2013 07 11 OSINT 2ool Kit On The Go Bag O Tradecraft PDF
2013 07 11 OSINT 2ool Kit On The Go Bag O Tradecraft PDF
2013 07 11 OSINT 2ool Kit On The Go Bag O Tradecraft PDF
July 2013
I tried classified research; I was limited. I tried unclassified research; I was without limits.
Then a friend told me a secret; mine was not. E. Ben Benavides
Open Source Intelligence is the non-cloak-and-dagger Ninety percent of intelligence comes from open sources. The other ten
aspect of fact collecting. Alan D. Tompkins percent, the clandestine work, is just the more dramatic. The real intelligence
hero is Sherlock Holmes, not James Bond.
Lieutenant General Sam Wilson, USA Ret.
Former Director, Defense Intelligence Agency
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Table of Contents
2
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
3
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Comments
This is a living document and at the time of publication all links were active but don’t give up if you get
the “Page Not Found” message. If a link does not work, try copying the link to the URL window. If it still
doesn’t work place the cursor at the end of the URL address and backspace to the first slash and hit the
enter key. If it still does not work keep backspacing to the next slash and press the enter key. Keep doing
this until you either get a hit or enter the home page. Once in the homepage you should be able to find
what you are looking for. But we all know the chaotic nature of the WEB and over time some sites will be
pulled off or no longer function. If this is the case, you have a final recourse - the wayback machine,
http://www.archive.org/. Copy the entire URL and paste it into the “take me back” box in the homepage.
This should take you back to the original homepage and from there you can pick up key words to find
what you are looking for.
I realize also that we don’t think alike. If you feel some links do not belong in a particular category let
me know and I will make the adjustments. If you feel a new category should be added please justify it,
and if you discover links that you think are relevant to the handbook please submit your list and I will
update. Together we can create a valuable guide that is not only useful to the intelligence analyst but also
beneficial to all branches of the military, and civilian agencies. The idea is to develop something that any
branch (infantry, artillery, armor, etc) besides MI can use for their own intelligence gathering. Remember,
“Every Soldier Is A Sensor”. We could also apply this to the civilian world and say “Every Citizen Is A
Sensor”. A good example is the individual that spotted the smoking SUV in Times Square and alerted
police to the situation. Had the contents smoldered long enough it is quite possible the situation could
have turned into something more serious.
While I have tried to get you to your objective as quickly as possible, there is still no substitute for
effective searching techniques. I strongly recommend looking over this very basic WEB searching
techniques site http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Handouts.html and download
the tutorial with powerpoint slides and handouts. The information is from 2009 but still very appropriate.
I also like Russ Haynal’s Internet Training at http://navigators.com/opensource.html and I think you will
too. Very easy to follow and digest the information even while working at your own pace.
There are two areas one cannot get away from on the WEB, pornography and theological/political
agendas. I have definitely made sure that none of the links end up with the former, but the latter cannot
be avoided.
I have been advised that I probably have published too much information and have made it easier for
the criminal element. All the information gathered has been through open source harvesting and anyone
with even the slightest knowledge of good searching techniques will be able to gather the same
information. For example, the nuclear related portions in this handbook when merged together will
produce a neat little file. You can gather this same information at the public library or by visiting several
blogs and merging the results. Scattered throughout this handout you will run across material like
Unclassified/FOUO, Law Enforcement Sensitive (LES), Restricted, Controlled Unclassified Information,
Sensitive But Unclassified (SBU) and other caveats. Again, this is all open source exploitation. I did not
hack into any sites! That’s my story and I’m sticking to it.
Those links that require a .mil or .gov return address are included for those
authorized access, they will not work for those not authorized access.
Prior to leaving the service of the U.S. Army, I established that this is my intellectual property and there
are no applicable constraints on my sharing it with the public.
4
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
According to the NATO Open Source Intelligence Handbook, November 2001, there are four
distinct categories of open source information and intelligence.
1) Open Source Data (OSD). Data is the raw print, broadcast, oral debriefing, or other form of
information from a primary source. It can be a photograph, a tape recording, a commercial satellite image,
or a personal letter from an individual. A god example is a reporter embedded with forces in Afghanistan
or Iraq. He/she is taking pictures, talking to soldiers, recording conversations and firefights, and taking
notes with a pen or pencil. This is considered raw data until it goes through a conversion process to
create a coherent product.
2) Open Source Information (OSI). OSI is comprised of the raw data that can be put together,
generally by an editorial process that provides some filtering and validation as well as presentation
management. OSI is generic information that is usually widely disseminated. Newspapers, books,
broadcasts, and general daily reports are part of the OSI world. An example is a reporter embedded with
forces who takes the raw data and converts it into a meaningful article that is printed in newspapers,
magazines or broadcasted over the air waves. OSI is what a Soldier would purchase at the bookstore
inside the Post Exchange in the form of USA Today or Newsweek.
3) Open Source Intelligence (OSINT). OSINT is information that has been deliberately
discovered, discriminated, distilled, and disseminated to a select audience, generally the commander and
his/her immediate staff, in order to address a specific question. In the case of a battlefield commander, it
would more than likely be answering the priority intelligence requirements (PIR) or specific orders or
requests (SOR). OSINT, in other words, applies the proven process of intelligence to the broad diversity
of open sources of information, and creates intelligence. Example: The meaningful article above (OSI)
that was created from raw data is used to support an operation. It’s quite possible that a photo
accompanying the article may be of a house known to harbor insurgents. The photo in the article
identifies the location and now can be used to support a tailored operation to attack the insurgents.
4) Validated OSINT (OSINT-V). OSINT-V is information to which a very high degree of certainty
can be attributed. It can only be produced by an all-source intelligence professional, with access to
classified intelligence sources, whether working for a nation or for a coalition staff. It can also come from
an assured open source to which no question can be raised concerning its validity (live video of an
aircraft arriving at an airport that is broadcast over the media). OSINT-V is OSINT for which there are
either confirming or unavailable classified sources or there are no available classified sources disputing
OSINT. OSINT-V is produced only when the analyst has access to classified sources.
Example: CNN reporter takes photos and reports on a bridge. Intelligence personnel are aware
the bridge is vital for the movement of insurgent supplies; however, CNN is unaware of that. Classified
information confirms that such a bridge exists. This in effect validates the reporting as OSINT-V,
especially if the bridge is identified to be destroyed to keep insurgents from moving supplies. But, if there
isn’t anything in the classified holdings to deny the existence of the bridge, it is still considered OSINT-V
since this is the first time the bridge has been observed and reported, and there are other sources like
other reporters to backup the findings.
People in the intelligence business are realists and know that everything cannot be monitored
simultaneously; construction of new infrastructure is continuously taking place around the world. We
cannot keep track of all new buildings, bridges, roads or airfields being built. This is what makes open
source reporting extremely valuable. It covers the areas the classical “INTS” are not assigned to cover.
The only time OSINT-V can be disputed is when there is confirming evidence to deny the information.
Summary: How do I know when I have OSINT? The simple answer is the analyst does not have
OSINT until the open source information has been processed and analyzed, and supports a specific
requirement. The specific requirement can be a tailored operation or simply answering a question. The
5
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
analyst has to be very careful when it comes to distinguishing between OSI and OSINT. Open source
information exploitation is exactly what the name implies, that which is gathered/collected from open
sources. In general, it is information that is available to the general public without restrictions unless it is
copyrighted material. These include newspapers, the internet, books, phone books, scientific journals,
radio broadcasts, television, individuals, and other forms. On the other hand, OSINT is an intelligence
gathering discipline that involves collecting information from open sources and analyzing it to produce
usable intelligence, and there isn’t anything that says intelligence must be classified in order for it to have
utility. In the Intelligence Community, the term "open" refers to overt, publicly available sources (as
opposed to covert or classified sources); it is not related to open-source software. OSINT is distinguished
from straight research in that it applies the process of intelligence to create tailored knowledge supportive
of a specific decision by a specific individual or group.
Open source intelligence is a process of information gathering from public and overt sources,
such as newspapers and military trade journals, that produces "actionable intelligence." Far from being
the hobby of amateurs, open source intelligence is used by official military and government intelligence
agencies on a regular basis.
1. Gather sources. The number of possible open source intelligence outlets is limitless. Some
basic ones are newspapers, which report on things like troop and fleet movement, and even civilians who
visit other countries and can make relevant observations upon return. Strategy and defense information
websites, such as Jane's Group, also provide high quality information for you to harvest.
2. Pick a region or topic. Monitoring all varieties of open source intelligence across regional and
topical interests takes huge amounts of manpower. To effectively use open source intelligence you
should focus on one region or issue at a time. This will help you to stay on top of the latest information
and will allow you to develop a background understanding of intelligence items.
3. Connect the dots. Once you have gathered your sources you need to monitor news and
information in order to connect the dots. Look, for example, at how heads of state visits coincide with
arms sales. Then consider troop and fleet movement against rising tensions in various regions. Use
widely available technology such as Google Earth, Bing Maps 3D, and others to get views of important
locations. Take all this kind of information and try to deduce the most likely intelligence information from it.
4. Test your theories. One of the best ways to test a theory that you've constructed on the basis
of open source intelligence is to publish the theory. You can post theories on strategy discussion forums
or you can send your piece to influential military bloggers or even newspapers. Check the responses from
other members of the open source intelligence community to see what the criticisms might be.
6
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Intelligence Gathering
Sources: http://seattletimes.nwsource.com/html/nationworld/2016162814_threatwhat10.html
http://www.seattlepi.com/news/article/An-intel-Q-A-How-the-US-gets-it-where-it-goes-2163524.php#page-
1
http://romenews-tribune.com/bookmark/15489804
http://www.theskanner.com/article/911-Special-Intelligence-QA--How-the-US-Gets-It-Where-It-Goes-
2011-09-11
Some questions and answers about the gathering and use of intelligence:
WASHINGTON (AP) — U.S. intelligence in the struggle against terrorism comes in many forms,
maddeningly general, improbably precise, a game of sorts with vast consequences for winner and loser.
It's a satellite image showing tribesmen gathering in a remote area where none should be — the
photograph so clear you can see the caliber of ammunition they are carrying.
It's a snatched bit of conversation between two terrorist leaders, overheard by a trusted source the
terrorists don't realize is listening.
Each of these sources and a multitude of others can become the tips that put an entire nation on alert, as
a single tip has done from a single source just before the 10th anniversary of the Sept. 11 attacks.
Here are some questions and answers about the gathering and use of intelligence:
Q: What is intel?
A: Simply put, it is information from anywhere that the U.S. can use to its advantage in the world, either in
pursuit of its goals or to protect its people. It can be as basic as a diplomat reading a local newspaper and
passing on something interesting to a superior in an embassy or Washington. But it gets much more
sophisticated and aggressive than that.
In counterterrorism, bits and pieces of information form a messy picture like an impressionist painting.
Those collecting the signs and signals look for a pattern, eventually an image, that gives them a target to
go after or tells them which target to protect.
A: Perhaps the spookiest is measurement intelligence, known as "MASINT," using far-away technology to
get extremely up close and personal. The U.S. is capable of placing a sensor near a suspected terrorist
hideout that can count the number of heartbeats in a room and gauge how fast they're beating. There are
even efforts to understand what a "guilty" heartbeat pattern might be.
Masint, working in combination with other kinds of intelligence-gathering, was one of the clinchers in the
raid that killed Osama bin Laden. The U.S. measured the approximate height of the tall man who paced
beneath the trellis outside the kitchen in a Pakistani compound, to help determine bin Laden was that
man.
Then there is human intelligence, or "humint," which has been around since the dawn of spycraft and is
still vital. That's the tipster you cultivate and pay, or perhaps the unproven one who simply walks into a
7
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
"Sigint," or signals intelligence, monitors or otherwise exploits radio, telephone or satellite phone
transmissions. "Imint" is imagery intelligence that includes photographs showing the outlines of a nuclear
power plant, obscured in desert sands, or a terrorist training base tucked in a mountainside.
Cybertracking is a newer tool, pursuing terrorists who use computers either to attack a computer network
or, more often, to organize how their own human network would launch a physical attack.
A: Each of those streams of data is captured by a multibillion-dollar worldwide network of U.S. satellites,
armed drones, static blimps and high-flying spy aircraft, manned or unmanned, that suck up so much
sound it takes massive computers to crunch all the data and help analysts overwhelmed by the technical
information to find meaningful clues.
Sometimes these streams are collected by U.S. operatives — Americans or those in U.S. employ — who
go behind enemy lines or into enemy homes, leaving behind the sensors that will provide the data.
True to its name, the Central Intelligence Agency is an "all-source" organization using all means.
A: Sometimes they don't. After a Nigerian allegedly tried to bring down a Detroit-bound airliner on
Christmas Day almost two years ago, it emerged that his father had warned U.S. diplomats about his
son's possible terrorist sympathies, but that tip was lost in the blizzard of counterintelligence.
But in the bin Laden raid, a human source led to the compound in the Pakistani army town of Abbottabad.
Signals intelligence monitored for phone calls emanating from there, and found none, because bin Laden
forbade them, hoping to evade detection by just such technical means. Masint was derived from the
imagery taken by drones and satellites.
All of this helped to convince CIA analysts they had found their man and persuade President Barack
Obama to approve a dangerous and diplomatically risky raid into Pakistani sovereign territory.
Q: How is all of this intel sorted through so that the real threats are detected and averted?
A: The ever-present risk is that they won't be. One of the failings of pre-9/11 counterintelligence was that
information was jealously guarded by the individual intelligence agencies. Word of a potential plot to fly
planes into U.S. landmarks was received by one agency. Another agency had word terrorists might be
attending flight school. Each organization kept to itself the dots of information that, when connected, could
have revealed the larger pattern of a massive terrorist plot.
Before raw data and human tips can be called "intelligence," they must be analyzed, and if possible,
corroborated. The CIA alone has 2,500 people in its Directorate of Intelligence devoted to that task. There
are thousands more across the 16 intelligence agencies, sifting raw data, and cross-comparing within
their own agencies, and with others, to spot a pattern.
Q: What does it mean to receive — and warn the public about — a credible and specific but unconfirmed
threat, as in the latest case?
A: A credible threat means it was heard from a trusted source, not just anyone. Specific means the U.S.
has details about when, where or how an attack might unfold. When a threat is specific and credible but
unconfirmed, that means intelligence officials haven't been able to validate the information even though
they trust the source who gave it to them.
8
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
This particular threat is not unusual, but it's being taken so seriously because it comes days before the
10th anniversary of 9/11, a date al-Qaida has eyed for attack.
A: Right now, teams of analysts are combing through information gleaned from one trusted source, who
heard that a small group of attackers, perhaps from Pakistan, might blow up a car bomb in New York or
Washington. One or all of the attackers might be from Pakistan. Newly minted al-Qaida leader Ayman al-
Zawahri might be behind it.
These analysts are looking for anything to corroborate that report in the reams of information they've
gathered tracking travelers to the U.S. from Pakistan. U.S. spies overseas will be going back to their
sources to see if anyone has heard the same rumor.
"You don't have the luxury of vetting the source and then disseminating the information," said Phillip
Mudd, a former top counterterrorist official at the CIA and the FBI. "You have to tell everyone what you
heard and then try to prove the information is legitimate.
He said he would be directing analysts to pore over everything that can be gleaned from flight and
passport logs of potential foreign suspects who have traveled to the U.S.
"Figuring out who would-be attackers are, or even whether they exist, could take months, where the
drumbeat of national security wants answers in minutes or days," Mudd said.
The CIA operates under the U.S. law known as Title 50 — literally a license to break laws in foreign
countries, by committing espionage, persuading a local official to commit treason, or in extreme
circumstances, to go into a foreign country and target an al-Qaida suspect for killing or capture. Title 50
operations are covert, meaning the U.S. never intends to acknowledge them. Other intelligence agencies,
such as the eavesdropping National Security Agency and the new Cyber Command, routinely operate
under Title 50 as well.
A: It can feel that way. There is a favorite expression among intelligence officials, memorably if
confusingly uttered by former Defense Secretary Donald H. Rumsfeld, that captures the essence of their
work:
"As we know, there are known knowns; there are things we know we know. We also know there are
known unknowns; that is to say we know there are some things we do not know. But there are also
unknown unknowns — the ones we don't know we don't know."
9
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Have you ever wondered how someone sitting 7,300 miles away is able to easily penetrate an
organization’s network? How someone who has never had legitimate access to a network can learn more
about that organization than most of its own employees? It’s actually pretty easy, given the right skill set
and a lot of patience. I know cyberwarfare isn’t a new thing, but it’s still impressive to think that someone
on the other side of the globe, a few continents away, is able to wreak so much havoc.
I recently gave a presentation to a group on the topic of open-source intelligence (OSINT). I have
given this as a hands-on presentation at conferences and workshops in the past. In those workshops, my
audience is usually made up of IT admins, company legal departments, and a handful of individuals from
across the law enforcement community. In the weeks leading up to each workshop I always request a list
of attendees from the conference sponsor, which I use to gather OSINT on the attendees. On the day of
the workshop, before everyone arrives, I go around and put nametags at their seats along with a notecard
that is specific for each person. When the session starts, I ask everyone to flip over the notecard and read
it – to see if it’s accurate. On that notecard is a complete bio and profile comprised of information that I
was able to get using various publically available resources. I try to keep the notecards at a G to PG level,
so they usually just include first/last name, DOB/place of birth, maiden names, parents names, kids
names, schools attended, address history, phone numbers, job history, associates, affiliations, hobbies,
etc. Although this isn’t your typical icebreaker, it does set the mood for the day as well as elicit a few
awkward stares. But if you’ve signed up for a class entitled “OSINT and the Internet as an investigative
tool” then it’s all fair game. Anyway, the point of the exercise is to illustrate to anyone who may have been
naïve just how easy it is for someone like me, who doesn’t work for a three-letter intel agency, to obtain
this level and amount of information.
What is OSINT?
Open-source intelligence refers to finding and analyzing information from any source that is
publically available. OSINT has been used for decades by the intelligence community. Only in the last 10
to 12 years has there been a methodology change. Prior to the Internet age, OSINT consisted of
analyzing newspapers, magazines, radio and TV from across the globe. It wasn’t until the Internet was
accessible to everyone that OSINT became popular and used by all sectors. As companies evolved and
technology advanced so did the competition to be the best in the market. What followed was a variety of
companies that started conducting competitive intelligence against one another – or cyberespionage as
its known today. During this time, as more companies joined the online community, they began to realize
the efficiency of using the Internet as a tool for obtaining “competitive intelligence.” It was then discovered
that a lot of nation-states were also using OSINT for their own nefarious purposes. We now know that
certain nation-states have entire teams devoted to conducting reconnaissance using the Internet to
acquire as much intel on U.S. companies, the government and our interests aboard. To put it bluntly,
China and Russia figured out long before we did that OSINT was a key to the success of their
subsequent hacking operations that have become commonplace over the last decade.
The Eye-opener
During my presentation last week, I was fortunate enough to have a few C-level executives in the
audience. This is always great because I get to show them first hand how easily they can become a
target of a phishing email or another social-engineering attack. I started off my presentation with
infrastructural reconnaissance, which focuses on gathering information on an organization such as email
addresses, DNS records, IP addresses, MX servers, files, and anything else that would be useful to an
attacker. Infrastructural recon differs from personal reconnaissance in that personal recon is exactly what
it sounds like: gathering info on a person or individual. The two types of recon are all part of the overall
objective anyway, especially if you plan to use a social-engineering attack. Before my presentation, I
received permission from the executives to use them and the company as the target for my demo. The
demo was split into two parts: Part 1 illustrating how much material on them and the company I could
uncover using only their domain name. Part 2 was me using the results from Part 1 to obtain additional
info that could be used in any number of subsequent attacks.
Part 1
10
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
I used Maltego to search for the domain. In under a minute the canvas was filled with a striking
display of DNS names, domains, MX Records, IP addresses, phone numbers, URLs, email addresses,
first and last names, NS Records, locations, documents, and social media affiliations. It’s worth
mentioning that since Maltego aggregates data from across the Internet and identifies everything that
your search term is related to, many results can and will be irrelevant. For example, since this particular
company also hosts a blog, there were many email addresses and names associated with user
comments on the company blog, which weren’t helpful in my objective. Nonetheless, Maltego, as The
Ethical Hacker Network describes it, is: “an open source intelligence and forensics application that allows
for the mining and gathering of information as well as the representation of this information in a
meaningful way. Coupled with its graphing libraries, Maltego, allows you to identify key relationships
between information and identify previously unknown relationships between them.”
After completing the search using Maltego, I started explaining the results to the audience and
zeroed in on one of the several email addresses returned. The email address I chose just happened to
belong to an exec sitting in the front row. Now that I had his email address, as well as the naming
convention used for their email (e.g., firstname_lastname@company.com or lastname@company.com),
and I had the actual email server, I was more than halfway there. I next logged into LinkedIn using an
unassuming account I already created specifically for this type of work and searched for the company. As
expected, the LinkedIn search returned a list of people identifying themselves as employees of this
company. In that list was a familiar name, it was the same executive and now I had his full name, title,
complete description of his position,
and a list of his coworkers and
information about their positions. Since
I only had an hour, I stopped Part 1 and
explained how the rest of the process
might play out in a real-world malicious
scenario with an attacker using this
information for a phishing email.
Part 2
The second part of the demo
consisted of me taking a lot of the data
I obtained in Part 1 (IP address, domain
names, etc.) and enumerating the
network. For this I used FOCA 3.2, a free fingerprinting and
information-gathering tool that can search for servers, domains,
URLs and public documents and which outputs everything into a
network tree. Another useful feature of FOCA is it searches for data
leaks such as metadata, directory listing, unsecure HTTP methods,
robot.txt files, detection and processing of svn repositories, and much
more. I think this part of my demo was even more eye-opening
because it showed the audience that several of their assets were
exposed. Within three minutes I managed to obtain a comprehensive
listing of their systems complete with IP net blocks, DNS servers,
exchanges server, webmail, Microsoft Lync server, customer-facing
portals, and a lot more.
The End
I barely scratched the surface in this OSINT presentation, but
in less than 20 minutes I was able to gather enough information for a
mass spear-phishing attack or network intrusion. Along the way I also
uncovered information that, although not applicable to this particular
objective, could have been useful had I decided to use another attack
vector as a way in. For example, I uncovered information about the
11
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
company’s customers, business partners, email communications between employees and prospects, as
well as vendors they used.
Like many things, these tools and techniques can be used for good or evil. Unfortunately, most of
the time, OSINT is used for malicious behavior. However, as security professionals we can leverage the
same TTPs as the bad guys to identify weaknesses before someone exploits them. OSINT can also be
very useful for IR and forensics consultants, especially when investigating advanced threats. Having
information on the attacker, such as an IP address, C2 servers, moniker, etc., I can then leverage it to my
advantage in gathering additional info during forensics. Just like we tell our customers “there is no one
right or all-encompassing security solution, but rather a security stack.” Think of OSINT as just another
layer in your overall security stack. https://blog.bit9.com/2013/04/15/osint-tools-the-foundation-for-social-
engineering-and-phishing-attacks/
Strategic Intelligence - Intelligence that is required for forming policy and military plans at national
and international levels. This is in line with more of an expanded timeframe and takes into consideration
entire countries. The intelligence analysis may run months or years into the future. During this period,
errors, which are not acceptable but do still occur, are not as critical as they are at the tactical level where
life and death are daily concerns. Errors at this level can be corrected with the luxury of more room for
maneuver.
Each of these components can further be divided into a number of subcomponents. These
components and subcomponents are not all-encompassing nor mutually exclusive. This approach is
merely a means to enhance familiarization with the types of information included in strategic intelligence.
12
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Biographic Intelligence:
The study of individuals of actual or potential importance, their background and personalities.
Educational And Occupational History
Individual Accomplishments
Idiosyncrasies And Habits
Position, Influence, And Potential
Attitudes And Hobbies
Economic Intelligence:
The science of production, distribution, and use of wealth-- the material means of satisfying
human desires. economic intelligence is intelligence which deals with the extent and utilization of the
natural and human resources and the economic potential of nations.
Economic Warfare
Economic Vulnerability
Manufacturing
Sources Of Economic Capability
Sociological Intelligence:
The study of society, as well as the groups within society, their composition, organization,
purposes and habits, and the role of the individual in relation to social institutions.
Population, Manpower And Labor
Cultural, Physical Characteristics Of People
Public Opinion
Education
Religion
Public Health And Welfare
Transportation Intelligence:
Concerned with the operation and facilities of transportation systems in foreign countries.
Telecommunications Intelligence:
Concerned with the operation and facilities of civil and fixed military communications systems in
foreign countries.
Transportation Telecommunications
- Railways - Radio
- Highways - Television
- Inland Waterways - Telephone
- Petroleum Pipelines - Telegraph
- Ports - Submarine Cable
- Merchant Marine - Related Comms
- Aviation - Media
Military Geography:
Geography is the science of the description of the land, sea and air, and the distribution of plant
and animal life, including man and his industries.
Military geographical intelligence is the military evaluation of all geographical factors which may in
any way influence military operations.
Description
Natural Features
13
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Manmade Features
Sub-Component Name
Physical Geography
Human And Cultural Geography
Strategy: Strategic military problems of the nation in light of position, terrain, economic, political, and other
factors.
Tactics: Employment of weapons, employment and operations of the various arms and services, special
operations training.
Category: Order of battle - equipment - logistics - organization/administration - military manpower
Political Intelligence:
Political intelligence is intelligence concerning foreign and domestic policies of governments and
the activities of political movements.
Basic Principles Of Government/National Policies
Government Structure
Foreign Policy
Political Organizations And Parties
Pressure Groups
Electoral Procedures
Public Order And Safety
Subversion
Intelligence And Security Organization
Propaganda
14
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
15
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
The Intelligence Cycle is the process of developing raw information into finished intelligence for
policymakers to use in decisionmaking and action. There are five steps which constitute the Intelligence
Cycle.
