroristwebsites/<br />
Islamic Terror Web http://uk.geocities.com/johnathanrgalt/<br />
Terrorism/Terrorist Group Websites http://members.tripod.com/spylopedia/ind-terror.htm<br />
The Battar Training Camp http://www.homelandsecurityus.com/battar7.asp#Targets<br />
Anti-Terrorism <strong>Intelligence</strong> http://atdatabase.r8.org/<br />
Jihad Online http://www.adl.org/internet/jihad_online.pdf<br />
Background on Saudi Arabia’s 26 Most Wanted<br />
http://www.siteinstitute.org/terrorismlibrary/charts_maps/charts_maps_1099422145.pdf<br />
The Iraqi Resistance (very controversial sites, you may be offended)<br />
http://www.albasrah.net/images/moqawama/index1.htm<br />
http://www.albasrah.net/<br />
Special Report http://memri.org/bin/articles.cgi?Page=archives&Area=sr&ID=SR3104<br />
A Trio of Disinformers: Islam Memo, Muhammad Abu Nasr, and Jihad Unspun<br />
http://aljazeera.com/<br />
http://www.jihadunspun.com/home.php<br />
http://www.islammemo.cc/<br />
Albasrah http://www.albasrah.net/<br />
Middle East Online http://www.middle-east-online.com/english/?id=12332<br />
The Army Of Ansar Al-Sunnah http://www.infovlad.net/mirror_alansar_alsunnah/<br />
http://online2005.100free.com/<br />
Pro Pakistani Islamic Jihad and pro Al Qaeda sites in Urdu (some also have Arabic and/or<br />
English.) http://akhbaar.jeeran.com/news004.htm<br />
http://islaminfo.50g.com/oldweb/shaheed_and_shahadaut1.htm<br />
www.almuslimoon.jeeran.com/mansoor.htm<br />
http://www.geocities.com/iqaaz_magazine/new/index.htm<br />
www.geocities.com/qadianis<br />
www.zavaj.com/i_saw_the_bodies.html<br />
www.free-webspace.biz/muwahideen/tibyaan/index.htm<br />
http://content.jeeran.com/miras_main.htm (Arabic)<br />
www.nuzool.tripod.com/naqshbandi.html<br />
http://aljihad.esmartweb.com/<br />
http://mitglied.lycos.de/muwahideen/unfolding_the_agenda.htm<br />
Jihadist Videos http://almagribi.blogspot.com/<br />
Ansar Jihad http://www.ansar-jihad.com/<br />
Camagat http://www.camagat.com/<br />
Jihad Films http://www.jihad-films.com/index.php<br />
World News Network http://www.w-n-n.net/<br />
World News Network Videos<br />
http://www.w-n-n.net/forumdisplay.php?s=a5ca51ad7ec647ce066fb6f3090d8403&f=10<br />
Pro Terrorist Hacker Web Site (The URL is linked to 9 different Arabic websites and is<br />
mentioned in 1,770 different web-pages via GOOGLE.) NOTE: Use extreme<br />
144
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
caution with this site, especially if you don’t know Arabic because it could<br />
compromise your systems. http://mooj3.jeeran.com/18hakar.htm<br />
Pro Iraqi Resistance http://www.iraqresistance.net/<br />
Palestinian Media Watch http://www.pmw.org.il/<br />
Indoctrination of Children http://www.pmw.org.il/tv%20part1.html<br />
Marketing of Terrorism Through The Internet<br />
http://www.intelligence.org.il/Eng/sib/12_04/int_m.htm<br />
http://www.intelligence.org.il/eng/eng_n/al_aqsa_e.htm<br />
Iraqi Insurgent Sniper Training http://www.military.com/ppt/iraqi_insurgent_sniper_training.htm<br />
al-Aqsa Martyrs Brigade (data on creating explosives) http://www.kataebaqsa.org/<br />
al-Bramj (how to make the highly explosive acetone peroxide) http://www.bramjnet.com/<br />
Tajdeed http://www.tajdeed.org.uk/<br />
Jihadi Du Jour http://jihadidujour.blogspot.com/<br />
Radical Islamic Websites http://www.threeworldwars.com/f/radical-islamic-websites.htm<br />
The site of the Islamic Block, Hamas' student wing http://www.alkotla.com/<br />
In The Name Of Allah, Most Gracious, Most Merciful http://bassel114.spaces.live.com/<br />
Tracerouting<br />
Geek Tools http://www.geektools.com/traceroute.php<br />
Traceroute http://www.tracert.com/cgi-bin/trace.pl<br />
http://cities.lk.net/trlist.html<br />
http://www.traceroute.org/<br />
Using Traceroute http://www.exit109.com/~jeremy/news/providers/traceroute.html<br />
Tracerouters Around The World http://nielssen.com/tracerouters/<br />
Hubble: Monitoring Internet Reachability in Real-Time http://hubble.cs.washington.edu/<br />
An Explanation Of Hubble<br />
http://www.govtech.com/gt/articles/286661?utm_source=newsletter&utm_medium=email&utm_campaign<br />
=GTEN_2008_4_15<br />
Training Resources<br />
MIT <strong>Open</strong>CourseWare (hundreds of free classes online) http://ocw.mit.edu/index.htm<br />
Introduction to <strong>Intelligence</strong> Analysis (1 to 2 Hours)<br />
Data Collection Tradeoffs (2 to 3 Hours)<br />
Critical Thinking Strategies (2 to 3 Hours)<br />
http://www.anacapatraining.com/webtraining/index.html<br />
Transportation<br />
National Transportation Library http://ntl.bts.gov/<br />
Transportation Search Engines http://ntl.bts.gov/tools/search_engines.html<br />
Bureau of Transportation Statistics http://www.bts.gov/<br />
Major Transportation Facilities of The U.S. 2009 (interactive map)<br />
http://www.bts.gov/programs/geographic_information_services/maps/major_transportation_facilities/html/<br />
map.html<br />
145
Tunnels<br />
UAVs<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Tunnels in The USA and Canada http://freespace.virgin.net/john.cletheroe/usa_can/tunnels/<br />
Tunnel <strong>Link</strong>s http://www.mysteries-megasite.com/main/bigsearch/tunnels.html<br />
New York City Tunnel No 3 http://www.water-technology.net/projects/new_york/<br />
Notable PA Railroad Tunnels http://www.railfanusa.com/pa/patunnels.html<br />
Longest Railroad Tunnels in the World http://www.robl.w1.com/Transport/tunnel.htm<br />
United States Air Force Unmanned Aircraft Systems Flight Plan 2009-2047<br />
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA505168&Location=U2&doc=GetTRDoc.pdf<br />
Flight of The Drones http://www.economist.com/node/21531433<br />
NanoEye http://www.scribd.com/doc/68542133/Nano-Eye<br />
http://defensetech.org/2011/10/12/the-armys-tiny-future-spy-satellite/<br />
Drones That Think http://www.c4isrjournal.com/story.php?F=magazine<br />
Unmanned Aircraft Systems Present & Future Capabilities http://cryptome.org/dodi/uav-future.pdf<br />
See what it’s like to fly a UAV: Welcome to the UAV pilot training program. Your mission is to<br />
locate and destroy enemy targets using AGM-114 Hellfire missiles launched from a MQ-9 Reaper.<br />