2. Collection
... is the gathering of the raw information needed to produce finished intelligence. There are many
sources of information, including open sources such as foreign broadcasts, newspapers, periodicals, and
books. Open source reporting is integral to CIA's analytical capabilities. There are also secret sources of
information. CIA operations officers collect such information from agents abroad and from defectors who
provide information obtainable in no other way.
Finally, technical collection—electronics and satellite photography—plays an indispensable role in
modern intelligence, such as monitoring arms control agreements and providing direct support to military
forces.
3. Processing
... involves converting the vast amount of information collected to a form usable by analysts. This is done
through a variety of methods including decryption, language translations, and data reduction.
16
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
5. Dissemination
The last step, which logically feeds into the first, is the distribution of the finished intelligence to the
consumers, the same policymakers whose needs initiated the intelligence requirements. Finished
intelligence is provided daily to the President and key national security advisers. The policymakers, the
recipients of finished intelligence, then make decisions based on the information, and these decisions
may lead to the levying of more requirements, thus triggering the Intelligence Cycle.
17
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Collection Phase
(Data Capture)
Dissemination Does information already exist?
Send directly to requesting office. Country Studies
Can we share with the public? Magazines/Newspapers
Do we withhold from the public in Web
order to protect the public? Television/Radio
How much restriction? Databases
May divulge sensitive open Open Source Center
source collection capabilities.
Protect tradecraft.
Open Source Who’s on the ground?
Informants/Sources
18
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
There is so much happening on the Internet during a year that it’s impossible to capture it all in a
blog post, but we’re going to give it a shot anyway. How many emails were sent during 2012? How many
domains are there? What’s the most popular web browser? How many Internet users are there? These
are some of the questions we’ll answer for you.
To bring you these answers, we’ve gone to the ends of the web – wherever that is – and back
again, and compiled a list of truly fascinating facts about the year that was. Some of the numbers are
snapshots taken during the year, others cover the entire period. Either way, they all contribute to giving us
a better understanding of Internet in 2012. Enjoy!
Email
2.2 billion – Number of email users worldwide.
144 billion – Total email traffic per day worldwide.
61% – Share of emails that were considered non-essential.
4.3 billion – Number of email clients worldwide in 2012.
35.6% – Usage share of the most popular email client, which was Mail for iOS.
425 million – Number of active Gmail users globally, making it the leading email
provider worldwide.
68.8% – Percentage of all email traffic that was spam.
50.76% – Percentage of all spam that was about pharmaceuticals, the top category of all spam.
0.22% – Share of worldwide emails that comprised some form of phishing attack.
Web Servers
-6.7% – Decline in the number of Apache websites in 2012.
32.4% – Growth in the number of IIS websites in 2012.
36.4% – Growth in the number of NGINX websites in 2012.
15.9% – Growth in the number of Google websites in 2012.
Domain Names
246 million – Number of domain name registrations across all top-level domains.
104.9 million – Number of country code top-level domain name registrations.
329 – Number of top level domains.
100 million – Number of .com domain names at the end of 2012.
19
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Internet Users
2.4 billion – Number of Internet users worldwide.
1.1 billion – Number of Internet users in Asia.
519 million – Number of Internet users in Europe.
274 million – Number of Internet users in North America.
255 million – Number of Internet users in Latin America / Caribbean.
167 million – Number of Internet users in Africa.
90 million – Number of Internet users in the Middle East.
24.3 million – Number of Internet users in Oceania / Australia.
565 million – Number of Internet users in China, more than any other country in the world.
42.1% – Internet penetration in China.
Social Media
85,962 – Number of monthly posts by Facebook Pages in Brazil, making it the most active
country on Facebook.
1 billion – Number of monthly active users on Facebook, passed in October.
47% – Percentage of Facebook users that are female.
40.5 years – Average age of a Facebook user.
2.7 billion – Number of likes on Facebook every day.
24.3% – Share of the top 10,000 websites that have Facebook integration.
200 million – Monthly active users on Twitter, passed in December.
819,000+ – Number of retweets of Barack Obama’s tweet “Four more years”, the
most retweets ever.
327,452 – Number of tweets per minute when Barack Obama was re-elected, the most ever.
729,571 – Number of messages per minute when the Chinese microblogging service Sina Weibo
saw 2012 finish and 2013 start.
9.66 million – Number of tweets during the opening ceremony of the London 2012 olympics.
175 million – Average number of tweets sent every day throughout 2012.
37.3 years – Average age of a Twitter user.
307 – Number of tweets by the average Twitter user.
51 – Average number of followers per Twitter user.
163 billion – the number of tweets since Twitter started, passed in July.
123 – Number of heads of state that have a Twitter account.
187 million – Number of members on LinkedIn (September).
44.2 years – Average age of a Linkedin user.
135 million – Number of monthly active users on Google+.
5 billion – How many times per day the +1 button on Google+ is used.
20.8% – Usage share of HootSuite as a social media management tool among the world’s top
100 brands.
Search
1.2 trillion – Number of searches on Google in 2012.
67% – Google’s market-leading share of the U.S. search market (December).
20
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
1 – The top trending question of the year on Ask.com: “Will Rob and Kristen get back
together?”
Mobile
1.1 billion – Number of global smartphone subscribers.
6.7 billion – Number of mobile subscriptions.
5 billion – Number of mobile phone users.
5.3 billion – Number of mobile handsets.
1.3 billion – Number of smartphones in use worldwide by end of 2012.
465 million – Number of Android smartphones sold in 2012, a 66% market share.
31% – Percentage of the U.S. Internet population that used a tablet or e-reader.
13% – Mobile share of global Internet traffic.
5 billion – Number of mobile broadband subscriptions.
1.3 exabytes – Estimated global mobile data traffic per month in 2012.
59% – Share of global mobile data traffic that was video.
500 megabytes – Amount of monthly data traffic consumed by the average smartphone.
504 kbps – The average mobile network connection speed globally (all handsets).
1,820 kbps – The average mobile network connection speed globally (smartphones).
Video
14 million – Number of Vimeo users.
200 petabytes – Amount of video played on Vimeo during 2012.
150,648,303 – Number of unique visitors for video to Google Sites, the number one video
property (September).
1 billion – PSY’s Gangnam Style video became the first online video to reach 1 billion views
(currently just over 1.1 billion) and it achieved it in just 5 months.
2.7 billion – Number of views of videos uploaded to YouTube tagged Obama or Romney during
the 2012 U.S. election cycle
2.5 million – Number of hours of news-related video that was uploaded to YouTube.
8 million – The number of concurrent viewers of the lifestream of Felix Baumgartner’s jump from
the edge of space, the most ever on YouTube.
4 billion – Number of hours of video we watched on YouTube per month.
60 million – Number of global viewers monthly on Ustream.
16.8 million – Number of total viewers in a 24 hour period for a video on Ustream, the most ever.
181.7 million – Number of total unique viewers of online video in the U.S. during December.
Images
7 petabytes – How much photo content Facebook added every month.
300 million – Number of new photos added every day to Facebook.
5 billion – The total number of photos uploaded to Instagram since its start, reached in
September 2012.
58 – Number of photos uploaded every second to Instagram.
1 – Apple iPhone 4S was the most popular camera on Flickr.
How Much Data is on the Internet and Generated Online Every Minute?
Source: http://removeandreplace.com/2013/03/13/how-much-data-is-on-the-internet-and-generated-
online-every-minute/
21
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Have you ever wondered how many bytes of data are created everyday online?
In the last twenty years, internet access has increased across the globe causing a
boom in the amount of data being produced and collected.
Here are some facts about data on the internet.
There are 277,000 Tweets every minute, Google processes over 2 million search
queries every minute, 72 hours of new video are uploaded to YouTube every minute,
More than 100 million emails are sent every minute, Facebook processes 350 GB of
data every minute and 571 new websites are created every minute.
These terms are usually used in the world of computing to describe disk space, or data storage space,
and system memory. For instance, just a few years ago we were describing hard drive space using the
term Megabytes. Today, Gigabytes is the most common term being used to describe the size of a hard
drive. In the not so distant future, Terabyte will be a common term. But what are they? This is where it
gets quite confusing because there are at least three accepted definitions of each term.
According to the IBM Dictionary of computing, when used to describe disk storage capacity, a megabyte
is 1,000,000 bytes in decimal notation. But when the term megabyte is used for real and virtual storage,
and channel volume, 2 to the 20th power or 1,048,576 bytes is the appropriate notation. According to the
Microsoft Press Computer Dictionary, a megabyte means either 1,000,000 bytes or 1,048,576 bytes.
According to Eric S. Raymond in The New Hacker's Dictionary, a megabyte is always 1,048,576 bytes on
the argument that bytes should naturally be computed in powers of two. So which definition do most
people conform to?
When referring to a megabyte for disk storage, the hard drive manufacturers use the standard that a
megabyte is 1,000,000 bytes. This means that when you buy an 80 Gigabyte Hard drive you will get a
total of 80,000,000,000 bytes of available storage. This is where it gets confusing because Windows uses
the 1,048,576 byte rule so when you look at the Windows drive properties an 80 Gigabyte drive will report
a capacity of 74.56 Gigabytes and a 250 Gigabyte drive will only yield 232 Gigabytes of available storage
space. Anybody confused yet? With three accepted definitions, there will always be some confusion so I
will try to simplify the definitions a little.
The 1000 can be replaced with 1024 and still be correct using the other acceptable standards. Both of
these standards are correct depending on what type of storage you are referring.
22
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
This is based on the IBM Dictionary of computing method to describe disk storage - the simplest.
Source: http://www.whatsabyte.com/
Bit: A Bit is the smallest unit of data that a computer uses. It can be used to represent two states of
information, such as Yes or No.
Byte: A Byte is equal to 8 Bits. A Byte can represent 256 states of information, for example, numbers or a
combination of numbers and letters. 1 Byte could be equal to one character. 10 Bytes could be equal to a
word. 100 Bytes would equal an average sentence.
Kilobyte: A Kilobyte is approximately 1,000 Bytes, actually 1,024 Bytes depending on which definition is
used. 1 Kilobyte would be equal to this paragraph you are reading, whereas 100 Kilobytes would equal an
entire page.
Megabyte: A Megabyte is approximately 1,000 Kilobytes. In the early days of computing, a Megabyte
was considered to be a large amount of data. These days with a 500 Gigabyte hard drive on a computer
being common, a Megabyte doesn't seem like much anymore. One of those old 3-1/2 inch floppy disks
can hold 1.44 Megabytes or the equivalent of a small book. 100 Megabytes might hold a couple volumes
of Encyclopedias. 600 Megabytes is about the amount of data that will fit on a CD-ROM disk.
Gigabyte: A Gigabyte is approximately 1,000 Megabytes. A Gigabyte is still a very common term used
these days when referring to disk space or drive storage. 1 Gigabyte of data is almost twice the amount of
data that a CD-ROM can hold. But it's about one thousand times the capacity of a 3-1/2 floppy disk. 1
Gigabyte could hold the contents of about 10 yards of books on a shelf. 100 Gigabytes could hold the
entire library floor of academic journals.
Terabyte: A Terabyte is approximately one trillion bytes, or 1,000 Gigabytes. There was a time that I
never thought I would see a 1 Terabyte hard drive, now one and two terabyte drives are the normal specs
for many new computers. To put it in some perspective, a Terabyte could hold about 3.6 million 300
Kilobyte images or maybe about 300 hours of good quality video. A Terabyte could hold 1,000 copies of
the Encyclopedia Britannica. Ten Terabytes could hold the printed collection of the Library of Congress.
That's a lot of data.
Petabyte: A Petabyte is approximately 1,000 Terabytes or one million Gigabytes. It's hard to visualize
what a Petabyte could hold. 1 Petabyte could hold approximately 20 million 4-door filing cabinets full of
text. It could hold 500 billion pages of standard printed text. It would take about 500 million floppy disks to
store the same amount of data.
Exabyte: An Exabyte is approximately 1,000 Petabytes. Another way to look at it is that an Exabyte is
approximately one quintillion bytes or one billion Gigabytes. There is not much to compare an Exabyte to.
It has been said that 5 Exabytes would be equal to all of the words ever spoken by mankind.
Zettabyte: A Zettabyte is approximately 1,000 Exabytes. There is nothing to compare a Zettabyte to but
to say that it would take a whole lot of ones and zeroes to fill it up.
Yottabyte: A Yottabyte is approximately 1,000 Zettabytes. It would take approximately 11 trillion years to
download a Yottabyte file from the Internet using high-power broadband. You can compare it to the World
Wide Web as the entire Internet almost takes up about a Yottabyte.
Brontobyte: A Brontobyte is (you guessed it) approximately 1,000 Yottabytes. The only thing there is to
say about a Brontobyte is that it is a 1 followed by 27 zeroes!
23
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Geopbyte: A Geopbyte is about 1000 Brontobytes! Not sure why this term was created. I'm doubting that
anyone alive today will ever see a Geopbyte hard drive. One way of looking at a geopbyte is 15267
6504600 2283229 4012496 7031205 376 bytes!
Now you should have a good understanding of megabytes, gigabytes, terabytes and everything in
between. Now if we can just figure out what a WhatsAByte is......:)
Data. – Data is raw and it’s abundant. It simply exists and has no significance beyond its existence . It
can exist in any form, usable or not. It does not have meaning of itself. Collecting users activity log will
produces data.
Information. – Information is data that has been given meaning by way of relational connection.
Knowledge. - Knowledge is the appropriate collection of information, such that its intent is to be useful.
Internet users are generating petabytes of data every day. Millions of users access billions of web pages
every millisecond, creating hundreds of server logs with every keystroke and mouse click. Having only
user log data is not useful. To give better service to user and generate money for business it is required
to process raw data and collect information which can be used for providing knowledge to users and
advertisers. Source: http://www.whatsabyte.com/
Based on these figures, I opine that intelligence exists out there just waiting to be tapped. Oh, come on
now, you do have search engines to help research that data; it’s only 8 zetabytes! Lots of data but guess
what, even Google which is considered currently the best search engine, has only indexed about 170
terabytes. Now you know why I recommend using more than one search engine with good keywords to
assist.
The 304th Military Intelligence Battalion's Mission The 304th Military Intelligence Battalion
conducts Soldier and Leader training; instilling the Tenets of Leadership, a Warrior Ethos, and
the Army Values in order to produce MI professionals who can conduct and lead Military
Intelligence operations in an Army or Joint-Interagency-Intergovernmental-Multinational (JIIM)
environment. 304th MI BN - Leaders of the Corps! The 304th Military Intelligence Battalion is
24
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
located in Fort Huachuca, Arizona and is a subordinate unit of the 111th Military Intelligence
Brigade.
IKN is a Knowledge Management tool and dynamic portal that enables Intelligence Soldiers all
over the world to communicate, collaborate and investigate. IKN serves as the Intelligence
Warfighter Forum and hosts discussion forums, a single point of entry to access Intelligence
Community websites, and provides a variety of public and private web applications that support
the Intelligence Community and the Warfighter.
Military Intelligence Students (new to IPB/COAs/MDMP or just need a refresher) give these sites a
visit. http://www.s2company.com/index.php
25
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Food And Drug Incident Mapping (map displays food/medicine items…Spurious, Adulterated,
Counterfeit, Contaminated, Tampered-With, Misbranded/Mislabeled, Recalled, Expired, and otherwise
dangers products such as Food, Medicine, Tobacco, Alcohol, Meat/Seafood, and sometimes things like
toys or jewelry, animal feed, and anything else that comes into contact with humans or things we
consume) http://food.globalincidentmap.com/home.php
26
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Silobreaker (for those familiar with Analyst Notebook, I think you’ll like this)
http://www.silobreaker.com/
Global Terrorism Database http://209.232.239.37/gtd1/
Interactive Global Incident Map (Terrorism Events and Other Suspicious Activity)
http://www.globalincidentmap.com/
PlanetData http://www.planetdata.net/worldnews/newsmap.php
Google News Map http://douweosinga.com/projects/googlenewsmap
Alert Map Actual Incidents http://visz.rsoe.hu/alertmap/woalert.php?lang=eng
Baghdad: Mapping The Violence
http://news.bbc.co.uk/2/shared/spl/hi/in_depth/baghdad_navigator/
Interactive Map Beta http://www.alertnet.org/map/
Public Intelligence in The Public Interest http://meta2.com/pdb/
RSOE Emergency And Disaster Information Service From Budapest, Hungary
http://visz.rsoe.hu/alertmap/
The Global Terrorism Database (GTD) is an open-source database including information on
terrorist events around the world since 1970 (currently updated through 2004). Unlike many other event
databases, the GTD includes systematic data on international as well as domestic terrorist incidents that
have occurred during this time period and now includes almost 80,000 cases. For each GTD incident,
information is available on the date and location of the incident, the weapons used and nature of the
target, the number of casualties, and -- when identifiable -- the identity of the perpetrator.
http://www.start.umd.edu/data/gtd/
Tracking The Threat (is database of open source information about the Al Qaeda terrorist
network, developed as a research project of the FMS Advanced Systems Group. Our goal is to apply new
technologies and software engineering approaches to open source intelligence while providing
researchers and analysts with information about Al Qaeda) http://www.trackingthethreat.com/
LiveLeak http://www.liveleak.com/live
Ogle Earth Ogle Earth brings you news about virtual globes, with a special focus on Google Earth.
http://www.ogleearth.com/
Mapping The Future http://mappingthefuture.csis.org/imagemap.shtml
http://mappingthefuture.csis.org/mappingthefuturebig2.pdf
Globalis - an interactive world map Globalis is an interactive world atlas where you decide what
is to be displayed on the map. Globalis aims to create an understanding for similarities and differences in
human societies, as well as how we influence life on the planet. This is primarily done using visual
means. http://globalis.gvu.unu.edu/
How To Use Globalis http://globalis.gvu.unu.edu/doc.cfm?page=help
LiveShips Map (See where water vessels are located at any time, Vessel positions may be up to
one hour old or incomplete.) http://www.marinetraffic.com/ais/
Vessel Tracker http://www.vesseltracker.com/en/Home.html
Access by Topic
http://www.gpo.gov/fdsys/search/pagedetails.action?granuleId=&packageId=GPO-
911REPORT&fromBrowse=true
Acquisition
27
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Afghanistan/Pakistan
Afghanistan News Updates
https://www.cimicweb.org/cmo/afg/Pages/AFGTopNews.aspx
Afghan Wiki
http://www.afghanwiki.com/en/index.php?title=Main_Page
Who’s Who in Afghanistan
http://www.afghan-bios.info/
Army Guide to Political Groups in Afghanistan
http://publicintelligence.net/ufouo-u-s-
army-guide-to-political-groups-in-afghanistan/
LiveLeak Afghanistan
http://www.liveleak.com/c/afghanistan
Afghanistan Provincial Reconstruction Team Handbook
http://usacac.army.mil/cac2/call/docs/11-16/toc.asp
Afghan Security Forces Order of Battle (OOB)
http://www.longwarjournal.org/oob/afghanistan/index.php
Opium Survey 2011 All Regions
http://www.unodc.org/documents/afghanistan//Opium_Surveys/Winter_Rapid_Assessment/Winter_asses
sment_Phase_12_FINAL.pdf
Paramilitary Terrorist Insurgent Groups http://cryptome.org/dodi/af-insurgents.zip
UN Maps Out Afghan Security Interactive Maps
http://online.wsj.com/article/SB10001424052970203568004576043842922347526.html?mod=WSJ_hp_L
EFTTopStories
Afghanistan War Videos http://www.afghanistanwarvideos.com/the-tau-of-terrorism
Afghanistan Facilities http://www.globalsecurity.org/military/facility/afghanistan.htm
Afghanistan Maps http://www.globalsecurity.org/military/world/afghanistan/maps.htm
Kajaki Dam Afghanistan http://cryptome.org/eyeball/kajaki-dam/kajaki-dam.htm
Afghanistan Special Coverage http://www.thrall.org/special/af.html
Afghanistan Maps http://www.lib.utexas.edu/maps/afghanistan.html
All Afghanistan News
http://topics.nytimes.com/top/news/international/countriesandterritories/afghanistan/index.html?scp=1-
spot&sq=afghanistan&st=cse
AfPak Daily Brief has terrific analysis from experts and publishes a daily brief of the latest
news from the region. http://www.pbs.org/wgbh/pages/frontline/talibanlines/etc/links.html
Wikileaks http://wikileaks.org/wiki/Category:Afghanistan
Civil-Military Overview https://cmo.act.nato.int/Pages/CMOwelcome.aspx
The Afghanistan Airport Guide
http://www.the-airport-guide.com/search.php?by=country&search=Afghanistan
Airports and Bases http://eyeball-series.org/af-bases/af-bases.htm
Asadabad Fire Base Helicopter Landing Zone
Bagram
Gardez South Helicopter Landing Zone
Herat
Jalalabad
Kabul International
Kandahar
Khost
Kunduz
Maimana
Marnah Ghar
Mazar I Sharif
28
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Sheberghan
Shindand
Tereen
Pakistan Maps. I have included Pakistan because of their common border and the role being
played out by the insurgents. http://www.nps.edu/Programs/CCS/Pakistan_Index.html
Afghanistan Information Management Services (great source for various maps) Should be of
interest to all branches. http://www.aims.org.af/root.aspx?seckeyz=39
Kabul Specific Maps http://www.nps.edu/Programs/CCS/Kabul.html
Afghanistan
https://www.intelink.gov/sharepoint/osp/Afghanistan%20OSINT%20Products/Forms/AllItems.aspx
Afghanistan Order of Battle 2007 FOUO (listed as FOUO but yet anyone can have access to it)
http://cryptome.org/dodi/afghan-battle.zip
Afghanistan Terrain Analysis FOUO (can be accessed by anyone)
http://cryptome.org/dodi/afghan-terrain.zip
Winning In Afghanistan http://cryptome.com/0001/afghan-win.htm
Africa
Africa-Wide Seychelles Swaziland
Central Africa Somalia Zambia
Angola South Sudan Zimbabwe
Burundi Sudan
Cameroon Tanzania
Central African Republic Uganda West Africa
Chad Benin
Congo-Brazzaville Burkina Faso
Congo-Kinshasa North Africa Cameroon
Equatorial Guinea Algeria Cape Verde
Gabon Egypt Cote d'Ivoire
Rwanda Libya Gambia
São Tomé and Príncipe Morocco Ghana
Tunisia Guinea
Western Sahara Guinea Bissau
East Africa Liberia
Burundi Mali
Comoros Southern Africa Mauritania
Djibouti Angola Niger
Eritrea Botswana Nigeria
Ethiopia Lesotho Senegal
Kenya Malawi Sierra Leone
Madagascar Mozambique São Tomé and Príncipe
Mauritius Namibia Togo
Rwanda South Africa
AllAfrica (AllAfrica is a voice of, by and about Africa - aggregating, producing and distributing
2000 news and information items daily from over 130 African news organizations and our own
reporters to an African and global public. We operate from Cape Town, Dakar, Lagos, Monrovia,
Nairobi and Washington DC.) http://allafrica.com/
AFRICOM Command Overview http://cryptocomb.org/Overview-of-Africa-Command.pdf
African Armed Forces http://cryptome.org/2012/03/aafj-feb-2012.pdf
Africa Intelligence http://www.africaintelligence.com/
Business Council For Africa http://www.bcafrica.co.uk/
African Studies Center http://www.africa.upenn.edu/
Africa Odyssey http://www.africaodyssey.com/
AFRICOM Search by Country (great interactive map) http://www.africom.mil/interactiveMap.asp
29
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Agriculture
Al Qaeda/Taliban
Aljazeera
30
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Area/International Codes
Aviation
Track Planes in Real-Time with Google Maps (we just continue to make it easier for terrorists like
Al Qaeda to shoot down an aircraft. Aircraft and airports are very secure and getting inside poses a high
degree of risk, however, shooting down an aircraft away from the terminal would make a statement that
aviation still is not that safe.) http://planefinder.net/
Airport Law Enforcement Agencies Network (ALEAN) http://www.alean.com/
World Aero Data http://worldaerodata.com/
Worldwide Airfield Maps http://www.airfieldmaps.co.uk/
Thirty Thousand Feet http://www.thirtythousandfeet.com/airports.htm
World Aeronautical Database http://www.worldaerodata.com/
World Airport Database http://www.world-airport-database.com/
http://www.tyzo.com/suppliers/airports.html
World Airport Codes http://www.world-airport-codes.com/
31
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
32
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Biometrics
BLOGS
By David F. Carr DOD: Be wary of social media's 'loose lips'
In an earlier era, “loose lips sink ships” was the military’s warning not to let even small details
about military movements and operations slip in casual conversation. In contrast, social media Web sites
today thrive on loose lips, making it even tougher to maintain operational security. Even the smallest
details shared on social media sites can play a role in security breaches.
WASHINGTON — Everyone from troops in the field to the highest brass and civilian leaders will be
allowed to Twitter, blog and use Facebook and other social networking sites on the military's non-
classified computer network, the Pentagon has announced.
The new policy follows a seven-month review in which the Defense Department weighed the threats and
benefits of allowing the wide use of emerging Internet capabilities. It essentially seeks to manage the
risks while acknowledging the Internet is proving a powerful tool for a myriad of tasks including recruiting,
public relations, collaboration with a wide range of people and for communications between troops and
their families.
To guard security, it allows commanders to cut off access – on a temporary basis only – if that's required
to safeguard a mission or reserve bandwidth for official use. The new directive also makes practices
uniform across the entire department, in which different commands previously blocked certain things
while others didn't. Visiting sites for pornography, gambling or hate-crime activities is still prohibited on
military computers.
"We need to take advantage of these capabilities that are out there – this Web 2.0 phenomena," said
David M. Wennergren, deputy assistant secretary of defense for information technology. "The idea is be
responsible and use these tools to help get the job done."
The new directive means that YouTube, MySpace and more than a dozen sites blocked by the Pentagon
in May 2007 will be unblocked, he said. The Pentagon said at the time that the use of video sites in
particular was straining its network and using too much of its bandwidth. But Wennergren said Friday that
the move failed to stem the use of bandwidth because people just went to alternate sites.
http://www.fcw.com/Articles/2009/06/22/Operational-Security-Presentation.aspx
33
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
BLOGS, like social sites, are good sources of information harvesting for intelligence purposes if
you have the time and patience, especially the time. Good keyword searching will cut down on the time
you spend on BLOGS if your only reason for being there is to harvest information. It is very easy to get
distracted though with all the videos that appear daily and you have to be focused on the task. I think that
too much information is being passed around. A good analyst, foreign or domestic, can put together
enough information from BLOGS to build a good intelligence file. However, I realize that people are not
going to shut them down and too many folks out there want access to them.
34
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
World Blogs (One of the Web’s largest and most comprehensive directories of World Blogs, sorted by
country and region.)
BLOGS, like social sites, are good sources of information harvesting for intelligence purposes if you have
the time and patience, especially the time. Good keyword searching will cut down on the time you spend
on BLOGS if your only reason for being there is to harvest information. It is
very easy to get distracted though with all the videos that appear daily and
you have to be focused on the task. Personally, I think that too much
information is being passed around. A good analyst, foreign or domestic,
can put together enough information from BLOGS to build a good
intelligence file. However, I realize that people are not going to shut them
down and too many folks out there want access to them. Be careful how
you use them. Once you post information to a Blog it is basically there
forever.
Africa
35
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Cameroon, Cape Verde, Chad, Congo, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Ivory
Coast, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritius, Morocco, Mozambique,
Namibia, Niger, Nigeria, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, South Africa,
Swaziland, Tanzania, Togo, Tunisia, Uganda, Zambia, Zimbabwe
Americas
Antigua and Barbuda, Argentina, Bahamas, Barbados, Belize, Bermuda, Bolivia, Brazil,
British Virgin Islands, Canada, Cayman Islands, Chile, Colombia, Columbia, Costa Rica,
Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Grenada, Guatemala, Guyana,
Haiti, Honduras, Jamaica, Mexico, Montserrat, Nicaragua, Panama, Paraguay, Peru, Saint
Kitts and Nevis, Saint Lucia, Saint Maarten, Saint Vincent and the Grenadines, Suriname,
Trinidad, Trinidad and Tobago, Trinidad and Togago, Turks and Caicos, United
States/Global, United States/Puerto Rico, Uruguay, Venezuela
Asia-Pacific
Afghanistan, Australia, Bangladesh, Cambodia, China, Cook Islands, Fiji, Hong Kong, India,
Indonesia, Japan, Kazakstan, Korea, Kyrgyzstan, Malaysia, Mongolia, Myanmar, Nepal, New
Zealand, Pakistan, Philippines, Singapore, South Korea, Sri Lanka, Taiwan, Thailand,
Uzbekistan, Vietnam
Europe
Middle East
Bahrain, Egypt, Iran, Iraq, Israel and the Occupied Territories, Jordan, Kuwait, Lebanon,
Libya, Oman, Saudi Arabia, Sudan, Syria, United Arab Emirates, Yemen
Chart
http://www.nctc.gov/docs/2006_calendar_bomb_stand_chart.pdf
36
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Bridges
CALL https://call2.army.mil/Login.aspx?ReturnUrl=%2fdefault.aspx
37
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
(why would CAMS be included in this handout? Imagine being told you have to deploy to a certain
country to conduct an operation. You are told the weather is 40 degrees with a heavy overcast and it is
drizzling. You can only imagine an image of what it looks like. However, with a weather cam of the area
the image is vivid and in real time. Most major cities around the world have cams showing certain parts of
the city which can be very helpful when planning an operation. They can show areas to avoid and roads
that support your equipment.)
Chemical/Biological/Radiological
38
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.chem.gla.ac.uk/protein/jeremy/database/DBform.html
Chemical Stockpile Emergency Preparedness Plan http://emc.ornl.gov/CSEPPweb/
Emergency Preparedness and Response http://www.bt.cdc.gov/
Biological and Chemical Terrorism http://www.cdc.gov/mmwr/preview/mmwrhtml/rr4904a1.htm
http://www.cdc.gov/mmwr/PDF/RR/RR4904.pdf
http://www.stimson.org/cbw/?SN=CB2001121259
Bioterrorism http://www.academicinfo.net/terrorismbio.html
Chemical Terrorism http://www.health.state.ny.us/nysdoh/bt/chemical_terrorism/chemterr.htm
http://www.cidrap.umn.edu/cidrap/content/other/chem/index.html
http://www.health.state.mn.us/divs/eh/emergency/chemical/index.htm
http://www.unc.edu/depts/spice/chemical.html
Chemical Agents http://www.bt.cdc.gov/agent/agentlistchem.asp
http://cdp.dhs.gov/pdfs/agert/Chemical_Agents.pdf
Responding to Chemical Terrorism http://www.opcw.org/resp/
Chemical and Biological Weapons Resource Page http://www.unc.edu/depts/spice/chemical.html
The most dangerous U.S. chemical facilities http://cryptome.org/chem/chem-danger.htm
http://eyeball-series.org/chem/51chem-eyeball.htm
Biological Agents http://cdp.dhs.gov/pdfs/agert/Biological_Agents.pdf
Radiological Materials and Nuclear Weapons
http://cdp.dhs.gov/pdfs/agert/Radiological_Materials.pdf
Chem/Bio/Nuclear Anti Terrorism http://www.nbcnco.com/
Chemical Agents http://www.bt.cdc.gov/agent/agentlistchem.asp
Chemical Terrorism Wall Chart http://www.unc.edu/depts/spice/chemical.html
http://www.unc.edu/depts/spice/chart.pdf
http://www.unc.edu/depts/spice/bioter2.pdf
Bioterrorist Agents http://www.informedsource.info/images/bioterrorism%20chart.pdf
Chemical Terrorism Agents and Syndromes
http://www.informedsource.info/images/chemical-terrorism.pdf
Chemical and Biological Weapons Resource Page http://cns.miis.edu/research/cbw/index.htm
Glossary Of BioChem Terrorism http://www.yourdictionary.com/library/terror.html#geography
Chemical And Biological Weapon Site http://www.cdi.org/issues/cbw/
Chemical Casualty https://ccc.apgea.army.mil/
Anthrax http://www.nctc.gov/site/technical/anthrax.html
Biological Threats http://www.nctc.gov/site/technical/biological_threats.html
Chemical Agents http://www.nctc.gov/site/technical/chemical_agents.html
Indicators of a Possible Chemical Incident
http://www.nctc.gov/site/technical/chemical_incident.html
Ricin http://www.nctc.gov/site/technical/ricin.html
China
Chinese Aircraft Carrier http://www.snopes.com/photos/military/chinacarrier.asp
http://www.truthorfiction.com/rumors/c/China-New-Aircraft-Carrier.htm
http://www.bbc.co.uk/news/world-asia-pacific-13692558
China Military Power Mashup China Powerful Military News, images and videos information
http://www.china-defense-mashup.com/
Chinese Stealth Aircraft Photos (Clint Eastwood where are you?)
http://cryptome.org/0003/cn-stealth.pdf
http://bbs.rednet.cn/thread-24610276-1-1.html
Military and Security Developments Involving the People’s Republic of China 2010
http://www.globalsecurity.org/military/library/report/2010/2010-prc-military-power.pdf
Wikileaks http://wikileaks.org/wiki/Category:China
Chinese Military Power http://www.sinodefence.com/
http://www.comw.org/cmp/
http://www.sinodefence.com/military/default.asp
39
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
China
https://www.intelink.gov/sharepoint/osp/China%20OSINT%20Products/Forms/AllItems.aspx
http://www.atomicarchive.com/Almanac/PRCFacilities.shtml
http://www.fas.org/nuke/guide/china/index.html
http://www.globalsecurity.org/wmd/world/china/nuke.htm
http://www.nti.org/db/china/wnwmdat.htm
http://www.cdi.org/issues/nukef&f/database/chnukes.html
http://www.nuclearfiles.org/menu/key-issues/nuclear-weapons/issues/facilities/chinese-nuclear-weapons-
facilities.htm
Maps of China http://www.maps-of-china.com/index.shtml
The China Post News http://www.chinapost.com.tw/
Submarines
http://www.strategypage.com/fyeo/howtomakewar/databases/submarine_database/submarines.asp
China Brief http://www.jamestown.org/publications_view.php?publication_id=4
http://www.jamestown.org/publications_archives.php?publication_id=4
Chinese-Russian exercise with ships, tank, aircraft etc.
http://video.google.com/videoplay?docid=-8842216285861816122
http://video.google.com/videoplay?docid=1457349235872084447
Military Power of the People’s Republic of China
http://www.globalsecurity.org/military/library/report/2006/2006-prc-military-power.htm
Chinese Military Power http://www.comw.org/cmp/
Chinese Defence Today http://www.sinodefence.com/
China Leadership Monitor http://www.hoover.org/publications/clm
China Today (military weapons and equipment) http://www.chinatoday.com/arm/
Chinese Air/Land/Sea Strike Missiles http://www.softwar.net/c801.html
The New Chinese Air Force http://www.softwar.net/plaaf.htm
Chinese Missile Page http://www.softwar.net/dongfeng.html
People’s Daily Online (English version) http://english.peopledaily.com.cn/
http://english.people.com.cn/rss/China.xml
China Air & Naval Power http://china-pla.blogspot.com/
Sino Defence http://www.sinodefence.com/
China's J-10: An Imagery Analysis
http://intellibriefs.blogspot.com/2008/01/chinas-j-10-imagery-analysis.html
Hypothetical attack on U.S. outlined by China
40
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.airforcetimes.com/news/2008/01/airforce_china_strategy_080121/
The Chinese SAM Network http://geimint.blogspot.com/2008/01/chinese-sam-network.html
China’s Emerging Air-To-Air Missiles
http://www.strategycenter.net/research/pubID.181/pub_detail.asp
China’s Military Power Reports http://www.defenselink.mil/pubs/china.html
China’s Cyber-Militia
http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948
China’s Navy Into The Wild Blue Yonder
http://www.economist.com/world/asia/displaystory.cfm?story_id=11496828
Chinese Nuclear Forces http://www.thebulletin.org/files/064003009.pdf
China Air And Naval Power http://china-pla.blogspot.com/
China Defense Today http://www.sinodefence.com/
Military Aviation http://cnair.top81.cn/link.htm
Collective Intelligence
Computer Forensics
Anti-Forensics http://cryptome.org/0003/anti-forensics.pdf
COFFEE (free Computer Online Forensic Evidence Extractor Tools)
Incident Response Collection Report http://tools.phantombyte.com/
First Responder Evidence Disk (FRED)
http://www.forensicswiki.org/wiki/First_Responder%27s_Evidence_Disk
Windows Forensic Toolchest http://www.foolmoon.net/security/wft/
Forensic Acquisition Utilities http://www.gmgsystemsinc.com/fau/
Windows Forensic Toolkit http://www.governmentsecurity.org/archive/t4532.html
Windows Memory Forensics Toolkit http://forensic.seccure.net/
The Forensic Toolkit (WIN NT 4.0 SP3)
http://www.foundstone.com/us/resources/proddesc/forensictoolkit.htm
http://news.nationalpost.com/2011/11/25/graphic-the-state-of-
the-global-spy-game/
41
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Counterterrorism
Country Links/Studies
National Geospatial Intelligence Agency (Download Country Files) Complete Files of Geographic
Names for Geopolitical Areas from GNS (ISO/IEC 10646 [Unicode UTF-8] Compliant as of 18 July 2002).
We provide complete files of geographic names information covering countries or geopolitical
areas. The files are not in customary gazetteer format, but are in a special format amenable to input into
geographic information systems, databases, and spreadsheets, giving end users powerful capabilities for
data analysis, manipulation, and display. They are offered with both names formats provided within each
of the files: Reading Order format (Mount Everest) that works well with mapping applications, and
Reverse Generics format (Everest, Mount) that works well with gazetteer listings. Follow the links below
to learn more and to begin downloading files. Database most recent update - July 01, 2013. http://earth-
info.nga.mil/gns/html/namefiles.htm
Click here to Download a single compressed zip file that contains the entire country files dataset
(Approximately 381MB compressed/1.81GB uncompressed)
Marine Corps Intelligence Activity Country Handbooks (Requires ID and password for access
through Intelink)
42
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
The Department of the Army Intelligence Information Services (DA IIS) has roadmapped the
Internet by country. These Country Research Pages are provided as a courtesy to the
community. You must have access along with password in order to enter these sites.
43
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
44
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
45
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
46
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
47
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Critical Thinking
This free web-based training is provided as an introduction to Anacapa’s scheduled and on-site
courses in intelligence analysis. Upon completion of all three training modules, you may obtain a
certificate of completion. Click on a link below to go to each module.
http://www.anacapatraining.com/company/index.html
1. Introduction to Intelligence Analysis
(1 to 2 Hours)
2. Data Collection Tradeoffs
(2-3 Hours)
3. Critical Thinking Strategies
(2-3 Hours)
Essentials Of Critrical Thinking http://www.free-ed.net/free-ed/TextResources/critThink_01.asp
5. Persuasion through Rhetoric: Common Devices and 10. Inductive Arguments Analogical Arguments
Techniques Topic Overview
Topic Overview What You Should Learn
What You Should Learn Frequently Asked Questions
Frequently Asked Questions Tips on Applications
Tips on Applications Important Terms
Important Terms True/False Quiz
True/False Quiz Multiple-Choice Quiz
Multiple-Choice Quiz
11. Causal Arguments
6. More Rhetorical Devices: Psychological and Related Topic Overview
Fallacies What You Should Learn
Frequently Asked Questions
48
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Cuba
Military Air Bases And Airports http://eyeball-series.org/cu-mil-air/cu-mil-air.htm
Bauta Las Tunas San Luis Pinar L Rio
Bayamo Manzanillo Santa Fe
Cabaiguán Matanzas Santiago de Cuba
Camaguey Mayari Santiago de las Vegas (Havana)
Guáimaro Northeast Morón Trinidad
Guantánamo (Cuba) Morón Northeast Trinidad East
Guantanamo Naval Base (US) Querejeta (Havana) Villa Clara
Guane Sagua de Tánamo Wajay (Havana)
Holguín San Antonio de los Baños
Cultural Intelligence
49
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.valuebasedmanagement.net/methods_earley_cultural_intelligence.html
Cultural Intelligence and Modern Management
http://www.1000ventures.com/ebooks/bec_ebooks_cimm.html
http://www.1000ventures.com/business_guide/crosscuttings/cultural_intelligence.html
http://www.bkpub.com/static/culturalintelligence.pdf
Avoiding a Napoleonic Ulcer: Bridging the Gap of Cultural Intelligence (Or, Have We Focused on
the Wrong Transformation?)
http://www.mcu.usmc.mil/mcwar/irp/Documents/CJCS%20Essay%20-%20Smith.pdf
Culture and Technologies of Control
http://slash.autonomedia.org/analysis/02/11/05/1432210.shtml
University of Military Intelligence http://128.196.21.240/cultural/default.asp
Religion and Beliefs http://www.earthstation9.com/index.html?aircraf6.htm
Cultural Studies http://www.mcia.osis.gov/culture.htm
Iraqi Culture Smart Card (printable version) http://cryptome.org/iraq-culture.htm
http://www.fas.org/irp/doddir/usmc/iraqsmart-0506.pdf
Pew Global Attitudes Project (a series of worldwide public opinion surveys) http://pewglobal.org/
Multicultural
http://www.awesomelibrary.org/Classroom/Social_Studies/Multicultural/Multicultural.html
Muslim American Society http://www.masnet.org/
Field Support Modules http://fieldsupport.lingnet.org/afghanistan.html
Iraq/Afghanistan https://www.atsc.army.mil/crc/index.asp
Culture Link http://www.culturelink.org/
Middle Eastern Culture http://www.shira.net/culture.htm
http://www.albany.edu/history/middle-east/culture.htm
Global Connections http://www.pbs.org/wgbh/globalconnections/mideast/themes/culture/
Cultural Awareness Documents http://cgsc.leavenworth.army.mil/carl/resources/biblio/cultural.asp
http://www.au.af.mil/au/awc/awcgate/awc-lesn.htm
The Iraq Culture Smart Card http://cryptome.org/iraq-culture.htm
Kwikpoint Visual Language Translators http://www.kwikpoint.com/index.html
Arab Culture Comparative Cultural Patterns
http://www.sagepub.com/upm-data/11712_Chapter9.pdf
Languages Of The World http://www.nvtc.gov/
Cultural Understanding and Language Proficiency https://www.us.army.mil/suite/portal/index.jsp
The Joshua Project: Mission is to convert people to Christianity. However, the site contains a
wealth of information w/ respect to various peoples in the region, their respective languages and it can
come with a picture so one is familiar with the dress associated with that culture.
http://www.joshuaproject.net/
North Korean Short Video Clips http://www.vbs.tv/shows/north-korea/
Interactive Map: Sunni And Shia : The Worlds of Islam
http://www.pbs.org/wnet/wideangle/shows/iran/map.html
Islamic Holy Places http://en.wikipedia.org/wiki/Category:Islamic_holy_places
Online Readings In Psychology And Culture
http://www.ac.wwu.edu/~culture/contents_complete.htm
50
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.comw.org/rma/fulltext/infowar.html
http://gib.squat.net/infowar/
Institute for the Advanced Study of Information Warfare http://www.psycom.net/iwar.1.html
infowar: Term Contexts For 'weapon'
http://www.twurled-world.com/Infowar/Update2/V_infowar_TERM_weapon.htm
The Information Warfare Site http://www.iwar.org.uk/
Ms. Guidance: Cyber War http://www.t0.or.at/msguide/cyberwar.htm
Cyber Warfare and Information Security http://securefrontiers.com/index.php?sectionID=25
The Security Portal for Information System Security Professionals
http://www.infosyssec.com/infosyssec/infowar1.htm
Georgetown Essays on Information Warfare
http://www.cs.georgetown.edu/~denning/infosec/iw-essays/
Books on subject
http://www.amazon.com/exec/obidos/ASIN/0275974235/102-7751075-0251322
http://www.amazon.com/exec/obidos/ASIN/0072132604/102-7751075-0251322
http://www.au.af.mil/au/aul/bibs/infowar/if.htm
Frontline: CyberWar (How real is the threat of war in cyberspace, and what does the White House
know that the rest of us don't? FRONTLINE investigates a new war using embedded malicious code,
probes and pings, and other weapons aimed directly at America's power grid, water supply, and
transportation systems. Examples include The Slammer (Super Bowl Sunday), Nimda (a week after 9/11),
Code Red (summer 2001), and Moonlight Maze (from Russia's Academy of Science). View the entire 52
minute program here in six consecutive chapters.)
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/view/
China’s Cyber-Militia
http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948
I have yet to understand why researchers, even the serious types, tend to avoid databases. They
would rather google all day long in the hopes that the seeked information will magically appear, and
sometimes it does I do have to admit but for the most part it is time not well spent especially if you know
your subject and a database can return better results. (The majority of databases have their own internal
search engines that will cut down on the time spent searching.) You also have to remember there is no
such thing as the perfect search query for any of the search engines.
Wayback Machine (The Internet Archive is building a digital library of Internet sites and other
cultural artifacts in digital form. Like a paper library, we provide free access to researchers, historians,
scholars, and the general public [works extremely well with URL addresses])
http://www.archive.org/index.php
Statistics Resources and Big Data on the Internet
http://www.llrx.com/features/statisticsdataresources.htm
51
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
52
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://l-lists.com/en/lists/dz3a5t.html http://www4.uwm.edu/libraries/govinfo/stats.cfm
Local Area Unemployment Statistics (LAUS) Statistical Sites on the World Wide Web
http://www.bls.gov/lau/ http://www.bls.gov/bls/other.htm
LocalCensus.com - Census and Business Information Statistical Yearbook for Asia and the Pacific 2008
http://www.localcensus.com/ http://www.unescap.org/stat/data/syb2008/ESCAP-
Measuring America: The Decennial Censuses From 1790 SYB2008.pdf
to 2000 Statistics – Wikipedia
http://www.census.gov/prod/2002pubs/pol02marv-pt1.pdf http://en.wikipedia.org/wiki/Statistics
Monthly Bulletin of Statistics Online (MBS) Statistics.com - Research Statistics and Statistical
http://unstats.un.org/unsd/mbs Analysis Directory
Name Statistics http://www.statistics.com/
http://www.namestatistics.com/ Statistics Canada
National Agricultural Statistics Service http://www.statcan.gc.ca/start-debut-eng.html
http://www.nass.usda.gov/ Statistics Every Writer Should Know
National Bureau of Economic Research (NBER) http://nilesonline.com/stats/
http://www.nber.org/ Statistics Online Compute Resources (SOCR)
National Center for Education Statistics (NCES) http://socr.stat.ucla.edu/
http://nces.ed.gov/ Statistics on the Web
National Center for Health Statistics http://my.execpc.com/~helberg/statistics.html
http://www.cdc.gov/nchs/ Statistics Sources
National Statistics Online (UK) http://www.rba.co.uk/sources/stats.htm
http://www.statistics.gov.uk/ Survey of Buying Power Online
NationMaster - World Statistics and Country http://guides.emich.edu/content.php?pid=126805&sid=11230
Comparisons 70
http://www.nationmaster.com/ Tech Crunchies - Internet Statistics and Numbers
OECD.StatExtracts - Complete Databases Available Via http://techcrunchies.com/
OECD's iLibrary The Age of Exabytes – Tools and Approaches for
http://stats.oecd.org/ Managing Big Data
OFFSTATS - Official Statistics on the Web http://www.readwriteweb.com/reports/big-data
http://www.offstats.auckland.ac.nz/ The Impoverished Social Scientist's Guide to Free
Oracle and Big Data Statistical Software and Resources
http://www.oracle.com/us/technologies/big-data/index.html http://maltman.hmdc.harvard.edu/socsci.shtml
Periscopic – Socially Conscious Information The Internet Glossary of Statistical Terms
Visualization http://www.animatedsoftware.com/statglos/statglos.htm
http://www.periscopic.com/ The R Project for Statistical Computing
Platfora – Clarity from Big Data http://www.r-project.org/
http://www.platfora.com/ The Statistics Home Page
Quality and Comparative International Statistics http://www.statsoftinc.com/textbook/stathome.html
http://www.freepint.com/issues/080104.htm#feature The World Bank - Data
Random.org - True Random Number Service http://data.worldbank.org/
http://random.org/ Truthy - Analyzed and Visualize the Diffusion of
SISA - Simple Interactive Statistical Analysis Information on Twitter
http://home.clara.net/sisa/ http://truthy.indiana.edu/
Smithsonian/NASA Astrophysics Data System (ADS) UK National Statistics Online
http://ads.harvard.edu/ http://www.statistics.gov.uk/
Social Science Data Search UNdata - Data Access System to UN Databases (32
http://sunsite3.berkeley.edu/wikis/datalab/index.php?n=Main. Databases - 60 Million Records)
GoogleSearch http://data.un.org/
Social Statistics 2.0 - Open Database of Statistics UNESCO Institute for Statistics
http://www.postyour.info/ http://www.uis.unesco.org/ev.php?URL_ID=2867&URL_DO=
SORT (Statistics and Operations Research DO_TOPIC&URL_SECTION=201
Transactions) United Nations Statistics Division
http://www.idescat.cat/sort/ http://unstats.un.org/unsd/
States and Local Areas : National Data Book (U.S. United States Census Bureau
Census Bureau) http://www.census.gov/
http://www.census.gov/compendia/databooks U.S. and World Population Clocks
Statisphere http://www.census.gov/main/www/popclock.html
http://www.statisphere.govt.nz/ USA.gov – Data and Statistics
Statistical Abstract of the United States: 2012 http://www.usa.gov/Topics/Reference-Shelf/Data.shtml
http://www.census.gov/compendia/statab/ USA Trade Online
Statistical Analysis and Data Mining https://www.usatradeonline.gov/
http://www3.interscience.wiley.com/journal/112701062/home U.S. Business and Economy-Wide Statistics
Statistical Data Mining Tutorials - Tutorial Slides by http://www.census.gov/econ/economywide.html
Andrew Moore USDA Economics, Statistics, and Market Information
http://www-2.cs.cmu.edu/~awm/tutorials/index.html System
Statistical Education Through Problem Solving http://usda.mannlib.cornell.edu/
http://www.stats.gla.ac.uk/steps/ USITC Interactive Tariff and Trade DataWeb
Statistical Resources Online http://dataweb.usitc.gov/
http://jolis.worldbankimflib.org/Estats/stat245.htm U.S. Statistical Abstract
Statistical Resources on the Web http://www.census.gov/compendia/statab/
53
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
EuroStats http://epp.eurostat.ec.europa.eu/portal/page/portal/eurostat/home/
American Fact Finder http://factfinder2.census.gov/faces/nav/jsf/pages/index.xhtml
Census https://www.census.gov/dataviz/
Health Map http://www.healthmap.org/en/
The World Bank http://data.worldbank.org/
UNDATA A World of Information (23 databases with 60 million records)
http://data.un.org/
Federal Statistics http://www.fedstats.gov/
Databases by Subject http://www.uflib.ufl.edu/subjects.html
WEB Finding Tools http://library.nps.navy.mil/home/netsearch.htm
World Basic Information Library http://wbil.fmso.osis.gov/
Digital National Security Archive http://nsarchive.chadwyck.com/
ProQuest http://proquest.umi.com/pqdweb
http://proquest.umi.com/pqdweb?RQT=573&TS=1083434519&clientId=26841&LASTSRCHMODE=3
American Religion Data Archive http://www.thearda.com/arda.asp?Show=Home
Army Libraries Directory http://www.libraries.army.mil/
CountryWatch http://www.countrywatch.com/
Early Bird http://ebird.afis.osd.mil/
Databases http://library.nps.navy.mil/home/databases.htm
Databases and Electronic Resources http://www.lib.monash.edu.au/databases/
Databases in Military Science http://library.nps.navy.mil/home/databasesmil.htm
EBSCO Support http://support.epnet.com/CustSupport/Customer/Search.aspx
http://web35.epnet.com/selectdb.asp?tb=1&_ug=sid+0603E65C%2DB41B%2D4AF8%2DBB48%2D2EA7
F7E7980E%40sessionmgr6+cp+1+1444&_us=dstb+DB+sm+DB+1D03&_uso=hd+False+C560&daerr=tr
ue
Britannica Online http://www.britannica.com/
Federal Government Resources on the WEB http://www.lib.umich.edu/govdocs/federal.html?