http://www.airforce.com/interactive/uav/index.html<br />
The Spy Flight Website http://www.spyflight.co.uk/main.htm<br />
The Complete UAV Field Gude http://www.popsci.com/technology/gallery/2010-02/galleryfuture-drones<br />
UAV World http://www.uavworld.com/<br />
A Worldwide Roundup http://www.aiaa.org/aerospace/Article.cfm?issuetocid=365<br />
http://www.aiaa.org/images/PDF/WilsonChart.pdf<br />
http://www.uav-info.com/pdfs/fig6_UAV-Systems_Overview.pdf<br />
UAV World http://www.uavworld.com/<br />
Photo Gallery http://www.uavforum.com/library/photo.htm<br />
Video Theater - A 5-10 Sec Video Clip Of A Featured UAV Each Month<br />
http://web.archive.org/web/20090513061222/http://www.uavforum.com/library/video.htm<br />
List of Unmanned Aerial Vehicles http://en.wikipedia.org/wiki/List_of_unmanned_aerial_vehicles<br />
Unmanned Aerial Vehicles Website <strong>Link</strong>s<br />
http://www.garmin-air-race.freeola.com/links%20listing/77.htm<br />
Drones: America’s New Air Force<br />
http://www.cbsnews.com/stories/2009/05/08/60minutes/main5001439.shtml<br />
Venezuela<br />
Venezuela Air Force http://www.aeroflight.co.uk/waf/americas/venezuela/AirForce/Venezuela-afbases.htm<br />
Military Air Bases And Airports http://eyeball-series.org/ve-mil-air/ve-mil-air.htm<br />
Aji<br />
Anaco<br />
Barcelona Air Base<br />
Barquisimeto Air Base<br />
Boca del Rio Air Base<br />
Cabruta<br />
Cabimas<br />
Caracas Air Base/International<br />
146
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Carizalles Air Base<br />
Chaparral<br />
Ciratobo<br />
Coro<br />
Ciudad Bolívar<br />
Cumaná<br />
El Vigia<br />
Guina<br />
Higuerote<br />
Inglaterra<br />
La Orchila Air Base<br />
Las Piedras<br />
La Trinidad de Orichuna<br />
La Uva<br />
Maracaibo Air Base<br />
Maturin<br />
Mayupa<br />
Ocumare del Tuy<br />
Palo Negro Air Base<br />
Pariaguán<br />
Porlamar<br />
Potrento<br />
Puerto Ayacucho Air Base<br />
Puerto Cabello<br />
Puerto Ordaz Air Base<br />
Puerto Páez<br />
San Jose de Guanira<br />
Santo Domingo Air Base<br />
Valencia<br />
ABYZ News <strong>Link</strong>s http://www.abyznewslinks.com/venez.htm<br />
Army Of Venezuela http://en.wikipedia.org/wiki/Army_of_Venezuela<br />
http://www.answers.com/topic/army-of-venezuela<br />
A Country Study http://lcweb2.loc.gov/frd/cs/vetoc.html<br />
World Of Facts http://www.worldoffacts.com/ve<br />
Visualization Tools<br />
Water Conflict<br />
Water Wars http://www.ciesin.org/docs/006-304/006-304.html<br />
http://www.ipsnews.org/africa/interna.asp?idnews=23759<br />
http://www.mideastnews.com/WaterWars.htm<br />
The Emerging Water Wars http://samvak.tripod.com/pp146.html<br />
The World’s Water http://www.worldwater.org/links.htm<br />
http://www.worldwater.org/<br />
http://www.worldwater.org/conflictIntro.htm<br />
http://www.worldwater.org/waterData.htm<br />
A World Without Water http://www.villagevoice.com/news/0234,otis,37614,1.html<br />
Water Wars in The Middle East<br />
http://www.nmhschool.org/tthornton/mehistorydatabase/waterwars.htm<br />
Water Wars Worldwide http://www.worldwaterwars.com/World/index.htm<br />
147
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Weapons Around The Globe<br />
Naval Weapons of The World http://www.navweaps.com/Weapons/index_weapons.htm<br />
World’s Deadliest Conventional Weapons http://www.foxnews.com/story/0,2933,473985,00.html<br />
World Special Weapons Guide http://www.globalsecurity.org/wmd/world/index.html<br />
Weapons Of The World Videos<br />
http://video.google.com/videosearch?hl=en&source=hp&q=weapons+of+the+world&oq=&um=1&ie=UTF-<br />
8&ei=9Th0S_j9M43QsgOt7MScBg&sa=X&oi=video_result_group&ct=title&resnum=4&ved=0CCEQqwQ<br />
wAw#<br />
Military Factory http://www.militaryfactory.com/<br />
Enemy Forces http://www.enemyforces.net/index.htm<br />
Weapons and Equipment<br />
http://directory.google.com/Top/Society/Military/Weapons_and_Equipment/<br />
http://www.canadiancontent.net/dir/Top/Society/Military/Weapons_and_Equipment/<br />
North Korean Special Weapons http://fas.org/nuke/guide/dprk/<br />
Fast Facts http://www.fas.org/asmp/fast_facts.htm<br />
Federation of American Scientists http://www.fas.org/main/home.jsp<br />
Military World http://www.militaryworld.com/dir/Armed_Forces/Weapons/<br />
Technology http://www.aeronautics.ru/technology.htm<br />
Military Factory http://www.militaryfactory.com/<br />
Worldwide Equipment Guide http://www.fas.org/man/dod-<br />
101/sys/land/row/weg.pdf#search=%22Worldwide%20Equipment%20Guide%22<br />
Rest Of The World Land Combat Systems<br />
http://www.fas.org/man/dod-101/sys/land/row/index.html<br />
World Wide Ground Combat System http://www.globalsecurity.org/military/world/links-ground.htm<br />
World Wide Missile Systems http://www.designation-systems.net/<br />
Strategy Page http://www.strategypage.com/default.asp<br />
World Wide Military http://www.worldwide-military.com/<br />
Weapons of Mass Destruction<br />
WMD https://www.intelink.gov/sharepoint/osp/WMD/Forms/AllItems.aspx<br />
Weapons of Mass Destruction <strong>Intelligence</strong> Threat Assessments<br />
http://www.fas.org/irp/threat/wmd.htm<br />
Weapons of Mass Destruction in the Middle East http://cns.miis.edu/research/wmdme/<br />
Weapons of Mass Destruction http://en.wikipedia.org/wiki/Weapons_of_mass_destruction<br />
Weapons of Mass Destruction Around The World http://www.fas.org/nuke/guide/index.html<br />
WMD Resources http://www.fas.org/nuke/<br />
WMD in ASIA http://nti.org/e_research/e3_19a.html<br />
Nuclear Threat Initiative http://nti.org/index.html<br />
Nuclear Weapons, Nuclear Warfare and WMD<br />
http://greennature.com/modules.php?op=modload&name=News&file=article&sid=1052&mode=thread&or<br />
der=0&thold=0<br />
Center for Nonproliferation Studies http://cns.miis.edu/<br />
Counter Proliferation Center http://www.au.af.mil/au/awc/awcgate/awc-cps.htm<br />
Weapons of Mass Destruction Resources http://www.extremistgroups.com/wmd.html<br />
Nuclear Control Institute http://www.nci.org/<br />
A Guide to Nuclear Weapons http://www.nuclearweaponarchive.org/<br />