Government Search http://www.queryserver.com/government.htm
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html
Library Web http://www.lib-web.org/
FirstGov http://www.firstgov.gov/
The Educator’s Reference Desk http://www.eduref.org/
54
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
55
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Latin America Data Base (LADB is the first Internet-based news service in English about Latin
America, publishing in-depth coverage of Latin American affairs since 1986)
http://ladb.unm.edu/
ResearchBuzz (News about search engines, databases, and other information collections)
http://www.researchbuzz.com/wp/
Hudson Institute http://www.hudson.org/
(Center on Islam, Democracy, and the Future of the Muslim World)
http://www.futureofmuslimworld.com/
Science & Technology Database http://www.stn-international.de/
International Database US Census Bureau http://www.census.gov/ipc/www/idbnew.html
Guide to Foreign and International Legal Databases http://www.law.nyu.edu/library/foreign_intl/
The Middle East Media Research Institute http://www.memri.org/index.html
Global Terrorism Analysis http://jamestown.org/terrorism/archives.php?publication_id=15
The National Security Archive http://www.gwu.edu/~nsarchiv/
STINET MultiSearch (STINET MultiSearch is a STINET feature intended to assist the DOD
community to access pertinent scientific and technical information over a wide range of sources)
http://multisearch.dtic.mil/
Public STINET http://stinet.dtic.mil/
Energy Files (At this site you will find over 500 databases and Web sites containing information
and resources pertaining to science and technology of interest to the Department of Energy, with an
emphasis on the physical sciences) http://energyfiles.osti.gov/
Science Research (a free, publicly available web portal allowing access to numerous scientific
journals and public science databases. It allows students, teachers, professors, researchers, and the
general public to access pertinent science information quickly and easily)
http://www.scienceresearch.com/search/
Terrorism Monitor Archives http://www.jamestown.org/terrorism/archives.php?publication_id=9
International Relations And Security Network http://www.isn.ethz.ch/
Monterrey Institute Of International Studies http://www.cns.miis.edu/
Directory of Open Access Journals http://www.doaj.org/
Satellite Database
http://www.ucsusa.org/global_security/space_weapons/satellite_database.html
Search For Buildings Anywhere On Earth http://www.emporis.com/en/
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html
http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html
Databases by Subject http://www-library.st-andrews.ac.uk/External/databasessubject.html
http://www.co.henrico.va.us/library/DB&Web/ERpubsubj.htm
http://www.uflib.ufl.edu/subjects.html
USGS Map Databases http://education.usgs.gov/common/map_databases.htm
BUBL LINK Catalogue: Selected Internet resources covering all academic subject areas.
http://www.bubl.ac.uk/
Authoratory (The content of Authoratory is produced by a computer program analyzing millions
of articles indexed by PubMed. The articles published by each author are carefully inspected to create a
personalized report. All of the reports all available here on the Authoratory web site)
http://www.authoratory.com/
Telecommunications Database http://www.telcodata.us/
MIPT Terrorism Knowledge Base http://www.tkb.org/Home.jsp
Directory Of Open Access Journals (Welcome to the Directory of Open Access Journals. This
service covers free, full text, quality controlled scientific and scholarly journals. We aim to cover all
subjects and languages. There are now 2686 journals in the directory. Currently 803 journals are
searchable at article level. As of today 133242 articles are included in the DOAJ service
http://www.doaj.org/
FedWorld http://www.fedworld.gov/
The University of Michigan Library Documents Center http://www.lib.umich.edu/govdocs/
The Library of Congress http://www.loc.gov/index.html
International Terrorist Symbols Database http://www.adl.org/terrorism/symbols/default.asp
56
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Datamining Tools
NationMaster http://www.nationmaster.com/index.php
Tools For Data Mining http://www.ncbi.nlm.nih.gov/Tools/
Defense
57
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
The Department of Homeland Security Open Source Enterprise (DHS-OSE) has just released
two new daily Open Source products to the Homeland Security Central website on Intelink-U
(https://www.intelink.gov/hls) and the Homeland Security Information Network-Intelligence (https://hsin-
intel.dhs.gov/).
With the large success of the DHS Daily Cyber Report, the DHS-OSE has started reporting open source
information on medical and health related hazards, as well as human smuggling and trafficking.
Respectively, these new open source products are titled: DHS Daily Infectious Diseases Report & DHS
Daily Human Trafficking Report.
Listed below is a short description of each:
The DHS Daily Infectious Diseases Report is collected each weekday as a summary of medical
and health related hazards published from open-source information concerning the homeland.
The DHS Daily Human Trafficking Report is collected each weekday as a summary of human
smuggling/trafficking related open-source information.
Each of these new products along with the Daily Cyber Report are available for PDF download at
the above secure web addresses and are available via unclassified e-mail subscription. There are also
several other new open source reports to be released that focus on:
Drug Trafficking,
Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE),
Illicit Commercial Trafficking, and
Weapons Trafficking
These DHS-OSE open source products originate from Internet sources and open source
information. They are unclassified products that can be widely distributed. Point of contact is Tom Link at
thomas.link@dhs.gov or tom.link@ugov.gov
58
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.dhs.gov/xinfoshare/programs/editorial_0542.shtm
The Department of Homeland Open Source Enterprise has launched their "Introduction to Open
Source" Online Training Modules to Intelink-U. https://www.intelink.gov/sites/dhs-ose/training/default.aspx
Threat Assessment: Hotels
https://www.ndpci.us/members/modules/dms/file_retrieve.php?function=view&obj_id=1127
Department of Justice
USDOJ Search Engine
http://searchjustice.usdoj.gov/search?site=default_collection&client=default_frontend&output=xml_no_dtd
&proxystylesheet=default_frontend&proxycustom=<HOME/>
59
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Geektools http://www.geektools.com/whois.php
InterNic http://www.internic.net/whois.html
Multiple DNS Lookup http://www.bankes.com/nslookup.htm
Webserver Search http://news.netcraft.com/
Query the APNIC Whois Database http://www.apnic.net/apnic-bin/whois.pl
RIPE Whois Search http://www.ripe.net/perl/whois
Check Domain http://www.checkdomain.com/
Super DNS Lookup http://cgibin.erols.com/ziring/cgi-bin/nsgate/gate.pl
Network Administrators Guide http://www.ibiblio.org/mdw/LDP/nag/node1.html
Query Tools http://www.wdi.co.uk/testTools/querytools.phtml
Internet Tools http://www.wowarea.com/english/help/tools.htm
60
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
limited to Mexico and the United Nations Office on Drugs and Crime (UNODC) indicate that the Sinaloa
organization maintains a presence in countries like Argentina, Ecuador, Peru, Panama, Costa Rica, and
Guatemala. People tied to the Federation have also been found in Australia and Malaysia, as well as in
other European countries. "El Chapo" Guzman, the visible leader of the cartel, is the most wanted
criminals by the governments of Mexico and the United States, but that did not stop the Forbes magazine
from including him in its list of the one thousand most richest and influential people in the world. The
cartel is dedicated to the smuggling of heroin, marijuana, and cocaine, in addition to dominating the
market for synthetic drugs, which are produced in clandestine laboratories which are mainly located in
Nay arit, Jalisco, Michoacan, Colima, and Baja California. According to reports from the US Department
of Justice, the Sinaloa Federation has an extensive distribution network in the country, covering at least
50 cities.
CurrentLeaders: Joaquin Guzman Loera, "El Chapo," Ismael Zambada Garcia, "El Mayo," Juan
Jose Esparragoza Moreno, "El Azul,".
Arrested or killed: Ignacio Coronel, "El Nacho," killed during a clash with the Navy. Vicente
Zambada Niebla, "El Vicentillo," arrested. Jesus Zambada Garcia, "El Rey," arrested. Martin Beltran
Coronel, arrested. Teodoro GarciaSimentel, "El Teo," arrested.
Los Zetas
Six years ago, at the beginning of the war launched by the Mexican Government against drug
trafficking, this group was the armed wing of the Gulf Cartel, with which it broke in 2010.
But even before their split, Los Zetas were already operating on their own. According the Public
Security Secretariat (SSP) and the US Drug Enforcement Agency, the organization established a network
of drug suppliers from Central America to the northern Mexican border. The cartel virtually controls all
coastal states in the country from Quintana Roo to Tamaulipas and Coahuila. Its influence includes
countries like Guatemala, where the government of that country considers them the main threat to its
national security, although there is also documentation on ties to the Italian mafia known as Ndrangheta.
Los Zetas are not only involved in drug trafficking. According to Mexican authorities, the group controls a
group involved in extortion and kidnapping, especially of undocumented migrants. It also protects or
extorts gangs involved in piracy of music albums, videos or clothing. But its main trait is the extreme
violence with which it operates. Experts agree that Los Zetas changed drug trafficking in Mexico, not only
because of the cruel way in which they kill their rivals, but also because of the operational structure they
deployed in its territory. A legacy of its past: The cartel was created with about thirty former military elite
bodyguards, who were hired as personal bodyguards for the then leader of the Gulf Cartel, Osiel
Cardenas Guillen. Now the group is composed of hundreds of cells, known as estacas, with 20 hitmen
each. The groups are headed by a local leader, who in turn is led by a regional leader. The chain ends in
the leader of the carte, who was HeribertoLazcanoLazcano, "El Lazca" or "The Excutioner," who died
during a clash with the Navy on 7 October.
He was the last former military from those who founded the organization. Experts such as George
Grayson expect his successor to be Miguel Trevino Morales, "El Z-40," who was second in command.
Analysts insist that the succession will not be easy, since for several months the organizations was
experiencing an internal struggle that seems to be focused in the states of northeastern Mexico. So far it
is not clear if the death of El Lazca will affect the operation of the cartel, or whether "El Z-40," will be able
to take over without any problems. The specialist said that "He is ready to move forward with his interests
with an unspeakable violence." However the Stratfor Consultant said that the death of "El Lazca" will not
affect the carte.
CurrentLeaders: Miguel Trevino Morales, "El Z40, • Eduardo Almanza Morales, and Octavio
Almanza Morales.
Captured or Killed Leaders: Heriberto Lazcano Lazcano, "El Lazca", dead, Jaime Gonzalez
Durán, "El Hummer," captured, Jesus Enrique Rejon Aguilar, "El Mamito,"captured, Flavio Mendez
Santiago, "El Amarillo," captured, Raul Lucio Hernández, "El Lucky," captured, Raymundo Almanza
Morales, "El Gori," captured, Sigifredo Najera Talamantes, "El Canicon," captured Sergio Pena Mendoza,
"El Concord," captured, Ricardo Almanza Morales, "El Gori1,• dead, Salvador Alfonso Martinez
Escobedo, "La Ardilla," captured, Omar Martin Estrada Luna, "El Kilo", captured.
Juarez Cartel
61
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
It used to be the strongest drug trafficking group in Mexico with presence in half of the country,
but now its territory is limited to some town in Chihuahua, in the northern part of the country, and in
Queretaro and Quinta Roo in the south. The Juarez Cartel, according to Stratfor consulting firm and the
Federal Bureau of Investigations (FBI) of the United States lost the battle against the Sinaloa Federation,
with which it was allied at one point. The group led by Joaquin Guzman Loera, "El Chapo," snatched
control of virtually all of Chihuahua border region with the United States, one of the major sites for drug
trafficking and also displace it in the stronghold in Sinaloa and Guerrero. The dispute over the territory
was fought especially in Ciudad Juarez, which is considered the most violent people in Mexico and where
6,000 people died over a 2-year period. The Juarez cartel led by Vicente Carrillo Fuentes, "El Vicerroy,"
established an alliance with the group of Los Zetas in order to defend themselves against their rivals, but
was not able to retain its market. Now, it is engaged in the export of heroin, marijuana, cocaine, and
synthetic drugs primarily through Ciudad Juarez, where it also controls a gang engaged in the extortion of
merchants. At the beginning of 2012, Stratfor predicted the possible end of this organization, which was
confirmed months later by one of its lieutenants, Guillermo Castillo Rubio, "El Pariente," who confessed
that the cartel "was weakened."
Current Leaders: Vicente Carrillo Fuentes, "El Viceroy" Juan Pablo Ledesma, "El JL."
Arrested or killed leaders: Vicente Carrillo Leyva, captured, Elmy Hermosillo Trujillo, "El
Potrillo," captured, Pedro Sanchez Arras, "El Tigre," captured Rogelio Segovia Hernández, "El
Royser,"captured, Luis Guillermo Castillo Rubio, "El Pariente," captured.
South Pacific Cartel: Until January 2008, this group, led by the Beltran Leyva brothers were part
of the Sinaloa Federation.
But the alliance ended with the capture of Alfredo Beltran, "El Mochomo." The leaders of the
group accused Joquin Guzman Loera, "El Chapo," of tipping of authorities of "El Mochomo's"
whereabouts. From that moment on began a dispute between the organizations that spanned several
states in the country. In that battle the cartel allied with the group of Los Zetas and even sought the
support of the Juarez Cartel. However, the death of its main leader, Arturo Beltran, "El Barbas," in
December 2009, as well as the separation of various lieutenants weakened the position of the group.
Currently the South Pacific Cartel maintains operation in Sinaloa and in some populations in Sonora in
the northwest, as well as in Morelos and Guerrero south of the country. It also operates in and around
Mexico City, the capital of the country, as documented by the Public Security Secretariat (SSP). One of
the leaders of the organization, Jesus Radilla Hernandez, "El Negro," is accused by authorities of the
murder of the son of the poet Javier Sicilia. The protest for the murder sparked the emergence of the
Movement for Peace with Justice and Dignity, which has brought together hundreds of victims of violence
from the war on drugs. One of the characteristics of the South Pacific Cartel is its ability to corrupt
policemen and official, according to specialists and authorities. An example was the so-called Operation
Clean Sweep, a joint investigation between Mexico and the United States to dismantle a network of
bribes given by the Beltran Leyva brothers to senior officials of the Office of the Attorney General of the
Republic and to employees of the US Embassy in Mexico. The South Pacific Cartel is mainly involved in
the smuggling of cocaine, marijuana and heroin.
Current Leaders: Hector Beltran Leyva, "El H," Mario Alberto Beltran Leyva, Fausto Isidro Meza
Flores, "El Chapo Isidro."
Captured or Killed Leaders: Arturo Beltran Leyva, "El Barbas," killed, Carlos Beltran Leyva,
captured, Alfredo Beltran Leyva, "El Mochomo,", captured, Sergio Villarreal, "El Grande," captured Oscar
Garcia Montoya, "The Hand WithEyes," capt ured Edgar Valdez Villarreal, "La Barbie," captured Gerardo
AlvarezVazquez, "El Indio," captured, Jesus Radilla Hernandez, "El Negro," captured, Hector Huerta
Rios, "La Burra,"captured
Gulf Cartel
At the beginning of the current government in 2006, the Gulf Cartel was experiencing several
problems. Its main leader, Osiel Cardenas Guillen, was in prison and it was quickly extradited to the
United States. Although it formally kept its alliance with the group of Los Zetas, within the organization
there were quarrels and divisions, as documented by the Public Security Secretary (SSP). In 2010 the
group of former soldiers completely separated from the cartel and from that moment on the cartel began
to lose its territory. Now, according to Stratfor Consultant and the SSP, this organization only has
presence in some towns in Tamaulipas, in the northeast of the country, especially in Matamoros and
62
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Reynosa. It also has groups operating in Nuevo Leon and San Luis Potosi. The Gulf Cartel has an
alliance with the Sinaloa Federation, which sent its armed group, the Jalisco New Generation to fight their
rivals. Stratfor also recently reported that the Knights Templar also sent hitmen to Monterrey to help the
cartel which has suffered major losses among its top leaders. The war that it is waging against its former
alies of Los Zetas, has caused the death of thousands of people, the disappearance of hundred more,
and forced whole communities into exile, which are fleeing the armed clashes.
Among the tolls of this dispute we can include the massacre of 72 undocumented migrants in San
Fernando in 2010, as well as the mass kidnapping of bus passengers who were killed and their bodies
buried in unmarked graves, known as narc-graves. Specialists agree that following the death of
HeribertoLazcanoLazcano, "El Lazca," the formal leader of Los Zetas, the Gulf Cartel might try to regain
territories with the help of other organizations, such as the Sinaloa Federation. Meanwhile, the group
maintains drug trafficking, especially cocaine, and marijuana, through the northern part of Tamaulipas
that borders the United States, an area stretching from Matamoros and Reynosa y Mexico to McAllen and
Pharr in Texas.
Current Leaders: Armando RamirezTrevino, "El Pelón," "Metro 24• or "Comandante Simple,"
Guadalupe Leal, "Lupito."
Captured or Killed Leaders: Antonio Cardenas Guillen, "Tony Tormenta,"dead, Jorge Eduardo
Costilla Sanchez, "El Coss," captured, Samuel Flores Borrego, "Metro 3,•dead, Gregorio Sauceda
Gamboa, "Caramuela," capturedHector Sauceda Gamboa, "El Karis," dead,IvanVelazquez Caballero, "El
Taliban," captured, Juan Gabriel Sierra Zermeno, "El Sierra", captured, Mario Cardenas Guillen, "El
Gordo,"captured.
63
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Federation, which had among its objectives to fight Los Zetas. We are talking of the Jalisco New
Generation Cartel. Some experts said that the group emerged in 2007 derived by the so-called Millenium
Cartel formed by the Valencia brothers, which operated in Jalisco and Michoacan. After the death of
Ignacio Coronel, "El Nacho," the third in command in the Sinaloa organization, the Jalisco Cartel virtually
became independent, according to Stratfor. Currently it has a presence in the states of Jalisco,
Michoacan, Colima, Quintana Roo, and the port of Veracruz. The Jalisco New Generation group controls
the production of chemical drugs in Jalisco and Colima, although its main task is to fight Los Zetas, who
are seeking to settle in the territory controlled by the Sinaloa Federation. This group also backs the Gulf
Cartel in its fight against the cartel of Los Zetas.
Current Leaders: Nemesio Oseguera Cervantes, "El Mencho."
Captured or KilledLeaders: Oscar Nava Valencia, "El Lobo," captured, Erick Valencia Salazar,
"El 85, • captured, Alberto Radillo Peza, "Pancho," captured, Abundio Mendoza Gaytan, "El Guero,"
captured.
Mexico Drug War Murders Since 2006 (Has a KML file to download for your own use in Google
Earth. Handy for those following the drug war)
http://www.google.com/fusiontables/DataSource?snapid=S193943h6vB
Cartels Unrelenting Conflict (has good interactive map)
http://www.msnbc.msn.com/id/32049643/ns/world_news-americas/
Narcotic News http://www.narcoticnews.com/Links-section-of-Narcotic-News.php
InSight Map: The Dangerous Journey North for Migrants
http://www.insightcrime.org/component/k2/itemlist/category/330-maps
Drug Related Interactive Maps http://www.insightcrime.org/
The Drug Violence in Mexico http://justiceinmexico.org/resources-2/drug-violence/
Blog Del Narco (WARNING – EXTREMELY GRAPHIC VIDEOS) http://www.blogdelnarco.com/
Field Guide to Mexican Drug Cartels
http://www.policemag.com/Channel/Gangs/Articles/2010/11/A-Field-Guide-to-Mexican-Drug-
Cartels.aspx
Drug Cartel Challenge Coin
http://www.policemag.com/Blog/Gangs/Story/2011/01/Drug-Cartel-Badge-Recovered.aspx
Street Terms - The Street Terms database contains over 2,300 street terms that refer to specific
drug types or drug activity. The database is used by police officers, parents, treatment providers and
others who require a better understanding of drug culture.
http://www.whitehousedrugpolicy.gov/streetterms/
Los Narcos (has not been updated) http://drugcartelinfo.blogspot.com/
PROJECT GUNRUNNER A Cartel Focused Strategy September 2010 (UNCLASSIFIED//LAW
ENFORCEMENT SENSITIVE) http://msnbcmedia.msn.com/i/msnbc/sections/news/Cartel_Strategy.pdf
Tracking Mexico's Drug Cartels http://www.stratfor.com/theme/tracking_mexicos_drug_cartels
Narco Mexico http://narcocartels.blogspot.com/
National Threat Assessments http://www.justice.gov/ndic/topics/ndtas.htm#Top
Drug Cartel Facts: Drug cartels are criminal organization developed with the primary purpose of
promoting and controlling drug trafficking operations. They range from loosely managed
agreements among various drug traffickers to formalized commercial enterprises…
http://www.freebase.com/view/en/drug_cartel
Mexican Drug Cartels In The United States
http://www.cnn.com/interactive/2009/05/world/map.mexican.cartels/index.html
The Southern Front (The U.S.Border on the Mexico border is divided into 9 sectors. Click on each
sector for more detailed information.) http://www.foxnews.com/hannity/sfmap/
Drug Cartels and Other Organized Crime Groups
http://www.drugstory.org/drug_traffic/cartel_organized.asp
The Narco News Bulletin (I would treat this one lightly, credibility is suspect)
http://www.narconews.com/
Drug War Clock http://www.drugsense.org/wodclock.htm
Drugs and Terrorism: A New Perspective (dated but useful)
http://www.dea.gov/pubs/intel/02039/02039.html
How Drug Prohibition Finances and Otherwise Enables Terrorism
64
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.cfdp.ca/eoterror.htm
How the Drug War in Afghanistan Undermines America’s War on Terror
http://www.cato.org/pubs/fpbriefs/fpb84.pdf
The Links Between Drug Prohibition and Terrorism http://www.cfdp.ca/terror.htm
Useful Sites http://faculty.maxwell.syr.edu/levitsky/useful_websites.htm
Afghanistan Drugs and Terrorism http://wwwc.house.gov/international_relations/108/91798.pdf
Crime, Drug Prohibition and Terrorism: An Inevitable Convergence http://www.narcoterror.org/
Mini Submarine http://www.saag.org/%5Cpapers14%5Cpaper1312.html
Common Sense for Drug Policy http://www.csdp.org/news/news/colombia.htm
The Real Drug Lords http://www.serendipity.li/cia/blum1.html
Mexico Fights US Drug War http://www.csdp.org/news/news/mexico.htm
The Globalization Of The Drug Trade http://www.unesco.org/most/sourdren.pdf
Drugs And Criminal Organizations http://www.interpol.int/Public/Drugs/default.asp
The Media Awareness Project - A worldwide network dedicated to drug policy reform. We inform
public opinion and promote balanced media coverage. http://mapinc.org/
You can hide drugs up your anus or vagina but a good customs agent will find them if
they’re suspicious. There are also experts who make a living packing suitcases and
rucksacks. It is possible to do it in a way that doesn’t show up on x-rays and that feels
genuinely like part of the baggage. It’s an acquired skill however and the customs boys
know exactly what to look for. Another popular method is to buy platform shoes and cut
out a space in the heels. This is hardly original but if you decide to try this please at least
get used to wearing the things first. You’ll look a little conspicuous overbalancing as you
walk through the airport.
65
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
66
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
67
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
68
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://online.wsj.com/article/SB10001424052748704288204575362862267177490.html?mod=
WSJ_hpp_LEFTTopStories#project%3DMEXDRUGWARS0912%26articleTabs%3Dinteractive
69
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
70
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
71
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
72
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Economic/Financial
E-Mail Lookups
73
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Energy
The Oil Drum (discussions about energy and our future. ) http://theoildrum.com/
Global Energy Network Institute http://www.geni.org/globalenergy/index2.shtml
Center for Global Energy Studies http://www.cges.co.uk/
Energy Central http://www.energycentral.com/
Energy Intelligence http://www.energyintel.com/
Electric Power Research Institute http://www.epri.com/
Energy Market Maps http://cryptome.sabotage.org/energy-eyeball.htm
http://www.eia.doe.gov/emeu/reps/eimap/ei_contents.html
California On-Line Energy Maps http://www.energy.ca.gov/maps/index.html
Department of Nuclear Energy
http://www.iaea.org/worldatom/Programmes/Nuclear_Energy/index.html
Databases and Directories http://www.platts.com/Databases%20&%20Directories/
Renewable Energy Projects http://www.crest.org/index.html
The Coming Global Energy Crisis http://www.energycrisis.org/
U.S. Department of Energy http://www.ciac.org/ciac/
World Energy Council http://www.worldenergy.org/wec-geis/
Energy Review http://archive.wn.com/2004/07/21/1400/energyreview/
Fauxtography a term used to describe instances of photojournalism (most coming from sources
in the Middle East) in which photos have been either misrepresented by staging or other means, or
manipulated with computer software. Source:
http://mediamythbusters.com/index.php?title=Fauxtography
Federal Government
74
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Fusion Centers
Fusion Centers Map, Locations, Contact Information http://publicintelligence.net/fusion-centers/
By Scott Buhrmaster, PoliceOne Columnist Across the country, gang activity continues to grab
headlines, as illustrated in numerous articles posted through PoliceOne recently. In Chicago, for example,
it has been reported that officers are battling an influx of several new and violent gangs to the city. The
New York Times reported earlier this month that although other types of homicides have fallen across the
country, gang-related murders rose a staggering 50 percent from 1999-2002 (the last year statistics were
75
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
available). Although strong counter-gang efforts by officers in Los Angeles and Chicago (the nation's
leading gang center) have effectively sparked a downtrend, LAPD Chief William J. Bratton, however,
called gang violence "the emerging monster crime in America," during a speech to a national gang
violence conference in Los Angeles this month. USA Today reported that some experts attribute an
increase in murders in the first six months of 2003 to an overall resurgence in gang activity in many cities.