Nuclear Weapons Websites http://members.tripod.com/spylopedia/ind-nukes.htm<br />
Commission on The <strong>Intelligence</strong> Capabilities of the U.S Regarding WMD<br />
http://www.wmd.gov/report/<br />
Center For Contemporary Conflict http://www.ccc.nps.navy.mil/si/<br />
148
Weather<br />
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Google Maps Weather http://googlemapsmania.blogspot.com/2011/08/google-maps-getsweather.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+GoogleMapsMani<br />
a+%28Google+Maps+Mania%29<br />
WeatherMaps/Satellite Images http://www.cnn.com/SPECIALS/2003/megastorm/<br />
Earth Station 9 Weather http://www.earthstation9.com/index.html?aircraf6.htm<br />
Intellicast Local Weather http://www.intellicast.com/LocalWeather/World/<br />
Climate and Weather http://www.lib.berkeley.edu/EART/Earth<strong>Link</strong>s.html#climate<br />
Weather Around the World http://www.mathcats.com/explore/weather.html<br />
Military Weather History http://www.srh.noaa.gov/ohx/educate/atc/history.htm<br />
Naval Pacific Meteorological and Oceanography https://207.133.112.33/<br />
National Weather Service Radar Image<br />
http://www.crh.noaa.gov/radar/loop/DS.p37cr/si.keax.shtml<br />
Internet Weather <strong>Source</strong> http://weather.noaa.gov/<br />
The World of Weather http://www.tec.army.mil/weather/customize.html<br />
Weather Software Archive http://cirrus.sprl.umich.edu/wxnet/software.html<br />
Weather Sites http://cirrus.sprl.umich.edu/wxnet/servers.html<br />
United States Air Forces in Europe Operational Weather Squadron (OWS)<br />
http://ows.public.sembach.af.mil/<br />
Live Weather Images http://www.weatherimages.org/weathercams/<br />
Weather Maps http://cirrus.sprl.umich.edu/wxnet/maps.html<br />
Organized Weather <strong>Link</strong>s http://weather.communitycomputing.com/owl/links/index.asp<br />
WunderGround http://www.wunderground.com/<br />
Weather CAMS http://www.weatherwatchers.org/wxcam/<br />
World Weather http://weather.wn.com/<br />
Weather Matrix http://www.weathermatrix.net/radar/world/<br />
AccuWeather http://home.accuweather.com/index.asp?partner=accuweather<br />
World News Network Sitemap (make this your first stop)<br />
World News http://wnsitemap.com/<br />
Miscellaneous<br />
Official Department Of The Army Publications And Forms http://www.army.mil/usapa/<br />
World Statistics Clock http://www.poodwaddle.com/worldclock.swf<br />
Understanding Surveillance Technologies<br />
http://www.dmos.info/eng/Understanding%20Surveillance%20Technologies.pdf<br />
Army Field Manuals http://www.globalsecurity.org/military/library/policy/army/fm/<br />
http://www.enlisted.info/field-manuals/<br />
149
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
SUSPICIOUS BEHAVIOR COULD INDICATE TERROR PLOTTING<br />
By Anthony L. Kimery<br />
' ... being able to distinguish the ordinary from the extraordinary'<br />
Coinciding with concerns among some intelligence services that suspected Hezbollah "sleeper cells" in<br />
Canada have been activated, Canadian law enforcement authorities increasingly are training for spotting<br />
potentially suspicious activity and behavior that may indicate terrorists are conducting surveillance or<br />
other goings-on in preparation for targeting a specific structure or location for attack.<br />
Several years ago, Robert David Steele, an outspoken veteran intelligence officer, told HSToday.us that<br />
“50 percent of the ‘dots’ that prevent the next 9/11 will come from bottom-up [local] level observation” and<br />
unconventional intelligence from “private sector parties.”<br />
Since 9/11, the Department of Homeland Security (DHS) and law enforcement in the Washington, DC<br />
capital region have actively urged citizens to report “suspicious activity.” Mobile electronic signs urging<br />
people to report suspicious activity are routinely placed at strategic locations throughout the metro area<br />
for periods of time. The last one of these portable warnings I saw was at the convergence of Key Bridge<br />
and George Washington Memorial Parkway on the Virginia-side of the Potomac River just across from<br />
Georgetown.<br />
Lynda Howes, a civilian member of the emergency event and management unit of the Calgary (Canada)<br />
Police Service, told attendees of the “Tri-lateral Security Conference” in Calgary last week that law<br />
enforcement must learn how terrorists operating in order to prevent attacks. She said counterterrorism is<br />
only manageable if it is tackled at the grass roots level. She explained that it’s vital that everyone -<br />
including the public, the police, government and private industry – recognizes the potential indicators of<br />
terrorism and what actions to take if, and when, they are encountered.<br />
Howes said terrorists must recruit members, research their targets, procure resources, receive, transfer<br />
and conceal money, and provide transportation and communication.<br />
And "each one of those phases represents an activity” that can be identified if a person is trained to know<br />
what to be on the look-out for. “Those activities are associated with a behavior. Once we have that<br />
behavior, those are things you and I will be witnessing every single day and are things we can pick up on<br />
as potential indicators.”<br />
In late 2002, The Air Force's Office of Special Investigations launched “Eagle Eyes,” a program to "deter<br />
terrorism by recognizing and reporting pre-attack activities," according to an OSI memo.<br />
"Every terrorist act is preceded by observable planning activities," according to the OSI memo. "When<br />
troops and citizens know what to look for and how to report suspicious activity, terrorist acts can be<br />
prevented."<br />
Department of Defense personnel have routinely been advised to report suspicious reconnoitering of<br />
military facilities, people asking detailed information about specific sites, and any other activity which<br />
could indicate a "dry run” attack.<br />
DHS says “knowing what to look for and being able to distinguish the ordinary from the extraordinary are<br />
the key elements to successful surveillance detection.”<br />
“A persistent stream of reported suspicious incidents requires an understanding of the purpose of terrorist<br />
surveillance, to know what terrorists look for, and how they conduct surveillance operations,” DHS’s<br />
advice states.<br />
150
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
DHS states “terrorists conduct surveillance to determine a target's suitability for attack by assessing the<br />
capabilities of existing security and discerning weaknesses in the facility. After identifying weaknesses,<br />
they plan their attack at the point of greatest vulnerability.”<br />
“Because terrorists must conduct surveillance-often over a period of weeks, months, or years-detection of<br />
their activities is possible,” DHS continued, noting, “regardless of their level of expertise, terrorists<br />
invariably make mistakes. The emphasis of surveillance detection is to key in on indicators of terrorist<br />
surveillance activities."<br />
DHS states “successful surveillance detection efforts require immediate reporting of incidents similar to<br />
the following:<br />
o Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or<br />
direction;<br />
o Individuals who stay at bus or train stops for extended periods while buses and trains come and go;<br />
o Individuals who carry on long conversations on pay or cellular telephones;<br />
o Individuals who order food at a restaurant and leave before the food arrives or who order without<br />
eating;<br />
o Joggers who stand and stretch for an inordinate amount of time;<br />
o Individuals sitting in a parked car for an extended period of time;<br />
o Individuals who don't fit into the surrounding environment because they are wearing improper attire<br />
for the location or season;<br />
o Individuals drawing pictures or taking notes in an area not normally of interest to a tourist or showing<br />
unusual interest in or photographing security cameras, guard locations, or watching security reaction<br />
drills and procedures; and<br />
o Individuals who exhibit suspicious behavior, such as staring or quickly looking away from individuals<br />
or vehicles as they enter or leave facilities or parking areas<br />
Other activity which should cause a heightened sense of suspicion include:<br />
o Suspicious or unusual interest;<br />
o Surveillance (suspicious in nature);<br />
o Inappropriate photographs or videos;<br />
o Note-taking;<br />
o Drawing of diagrams;<br />
o Annotating maps; and<br />
o Using binoculars or night vision devices<br />
“Terrorists may also employ aggressive surveillance techniques, such as making false phone threats,<br />
approaching security checkpoints to ask for directions, or ‘innocently’ attempting to smuggle nonlethal<br />
contraband through checkpoints,” DHS’s advice states. “The terrorists intend to determine firsthand the<br />
effectiveness of search procedures and to gauge the alertness and reaction of security personnel.”<br />
Karen Morley, senior director of TerraGo Technologies, Atlanta, Ga., who began her career in the<br />
geospatial industry in the US Air Force as a target intelligence specialist, told HSToday.us that terrorists<br />
need to conduct careful surveillance of a potential target in order to be confident that they can pull off a<br />
successful attack.<br />
In 2004, RAND developed the book, “Mapping the Risks: Assessing Homeland Security Implications of<br />
Publicly Available Geospatial Information,” for the National Geospatial-<strong>Intelligence</strong> Agency, determined<br />
that “potential attackers, such as terrorist groups or hostile governments, are more likely to [utilize]<br />
reliable and timely information … such as through direct access or observation. In addition, many types of<br />
attacks, such as those by ground parties, are likely to require detailed information for attack planning<br />
purposes (depending on the target type and mode of attack). This type of information, which mostly<br />
151
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
comes from such nongeospatial sources as engineering textbooks or human expertise on the operations<br />
of a particular type of industrial complex, is essential for attackers to have a high confidence in their plan.”<br />
But according to John Bumgarner, an 18-year veteran of special operations who has worked with most of<br />
the three-letter intelligence agencies at one time or another and is now research director for security<br />
technology at the US Cyber Consequences Unit, a non-profit research institute, because of training like<br />
that promoted by Howes it has become more and more difficult for terrorists to physically recon targets,<br />
especially in the US.<br />
“To actually start planning very detailed reconnaissance of a building, and all the streets that go into it,<br />
and all the alleyways and everything else, that could require a lot of physical reconnaissance on the<br />
ground - it’s not something that you can actually just easily do anymore,” Bumgarner stressed, especially<br />
in the post-9/11 environment where conspicuous photographing, videoing and other apparent physical<br />
surveillance can, and has - repeatedly across the nation - caused people to be detained and questioned<br />
about their activities.<br />
“In other words,” said Bumgarner, “it’s gotten a whole lot harder for a terrorist to conduct the kind of<br />
conspicuous physical surveillance of a target that’s necessary for conducting a large-scale or mass<br />
casualty attack.”<br />
Consequently, more sophisticated terrorists are utilizing easily accessible geospatial information, which<br />
was examined in the April HSToday cover report, “Every Eye a Spy.”<br />
152
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Taking Advantage Of Search Engines To Do Your Work<br />
My favorite search engines, and I’m sure you have your favorites, are the Copernic Suite followed by<br />
Google and then others. I use them extensively and use them to my advantage when doing research and<br />
I just don’t have the time to sit in front of the computer and type in all the keywords. First let me start with<br />