And it likely comes as no surprise that even rural areas across the country are not immune to gangs. The
Charlotte Observer, for example, recently ran a feature article focused on the preemptive counter-gang
efforts of law enforcement in a rural North Carolina area where gang affiliation has surfaced. In fact, some
remote areas outside larger cities may even attract urban gang members looking for a place to set up
shop in an area where police resources may be fewer and, theoretically, awareness of gangs and tactics
to suppress them may be lesser. Regardless of where you work, you will likely face the challenge of
approaching gang members at some point in your career. For some of you, this may already be a daily
occurrence. For others, it may be a less frequent occurrence but nonetheless one you must be tactically
prepared for. Here are 10 pointers, presented specifically for patrol officers, to keep in mind when
approaching gang members. Although these really just scratch the surface of the myriad gangs contact
tips, they do serve as a solid foundation for your next gang contact. They also serve as a reminder that
contact with gang members has unique nuances that can make a dramatic difference between well-
controlled contact and a free-for-all. The better prepared you are to recognize them, the better prepared
you will be to safely navigate street contact with gang members. Stay alert to your surroundings.
Knowing that they attract police attention, gang members standing in a group on the street may
hide their weapons in easily accessible, nearby locations instead of on their person. Hiding spots of
choice would be those easily overlooked by officers but offering quick access to gang members. Good
examples are inside wheel wells of nearby cars, on top of parked car tires, inside a nearby garbage can,
under bushes or under a piece of garbage on the ground. Another surrounding threat may be gang
members-both friendly and rival-across the street from your contact, secreted in nearby alleys or in
vehicles, driving by. To fellow gang members, your contact with their street brothers and sisters may be
considered threatening and warrant distractive, perhaps offensive, action. To rival gang members, your
contact with their enemies may be seen as an opportunity to attack while the enemy isn't watching -
particularly if the attacker is looking to score points for courage (and stupidity) for attacking in police
presence. An ideal gang contact will involve three officers: a contact officer making direct contact with
the gang members, a primary cover officer spotting the contact officer and a secondary contact officer
scanning the surrounding area for threats. Obviously that kind of personnel isn't always available, but
when possible, the three-officer approach is preferable. Pay particular attention to underage juveniles.
Knowing that underage juveniles may face lesser weapons possession charges than older
members and may be considered less threatening to an approaching officer, gangs may have younger
members carry their weapons for them. When approaching gang members, stay keenly alert to the
younger members, both for the fact that they may be armed and for the fact that, in an effort to impress
older members, they may be more inclined to confront, challenge or act violently towards law
enforcement. Pay particular attention to females.
Under the assumption that officers approaching a group of gang members may make the
dangerous mistake of disregarding females as less of a tactical risk than males, gang members may have
females carry their weapons for them. They may also do so with the thought that male officers without a
female partner or a female officer close by may shy away from closely searching a female in the group,
particularly if efforts to do so are met with resistance, threats and ridicule. Be prepared to handle females
with as much tactical caution and thoroughness as you would with males. Watch out for dogs.
Obviously the presence of a dog should warrant special attention, but be aware that gang
members have been known to train dogs to respond to non-verbal attack commands like touching a pant
leg, pulling on a shirt or dropping a leash. A dog can be a dangerous, even deadly weapon. Handle its
presence at the scene as such. Avoid showing obvious disrespect.
In gang culture, respect is often worth more than gold and can make the difference between life
and death. Efforts to degrade, embarrass or show outward disrespect for gang members will likely be met
with strong resistance and may incite violence that otherwise could have been avoided. Regardless of
your true feelings, try to maintain an air of respect without alluding to weakness, inferiority or lack of
control of the situation. A facade of respect will help you maintain control and may yield mutual respect
that will prove beneficial at the point of contact and in the future. Do keep in mind, however, that in an
arrest situation anything goes. If, for example, a gang member you are arresting asks that you not cuff
76
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
him until he is out of eyeshot of his associates to avoid embarrassment, this is an obvious no-no. Tactical
soundness takes priority over all other considerations. Don't overreact.
"Overreacting tends to make officers appear to be someone who shows fear," says PoliceOne
gang expert and P1 Discussion Board moderator Bob Walker. "Gang members refer to this type of officer
as 'scary'--someone who shows fear and over reacts." Fear alludes to vulnerability and lack of control,
which may increase the chances that combative members may confront you. However, be sure that in
your effort to avoid overreacting you don't UNDERreact. Remain in control of yourself and the situation
while responding with the appropriate level of action. Know your jargon and your facts...or don't use
them.
One of the quickest ways to lose respect and credibility and to put yourself in danger when
dealing with gang members is to show signs of ignorance to gang jargon and culture. Although
communicating with gang bangers on a colloquial level may facilitate better communication, deeper
respect, and may yield more information, if you're not up to date on all the current street terms, don't use
them. The same holds true with gang-related facts. If you're not sure of what you're saying, don't say it. In
the world of gangs and law enforcement, ignorance is not bliss, it's dangerous. "Most street officers who
are not specifically assigned to gang units are dealing with all kinds of different people and occurrences,"
says Walker "They don't have the convenience of dedicating time to learning lots of gang slang and then
staying updated on changes. "Once you start using slang, you're opening the door to the rest of your
conversation being conducted in slang. If you're not fully confident of your ability to speak gang language,
it's better to use no slang at all than to toss out a few terms in an effort to be cool, and then find yourself
coming up short later in the conversation." Walk the walk.
Never threaten anything that you can't or won't follow through on. If you say you're going to
respond in a certain way if your questions aren't answered, do it. If you say action will be taken if certain
behavior isn't immediately terminated, take it. And on the flip side, if you promise something that you can
in fact provide in response to cooperation, follow through on your "agreement." Another quick way to
loose credibility and diminish the odds of future cooperation is to make shallow threats and meaningless
promises. Pay close attention to clothing.
Some gang wear is conducive to effectively hiding weapons. Things like baggy pants with deep
pockets, oversized shirts, thick coats, and ball caps lend themselves well to secreting a variety of
weapons including, of course, guns. Pay very close attention to the movements of gang bangers who
may be wearing clothes that are especially good for hiding weapons. Also remember to search very
thoroughly and cautiously when that level of contact is warranted. Use 'interest' as a means of gathering
intelligence.
You may be surprised at how much can be learned just by asking with interest and waiting for an
answer. Whenever possible, ask gang members questions that may yield valuable intelligence
information without a demanding or overbearing tone. Ask about things like leadership, new gang
members, upcoming activities, problems with rival gangs, shifts in territory...anything and everything that
may prove helpful to anti-gang efforts. Be sure to take notes when reasonable and be sure to share the
intelligence with your command staff, fellow officers and your gang unit.
Source: African-American street gang that and Wah Ching have been rivals of this
http://www.accuracyproject.org/GangAcro originated in Compton, California. gang.
nyms-US.html
ABT - Aryan Brotherhood of Texas -- A AC - Aryan Circle -- A white supremacist
AB - Aryan Brotherhood -- A white white supremacist prison/street gang street/prison gang that has spread to
supremacist prison/street gang founded in founded in Texas in the 1980s. dozens of states throughout the country.
the 1960s in California. 666 is another tag
associated with this Caucasian gang. ABZ - Asian Boyz -- An Asian-American ACB - Asian Crip Boys -- An Asian-
street gang that originated in Southern American street gang found in multiple
ABC - Altadena Blocc Crips -- A California, then later spread to a number locations, including--but not limited to--
predominantly African-American street of cities across the country. They have California, Washington, Illinois, Georgia,
gang based in the San Gabriel Valley of grown to become one of America's largest and North Carolina.
Southern California. Their name is Asian street gangs. Many of the ABZ sets
occasionally spelled "Altadena Bloc Crips" are comprised primarily of Cambodian- ACG - Asian Crip Girls -- An Asian-
or "Altadena Block Crips." Americans. AB, ABS, and 1 2 26 (1 = A, 2 American street gang. In Minnesota, this
= B, 26 = Z) are a few of the other tags gang is predominantly Hmong.
ABC - Asian Boy Crips -- An Asian- associated with this gang. Their colors
American street gang founded in include black, yellow, and green. A tattoo ADCC - Atlantic Drive Compton Crips -- A
Minnesota. of a dragon wrapped around the letter "A" Southern California street gang found
can occasionally be found on its south of Los Angeles in Compton.
ABCC - Acacia Blocc Compton Crips -- An members. Tiny Rascal Gangsters (TRG),
77
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
ADL - Altadena Denver Lanes -- A that originated in Los Angeles, California. American street/prison gang and drug
Southern California street gang found in They later popped up in a few other cartel that has been most active in the
the San Gabriel Valley. This Bloods' gang locations across the country. Southwestern United States.
is comprised primarily of African-
Americans. Red has been their chosen APO - Asian Pride Only -- An Asian- BA - Brown Authority -- A predominantly
color. American street gang most active in Hispanic street gang in Pico Rivera,
California and Oregon. California. Pico Viejo has been a rival of
AFO - Arellano-Felix Organization -- A this Los Angeles County gang.
major North American drug trafficking AS - Aryan Soldiers -- A white
cartel that is also know as the Tijuana supremacist street/prison gang. BB - Border Brothers -- A predominantly
Cartel. Hispanic prison/street gang that has been
ASW - Asian Street Walkers -- An Asian- most active in California and Arizona.
AGC - Avalon Gangsta Crips -- An American street gang that is occasionally Although they are primarily known as a
African-American street gang founded in known as Asian Street Warriors. They've prison gang, they have increasingly been
Los Angeles, California. been active in Utah, Idaho, and especially establishing a presence on the streets. 22
Stockton, California. Many of their and XXII are a couple of another tags
AIB - Asian Insane Boys -- An Asian- members have been of Cambodian associated with the Border Bros. (The
American street gang in Southern ancestry. number 2 represents the letter "B" -- thus,
California. 22 = BB.) Some cliques claim black as
A13 - Azusa 13 -- A predominantly their gang color.
AIGN - Almighty Imperial Gangster Nation Hispanic street gang in Southern
-- An African-American street gang. IG California. The gang (also known as BBH - Brown Brotherhood -- A
and AIG are a couple of other tags Varrio Azusa 13, and Varrio Azusa 13 predominantly Hispanic street gang that
associated with this gang. Rifa) can be found in the San Gabriel has arguably been most active in the
Valley community of Azusa, in Los California cities of Vallejo (in Solano
AKA - Asian Kick Ass -- An Asian- Angeles County. This Mexican Mafia County) and Whittier (in Los Angeles
American street gang in Southern affiliated gang has been accused of County). BBH 13 and BBHX3 are a couple
California. They've arguably been most engaging in a campaign of violence and of another tags associated with this gang.
active in the San Gabriel Valley, east of harassment to drive African-Americans
Los Angeles, California. out of the city of Azusa as well as prevent BCR - Brown Crowd Raza -- A Sureno
blacks from moving into the SGV city. In street gang found in the vicinity of
AKB - Asian Killa Boyz -- A Southern addition to the aforementioned hate Portland, Oregon.
California street gang based in the San crimes, a 2011 federal indictment also
Gabriel Valley. showed they sought to monopolize the BD - Black Disciples -- An African-
market for illegal drugs in Azusa, American street gang founded in Chicago.
AKP - Asian King Posse -- A California. They are also known as the Almighty
predominantly Hmong street gang in the Black Disciple Nation (ABDN).
Midwest. They've arguably been most ATC - Anaheim Travelers City -- An
active in Detroit, Michigan, Minneapolis/St. Anaheim, California street gang. BD - Black Dragons -- An Asian-American
Paul, Minnesota and Wisconsin. 116 is SouthSide Krooks (SSK) has been a rival street gang and organized crime syndicate
another tag associated with this Asian- of this Southern California gang. ATC LM that was founded in the 1980s. They've
American gang. (Anaheim Travelers City Los Malos) is been most active in Monterey Park and
another tag associated with this gang. Rosemead in the San Gabriel Valley, and
ALK - Almighty Latin Kings -- Founded in Los Angeles, California. Many of their
Chicago, Illinois, they are one of the AV - Ashland Vikings -- A predominantly members have been ethnic Chinese from
largest Hispanic gangs in the United Hispanic street gang based in Chicago, Vietnam. Black Dragons can occasionally
States. They're also known as the Latin Illinois. AVs and AVN (Ashland Vikings be identified by their use of the Oakland
Kings (LK), Almighty Latin King Nation Nation) are a couple of other tags Raiders' number 80 jersey of Jerry Rice.
(ALKN), and Almighty Latin King and associated with this gang. Their rivals
Queen Nation (ALKQN). include--but are not limited to--La Raza, BDS - Bulldogs -- A predominantly
Harrison Gents, Playboys, and Maniac Hispanic street/prison gang in Fresno,
ALKN - Almighty Latin King Nation (See Latin Disciples. California. FBD and F-14 (Fresno 14) are
above ALK entry) a couple of other tags associated with this
Aves - The Avenues -- A Mexican- gang. Red has been their traditional color.
ALKQN - Almighty Latin King and Queen American street/prison gang that has been
Nation (See above ALK entry) most active in northeastern Los Angeles, BG - Bassett Grande -- A Southern
California. Their turf has included California street gang that is also known
ANO - Aryan Nation Outlaws -- A white Highland Park, Glassell Park, as well as as Bassett Grande 13. LNO (Los Nite
supremacist gang that was reportedly sections of Cypress Park, and Eagle Owls) is another tag associated with this
founded by members of the Aryan Rock. Founded in the 1950s, the gang gang.
Brotherhood of Texas. (also known as Avenidas) was named for
the avenues in northeast L.A. that cross BGC - Broadway Gangsta Crips -- An
AOA - American Outlaws Association -- A Figueroa. They're very closely associated African-American street gang that
motorcycle gang also known as the with the Mexican Mafia (La Eme). originated in Los Angeles, California.
Outlaws Motorcycle Club and Outlaws Members of the Avenues have been NOTE: It's occasionally spelled Broadway
Nation. convicted of committing hate crimes Gangster Crips.
aimed at driving black residents out of the
AP - Armenian Power -- An Armenian predominantly Latino neighborhoods of BGF - Black Guerrilla Family -- An African-
street gang most active in Hollywood, northeastern Los Angeles. Highland Park American gang that was originally called
Glendale, the eastern San Fernando (HLP) has been a rival of this gang. The Black Family or Black Vanguard, and was
Valley, and western San Gabriel Valley of use of an apostrophe (Ave's) occasionally founded in 1966, at the San Quentin State
Southern California. AP 13, AP X3, and appears in tagging. A tattoo of a skull Prison in California.
AP XIII are a few of the other tags wearing a fedora is commonly found on
associated with this gang. many of its members. Cliques include BH - Big Hazard -- A predominantly
Drew Street, Cypress Aves, Division Mexican-American street gang found in
AP - Avenue Pirus -- A Southern Street (DVST), 43rd Aves, Avenues 57, East Los Angeles, California, and a few
California street gang that is occasionally etc. other locations across the country.
known as Avenue Piru Gang (APG).
BA - Barrio Azteca -- Founded in the BHB - Bad Hamo Bloods -- A street gang
APB - Athens Park Boys -- A street gang 1980s, Barrio Azteca is a Mexican- on the island of O'ahu in Hawai'i. They
78
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
have been most active in Kalihi, Honolulu, Catalina Island, off the coast of Southern BSV - Brown Society Vatos -- A Mexican-
Hawai'i. California. Some cliques claim black and American street gang most active in
tan as their gang colors. California and Georgia.
BHB - Big Head Boyz -- A street gang in
Boston, Massachusetts. Their turf has BPM - Brown Pride Mexicanz -- A BTK - Born To Kill -- A predominantly
included the area in the vicinity of the city Mexican-American gang found in multiple Vietnamese-American street gang
streets of Brunswick, Creston, and locations, including--but not limited to-- founded in New York in the 1980s.
Fayston. MIC (Magnolia Intervale Arizona, California, Oregon, and They've been active in several locations,
Columbia), and Columbia Road Rockies Washington. Their name is occasionally including--but not limited to--California,
have been rivals of this gang. spelled Brown Pride Mexicans. Some are Georgia, Hawaii, Mississippi, New Jersey,
affiliated with the Surenos and may tag New York, and Texas.
BHB - Bounty Hunter Bloods -- A BPMX3, BPM SUR X3 or BPM 13, while
predominantly African-American street others are affiliated with the Nortenos and BTK - Born To Kill Posse -- A
gang. Although they are primarily an East sometimes tag BPM 14. predominantly Caucasian street gang in
Coast gang found in Virginia and New Brooklyn, New York.
Jersey, they've also established BPR - Brown Pride Raza -- A Mexican-
themselves in a number of other locations American gang found in multiple locations, BTM - Blue Top Mob -- A Harlem, New
across the country. including--but not limited to--California and York-based street gang.
Oregon. BPR 13 is another tag associated
BHT - Barrio Hollister Territory -- A street with this gang. BTS - Brown Thugs -- A predominantly
gang in Hollister, California. This San Latino street gang.
Benito County gang is reportedly affiliated BPS - Black P. Stones -- An African-
with the Nortenos. American gang founded in Chicago in the BVNS - Barrio Van Nuys -- A Southern
mid-20th century. They've since grown to California street gang based in the San
BLD - Bloods -- A large, African-American become a nationwide presence. Originally Fernando Valley. BVNS 13 is another tag
gang that was founded in California. The called Blackstone Rangers, they are also associated with this gang.
Crips are the long-time rivals of the known as the Black P. Stone Nation
Bloods. Red has been this gang's (BPSN). CAC - Crazy Ass Criminals -- A California
traditional color. Bloods can frequently be street gang comprised primarily of
identified by their use of red clothing, BPS - Brown Pride Surenos -- A Hispanics.
and/or red bandanas. Red is also the predominantly Mexican-American street
preferred color of spray paint for Blood gang. They've arguably been most active CAM - Crazy Ass Mexicans -- A Mexican-
graffiti. in Southern California. BPS 13, BPS X3, American street gang. CAM 13 is another
and BPSXIII are a few of the other tags tag associated with this gang.
BLST - Barrio Libre South Tucson -- A associated with this gang.
Mexican-American street gang in Pima CB - Crazy Bloods -- A predominantly
County, Arizona. BLST 13 is another tag BPSC - Brown Pride Santa Cruz -- A Hmong street gang in Minnesota.
associated with this South Tucson gang. Santa Cruz County, California street gang.
CBC - Cold Blooded Cambodians -- A
BMC - Brown Magic Clique -- A BPT - Brown Pride Tokers -- A Mexican- Southern California street gang that later
predominantly Hispanic street gang that's American gang in Oregon. changed its name to Crazy Brother Clan.
found along the Oregon - Idaho border.
BMC has been most active in Nyssa, and BRB - Bird Road Boys -- A Florida street CBC - Crazy Boy Clan -- An Asian-
Ontario, in Malheur County, Oregon. gang that is also known as the Bird Road American street gang.
Boyz.
BOD - Boys of Destruction -- An African- CBC - Crazy Brother Clan -- A Southern
American street gang in St. Louis, BRD - Blood Red Dragons -- An Asian- California street gang founded in Long
Missouri. Their gang acronym can also American street/prison gang that is Beach. This predominantly Asian street
stand for "Brothers of Dorsey" or "Brothers occasionally known as the Boston Red gang was formerly known as the Cold
of Death." The Horseshoe Posse has Dragons. They've been active in the cities Blooded Cambodians.
been a bitter rival of this Crips' gang. of Boston, Chelsea, Fall River, Lowell,
Lynn, and Revere, Massachusetts. CFM - Crazy Fucking Mexicans -- A street
BP - Barrio Pobre -- A predominantly Naturally, red has been their traditional gang found in multiple locations, including
Hispanic street gang that's been most color. California, and the Portland, Oregon area.
active in California. They're occasionally known as the Crazy
BSL - Brown Side Locos -- A Fuckin' Mexicans.
BP - Brown Pride -- A Mexican-American predominantly Latino street gang that is
street gang found in multiple locations, arguably most active in California and C14 - Clanton 14 -- A Mexican-American
including California and Arizona. BP13 Georgia. street gang founded in Los Angeles,
and BPX3 are a couple of other tags California. They are reportedly one of the
associated with this gang. BST - Barrio Sur Trece -- A California oldest L.A. gangs, with roots dating back
street gang that occasionally uses the tag to the early 20th century.
BP - Brown Pride -- A Mexican-American BST 13.
street gang founded in Nashville, CHB - Crazy Hmong Boyz -- An Asian-
Tennessee. 218 and BP 218 are a couple BST - Blythe Street -- A Southern American street gang in Wisconsin. True
of other tags associated with this gang. California street gang also known as Asian Bloods (TAB) has been a rival of
Blythe Street 13 (BST 13). this Midwest gang.
BPA - Brown Pride Army -- A
predominantly Hispanic street gang found BS13 - Brown Side 13 -- A Sureno street CIVL - Cicero Insane Vice Lords -- A
in multiple locations, including Southern gang comprised primarily of Hispanics. street gang founded in Chicago, Illinois.
California, and Portland, Oregon. They've been active in several locations,
including--but not limited to--California, CL - Campo Locos -- A predominantly
BPL - Brown Pride Locos -- A Georgia, New York, Oregon, Tennessee, Hispanic street gang that's been most
predominantly Mexican-American gang and Washington. active in California.
found in numerous locations, including--
but not limited to--California, Florida, BSV - Blood Stone Villains -- A street CMG - Crenshaw Mafia Gangster Bloods -
Georgia, Indiana, Maryland, North gang that's found in several locations - A Southern California street gang
Carolina, Oregon, Texas, Washington, across the country. NOTE: It's founded in Los Angeles.
and Wisconsin. A BPL gang has even occasionally spelled Blood Stone Villainz.
been reported on the idyllic resort of COB - Color of Blood -- A predominantly
79
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Asian-American street gang that has been CEXCE13 is another tag associated with
most active in the San Francisco Bay this gang. ECB - Elm City Boys -- A predominantly
Area. This gang has been found in Contra African-American prison/street gang.
Costa County, California. Although DBS - Diablos -- A predominantly They've arguably been most active in the
members were initially Khmu (an ethnic Mexican-American street gang. EVD, New Haven, Connecticut area. More
group in Laos), COB has grown to include EVD1, VEV XIII, VEV SUR XIII, VEVX3, 5 recently, they have branched out to other
some African-Americans. Sons of Death 22 4, and 13 are a few of the other tags areas of Connecticut. Black and green are
(SOD) has been a rival of this gang. occasionally associated with this gang. their traditional colors.
COORS Family Skins - Comrades of Our DDP - Dominicans Don't Play -- A multi- ECC - East Coast Crips -- Contrary to its
Race's Struggle Family Skins -- A white national gang comprised primarily of name, this African-American gang actually
supremacist skinhead gang found in Hispanics of Dominican ancestry. originated in South Central Los Angeles,
Southern California. This Caucasian gang California. Florencia 13 (a large Mexican-
is also known as Coors Family Skinheads DF - Dragon Family -- An Asian-American American gang) has been one of ECC's
(CFS). street gang based in Northern Virginia. traditional rivals.
They've also been active in Maryland and
CPA - Canoga Park Alabama -- A the District of Columbia. ECC - El Camino Crips -- An Asian-
Southern California street gang based in American street gang in the Sacramento,
the San Fernando Valley community of DIA - Down In Action -- A Southern California area. Their gang members are
Canoga Park. The ethnicity of its California street gang. primarily Laotian.
members is primarily Hispanic.
DMI - Dead Man Incorporated -- A XVIII - 18th Street gang -- The 18th Street
CPB - Center Park Bloods -- A Southern predominantly Caucasian prison/street gang is one of the largest predominantly
California street gang that is most active in gang founded in Maryland in the late Hispanic gangs in the United States.
Inglewood. 1990s. Dead Man Inc. later spread to Founded in Los Angeles, California, in the
numerous locations across the United mid-20th century, they later branched out
CPC - Carson Pinoy Compadres -- A States, and their membership has to dozens of states throughout the
Southern California street gang comprised expanded to include other ethnicities. 4 13 country. X8, 666, 18, 18th and XV3 are
primarily of Asian-Americans. 9 is another tag associated with them. other tags associated with this gang.
Black is usually their chosen color.
CPCC - Carver Park Compton Crips -- A EK - European Kindred -- A white
Southern California street gang. DOT - Den of Thieves -- A North Carolina supremacist street/prison gang founded in
gang. Oregon in the 1990s.
CPP - Campanella Park Piru -- An African-
American street gang that originated in DPG - Dog Pound Gang -- A multi- EMB - Emerson Murder Boys -- A
Southern California. This Bloods' gang is national gang found in a number of predominantly African-American gang
occasionally spelled Campenella Park locations across the country, as well as that's been most active in Minneapolis,
Piru. Central America and the Caribbean. Minnesota. Emerson Murder Boyz, and
Emerson Murda Boyz are a couple of the
CRP - Crips -- An African-American gang DSB - Down South Boys -- A Florida gang other spelling variations you may find for
that was founded in Los Angeles, also known as the Down South Boyz. them. This Twin Cities' gang is
California. The Bloods are their long-time occasionally referred to as the Emerson
rivals. Blue has been this gang's DSC - Donna Street Crips -- A Money Boys.
traditional color. Crips can frequently be predominantly African-American street
identified by their use of blue apparel, gang based in Las Vegas, Nevada. EME - La Eme -- A Mexican-American
and/or blue bandanas. Blue is often the gang founded in the late 1950s, by East
preferred color of spray paint for Crip D13 - Duarte Eastside -- A Mexican- L.A. Hispanics in the California
graffiti. American street gang based in the Corrections System at Tracy, California.
Southern California community of Duarte. Eme is the Spanish phonetic spelling for
CSG - Criminal Street Gang -- A generic DuRoc Crips has been a rival of this San the letter M. This gang is also known as
acronym used to describe any criminal Gabriel Valley gang. DEG, DES, and the "Mexican Mafia" and La Eme. The use
street gang. DESG are a few of the other tags of Aztec symbols and/or the image of a
associated with this gang. small black hand can sometimes be found
CVL - Corona Varrio Locos -- A Southern within the tattoos of their gang members.