the Copernic Suite. It is comprised of Copernic Agent Professional, Copernic Tracker and Copernic<br />
Summarizer. Tracker and summarizer are exactly what the titles imply. The tracker keeps track of<br />
websites and alerts you when there are changes to it. Summarizer will take an article and summarize it to<br />
a more manageable article; and you determine the number of words in the summarized article. The<br />
following applies to copernic agent professional and how to customize it to work for you.<br />
You’ll notice on the graphic below how I have formatted my copy. On the right side is a box where folders<br />
are created as I have done. In the top center are the keywords I used for the Iran folder in the box at right.<br />
I have programmed the engine to do automatic searches at 0800 every day (by this time I have had my<br />
first cup of coffee and just waiting for all the results to come in). You also will notice that on the search<br />
term “Iranian military capabilities” there is a number 24 in parenthesis. These are the new results that<br />
came in at 0800, so you will always know about new results. Just below the box with the keywords are all<br />
the hits that came in. The green check mark indicates that it is a valid link. Now look at the left hand side<br />
in the quick search box and you should notice that I have 1005 search engines enabled. With these many<br />
search engines enabled you should be able to pin down what you’re looking for.<br />
153
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
154
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Let’s now look at Google and see how it can be customized to work for you. What you’re looking at now is<br />
the traditional page. On the upper right is the “sign in” link. Click on this link to establish an account. Once<br />
you establish an account click on the news link to go to the personalized news page.<br />
Click on news to go to personalized news page.<br />
Click here to establish an account<br />
155
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Clicking on the news link brings up the following page. You’ll notice on the left hand side where I have<br />
established all keywords of interest to me. I have included all the classical “INTS’ along with some others<br />
of interest. Clicking on a keyword, for example “explosively formed projectiles”, brings up the latest search<br />
on that term. I use the same keywords in Copernic above because the results are not always the same<br />
for both search engines. By using two search engines to do my bidding I stand a better chance of getting<br />
a plethora of results and thus more solid news from around the world.<br />
My keywords<br />
Clicking on the “edit this personalized page” brings up<br />
the following where the user enters all the keywords of<br />
interest to them. You’ll notice that all my keywords match<br />
those on the left hand side.<br />
Click here to personalize your page.<br />
156
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Terrorism Threat Map 2005<br />
Map Is Hyperlinked To The Web<br />
157
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Terrorism Threat Map 2006<br />
Map Is Hyperlinked To The Web<br />
158
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Terrorism Threat Map 2007<br />
Map Is Hyperlinked To The Web<br />
159
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Political And Economic Risk Map 2006<br />
http://www.offnews.info/downloads/2006_P&E_Region_Snapshots.pdf<br />
Political And Economic Risk Map 2007<br />
Map Is Hyperlinked To The Web<br />
This map is shown because terrorism has always had some type of correlation to the economic<br />
and political health of certain countries. It may help the analyst determine where terrorist acts<br />
are likely to take place. Obviously the risk map will not tell with any degree of certainty where<br />
the next incident will occur but the analyst can make some predictions by looking at current<br />
instabilities in certain parts of the globe.<br />
160
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Political And Economic Risk Map 2008<br />
Map Is Hyperlinked To The Web<br />
This map is shown because terrorism has always had some type of correlation to the economic<br />
and political health of certain countries. It may help the analyst determine where terrorist acts<br />
are likely to take place. Obviously the risk map will not tell with any degree of certainty where<br />
the next incident will occur but the analyst can make some predictions by looking at current<br />
instabilities in certain parts of the globe.<br />
161
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
<strong>Global</strong> Health Care Capabilities<br />
Map Is Hyperlinked To The Web<br />
162
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Tricks Of The Trade For The <strong>Open</strong> <strong>Source</strong> Analyst<br />
Looking For Old Information<br />
By Etan Horowitz<br />
The Orlando (Fla.) Sentinel<br />
Things move so fast on the Internet that sometimes the information you are looking for has been removed<br />
or changed. Using Google's Cached <strong>Link</strong>s and the Internet Archive's Wayback Machine can help you find<br />
what you are looking for even if the content is no longer online.<br />
1. If you know that the information you are searching for is no longer online, go to Google.com.<br />
2. Enter as much information as you can into Google's search field and hit enter.<br />
3. When your search results appear, find the result with the most appropriate description and click on the<br />
link at the bottom left of the result that says "Cached." This will open a snapshot of the Web page that<br />
Google took as it was indexing it.<br />
Clicking on the cached link may also be useful if you ever click on a search result link that doesn't work.<br />
4. If you don't know exactly what you are looking for or are curious about a previous version of a Web<br />
page, go to web.archive.org to search the Internet Archive's Wayback Machine, an archive of 85 billion<br />
Web pages dating back to 1996.<br />