California gang comprised primarily of DuRoc - DuRoc Crips -- An African- Nuestra Familia (NF) has been the
Hispanics. CVL is based in the Riverside American street gang based in Southern traditional rival of this large gang.
County community of Corona, and is also California. They've been most active in an
known as Corona Vatos Locos. unincorporated area of the San Gabriel EMF - El Monte Flores -- A predominantly
Valley between the cities of Arcadia, Mexican-American street gang founded in
CVS - Compton Varrio Segundo -- A Duarte and Monrovia known as "No Man's the mid-20th century. EMF 13 is another
Southern California street gang. Land." Monrovia Nuevo Varrio, and tag associated with this gang based in the
Duarte Eastside have been rivals of this San Gabriel Valley community of El
CVTF - Compton Varrio Tortilla Flats -- A gang. A long-time presence in Los Monte.
Southern California street gang. They are Angeles County, DuRoc Crips have
also known as Tortilla Flats Compton recently been establishing themselves in EMK - Evil Minded Kings -- A street gang
Varrio, Tortilla Flats 13 (TF13), or just San Bernardino County. Roc is another most active in Southern California and
Tortilla Flats (TF). tag that is occasionally associated with Oregon. EM and EMK 365 are a couple of
this gang. other tags associated with this gang.
CWA - Crips With Attitude -- An Asian-
American street gang found in California EBS - Eternal Brown Soldiers -- A EPT - El Paso Tangos -- A predominantly
and Minnesota. They have arguably been predominantly Hispanic street gang in Hispanic gang in Texas.
most active in Modesto, California and the Southern California. They've been most
Twin Cities (Minneapolis / Saint Paul) area active in the San Gabriel Valley ERS - East River Skins -- A predominantly
of Minnesota. Some sets were originally community of Hacienda Heights. They are Native American gang found in South
called Cambodians With Attitude. also known as "Varrio 13 Eternal Brown Dakota and Montana. They've arguably
Soldiers." HACxHTSgv is another tag been most active in the vicinity of Billings,
CXC13 - Culver City 13 -- A Mexican- associated with this gang. Montana.
American street gang based in Southern
California. They are also known as the ECB - El Cerrito Boys -- A Corona, ESB - East Side Bolen -- A Southern
City Boys, and Culver City Boyz (CCB). California street gang. California street gang based in the San
80
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Gabriel Valley community of Baldwin Park. Southern California street gang reportedly displayed. XIV, and X4 are a couple of
They are also known as Varrio East Side affiliated with the Rollin' 60s Crips. other tags associated with them.
Bolen, and East Side Bolen Parque
(ESBP). This predominantly Chicano gang EYC - Elsinore Young Classics -- A FSC - Fair Street Crips -- A predominantly
has been in existence for several Southern California street gang based in African-American street gang in the
decades. Lake Elsinore. Elsinore Vatos Locos (EVL) Atlanta, Georgia area.
has been the traditional rival of this
ESB - Eastside Bloods -- An African- predominantly Hispanic gang. EYC-13 is FS13 - Flip Side 13 -- A Southern
American street gang. another tag associated with this gang. California street gang comprised primarily
of Filipino-Americans.
ESBP - East Side Brown Pride -- A street EYC TWS - Elsinore Young Classics -
gang most active in the American Tiny Winos -- A predominantly Hispanic FSU - Friends Stand United -- A street
Southwest. street gang based in Lake Elsinore, gang founded in Boston, Massachusetts in
California. Tiny Winos is a subset of the the early 1990s. Their gang acronym,
ESC - Eastside Crips -- An African- Elsinore Young Classics. EYC 13 TWS is FSU, can also stand for Fuck Shit Up, and
American street gang. another tag associated with this gang. Forever Stand United.
ESL - East Side Longos -- A Southern FTB - Fruit Town Brims -- A predominantly
California street gang. Tiny Raskal Gang FD - Flying Dragons -- A multi-national African-American street gang that
(TRG) has been the traditional rival of this street gang comprised primarily of Asians. originated in Compton, California. They
primarily Hispanic gang based in Long Although they can be found in many later branched out, becoming a nationwide
Beach. locations around the world, they have presence.
arguably been most active in Hong Kong,
ESL - Eastside Locos -- A predominantly Canada, Australia, New Jersey, New York F13 - Florencia 13 -- One of the largest
Latino street gang. They've been active in City's Chinatown, Queens, and Brooklyn. Hispanic gangs in Southern California.
numerous locations, including--but not Initially based in Los Angeles, they later
limited to--California, Oregon, 504 - Gotti Boyz -- An African-American spread to a number of other cities across
Washington, Idaho, Montana, New street gang that has been most active in the United States. They've been allied
Mexico, Kansas, Florida, Georgia, and the 3rd ward of New Orleans, Louisiana. with the "Mexican Mafia" or La Eme. FX3
Texas. ESL 13 is another tag associated They have also been found in Atlanta, and FXIII are a couple of other tags
with this gang. There isn't a single, Georgia, and Houston, Texas. The 504 associated with them. East Coast Crips
consistent color claimed by the various that occasionally represents this gang has (ECC) has been a bitter rival of this gang.
Eastside Locos' gangs. Some claim blue, been the area code for New Orleans. F-13's gang color is usually red.
others display orange, while others use
black and white as their gang colors. 4CH - Four Corner Hustlers -- An African- FTM - Flip Town Mob -- A California street
American street gang founded in Chicago, gang also known as the Flip Town Mafia.
ESN - EastSide Nortenos -- A street gang Illinois in the late 1960s. They later spread
in Hollister, California. This San Benito to numerous locations across the United FTRA - Freight Train Riders of America --
County gang is occasionally referred to as States. In their early days, black and A gang of homeless individuals who travel
EastSide Norte'os. brown were their colors. Later, black and by boxcar. This trainhopping gang is most
gold emerged as their chosen colors. active in the Northwest United States.
ESP - Eastside Piru -- A predominantly
African-American street gang. Red has 4Seas - Four Seas Mafia -- A multi- GBG - Gay Boy Gangsters -- A
been this gang's traditional color. They've national street gang and crime syndicate. prison/street gang comprised primarily of
established themselves in a number of Originally based in Taiwan, their sphere of homosexual members.
locations across the country. In San influence later spread to China, Korea,
Diego, California, they are also known as and Japan. It is the four countries of GD - Gangster Disciples -- An African-
Skyline, or Skyline Piru. Taiwan, China, Korea, and Japan, which American street/prison gang founded in
gives them their name, "Four" Seas Mafia. Chicago, Illinois. They later spread to
ESSJ - East Side San Jose Peckerwoods In the United States, 4Seas is a street dozens of states throughout the United
-- A white supremacist street gang based gang, rather than a more sophisticated States. The numbers 7 and 4 are closely
in Central California. crime syndicate. The Four Seas Mafia has associated with the Gangster Disciples.
been most active in the San Gabriel Valley The number 7 represents the letter "G"
EST - Eastside Torrance -- A Southern of Southern California. (the seventh letter of the alphabet), while
California street gang based in the city of the number 4 represents the letter "D" (the
Torrance. 14 - Nortenos -- The number 14 fourth letter of the alphabet). They
represents the letter "N" (the fourteenth "represent" to the right side of the body by
ESW - Eastside Wilmas -- A letter of the alphabet) to denote the tilting their hats to the right side, rolling up
predominantly Hispanic street gang found Nortenos (Spanish for Northerners), or an the right pant leg, etc. Black and blue are
in the South Bay area of Los Angeles. affiliation with them. Red has been their usually their chosen colors.
They've been most active in Wilmington traditional color. They are very closely
and Long Beach, California. Westside affiliated with the prison gang Nuestra GKB - Gangsta Killer Bloods -- A
Wilmas (WSW) has been one of their Familia. The Mexican Mafia (La Eme) and predominantly African-American street
rivals. the Surenos (Spanish for Southerners) gang that is frequently spelled "Gangsta
have been their traditional rivals. Killa Bloods." They have been active in
ESWP - East Side White Pride -- A white Nebraska Cornhuskers' jerseys and several locations, including--but not limited
supremacist skinhead gang found in the related sportswear are occasionally worn to--Arkansas, California, Louisiana, New
vicinity of Portland, Oregon. by its members. University of Nebraska Jersey, New York, North Carolina,
apparel is popular with Nortenos because Pennsylvania, and South Carolina. Red
ETGC - Eight Trey Gangster Crips -- An of their prominent "N" and red color. In has been their traditional gang color.
African-American gang that originated in addition to the aforementioned Big Red
South Central Los Angeles, California. apparel, members have also worn San GPG - Green Pond Gang -- A street gang
Francisco 49ers' gear, and University of found near Walterboro, North Carolina.
EVL - Elsinore Vatos Locos -- A Southern Nevada, Las Vegas sportswear. The Loopside Gang has been a rival of this
California street gang based in Lake meaning of the UNLV acronym being Colleton County gang.
Elsinore. Elsinore Young Classics (EYC) altered to "Us Nortenos Love Violence."
has been the traditional rival of this Graffiti, or tattoos of a Huelga bird can GS - Ghost Shadows -- An Asian-
predominantly Hispanic gang. occasionally indicate a Norteno affiliation, American street gang.
as can a red belt, red shoe laces, or any
EWF - Every Woman's Fantasy -- A apparel with the number 14 prominently GSC - Grape Street Crips -- A Southern
81
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
California street gang. Purple has been IIVL - Imperial Insane Vice Lords -- An Southern California street gang.
the traditional color of this Crips' set. African-American gang founded in
Chicago, Illinois. IIVL sets have been KTB - Kearns Town Bloods -- A Utah
HCC - Harbor City Crips -- A Southern active in Illinois, Arkansas, and Knoxville, street gang.
California street gang found in the South Tennessee. 9-9-22-12 is another tag
Bay area of Los Angeles. associated with this gang. KTM - KoreaTown Mobsters -- An Asian-
American street gang.
HLP - Highland Park -- A street gang in IP - Insane Popes -- A predominantly
the Highland Park area of northeastern Caucasian street gang that originated in KTO - Krazy Town -- A Southern
Los Angeles, California. The Avenues Chicago, Illinois, in the early 1970s. California street gang comprised primarily
(also known as Avenidas) has been a rival of Hispanics.
of this gang that is also known as IVL - Insane Vice Lords -- An African-
Highland Parque. American street/prison gang with roots in KTO - Krew Taking Over -- A street gang
Chicago, Illinois. Over the years, they've in the Salem, Oregon area.
HNS - Hmong Nation Society -- An Asian- arguably been most active in Indiana,
American street gang that is most active in Mississippi, and Chicago. Red and black KWC - Ken Side Wah Ching -- An Asian-
Sacramento and other Central California are usually their chosen colors. American street gang found in the San
cities. Menace of Destruction (MOD) has Gabriel Valley of Southern California.
been a bitter rival of this gang. IZGO - Ismael Zambada Garcia They've been most active in Alhambra.
Organization -- A major North American
HP - Hawthorne Pirus -- A Southern drug trafficking cartel. KWS - Kings with Style -- A street gang
California street gang. This Bloods' gang with roots in Los Angeles, California.
has been most active in the city of JB - Joe Boys -- An Asian-American street
Hawthorne, south of Los Angeles. gang that was most active during the KWS - Krazy Wicked Surenos -- A
1970s in San Francisco, California. The predominantly Hispanic street gang. KWS
HPL - Hermanos de Pistoleros Latinos -- Joe Boys were originally known as the 13, and KWS X3 are a couple of other
A North American prison/street gang "Joe Fong Boys," named for their founder, tags associated with this gang.
founded in the late 1980s. This Hispanic Joe Fong. This gang is notorious for their
gang is most active in Texas and Mexico, participation in the Golden Dragon LAB - Local Asian Boyz -- An Asian-
and is also known as Hermandad de massacre, in which five people were killed American street gang.
Pistoleros Latinos. and eleven injured.
LAOB - L.A. Oriental Boys -- An Asian-
HS - Hillside 12th Street -- A Sureno street KAM - Krazy Ass Mexicans -- A American street gang founded in Los
gang found in the vicinity of Portland, predominantly Hispanic street gang. KAM Angeles, California.
Oregon. 13 is another tag associated with this
gang. They've arguably been most active LBF - Lost Boys Family -- A Georgia street
HSG - Alhambra Hellside Gang -- A in Central and Southern California. gang.
Southern California gang found in the San
Gabriel Valley. KB - Korat Boys -- An Asian-American LC - Latin Counts -- A Latino street gang
street gang. founded in Chicago, Illinois in the mid-20th
HSN - Hammerskin Nation -- A white century. They later branched out to a
supremacist skinhead gang founded in KBS 13 - Krazy Boys Surenos 13 -- A U.S. number of states throughout the country.
Texas in the late 1980s. Dozens of street gang found in the vicinity of El They've arguably been most active in
chapters (also known as "crews") have Paso, Texas. Florida, Illinois, Indiana, Michigan, New
popped up in states throughout the United York, and Wisconsin.
States, as well as international chapters in KCB - King Cobra Boyz -- An Asian-
several foreign countries. American street gang that has been active LCM - Little Crazy Mentals -- An Asian-
in several locations, including--but not American street gang.
HSP - Horseshoe Posse -- An African- limited to--Fresno, Los Angeles, San
American street gang in St. Louis, Diego, and Orange County in California, LCN - La Cosa Nostra -- An organized
Missouri. Boys of Destruction (a nearby as well as Las Vegas, Nevada, and Utah. crime group that is more commonly known
gang) has been a bitter rival of this Many of the gangs are comprised by the general public as the mafia or mob.
Bloods' gang. primarily of Laotians.
LE - Latin Eagles -- A predominantly
HTB - Hill Top Boys -- A North Carolina KES - Killing Every Spot -- A Gainesville, Latino street gang founded in the 1960s,
street gang. Georgia street gang founded in the late in Chicago, Illinois. Over the years, their
1990s. rivals have included the Gangster
HTC - Hilltop Crips -- An African-American Disciples, Spanish Cobras, Maniac Latin
street gang that has been most active in KGB - Kings Grant Boys -- A street gang Disciples, Spanish Gangster Disciples,
Tacoma, Washington. in North Carolina and Virginia. and the Vice Lords. ALEN (Almighty Latin
Eagles Nation) and LEN (Latin Eagles
HTHC - Hard Time Hustler Crips -- An KGM - Known Gang Member -- A generic Nation) are a couple of other tags
African-American street gang in Southern term used to describe any known member associated with this gang. Their gang
California. They have been most active of a street or prison gang. colors include grey and black.
near Inglewood, southwest of Los
Angeles. KK - Korean Killers -- An Asian-American LES 13 - Lil East Side 13 -- A
street gang. This gang was known for their predominantly Hispanic street gang
HVK - Hidden Valley Kings -- An African- involvement with drugs, gambling, and founded in Southern California.
American gang founded in Charlotte, international prostitution.
North Carolina's Hidden Valley community LF - Lost Foundation -- An African-
the 1990s. HV is another tag associated KMC - King Motherland Chicago -- A American street gang found primarily on
with this gang. street gang closely associated with the the East Coast of the United States. They
Latin Kings. have been most active in Queens, New
IB - Immortal Bloods -- The Minnesota set York.
of this gang is predominantly Hmong. Red KP - Korean Pride -- An Asian-American
has been their traditional color. street gang. They've been most active in LGF - La Gran Familia -- A North
California, Hawaii, Maryland, New York, American crime syndicate and Latino
IDM - Insane Diego Mob -- A Southern and the District of Columbia. gang that has been most active in Atlanta,
California street gang. Georgia.
KPCC - Kelly Park Compton Crips -- A
82
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
LGKK - Last Generation Korean Killers -- LRB - Lynwood Rude Boys -- A Southern
An Asian-American street gang. California street gang, also known as the MBC - Menace Boy Crew -- An Asian-
Lynwood Rude Boyz. American street gang.
LHB - Los Homeboys -- A predominantly
Hispanic street gang most active in Texas. LRG - Lady Rascal Gang -- An Asian- MBL - Mesa Barrio Locos -- A Mesa,
LHB 13, LHB X3 and LHB XIII are a few of American street gang that has been the Arizona street gang that is occasionally
the other tags associated with this gang. female branch of the Tiny Rascal Gang, known as Mesa Varrio Locos.
which is also known as the Tiny Rascal
LHG - Lil Hill Gang -- A predominantly Gangsters or Tiny Rascals. MBS - Mongolian Boys Society -- An
Hispanic street gang based in the San Asian-American street gang. They have
Gabriel Valley of Southern California. LRL - La Raza Loca -- A predominantly arguably been most active in the Central
They are occasionally referred to as Lil Hill Hispanic street gang. California cities of Fresno and Visalia.
13 Gang, Lil Hill 13 Rifa, Lil Hill G's, and Their name is occasionally spelled
also, Lil Hill Rifa. This SGV gang has been LRZ - La Raza -- A North American gang Mongolian Boyz Society.
active in Bassett, Valinda, La Puente, and comprised primarily of Mexican-
City of Industry. Americans. MBZ - Mental BoyZ -- An Asian-American
street gang that's been most active in
LJ - Latin Jivers -- A Latino street gang LS - Latin Souls -- A predominantly Latino California and Arizona.
based in Chicago, Illinois. LJs and ILJN street gang found in several locations,
(Insane Latin Jivers) are a couple of other including--but not limited to--California, MC - Mickey Cobras -- An African-
tags associated with this gang. Florida, Illinois, and New York. American gang founded in Chicago,
Illinois. MCs, ACN (Almighty Cobra
LK - Latin Kings -- One of the largest LSN - Los Solidos Nation -- A Nation), and AMCN (Almighty Mickey
Hispanic street/prison gangs in the United predominantly Hispanic street/prison gang Cobras Nation) are a few of the other tags
States. With roots dating back to the mid- that has arguably been most active in associated with this gang.
20th century, the Latin Kings can now be Massachusetts, Connecticut, Maine, New
found in dozens of states throughout the Hampshire, Pennsylvania, and New York. MCF 13 - Michigan Chicano Force 13 -- A
country. They're also known as the Founded circa 1990, Los Solidos has predominantly Hispanic street gang,
Almighty Latin Kings (ALK), Almighty Latin been active in numerous locations, occasionally tagged MCForce X3.
King Nation (ALKN), and Almighty Latin including--but not limited to--Bridgeport,
King and Queen Nation (ALKQN). Their Hartford, New Haven, New London, and MCM - Mexican Criminal Mafia -- A
gang colors are black and gold. Norwich in Connecticut, as well as Mexican-American street gang in Denver,
Rutland, Vermont. Others include the Colorado. MCM 13 is another tag
LL - Latin Lords -- A predominantly Latino Massachusetts' cities of Boston, Fall associated with this Sureno gang.
gang active in numerous locations across River, Framingham, Lawrence, Lowell,
the country. Red has been their traditional New Bedford, and Worcester. TSO (The MCP - Mexicans Causing Panic -- A
color. Solid Ones), OFO (Original Family Mexican-American street gang found in
Organization), and BSDS (Born Solid, Die several locations across the country. They
LLC - Lay Low Crips -- A street gang most Solid) are a few of the other tags have arguably been most active in the
active in the Salt Lake City, Utah area. associated with this gang. Their gang San Fernando Valley in Los Angeles
colors include red and blue. County, California.
LLS - Little Locos -- Little Locos is a
predominantly Hispanic street gang LTC - Loc Town Crips -- An Asian- MDB - Mad Dog Bloods -- A New York
located in several cities across the American street gang in Stockton, street gang.
country. It is also a subset of several other California. This San Joaquin County gang
gangs, made up of their younger gang is comprised primarily of Cambodian- MFL - Mexicans For Life -- A Mexican-
members. LL is another tag associated Americans. Blue has been their traditional American street gang based in the San
with this gang. They are arguably most color. Gabriel Valley of Southern California.
active in California, Arizona, New York, Puente 13 has been a rival of this Los
Virginia, and Washington. LTS - Los Traviesos -- A predominantly Angeles County gang. MFL13 is another
Hispanic street gang. tag occasionally associated with them.
LMG - Love Murdering Gangsters -- A
predominantly African-American street LVL - Little Valley Lokotes -- A Pacific MGB - Miller Gangster Bloods -- An
gang that has been most active in Northwest street gang found in multiple African-American street gang that
Memphis, Tennessee. The gang was locations, including the Yakima, originated in Los Angeles, California.
originally named LeMoyne Gardens, Washington area. Occasionally spelled
which was the housing project many "Lil Valley Lokotes," LVL13 and LVLX3 MHS - Modesto Hit Squad -- A Central
members called home. This gang is are a couple of other tags associated with California street gang founded in Modesto.
occasionally referred to as "Love this gang. They are a subset of the Crips.
Murdering Gangstas," and LMG Mafia.
Gangster Disciples has been a bitter rival LVL - Little Vatos Locos -- A MIC - Magnolia-Intervale-Columbia -- A
of LMG. Red has been their traditional predominantly Hispanic street gang. They street gang in Boston, Massachusetts.
gang color. have arguably been most active in The gang's named for the city streets of
Maryland, Georgia, and California. They Magnolia, Intervale, and Columbia. Big
LN - Los Nietos -- A predominantly are not only an independent street gang Head Boyz (BHB) has been one of their
Hispanic street gang in the West Whittier- located in several cities across the rivals.
Los Nietos area, east of Los Angeles, country, but also a subset (younger
California. members, typically) of several other MIVL - Mafia Insane Vice Lords -- A
gangs. faction of the Vice Lords -- A street gang
LOCC - Loaded Crip Crew -- A based in Chicago, Illinois.
predominantly Hispanic street gang. LVM - Luzon Visayan Mobsters -- A
Southern California street gang found in MK - Milwaukee Kings -- A street gang
LP - Laos Pride -- An Asian-American the San Gabriel Valley and other areas based in Chicago, Illinois. MKN is another
street gang. around Los Angeles. Their members are tag associated with this gang. Note:
primarily Filipino. They're named for Milwaukee Ave. in
LPG - Laos Pride Gangsta -- An Asian- Chicago, not the city of Milwaukee,
American street gang. This gang is MAB - Mt. Airy Boys -- Mount Airy Boys is Wisconsin.
occasionally referred to as Lao Pride an Asian-American street gang found in
Gangsta. the Twin Cities (Minneapolis / St. Paul) MLD - Maniac Latin Disciples -- A large,
area of Minnesota. predominantly Hispanic street/prison gang
83
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
founded in Chicago, Illinois, in the mid- MW - Mandingo Warriors -- An African- predominantly Hispanic street gang found
20th century. In Chicago, the Spanish American gang founded in Texas in 1984. in numerous locations from coast to coast.
Cobras, and the Latin Kings have been They are arguably most active in
their primary rivals. Lady Ds has been the NBCC - Nutty Blocc Compton Crips -- A California, Texas, and Georgia. NSL XIV,
female branch of the Maniac Latin Southern California street gang. NSL 14 and NSL X4 are a few of the other
Disciples. In spite of the fact they are often tags associated with this Norteno gang.
recognized primarily as a Hispanic gang, NBT - Nothing But Trouble -- A street
in the past, there have been documented gang in South Central Los Angeles, NSLX3 - Northside Longos 13 -- A
cases of both Caucasian and African- California, that began as a tagging crew. Southern California street gang based in
American MLD members. LD is another Long Beach and comprised primarily of
tag associated with this gang. A pitchfork NCA - Ninja Clan Assassins -- An Asian- Hispanics.
is one of their most common identifiers or American street gang.
symbols. Their gang colors include blue NSP - North Side Pasadena -- A
and black. NF - Nuestra Familia -- A predominantly predominantly Hispanic street gang based
Chicano prison gang. Nuestra Familia is in Pasadena, California. Varrio Pasadena
MNV - Monrovia Nuevo Varrio -- A very closely affiliated with the Nortenos. Rifa has been one of their rivals. Blue has
predominantly Hispanic street gang based The Mexican Mafia (La Eme) has been been this Los Angeles County gang's
in the Southern California community of the traditional rival of this large gang that traditional color.
Monrovia. DuRoc Crips has been a rival of was founded in the California prison
this San Gabriel Valley gang. Monrovia system in the 1960s. Although they are NSR - North Side Redondo -- A Southern
Nuevo Barrio, Monrovia Nuevo Bario, primarily known as a prison gang, they California street gang based in Redondo
Monrovia Nueve Barrio, Monrovia Nueve have increasingly been establishing a Beach. This predominantly Hispanic gang
Vario, and Monrovia Nueve Varrio are presence on the streets. Red has been is also known as Redondo 13, and NS
among the many spelling variations you their traditional color. LNF (La Nuestra Redondo 13.
may find for this gang. Familia) is another tag associated with this
gang. NSV - North Side Villains -- A Washington
MOB - Men Over Bitches -- A North state street gang.
Carolina street gang. NGB - Native Gangster Bloods -- A
predominantly Native-American gang. OBS - Oriental Boy Soldiers -- A Southern
MOB - My Only Brothers -- An African- California street gang.
American street gang in California. NHBZ - North Hollywood Boyz -- A
Southern California street gang. OCG - Outta Control Gangstas -- A
MOD - Menace of Destruction -- A Minnesota street gang that has arguably
predominantly Hmong street gang, also NHC - Neighborhood Crips -- There are a been most active in the Twin Cities
known as the Masters of Destruction, or number of Neighborhood Crips' gangs, (Minneapolis / St. Paul). Their name is
occasionally, Men of Destruction. This including the 46 Neighborhood Crips, occasionally spelled "Outta Control
Asian-American gang was reportedly Rollin' 60s Crips, 67 Neighborhood Crips, Gangsters."
founded in Fresno, California, in the late 105 Neighborhood Crips, 107
1980s. MOD can be found in numerous Neighborhood Crips, 111 Neighborhood OKB - Oriental Killa Boyz -- An Asian-
locations across the United States, though Crips, in addition to a number of other American street gang that is also known
they are arguably most active in California Neighborhood Crip sets in Los Angeles, as the Oriental Killer Boys. This gang is
and the Twin Cities (Minneapolis / St. California, as well as other U.S. cities. based in San Diego, California.