5. Type the URL of the Web site you want to see and click "Take Me Back." This will bring up a collection<br />
of archived pages from that Web site, organized by year.<br />
Cached <strong>Link</strong>s may not be available for all Web sites and less popular Web sites may not be included in<br />
the Internet Archive Wayback Machine.<br />
163
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
<strong>Open</strong> Access Copyright OSS.Net, Inc. © 2006 All Rights Reserved.<br />
<strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Familiarization Documents<br />
The intent of this single-page document is to share basic knowledge about <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> (<strong>OSINT</strong>).<br />
History<br />
Quincy Wright, “Project for a World <strong>Intelligence</strong> Center” (1957)<br />
Al Gray, “<strong>Global</strong> <strong>Intelligence</strong> Challenges of the 1990’s” (1988-1989)<br />
Robert Steele, Critique of CIA/FBIS <strong>OSINT</strong> Plan (1989, Still Valid in 2006)<br />
USMC, <strong>OSINT</strong> Program Debate History (1989-1995)<br />
Robert Steele, “E3i: Ethics, Ecology, Evolution, & <strong>Intelligence</strong>: An Alternative Paradigm” (1992)<br />
Robert Steele, “God, Man, and Information: Comments to INTERVAL In-House” (1993)<br />
Robert Steele, “Creating a Smart Nation” (1996)<br />
Robert Steele, “The <strong>OSINT</strong> Story” (2004)<br />
Robert Steele, “Basic Lectures on Secret <strong>Intelligence</strong> Shortfalls and All-<strong>Source</strong> Reform” (2004)<br />
Context<br />
MCIA, “Model for Analysis of Expeditionary Environment” (1989)<br />
MCIA, “Expeditionary Environment Strategic Generalizations” (1990)<br />
USMC, “<strong>Intelligence</strong> Preparation of the Battlefield” (1992)<br />
Robert Steele, “<strong>OSINT</strong>: What Is It? Why Is It Important to the Military?” (1994)<br />
Robert Steele, “Expeditionary Environment in 21 st Century” (1994)<br />
Ben Gilad, Business Blindspots (1996)<br />
Robert Steele, “Virtual <strong>Intelligence</strong> & Information Peacekeeping” (1997)<br />
Robert Steele, “Information Peacekeeping: The Purest Form of War” (1998)<br />
Robert Steele, “Asymmetric Warfare and Four Forces After Next” (1998)<br />
Robert Steele et al, “Relevant Information” (1999)<br />
Amitai Avishalom, “Overcoming Impediments to Information Sharing” (2003)<br />
Defense Science Board “Strategic Communication” (July 2004)<br />
United Nations, “A More Secure World: Our Shared Responsibility” (2004)<br />
Robert Steele, “Address to the Department of State” (2004)<br />
Robert Steele, “Peacekeeping <strong>Intelligence</strong>” (2004)<br />
Robert Steele, “Information Peacekeeping” (2004)<br />
Robert Steele, “Questions Any National <strong>Intelligence</strong> Manager Should Be Able to Answer” (2005)<br />
Robert Steele, “Address to the Department of Homeland Security” (2005)<br />
Robert Steele, “Briefing for the Department of Defense” (2006)<br />
C. K. Prahalad, The Fortune at the Bottom of the Pyramid (2006)<br />
Robert Steele, “Reinventing <strong>Intelligence</strong>” (2006)<br />
Practice<br />
Robert Steele, “Creating a Bare Bones <strong>OSINT</strong> Capability” (1994)<br />
Jack Davis, Compendium of Analytic Tradecraft (1997)<br />
Robert Steele,, <strong>OSINT</strong> Executive Overview (1998)<br />
NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook (2001)<br />
NATO <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Reader (2002)<br />
NATO <strong>Intelligence</strong> Exploitation of the Internet (2002)<br />
Robert Steele, “New Rules for the New Craft of <strong>Intelligence</strong>” (2002)<br />
Robert Steele, “Peacekeeping <strong>Intelligence</strong> Leadership Digest 1.0” (2003)<br />
Eobert Steele, “Special Operations Forces <strong>Open</strong> <strong>Source</strong> <strong>Intelligence</strong> Handbook” (DRAFT, 2004)<br />
Robert Steele, “Primer on Public <strong>Intelligence</strong>” (2005)<br />
Essential Individual Access & Analytic Toolkit via SILOBREAKER (2006)<br />
Anonymous, Web Quick <strong>Link</strong>s for the Military Analyst (2006)<br />
Robert Steele, The Practice of <strong>Intelligence</strong> and Related Documents (2006)<br />
Policy & Investment<br />
Mr. Boyd Sutton, “Challenge of <strong>Global</strong> Coverage” (1997)<br />
Dr. Joseph Markowitz, “<strong>Open</strong> <strong>Source</strong> Investment Strategy” (2000)<br />
Dr. Stephen Cambone, USDI, Speech to SASA (2004)<br />
Defense Science Board, “Transition to and From Hostilities” (2004)<br />
Robert Steele, “Creating a Defense <strong>Open</strong> <strong>Source</strong> Agency” (2005)<br />
Robert Steele, “Funding a National <strong>Open</strong> <strong>Source</strong> Agency at $2B a Year” (2005)<br />
164
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Robert Steele, “Commercial Imagery and Geospatial Funding at $600M a Year” (2005)<br />
Robert Steele, “Creating a Combatant Commander <strong>Open</strong> <strong>Source</strong> Program” (2005)<br />
Congressman Rob Simmons (R-CT-02), “Foreword” to Book on Information Operations (2006)<br />
Media<br />
John Perry Barlow in Forbes (2002)<br />
Robert STEELE in TIME (2003)<br />
Kris Alexander in WIRED (2005)<br />
“The Power of Us” in Business Week (2005)<br />
Reference<br />
Annual Training Conference, Proceedings, 1992-date (less 2005, none held)<br />
Portal Pages and Archives, www.oss.net, 1992-date<br />
Robert Steele, Amazon Lists of Recommended Books (look at this first)<br />
Robert Steele, Amazon Reviews (Be patient, two hours = overview of<br />
reality<br />
165
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Dissemination<br />
Can we share?<br />
How much restriction?<br />
May divulge sensitive open<br />
source collection capabilities.<br />
Analysis and Production<br />
(Validated <strong>OSINT</strong> and<br />
Predictive Analysis)<br />
Do we need to go back and modify<br />
the planning and direction?<br />
This still does NOT stop the next<br />
step which is dissemination.<br />
Planning and Direction<br />
What is the Crisis/Crises?<br />
NEO, Humanitarian, Peacekeeping, etc.<br />