Paul) area of Minnesota. Hmong Nation
Society (HNS) has been a bitter rival of NHLS - North Hollywood Locos -- A OLB - Oriental Lao Boys -- An Asian-
this gang. Southern California street gang. American street gang found in California.
MPB - Mozart Park Boys -- A street gang 98 - 98 Mafia -- A street gang also known OLB - Oriental Lazy Boys -- An Asian-
in Boston, Massachusetts. as the 98 Mafia Crips. MCG (Mafia Crip American street gang.
Gang) is another tag occasionally
MPG - Mien Pride Gangsta -- An Asian- associated with them. They've been active OLG - Oriental Laotian Gangsters -- An
American street gang comprised primarily in several locations, including--but not Asian-American street gang based in
of Mien (a Laotian ethnic group). They limited to--California, Washington, New Utah.
have arguably been most active in the York, New Jersey, and Nashville,
Sacramento, California area. Tennessee. OMB - Oroville Mono Boys -- A
predominantly Hmong street gang, also
MPLS - Moorpark Locos -- A 9400 - 9400 Boyz -- A predominantly known as the Oriental Mono Boys.
predominantly Hispanic street gang in Hispanic street gang in Oakland, They've arguably been most active in
Ventura County, California. They've been California. 94th Avenue was the source of California and Minnesota.
most active in Moorpark and Simi Valley. their name, and also the primary turf
MP and MPL are a couple of other tags claimed by them. Black has been their OMG - Outlaw Motorcycle Gang -- A
associated with this gang. Varrio Simi chosen gang color. generic term used to describe any violent
Valley (VSV) has been a rival of this gang. and/or criminal motorcycle gang.
NLR - Nazi Lowriders -- A white
MSB - Mad Swan Bloods -- A street gang supremacist gang founded in Southern OPP - Oriental Park Place -- An Asian-
reportedly founded in the 1970s in Los California. American street gang based in Texas.
Angeles, California. They later popped up
in a few other locations across the NSB - North Side Bolen -- A Southern ORB - Oriental Ruthless Boys -- A
country. California street gang based in the San predominantly Hmong street gang that
Gabriel Valley community of Baldwin Park. has been active nationwide. This Asian-
MS-13 - Mara Salvatrucha -- A multi- They are also known as Varrio North Side American gang can be found in numerous
national gang founded by El Salvadoran Bolen, and also North Side Bolen Parque locations, including--but not limited to--
refugees in the late 1980s in Los Angeles, (NSBP). This predominantly Chicano gang California, Colorado, Minnesota,
California. They later spread to a number has been in existence for several Washington, Wisconsin, and New York.
of cities across the United States. MS-13 decades.
cliques can also be found in El Salvador, OSB - Oriental Street Boyz -- An Asian-
Guatemala, Mexico, Panama, Nicargua, NSBP - North Side Brown Pride -- A street American street/prison gang in
and Honduras. Their rivals include--but gang most active in the American Massachusetts. Some of the most active
are not limited to--Bloods, Salvadorans Southwest. sets have been in Boston, Lowell, and
With Pride, and the Latin Kings. Lynn, Massachusetts. Many of their
NSL - North Side Locos -- A members have been of Cambodian
84
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
ancestry. OB, and OBB are a couple of Long Beach, California. "PENI" is a California. Pico Nuevo, and Brown
other tags associated with this gang. Blue variation of this gang's acronym, while Authority have been rivals of this Los
has been their traditional color. "Public Enemy Number 1" and "Public Angeles County gang. VPV (Varrio Pico
Enemy Number One Death Squad" are Viejo) is another tag associated with this
OSB - Oquirrh Shadow Boys -- A Utah variations of their name. Over the years, gang.
street gang. they have been allied with the Nazi Low
Riders (NLR) and Aryan Brotherhood (AB) PVCC - Park Village Compton Crips -- A
OSL - Orange Street Locos -- A Southern prison gangs. Southern California street gang.
California street gang.
PGV - Pleasant Grove Vatos -- A PWL - Pee-Wee Locos -- Pee-Wee Locos
OT - Okie Town -- A predominantly predominantly Hispanic street gang in the is not only an independent street gang
Mexican-American street gang in Yuma, Dallas, Texas area. PGV X3 is another tag located in several cities across the
Arizona. OT X3 and OT 13 are a couple of associated with this Northern Texas gang. country, but is also a subset (younger
other tags associated with this gang. members, typically) of several other
PHV - Prince Hall Village -- A gangs. PWLS is occasionally offered as
OT - Oriental Troops -- An Asian- predominantly African-American street an acronym for this gang.
American street gang found in several gang in Oklahoma City, Oklahoma. They
locations across the country. They've are also known as the Prince Hall Village QV - Quiet Village -- A predominantly
arguably been most active in Visalia, Crips, and occasionally, the Prince Hall Hispanic street gang found in Whittier,
Tulare County, California. Although blue Village Gangster Crips. California. They are also known as Varrio
has been their traditional gang color, Quiet Village, and Quiet Village Gang.
black, white, and gray may occasionally PLK - Pasadena Latin Kings -- A QVG is another tag associated with this
be used as well. The Nortenos have been predominantly Hispanic street gang Los Angeles County gang.
a rival of this gang. 15 and 20 are tags founded in Pasadena, California. PLK 13
associated with Oriental Troops. (The is another tag associated with this gang. RAC - Raymond Ave. Crips -- A
number 15 represents the letter "O" while predominantly African-American street
20 represents the letter "T" -- thus, 15 20 PN - Pico Nuevo -- A predominantly gang based in Southern California.
= OT.) Hispanic street gang in Pico Rivera,
California. Pico Viejo, and Rivera 13 have RAW - Ready and Willing -- A
O13 - Ogden Trece -- A predominantly been rivals of this Los Angeles County predominantly Hispanic street gang in
Hispanic street gang in Ogden, Utah. CCL gang. Jackson County, Oregon. This Sureno-
(Centro City Locos) is another tag affiliated gang has been most active in
associated with this Weber County gang. POMC - Pagans Outlaw Motorcycle Club - Medford, and Central Point. Blue has
- A U.S.-based outlaw motorcycle gang. been their traditional color.
OTSD 13 - Old Town San Diego 13 -- A
Southern California street gang based in PPB - Pacoima Piru Bloods -- A Southern RCB - Royal Cambodian Bloods -- An
the San Diego area. California street gang. Asian-American street gang in Minnesota.
They have arguably been most active in
OVC - Orange Varrio Cypress -- A PPHG - Pimps, Players, Hustlers and Rochester, and the Twin Cities
Southern California street gang. Gangsters -- A Southern California street (Minneapolis / St. Paul) area of
gang that is also known as Pimps, Minnesota.
OVG - Ogden Violent Gangsters -- A Playboys, Hustlers and Gangsters, or
Weber County, Utah street gang. occasionally, Pimps, Playas, Hustlas, and RD - Red Door -- Red Door ("Hung
Gangstas. This Crip-affiliated gang has Mung") could be described as an Asian
arguably been most active in Rialto, and organized crime syndicate. They've been
PB - Purple Brothers -- An Asian- San Bernardino, California. Rollin' 60s most active in the San Gabriel Valley, east
American street gang found in the Twin Crips has been a rival of this Inland of Los Angeles, California.
Cities (Minneapolis / St. Paul) area of Empire gang.
Minnesota. RGC - Rocafella Gangsta Crips -- A U.S.
PSB - Piru Street Boyz -- A Southern street gang founded in New York.
PBCC - Palmer Blocc Compton Crips -- A California street gang.
Southern California street gang. RNC - Rollin' 90s Crips -- An African-
PSK - Park Side Killers -- A Philadelphia, American street gang founded in Southern
PBG - Pinoy Boys Gang -- A Southern Pennsylvania street gang that is California. They've arguably been most
California street gang comprised primarily occasionally spelled Park Side Killas. active in Nashville, Tennessee, South
of Asian-Americans. Central Los Angeles, California, Georgia,
PSW - Poorside Watson -- A Central Minnesota, Maryland, and North Carolina.
PBH - Pinoy Blood Hound -- A street gang California street gang sometimes called
founded in California. Poorside Watsonville. PSW X3 is another RSC - Rollin' 60s Crips -- An African-
tag associated with this gang in American street gang founded in Southern
PBS - Playboy Surenos -- A Watsonville, Tulare County, California. California. They've been active in several
predominantly Hispanic street gang found locations, including--but not limited to--
in multiple locations across the country. P-13 - Puente 13 -- A predominantly South Central Los Angeles, California,
PBS 13, and PBS X3 are a couple of other Hispanic street gang based in the San Georgia, Maryland, North Carolina,
tags associated with this gang. Gabriel Valley community of La Puente. Virginia, and Washington. They are also
Bassett Grande, and Mexicans For Life known as the Rollin' 60s Neighborhood
PDL - Pasadena Denver Lanes -- A have been rivals of this Los Angeles Crips. R60 is another tag associated with
predominantly African-American street County gang. LP13 is another tag this Crips' set.
gang in Southern California. This Bloods' occasionally associated with Puente 13
gang later spread to a few other locations (also known as Puente Trece). RSL - Riverside Locos -- A predominantly
across the country. DLB (Denver Lanes Hispanic street gang. They've arguably
Bloods) is another tag associated with this PTS - Portland Town Soldiers -- A U.S. been most active in California and
gang. street gang. Georgia. RSL-13 is another tag that is
occasionally associated with this gang.
PEN1 - Public Enemy Number One -- A PUSH - Portland United Skinheads -- A
white supremacist street/prison gang that white supremacist skinhead gang founded RSL - Rockwood Street Locos -- A Los
is most active in Orange County, in Portland, Oregon. Angeles, California street gang comprised
California. Founded in the 1980s, they're primarily of Hispanics. RWST, RSL-13,
most associated with the seaside PV - Pico Viejo -- A predominantly and RWSL are occasionally offered as
communities of Huntington Beach, and Hispanic street gang in Pico Rivera, acronyms for this gang.
85
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
and/or Folk Nation symbols and identifiers other locations throughout the United
RTC - Rollin' 20 Crips -- An African- may also help distinguish SGD members. States. Some of these are known as
American street/prison gang founded in "Southside Locos" and many are
Southern California. They've been most SMM - Sex, Money, Murda -- A comprised primarily of Hispanics.
active in Long Beach and Los Angeles, predominantly African-American street
California, as well as Maryland. Young 20 gang based on the East Coast of the SSM - South Side Mesa -- An Arizona
Locs (YTL) has been the subset and United States. This gang is occasionally street gang. SSM 13 is another tag
younger generation of this gang. R20 is referred to as Sex, Money, Murder. They associated with this gang.
another tag associated with the Rollin' 20 are arguably most active in New York,
Crips. New Jersey, Pennsylvania, and Maryland. SSP - South Side Pasadena -- A
predominantly Hispanic street gang
R13 - Rivera 13 -- A predominantly SNM - Syndicato Nuevo Mexico -- A founded in Pasadena, California. Varrio
Hispanic street gang in Pico Rivera, predominantly Hispanic prison gang that Pasadena Rifa has been one of their
California. They are occasionally known has been most active in New Mexico. rivals. SSP 13 is another tag associated
as Rivera 13 Viejo. Pico Nuevo has been with this Los Angeles County gang. Red
a rival of this Southern California gang. SOD - Sons of Death -- A predominantly has been their traditional color.
Asian-American street gang that has been
RU - Raza Unida -- A Mexican-American most active in the San Francisco Bay SSVL - South Side Vatos Locos -- A street
gang founded in Texas in the late 1980s. Area. This gang has been found in the gang. VL, SSVL 13 and SSVL X3 are a
cities of Richmond, and San Pablo in few of the other tags associated with this
RVL - Renegade Vice Lords -- A street Contra Costa County, California, Fairfield gang.
gang founded in Chicago, Illinois. in Solano County, California, as well as
Portland, Oregon. Although members ST - Suicidal Town -- An Asian-American
SBB - Sacramento Bad Boys -- An Asian- were initially Mien (a Laotian ethnic street gang. This gang was founded in
American street gang in Sacramento, group), SOD has grown to include other Southern California and is occasionally
California. Their gang color is usually red Laotians, Pacific Islanders, Vietnamese, referred to as the Suicidal Town Crips, or
or burgundy. BB, and SBB Blood are a and others. Color of Blood (COB) has the Suicidal Town Gangsta Crips.
couple of other tags that are occasionally been a rival of this gang.
associated with this gang. STC - Street Thug Criminals -- A street
SOS - Sisters of the Struggle -- An gang in the Washington, D.C. and
SBCC - Santana Blocc Compton Crips -- African-American gang that has been the Maryland areas.
A Southern California street gang. female branch of the Black Gangster
Disciples (BGD). STC - Sur Trece Califas -- A Sureno street
SBG - Sheboygan Boy Gangsters -- A gang found in the vicinity of Portland,
Wisconsin street gang, also known as the SOS - Sons of Samoa -- A street gang Oregon.
Sheboygan Boyz, and the Sheboygan comprised primarily of Pacific Islanders.
Boys Gang. This gang has been most prevalent in STG - Security Threat Group -- A generic
California, Utah and Hawaii. term used to describe any violent and/or
SBZ - Seoul BoyZ -- An Asian-American criminal street or prison gang.
street gang that has been most prevalent SOSMC - Sons of Silence Motorcycle
in California. Club -- A U.S. motorcycle gang founded in STL - Sur Town Locos -- A predominantly
Colorado in the 1960s. Mexican-American street gang found in
SC - Spanish Cobras -- A street gang multiple locations, including--but not
founded in Chicago, Illinois. With roots SPFG - South Park Family Gang -- A limited to--California and Colorado.
dating back to the mid-20th century, this predominantly African-American street
Hispanic gang is also known as the gang that is most prevalent in Tucson, STO - Shortys Taking Over -- A
Insane Spanish Cobras (ISC). Arizona. predominantly African-American street
gang in Minnesota. They have been most
SCR - Simon City Royals -- A SSB - Southside Bloods -- An African- active in Minneapolis and St. Paul. Bogus
predominantly Caucasian street/prison American street gang. Boyz has been a bitter rival of this gang.
gang founded in Chicago, Illinois back in
the mid-20th century. This gang is a Folks SSBP - Southside Brown Pride -- A SUR 13 - Surenos -- The Surenos
allied gang. Their rivals include--but are predominantly Hispanic street gang. (Spanish for Southerners) is a large
not limited to--Spanish Cobras, Latin street/prison gang that was founded in
Eagles, Latin Kings, and MS-13. Although SSC - Southside Crips -- An African- California. They're closely affiliated with
they now have a nationwide presence, American street gang. the Mexican Mafia prison gang (a.k.a. "La
they're most active in Florida, Illinois, Eme"). Although Surenos' gangs are
Indiana, Mississippi, Wisconsin, and a few SSCC - South Side Compton Crips -- A rarely actually connected with one
other areas in the Midwest and South. Southern California street gang. another, this Hispanic gang now exists
Their gang colors are usually blue and throughout the United States. Blue has
black. SSF - South Side Familia -- A been this gang's traditional color, so its
predominantly Hispanic street gang found members can occasionally be identified by
SD - Satan's Disciples -- A predominantly in Colorado and Washington. SSF 13 is their use of blue apparel, and/or blue
Hispanic street/prison gang founded in the another tag associated with this gang. bandanas. Blue is often the preferred
1960s in Chicago, Illinois. Satan's color of spray paint for their graffiti. X3,
Disciples later spread to a number of cities SSI - State Side Islanders -- A Southern and XIII are a couple of other tags
across the U.S. They are also known as California street gang based in the San associated with them. The Nortenos
the Insane Gangster Satan's Disciples Diego area. (Spanish for Northerners) are their
Nation (IGSDN). Yellow and black are traditional rivals.
their traditional colors. SSK - SouthSide Krooks -- A NOTE: A few viewers of the History
predominantly Hispanic street gang in Channel's TV series, Gangland, drew the
SDP - Samahang Dugong Pinoy -- A Orange County, California. They've erroneous conclusion that this gang was
California-based street gang. arguably been most active in Anaheim located exclusively in Atlanta, Georgia.
and Placentia. Anaheim Travelers City
SGD - Spanish Gangster Disciples -- A (ATC) has been a rival of this Southern SVL - Spanish Vice Lords -- A
predominantly Hispanic street gang California gang. predominantly Latino street/prison gang
founded in Chicago, Illinois. Over the founded in the early 1980s, in Chicago,
years, they've arguably been most active SSL - South Side Locos -- A street gang Illinois. They have arguably been most
in Illinois, Indiana, Florida, and Wisconsin. found in California, Arizona, Maryland, active in Illinois, and Indiana. Their gang
Graffiti, drawings or tattoos of a cross Oklahoma, Washington, D.C. and several colors include maroon and black.
86
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
87
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
88
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Hispanic street gang in Los Angeles, WSC - West Side Crips -- An African- and Long Beach, California. Eastside
California. VVR X3 is another tag American street gang. Wilmas (ESW) has been one of their
associated with this gang. rivals.
WS18 - Westside 18th Street -- A Sureno
gang found in the vicinity of Portland, WTX - West Texas Tangos -- A
WB - The Wonder Boys -- A Mexican- Oregon. XVIII, X8 and XV3 are a few of predominantly Hispanic street/prison
American street gang in the Yuma, the tags associated with this gang. gang.
Arizona area. They are also known as Los
Wonder Boys, or Wonder Bois. WS18TWS - Westside 18th Street Tiny WVL - Whittier Varrio Locos -- A
Winos -- A Sureno street gang found in predominantly Hispanic street gang found
WBP - Wetback Power -- A Mexican- the vicinity of Portland, Oregon. in the Whittier area, southeast of Los
American street gang. Angeles, California.
WSI - West Side Islanders -- A street gang
WCMP - West Covina Mob Piru -- A comprised primarily of Pacific Islanders. WVN - Watson Varrio Norte -- A Santa
Southern California street gang based in They have been found in California, Cruz County, California street gang found
the San Gabriel Valley community of West Oregon, Washington, and on the island of in the Watsonville area.
Covina. Oahu in Hawai'i. They have arguably been
most active in Honolulu, Hawai'i, and Long YCT - Young Crazy Thugs -- A Southern
WF13 - White Fence 13 -- A Mexican- Beach, California. California street gang that is occasionally
American street gang founded in East Los spelled "Young Crazy Thugz."
Angeles, California. WSL - Westside Locos -- A predominantly
Hispanic street gang found in numerous YOG - Young Oriental Gangsters -- An
WK - White Knights -- A white supremacist locations from coast to coast. They are Asian-American gang.
street/prison gang founded in the Texas arguably most active in California, Florida,
prison system in 1991. and Georgia. WSL 13, WSL X3 and WSL YOH - Youth of Hitler -- A white
XIII are a few of the other tags associated supremacist skinhead gang found in
WNS - Winos -- A predominantly Hispanic with this gang. Be aware that some WSL Portland, and Milwaukie, which is located
street gang. They have arguably been sets claim an alliance with the Nortenos, southeast of Portland, Oregon.
most active in California, Oregon and while others are allied with the Surenos.
Washington. They are not only an YOT - Young Oriental Troop -- An Asian-
independent street gang located in several WSM - West Side Mesa -- An Arizona American street gang found in the vicinity
cities across the country, but also a subset street gang comprised primarily of of Seattle, Washington.
(younger members, typically) of several Hispanics.
other gangs. YTK - Young Terrible Kids -- A street gang
WSP - West Side Pomona -- A found in Hawaii.
WSBP - West Side Brown Pride -- A predominantly Hispanic street gang that
predominantly Mexican-American street originated in Pomona, California. WSP 13, YTL - Young 20 Locs -- A predominantly
gang found in the American Southwest. WSP X3 and WSP XIII are a few of the African-American street gang found in
Although they are found in several other tags associated with this gang. Long Beach, California. They are a subset
locations, they are most active in Phoenix, and younger generation of the Rollin' 20
Arizona. WSBP13 and WSBPXIII are a WSV - West Side Verdugo -- A Southern Crips (RTC). Their chosen colors are
couple of other tags associated with this California street gang, also known as the black and yellow, and members often
gang. Mount Vernon Gang (MVG). wear Pittsburgh Steelers apparel.
89
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.policemag.com/Videos/Channel/Gangs/2011/01/Gangs-In-the-Military-Part-1.aspx
Gang tattoos are an excellent tool for law enforcement and corrections officers to use to identify
known or suspected gang members. This gallery includes examples of tattoos worn by predominanly
Hispanic gangs such as the Mexican Mafia, MS-13, and the Latin Kings. The number "13" is used
because M (or La Eme) is the thirteenth letter of the alphabet and is used to signify the Mexican Mafia,
which uses Sureños—gangs that swear allegiance to the Mexican Mafia—to carry out its orders from
prison. http://www.policemag.com/Channel/Gangs/PhotoGallery/2009/08/Gang-Tattoos-Hispanic.aspx
Latin King’s Gang Signs Video
http://www.policemag.com/Videos/Channel/Gangs/2010/09/Latin-King-s-Gang-Signs.aspx
Tattoos Associated with the Barrio Azteca Gang
http://info.publicintelligence.net/mexicoconsulateattacks.pdf
Investigating Gang Homicides - A gang murder investigation requires your best detective skills to
solve the crime and protect the witnesses.
http://www.policemag.com/Channel/Gangs/Articles/2010/10/Investigating-Gang-Homicides.aspx
Gangs United (if there was reason to be concerned, what is now happening in S. Texas is more
disturbibg) http://threatswatch.org/rapidrecon/2010/11/gangs-united/
Gang Book
https://docs.google.com/viewer?a=v&pid=gmail&attid=0.1&thid=12c6ec4f372a0a0d&mt=applicati
on/pdf&url=https://mail.google.com/mail/?ui%3D2%26ik%3D00892a2f0d%26view%3Datt%26th%
3D12c6ec4f372a0a0d%26attid%3D0.1%26disp%3Dattd%26zw&sig=AHIEtbR3U6DArH21pObsw
vl2qri4qR6f-w&pli=1
The Barrio Azteca Trial and the Prison Gang-Cartel Interface
http://www.stratfor.com/weekly/20081119_barrio_azteca_trial_and_prison_gang_cartel_interface
Gangs In The U.S. http://www.accuracyproject.org/GangAcronyms-US.html
Gangs Northwest Gangs: This website was made to give general information on street gang
activity in the Northwest region of the United States. http://www.nwgangs.com/8001.html
Gang Graffiti Photos http://www.flickr.com/photos/northwestgangs/
Mapping Gang Related Activity In North America http://gangs.globalincidentmap.com/home.php
Know Gangs: Recent Gang Videos http://www.knowgangs.com/gang_resources/menu.php
http://www.knowgangs.com/
All Crip Gangs in Los Angeles County http://www.streetgangs.com/crips/index.html
Organized Crime Web Links http://www.yorku.ca/nathanson/Links/links.htm
Gangs 101 http://www.lincolnnet.net/users/lrttrapp/block/gangs101.htm
Gangs Or Us http://www.gangsorus.com/
Gangs http://www.geocities.com/Athens/4111/nogangs.html
http://www.angelfire.com/biz4/stopvarriowar/gps.html
Gang Intelligence Unit
http://www.charmeck.org/Departments/Police/About+Us/Departments/Gang+Intelligence+Unit.htm
Motorcycle Gangs Or Mafia http://www.nagia.org/Motorcycle_Gangs.htm
Organized Crime And Political Corruption http://www.ipsn.org/
Gangs Before Thrasher http://gangresearch.net/Archives/UIC/Courses/history/beforethrash.html
Gang Research http://gangresearch.net/
http://www.uic.edu/orgs/kbc/
http://tigger.uic.edu/~huk/Gang%20History/Citygangs.html
http://www.ericdigests.org/pre-9216/gangs.htm
Gangs Around The World http://www.uic.edu/orgs/kbc/gangresources/Intgangs.html
http://gangresearch.net/Globalization/regions/intgangs.html
Identifying Gang Members http://www.polksheriff.org/library/gangs/identifying.html
Gang Symbols/Signs http://www.velocity.net/~acekc/gangsymbols.htm
http://www.velocity.net/~acekc/gangsign.htm
http://ga.essortment.com/gangsignsands_reyp.htm
Gang Awareness http://www.sanantonio.gov/sapd/pdf/Awareness.pdf
Gang Handbook http://www.gov.mb.ca/justice/safe/gangproof/ganghandbook2004.pdf
Gangs In Texas http://www.oag.state.tx.us/AG_Publications/pdfs/97gang.pdf
90
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Clantone 14 http://www.clantone.net/mainpage.html
Gangs Speak For Themselves http://tigger.uic.edu/~huk/Gang%20History/Gangs.html
All Blood Gangs In Los Angeles County http://www.streetgangs.com/bloods/
Crips http://www.streetgangs.com/crips/
Hispanic Gangs In Los Angeles County http://www.streetgangs.com/hispanic/
Asian Gangs In Los Angeles County http://www.streetgangs.com/asian/
18th Street Gang http://www.streetgangs.com/18thstreet.html
Territory Maps of Gangs in Los Angeles http://www.streetgangs.com/maps/
Female Gangs In America http://www.uic.edu/orgs/kbc/Female.html
http://www.angelfire.com/theforce/gps0/FemaleGangs.html
Street Gang Websites & Related Links http://www.angelfire.com/biz4/stopvarriowar/gps.html
Know Gangs http://www.knowgangs.com/gang_001.htm
Mara Salvatrucha http://www.the-solution.org/ms13.htm
http://home.comcast.net/~jackhydn1/structure.htm
http://www.islandpacket.com/news/local/story/5711073p-5115080c.html
http://www.flickr.com/photos/brianwisconsin/search/tags:MS-13/
http://www.rockawave.com/news/2005/0708/Front_Page/003.html
http://home.comcast.net/~jackhydn1/FFXPolicePres.pdf
Gang Prevention Publications
http://www.dojconnect.com/docs/resources/Gang_Prevention_Resources.pdf
Gang Profiles http://cryptome.org/13gangs.htm
Gang and Security Threat Group Awareness http://www.dc.state.fl.us/pub/gangs/index.html
The Psychology of Criminal Behaviour http://www.athabascau.ca/courses/crjs/360/index.html
Bloods And Crips http://www.dc.state.fl.us/pub/gangs/la.html
Street Gangs: A Dead End http://www.fmuniv.edu/urbanaffairs/Street%20Gangs.pdf
The Reality Of Gangs http://www.ncpc.org/cms/cms-upload/ncpc/files/gangs.pdf
Youth Gangs http://www.ed.gov/admins/lead/safety/training/gangs/day1_pdf.pdf
Gangs Or Us http://www.gangsorus.com/graffiti.html
2005 National Gang Threat Assessment
http://www.stripes.com/07/feb07/gangs/2005_NAGIA_Assessment.pdf
Review Of Gang Activity Affecting The Army
http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf
Gang-Related Activity in the US Armed Forces Increasing
http://www.stripes.com/07/feb07/gangs/ncis_gangs.pdf
Gangs In The Military Video http://www.militaryspot.com/videos/video72.htm
Gang Activity In The U.S. Military http://usmilitary.about.com/od/justicelawlegislation/a/gangs.htm
Gang Signs http://zimmer.csufresno.edu/~haralds/htmlfiles/gang-signs.html
Gangs Spreading In The Military
http://www.cbsnews.com/stories/2007/07/28/eveningnews/main3107316.shtml?source=RSSattr=HOME_
3107316
Gang Related Activity In The Armed Forces
http://militarytimes.com/static/projects/pages/ngic_gangs.pdf
Gang Activity Threat Assessment http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf
List Of California Street Gangs http://en.wikipedia.org/wiki/List_of_California_street_gangs
Gang Signal http://en.wikipedia.org/wiki/Gang_signal
Gang Awareness Guide http://www.state.nj.us/oag/gang-signs-bro.pdf
Gang Hand Signs from Gang Members
http://www.hiphopmusicclassic.com/Gang-Hand-Signs-from-Gang-Members.html
91
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Global Threats/Conflict
92
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Google Alerts (Don’t waste time on searches when Google can do it for you. Type in the
keywords or phrases and get the results as they occur or once a day) http://www.google.com/alerts
Google Answers (Ask a question, set a price get an answer) http://answers.google.com/answers/
Catalogs (Search and browse mail-order catalogs) http://catalogs.google.com/
Directories (Browse the web by topic) http://www.google.com/dirhp
Froogle (Shop smarter with Google) http://froogle.google.com/
Groups (Create mailing lists and discussion groups)
http://groups-beta.google.com/grphp?hl=en&tab=wg
Images (Search for images on the web) http://www.google.com/imghp?hl=en&tab=wi
Labs (Try out new Google products) http://labs.google.com/
Local (Find local businesses and services) http://local.google.com/
Maps (View maps and get directions) http://maps.google.com/
News (Search thousands of news stories) http://news.google.com/nwshp?hl=en&gl=us
Print (Search the full text of books) http://print.google.com/
Scholar (Search scholarly papers) http://scholar.google.com/
Special Searches (Search within specific topics)
http://www.google.com/intl/en/options/specialsearches.html
University Search (Search a specific school's website)
http://www.google.com/intl/en/options/universities.html
WEB Search Features (Do more with search) http://www.google.com/help/features.html
A 3D interface to the planet http://earth.google.com/
Blog Search http://blogsearch.google.com/
Simply Google http://www.usabilityviews.com/simply_google.htm
Search Mash http://www.searchmash.com/
93
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Hate Groups
Hezbollah
94
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Human Trafficking
95
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
HUMINT
Identity Theft
What to do if you are a victim of identity theft? Place a fraud alert on your credit reports by
notifying all credit reporting agencies.