Gangs/Drug Cartels/Trafficking<br />
Identify best sources of information.<br />
<strong>Open</strong> <strong>Source</strong><br />
<strong>Intelligence</strong> Cycle<br />
Collection Phase<br />
(Data Capture)<br />
Country Studies<br />
Magazines/Newspapers<br />
Web<br />
Television/Radio<br />
Databases<br />
FBIS<br />
Who’s on the ground?<br />
Informants/<strong>Source</strong>s<br />
Foreign Services<br />
Processing, Integration and<br />
Guidance (Data Mining and Critical<br />
Thinking)<br />
Is there supporting evidence?<br />
Can present data be sanitized?<br />
Do we query/task classified<br />
“INTS”?<br />
Credibility and Reliability<br />
166
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
* * * Google Can Do That? * * *<br />
Recommended Search Tips<br />
* Google lets you search for a range of numbers, in any format. To include a number range in your search<br />
query, type in the lower and upper numbers, separated by two periods - e.g., 15..50 I had a chance to try<br />
out this feature in a real-life search; I wanted to find a set of wireless headphones on Amazon.com<br />
costing between $50 and $100. I typed in the query (wireless OR cordless) headphones $50..$99<br />
site:amazon.com and, sure enough, I retrieved a wide selection of wireless headphones within my price<br />
range.<br />
Note that Google is smart enough to recognize decimal points - some of the items I retrieved weren't an<br />
even dollar amount but were, for example, $57.83. This feature could also come in handy if you are<br />
looking for a mention of a range of years.<br />
* Speaking of date-searching on Google, you can limit your search to only those pages added or changed<br />
within the past [whatever] days. This can be a useful feature if you re-run a search regularly; just limit your<br />
search to the pages added or modified since you last ran your search. You can do this not by adding text<br />
in the search box but by modifying the search results page URL by adding the following text to the end of<br />
the URL and clicking [Search]: &as_qdr=dn (where n is the number of days you want searched)<br />
So, for example, to limit my search to the last 18 days, I would add &as_qdr=d18 to the end of the search<br />
results page URL.<br />
Keep in mind that this isn't a perfect date-limiting search. Some web content management systems<br />
automatically refresh a web page frequently, without necessarily making any changes to the page. Those<br />
pages will have a recent date but the content within them may have been unchanged for months.<br />
* If you are based in the US, you can search for local companies through your cell phone, regardless of<br />
whether or not your phone has web capability. If you call 1-800-GOOG411 (1-800-466-4411), you will be<br />
asked to say the city and state you want information on - Boulder, Colorado, for example - then you say<br />
the type of business or specific business name you want - for example, "book store" or "Barnes and<br />
Noble". A text-to-speech program will read you the top eight results from its local search<br />
(http://local.google.com). If you want, Google can automatically dial any of the first eight businesses'<br />
phone number, or you can ask to have the address and phone number read to you.<br />
You can also get quick answers to simple queries by texting Google from a US cell phone. Send a text<br />
message to 466 453 (GOOGLE) and then type your query in the text box and send it. Within seconds,<br />
you will receive a text message with one of Google's Quick Answers. The default is for Google to take<br />
your query and attempt to find a Quick Answer. If you want a search of the web, put the word web at the<br />
beginning of your search, such as web avian flu. This will return you a text message with a snippet of the<br />
first search result, along with a link to mobile-formatted page of the search results. See<br />
http://sms.google.com for more information on this service.<br />
I recently discovered Intelways, a nifty way to search a number of search engines sequentially. It's not a<br />
metasearch engine; it lets you click from one resource to another. Its main claim to fame is that it<br />
categorizes the tools by broad type of search -- general, images, video, news, social (blogs, social<br />
networking sites, social bookmarking sites, etc.), file-type searching, reference, academic, business, tech<br />
and (natch) shopping. (<strong>Source</strong>: Bates Information Services, www.BatesInfo.com/tip.html )<br />
167
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
PowerSet.com<br />
We have a new player in the semantic search arena; "semantic search" refers to the idea<br />
that a better way to find the most relevant material is to not just look at word frequency,<br />
location, links to a page and so on but to understand the sense of what is being asked and<br />
the sense of what is on web pages, and then to match the most applicable pages. For<br />
example, if I typed in a query for stock, a semantic search engine would see that this was in<br />
the context of livestock, and would find other pages that have to do with animals on farms<br />
rather than about shares of ownership in a company, flowers, or racing cars.<br />
PowerSet uses a technology that attempts to mine meaning out of web pages -- specifically,<br />
Wikipedia articles. This isn't a general-purpose search engine, but it is a tremendous tool if<br />
you are looking for information on a subject that spans a number of Wikipedia articles, or<br />
that has a number of meanings. Take "Barack Obama" as an example. There are thousands<br />
of articles that mention Obama -- the Wikipedia article specifically about him, as well as<br />
articles about politicians who have endorsed him, his early career, the roles of race and<br />
religion in the US presidential campaign, and so on.<br />
Rather than going through all of those entries, including the extensive article specifically on<br />
Obama, head over to PowerSet and you will get a single search result that pulls together<br />
what it judges to be the most relevant information about Barack Obama. There is a nice<br />
summary of who he is, the key facts about his career, and a relevance-ranked list of<br />
Wikipedia pages that mention him.<br />
What I find particularly interesting is the "Factz" section of the page, which attempts to pull<br />
together significant statements about Barack Obama in the Wikipedia articles. So, for<br />
example, the Factz for Barack Obama include information that he introduced the following<br />
pieces of legislation:<br />
� Iraq War De-Escalation Act of 2007<br />
� Response Act<br />
� Pandemic Preparedness<br />
� Transparency Act<br />
� Federal Funding Accountability<br />
While that isn't a comprehensive list of the pieces of legislation he has introduced, these are<br />
probably the most significant ones, since this list includes only legislation that was<br />
mentioned in Wikipedia articles.<br />
PowerSet is best used for those searches that cover a number of topics or areas. It's not<br />
perfect, and it only searches Wikipedia, but I find it an exciting new approach in the efforts<br />
of search engines to make sense out of web content. www.BatesInfo.com/tip.html<br />
168
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Bing Gets Smart<br />
Bing,the search engine formerly known as Microsoft Live Search, has surfaced a number of<br />
its advanced search commands. Some of these are new, some simply haven't been<br />
publicized. You can see some of Bing's features in its Advanced Operator Reference, a<br />
minimalist page that lists operators and, with another click, gives a brief description and<br />
example of when the operator could be used.<br />
Following are a list of four Bing commands:<br />
� Contains: specifies that any page retrieved has links to specific file types. Syntax is<br />
contains:files_type Example: apiculture contains:ppt This is not a search within<br />
pages of those file types; the example here is looking for pages that both contain the<br />
word "apiculture" and have links to files with the .ppt extension. Other file type<br />
extensions you can search for include doc, pdf, ppt, rtf, txt and xls.<br />
� HasFeed: specifies that any page retrieved has a link to an RSS feed on the page.<br />
Syntax is feed: Example:apiculture hasfeed: As with the contains: command, this<br />
isn't searching within RSS feeds; this search finds pages with RSS feeds on them.<br />
� <strong>Link</strong>FromDomain: identifies all the outgoing links on a specific domain, optionally<br />
limited to a particular topic. Syntax is linkfromdomain:a_domain_name To find some<br />
tutorials on renewable energy, for example, you might search for pages that are<br />
linked-to from HowStuffWorks.com and that also have the phrase "renewable<br />
energy" -- linkfromdomain:howstuffworks.com "renewable energy".<br />
� Norelax: lets you specify that all your search terms, not just the first four, be<br />
included in the query. Syntax is norelax:search_word Use this operator to indicate to<br />
Bing that all words in your query must be weighted equally. This tells Bing not to<br />
"relax" its Boolean AND for the fifth and subsequent words in a query. If, for<br />
example, you are creating a more complex query and want to ensure that Bing treats<br />
all words as mandatory, you could search "west nile" mosquito non-toxic<br />
norelax:spraying, using norelax: to make the search word spraying mandatory.<br />
Bates Information Services, and include the URL, www.BatesInfo.com/tips<br />
Using Yahoo to Brainstorm<br />
Yahoo! has an experimental service called Correlator, part of its Sandbox area where Yahoo<br />
tries out new ideas. This particular demonstration is useful for research brainstorming; it<br />
gives you information -- not just search results -- that can help you get a better sense of<br />
the various aspects of an idea.<br />
At its core, Correlator is a sophisticated tool for mining Wikipedia; its default search results<br />
page groups Wikipedia snippets by category. The search query "lithium ion batteries", for<br />
example, gives me information organized into areas such as rechargeable batteries, electric<br />
vehicles, and electric batteries. But what's more interesting is that below the search box are<br />
icons for Names, Places, Events, Concepts, News and Answers.<br />
When I click the Names icon, the result is a dynamic word cloud and list of frequentlyoccurring<br />
names (geographic, personal, company, etc.) related to lithium ion batteries.<br />
169
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Clicking the Places icon displays a map of the world, with flags in areas that are significant<br />
in the context of lithium batteries, such as China (manufacturing), Austin (research and<br />
development), and Chicago and Japan (which both have tests of lithium battery-powered<br />
vehicles). This alone gives me ideas on where to look next -- local Chicago and Japanese<br />
papers, for example, if I want to know what is past the drawing board stage.<br />
The Events icon displays a time line of events, again culled from Wikipedia, pertaining to Liion<br />
batteries. This helps me see, among other things, the speed with which Li-ion batteries<br />
have been incorporated into various devices. The News icon produces snippets from 20 or<br />
so recent stories in Yahoo News on the batteries. Clicking the Answers icon runs my query<br />
in the Yahoo Answers database; since Yahoo Answers tends to be consumer-oriented, the<br />
results help me identify the most common consumer concerns regarding batteries. The<br />
Concepts icon produces another dynamic word cloud and list of key words and phrases from<br />
the relevant Wikipedia articles. Of all the icons, this is the most variable in terms of<br />
usefulness.<br />
While limited to Wikipedia results, I have found Yahoo Correlator to be a quick way to see<br />
the wide range of possibilities for me to explore with a new concept.<br />
170
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract<br />
Killing Time (only on launch/lunch breaks)<br />
http://dsc.discovery.com/tv/future-weapons/games/cannon/cannon.html<br />
171