Experian P. O. Box 9532, Allen, TX 75013-9595 Tel: 888-397-3742
Equifax P. O. Box 740241, Atlanta, GA 30374-0241 Tel: 800-685-1111
Trans Union P. O. Box 6790, Fullerton, CA 92834 Tel: 800-680-7289
Innovis Data Solutions P.O. Box 1534, Columbus, OH Tel: 877-261-7685
Identity Theft and Terrorism http://www.privacymatters.com/identity-theft-information/identity-
theft-and-terrorism.aspx
Credit Card Fraud http://www.identity-theft-help.us/credit.card.fraud.htm
How To Commit Credit Card Fraud http://www.clean-credit.us/identity-theft-how.htm
http://www.identity-theft-help.us/how.to.commit.fraud%20.htm
http://www.identity-theft-help.us/how.to.commit.identity.theft%20.htm
Identity Theft: A Quiz for Consumers http://www.usdoj.gov/criminal/fraud/idquiz.pdf
Identity Theft and Fraud http://www.usdoj.gov/criminal/fraud/idtheft.html
Identity Theft Resources http://www.privacyrights.org/identity.htm
Identity Theft Prevention and Survival http://www.identitytheft.org/
Take Charge: Fighting Back Against Identity Theft
http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm
Identity Theft in The U.S
http://www.cnn.com/interactive/us/0516/map.state.theft.rankings/frameset.exclude.html
http://www.cnn.com/interactive/us/0516/map.state.theft.rankings/frameset.exclude.html
96
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Ditto http://www.ditto.com/
NASA http://nix.nasa.gov/
Flickr http://www.flickr.com/
The MEMRI Economic NBlpog http://www.memrieconomicblog.org/
http://www.memri.org/
Webshots http://webshots.com/
Excellent Video Clips From The Middle East http://www.memritv.org/
YouTube http://youtube.com/
GoogleVideo http://video.google.com/
Daily Motion http://www.dailymotion.com/us
Myspace http://myspace.com/
Metacafe http://www.metacafe.com/
Break http://break.com/
Metatube http://www.metatube.net/
Yahoo Video http://video.yahoo.com/
Ifilm http://www.ifilm.com/
Educate Earth http://www.educatedearth.net/index.php
StupidVideos http://stupidvideos.com/
FileCabinet http://filecabi.com/
Hi5 http://hi5.com/
Pandora http://pandora.com/
MTV http://www.mtv.com/
PhotoBucket http://photobucket.com/
OnAirToday (a collection of latest feeds from various sources. More feeds).. http://www.onairtoday.com/
Flixxy http://www.flixxy.com/
Zoomr : Recent startup that is shaping up to take on Flickr. Have just announced they will be
increasing monthly limits on free and paid accounts to more than what Flickr offers.
Vmix : Founded by the people behind MP3.com, Vmix offers photo and video sharing along with
the ability to create you own slideshows. A busy-looking site that seems to have quite a bit of traffic.
Flickr : The daddy of photo-sharing sites, the first in the breed of web 2.0 photo sites, allows you
to create galleries, tag photos etc. The biggest in terms of traffic and was acquired by Yahoo.
Fotki : Founded in 1998 Fotki has been around for ages in relation to a lot on this list, it offers a
range of services such as photo-sharing, photo-printing, photo-selling and blogging.
Fotolog : Large photo blogging community - claims to have a staggering 1.5 billion page views
and receive over 20 million unique visitors per month which is backed up by its alexa ranking of 33.
Fototopic : Another site that has been around a few years; since 1999. Offers gallery services and
also prints and your photos on to various gifts within their store.
Glowfoto : A basic photo sharing site that offers galleries and the option to upload via mobile
phone. 25million photos have been uploaded by 73k users so far.
DotPhoto replaced MyPhotoAlbum : Photo sharing with the usual features and also offers
printing; currently offering 15 free prints to new users. Has had 32million photos uploaded so far.
Panoramio : Photo storage and a mapping feature via a mashup with google maps. Each photo
gets linked with the place it was taken. 2GB storage included for free.
Zoomonga : A nice-looking site but the rather stingy 20mb of uploads per month on the free plan
could be why it doesnt look exactly busy.
Webshots : Another huge site owned by Cnet. Provides the usual photo sharing features plus a
desktop utility for organising photos, prints on gifts etc.
Photobucket : The favourite of myspace users, provides free and paid accounts for image hosting
and video hosting along with the ability to create a flash slideshow. Have harnessed viral marketing to a
tee and provide most of the image hosting for myspace and other social networks.
PBase : Not the easiest on the eye but seems to have gained huge traffic since it was established
in 1999. Very basic features and a huge member’s forum.
OrangePics : A basic site that emphasizes ease of use and safety of your photos. Currently
offering your first full year for free, after which is an annual charge of $24.95.
97
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Phanfare : Offers unlimited storage for a monthly fee of $6.95 to host your photos and video clips.
Also provides downloadable organisation software.
SmugMug : Really nicely designed site that offers accounts from $59.95 per year with a free trial.
The user galleries are nice to look at and you can include video in these.
Dropshots : Front end looks nice and clean and the features are up to scratch but viewing the
sample gallery lets the site down - cluttered and ugly.
Slide : Another site that has taken advantage of myspace to create viral marketing. Users upload
photos and create slideshows using the editor and then post them to their profile or blog etc. Controls are
nice and easy to use, will do well unless myspace bring out their own slideshow tools.
Photosite : Provides photo sharing but you get the impression the site is more about selling prints
and gifts than that. looks a touch too corporate although the drag and drop tools sound impressive.
23HQ : Nice site which provides completely free accounts, basic features such as galleries,
tagging and photogroups; where you can form your own community of friends and chat and share each
other’s photos.
Kodak Gallery : Goes under the name of a photo sharing site but looks very corporate and set up
to flog merchandise rather than provide a nice website experience.
Zoto : Nice site with good features such as geo-tagging, photo blogging and the usual community
features such as browsing by interest. Free version with the option to upgrade to a pro account for $24.95
per year.
Snapfish : Another corporate site run by Hewlett Packard, offers photo sharing and digital prints
of your snaps.
Flukiest : Photo, Video and music sharing with the ability to upload via mobile phone or a
personalised Flukiest email address.
Imagestation : Sonys photo sharing offering, much better looking the Kodaks or HPs. Usual
features with printing options but also the ability to upload via your psp.
PictureTrail : Another site that is combining photo sharing and social networking. Provides
myspace style customisable profiles and some nice flash widgets to create 3d cubes of your photos, heart
shapes, slideshows, screensavers and loads more bits and bobs.
Hello : Great domain and Googles offering which is designed to work in tandem with their picasa
image organising software which they acquired. Picasa is great piece of software and helps you find
pictures you had long forgotten about. it seems that hello allows you to send images to your friends like
and instant messager or to your blogger blog.
Parazz : Parazz is a nifty looking site which offers drag and drop uploading, slideshow creation
with the option to add a soundtrack, camera phone uploads and a colour theme editor. They provide a
free version or pro version for $29 a year.
Zeec : Clean looking site with nice user galleries, offers the choice of uploading via your pc or
mac with their software or via mobile phone.
IMINT
GEOINT Online (A website that is unifying existing NGA web-based capabilities for online, on-
demand discovery of and access to geospatial intelligence (GEOINT) content, services, expertise, and
support. GEOINT Online is an element of the strategy to transform NGA from solely a product producer
to a GEOINT Services Provider with integrated access to GEOINT content, services, expertise and
support.)
https://www.geoint-online.net/_layouts/NGA/GO/Logon/logon.aspx?Source=https://www.geoint-online.net/
IMINT And Analysis (Open source military analysis, strategic thinking, and Google Earth imagery
interpretation) http://geimint.blogspot.com/
Imagery Intelligence Part I and II http://dataink.blogspot.com/2007/03/imagery-intelligence.html
http://dataink.blogspot.com/2007/10/imagery-intelligence-part-ii.html
IMINT 101 Introduction To Imagery Intelligence http://ftp.fas.org/irp/imint/imint_101.htm
Do It Yourself Imagery Analysis
http://geimint.blogspot.com/2008/01/effective-searching-in-google-earth.html
98
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Satellite Sensors (Learn more about each sensor and view sample satellite imagery)
ALOS
ASTER
CARTOSAT-1
CBERS-2
FORMOSAT-2
GeoEye-1
IKONOS
LANDSAT 7
QuickBird
SPOT-5
WorldView-1
Counter IMINT: The Syrian Deception
http://verificationthoughts.blogspot.com/2008/05/syrian-deception.html
Army Geospatial Center http://www.agc.army.mil/
Information Dominance/Operations
99
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Intelligence Disciplines
Intelligence Resources
100
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Ad-Aware http://www.lavasoft.de/software/adaware/
Analyzer http://analyzer.polito.it/30alpha/
Bugnosis http://www.bugnosis.org/
Cybercrime http://www.cybercrime.gov/
CERT http://www.cert.org/
Hacker and Spyware Protection http://www.looknstop.com/En/index2.htm
Email Security and Privacy http://www.stealthmessage.com/
Home Network Security http://www.cert.org/tech_tips/home_networks.html
Privacy and Security http://www.markusjansson.net/eienbid.html
Lavasoft http://www.lavasoftusa.com/
Leak Test http://grc.com/lt/leaktest.htm
Setting up Security Zones http://www.microsoft.com/windows/ie/using/howto/security/setup.mspx
Shields Up http://grc.com/su-firewalls.htm
Anti Spyware Tools http://www.spychecker.com/home.html
Spyware Reviews http://removespyware.net/
Guide to Online Privacy http://www.cdt.org/privacy/guide/basic/topten.html
Virus List http://www.viruslist.com/en/index.html
WebWasher http://www.webwasher.com/
Snooper http://snoop.cdt.org/
Security Advisers http://www.wilders.org/
Spyware and Adware Removal http://www.paretologic.com/xoftspy/lp/14/
Top Secret Software http://www.topsecretsoftware.com/index.html
Interpol
101
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Iran/Iranian Military
102
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.freerepublic.com/focus/f-news/1790191/posts
Iran Defence http://www.irandefence.net/showthread.php?t=4808
How Iran Would Apply its Assymetric Naval Warfare Doctrine in The Future Conflict
http://www.marshallcenter.org/site-graphic/lang-en/page-occpapers-research-
1/static/xdocs/research/static/occpapers/occ-paper_10-en.pdf
Ammunition And Metallurgy Industries Group http://www.diomil.ir/en/amig.aspx
Spy Photos Reveal 'Secret Launch Site' For Iran's Long-Range Missiles
http://www.timesonline.co.uk/tol/news/world/middle_east/article3724048.ece
Open Source Readings On Iran
http://uskowioniran.blogspot.com/2008/04/open-source-readings-on-iran.html
Tehran Nuclear Research Center
http://www.globalsecurity.org/wmd/world/iran/tehran-tnrc.htm
Satellite Imagery of the Tehran Nuclear Research Center
http://www.globalsecurity.org/wmd/world/iran/tehran-tnrc-imagery.htm
103
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.google.com/hostednews/afp/article/ALeqM5hnl-
YPuDmONcoBmmS8_G91LxdryA?docId=CNG.041943dc452c61a507ee986061b49f2d.f21
Iraninan Websites
104
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Mashreghnews ("Mashreghnews" is closed to armed forces. High likely IRGC. Due to its extreme
focus on "air" related stuff, it might be connected to a company or an institute that works for IRGC's
Aerospace Forces. Iran has two military. Artesh, or "Army" is the one that is conventional with most
personnel, limited political involvement and low technology. IRGC or Sepah, made after Iraqs attack to
Iran from ordinary people to protect the "revolution" and then remained as a whole separate military
figure. Army has an Air force, IRAF. They are running the airplanes, specially F-14 Tomcats. Iran is the
ONLY and largest owner of F-14s at the moment due to restrictions and also because bold military ties of
U.S govt with Shah's Army before the Revolution. Back then, and even these days, Tomcats are stuff one
can count on them. Army also has a Force name "Air Defense". These are the "S-300 bullshit" people
who run Radars and surface to air offense. at IRGC side, they only have an Aerospace Force. While it
has limited kid stuff planes, its focus is Missiles.) NOTE: Translating the site into English turns out to be
very poor, however, with patience you can pick up enough key words to do follow up research
http://www.mashreghnews.ir/fa/news/156072/%D8%A7%D9%88%D9%84%DB%8C%D9%86-
%DA%A9%D8%A7%D9%86%D8%AF%DB%8C%D8%AF%D8%A7%DB%8C-
%D8%B1%DB%8C%D8%A7%D8%B3%D8%AA%E2%80%8C-
%D8%AC%D9%85%D9%87%D9%88%D8%B1%DB%8C-%D9%85%D8%B4%D8%AE%D8%B5-
%D8%B4%D8%AF
Translation into English
http://translate.google.com/translate?langpair=auto|en&u=http%3A%2F%2Fwww.mashreghnews.ir%2Ffa
%2Fnews%2F156072%2F%D8%A7%D9%88%D9%84%DB%8C%D9%86-
%DA%A9%D8%A7%D9%86%D8%AF%DB%8C%D8%AF%D8%A7%DB%8C-
%D8%B1%DB%8C%D8%A7%D8%B3%D8%AA%E2%80%8C-
%D8%AC%D9%85%D9%87%D9%88%D8%B1%DB%8C-%D9%85%D8%B4%D8%AE%D8%B5-
%D8%B4%D8%AF
http://translate.google.com/translate?langpair=auto|en&u=http%3A%2F%2Fwww.mashreghnews.ir%2Ffa
%2Fnews%2F155915%2F%D9%85%D8%B1%D9%88%D8%B1%DB%8C-%D8%A8%D8%B1-
%D8%AF%D8%B3%D8%AA%D8%A7%D9%88%D8%B1%D8%AF%D9%87%D8%A7%DB%8C-
%D8%AF%D9%81%D8%A7%D8%B9%DB%8C-6%D8%B3%D8%A7%D9%84-
%D8%B1%DA%98%D9%87-
31%D8%B4%D9%87%D8%B1%DB%8C%D9%88%D8%B1%D9%85%D8%A7%D9%87-
%D8%B9%DA%A9%D8%B3
http://translate.google.com/translate?langpair=auto|en&u=http%3A%2F%2Fwww.mashreghnews.ir%2Ffa
%2Fnews%2F154510%2F%D9%85%D8%B1%D9%88%D8%B1%DB%8C-%D8%A8%D8%B1-
%D8%AA%D8%AD%D9%88%D9%84-
%D9%85%D9%88%D8%B4%DA%A9%E2%80%8C%D9%87%D8%A7%DB%8C-
%D8%A7%DB%8C%D8%B1%D8%A7%D9%86%DB%8C-%D8%AF%D8%B1-
%D8%B1%DA%98%D9%87-31-
%D8%B4%D9%87%D8%B1%DB%8C%D9%88%D8%B1%D9%85%D8%A7%D9%87-
%D8%B9%DA%A9%D8%B3
Rajanews ("Rajanews" is a website "officially" belong to a series of hardliners with origins in the
Iran/Iraq war - they promote war, arrests, Spy executions and alike. Some info on their site is not
propaganda and comes from real sources, which are, their own hardliner friends in politics, Military and
Intelligence. NOTE: Translating the site into English turns out to be very poor, however, with patience you
can pick up enough key words to do follow up research) http://rajanews.com/detail.asp?id=138264
Translation into English
http://translate.google.com/translate?langpair=auto|en&u=http%3A%2F%2Frajanews.com%2Fdetail.asp
%3Fid%3D138264
Kamangir.net http://kamangir.net/
Links To Iranian Websites http://clibrary.um.ac.ir/iranianwebsites.htm
http://www.birmingham.gov.uk/GenerateContent?CONTENT_ITEM_ID=24062&CONTENT_ITEM_TYPE=
0&MENU_ID=260
Toronto Iranians http://www.torontoiranians.com/modules/mylinks/
105
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Iraq
106
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Islam/Islamic Websites
Islamic Heraldry
107
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Israel
Israel's Dimona Nuclear Weapons Factory In 3D, and other Israeli videos
http://www.youtube.com/watch?v=bbjgDERSuiI
New Weapon To Get Terrorists http://www.youtube.com/watch?v=iv7Kn0mOTsE&feature=related
Israeli Blogs http://www.ringsurf.com/ring/ilblogs/
http://judaism.about.com/od/israeliblogs/Israeli_Blogs.htm
Israeli Special Forces http://www.isayeret.com/
Israeli Military Facilities http://cryptome.org/idf/idf-eyeball.htm
Soreq Nuclear Research Center http://cryptome.org/soreq-eyeball.htm
Israel Signal Facilities http://cryptome.org/ilsig-eyeball.htm
Gaza Strip http://www.lib.utexas.edu/maps/middle_east_and_asia/gaza_strip_may_2005.jpg
http://cryptome.org/kerem/kerem-eyeball.htm
Israel Intelligence Agencies http://www.fas.org/irp/world/israel/index.html
Mossad http://www.mossad.gov.il/Mohr
Mossad English Version
http://www.mossad.gov.il/Mohr/MohrTopNav/MohrEnglish/MohrAboutUs/
Jerusalem Center for Public Affairs http://www.jcpa.org/brief/brief-list.htm#te
Israeli Air Force Intelligence Unit http://video.google.com/videoplay?docid=279277445708481896
Israel/Lebanon Conflict http://www.gearthblog.com/blog/archives/2006/07/israellebanon_c.html
Israel/Palestinian ProCon http://www.israelipalestinianprocon.org/
Israel Science And Technology
http://www.science.co.il/Transportation-Companies.asp?s=software
Israel Defense Forces
http://www.sap.com/platform/netweaver/pdf/CS_Israeli_Defense_Forces.pdf
Export And International Cooperation Institue
http://www.export.gov.il/Eng/_Articles/Article.asp?ArticleID=3363&CategoryID
What Would An Israeli Ground Invasion Look Like
http://www.mcculloughsite.net/stingray/2006/07/17/what-would-an-israeli-ground-invasion-look-like.php
Gisrael Digital Mapping http://www.gisrael.co.il/
Israeli Torture Prison http://eyeball-series.org/facility-1391/facility-1391.htm
General Israeli Military & Weapons Articles http://www.nogw.com/ilweapons.html
108
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
The Secret Arsenal of The Jewish State 2003 (interactive graphic) Best to type the link into the URL
box. Will not function by clicking on it.
http://www.islamonline.net/Arabic/Media/2003/03/article1.shtml
Type link directly into URL box; clicking will not function http://www.nogw.com/ilweapons.html
Despite Israel's refusal to acknowledge its nuclear weapons status, its secret arsenal is an open secret
that Israeli policy makers don't go out of their way to deny. From its beginnings in the mid-1960s, Israel's
program has developed into one that rivals those of larger powers like France and Britain. Here, based on
interviews with U.S. intelligence officials and nuclear experts, is a portrait of Israel's strategic weapons
programs. http://www.sweetliberty.org/issues/israel/strategic/index.shtml
109
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
31.001504°N, 35.146723°E
Eilabun
Eilabun is Israel's second weapons storage facility. Tactical nuclear shells and land mines are
among its contents.
110
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
32.760226°N, 35.412077°E
Kfar Zekharya
Suspected nuclear missile base and bomb storage storage facility.
31.766267°N, 34.88142°E
Nahal Soreq
Soreq is the equivalent of the U.S. national weapons laboratories. The lab handles weapons design
and construction as well as research.
31.766267°N, 34.88142°E
Yodefat
Suspected nuclear weapons assembly facility.
32.85093°N, 35.27916°E
Tirosh
Reportedly one of two Israeli nuclear weapons storage facilities. It is speculated that that Tirosh is
the strategic weapons storage site, while Eilabun is the tactical weapons storage site.
31.751963°N, 34.863524°E
Rafael
Rafael has been responsible for the actual assembly of Israeli nuclear weapons.
32.889534°N, 35.09119°E
Language Training
The notion of ‘foreign’ languages is beginning to disappear, thanks to ongoing developments by the
likes of Google and Facebook that help the thousands of languages across the world be less foreign and
more accessible. How? By making language translation easier than ever. In light of the technological
progress in translation software made over the last decade, we may very well be on the cusp of
witnessing the majority of language barriers between people groups disappear.
111
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Not only does that mean everyone will be able to speak their natural tongue, learning another
language will be purely out of interest or linguistic study, not a degree requirement for students or
mandatory continuing education for international business people.
http://singularityhub.com/2012/07/24/will-it-matter-if-we-speak-different-languages-in-the-
future/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SingularityHub+%28Sin
gularity+Hub%29
2lingual (super useful dual-language search tool that makes it easy to Google Search in 2
separate languages. It performs both a Google Search and a Cross-language Google Search. It also
provides a query translation option that can be activated or deactivated for Cross-language Google
Searches. The top-ranking Google Search Results from 2 separate languages are presented side-by-side
in separate lists.) Currently, the following 37 Google Search Languages are supported.
http://www.2lingual.com/
Any Dutch Italian Slovenian
Language English Japanese Spanish
Arabic Estonian Korean Swedish
Bulgarian Finnish Latvian Thai
Catalan French Lithuanian Turkish
Chinese German Norwegian Ukrainian
(Simplified) Greek Polish Vietnamese
Chinese Hebrew Portuguese
(Traditional) Hindi Romanian
Czech Hungarian Russian
Danish Indonesian Slovak
Multilingual Voice Search (makes it easy to Google Voice Search in 79 different spoken
languages. Features include Search-by-Voice, Real-time Search Suggestions and "Did you say" Speech-
to-Text Corrections.) Currently, the following 79 Speech-to-Text Languages are supported.
http://google-multilingual-voice-search.2lingual.com/
Twitter Multilingual Voice Search http://twitter-multilingual-voice-search.2lingual.com/
112
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
113
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Gateway to the exchange of scientific and technical information Defense Technical Information Center
News and Events Department of Defense
News and Events Drug Enforcement Administration
Research Venue Elder Abuse Prevention
News and Events, Task Force Initiatives FATF — Financial Action Task Force on Money Laundering
Gateway to the BOP site provides various selections, including: Quick Facts and Statistics, Weekly Population
Reports, Program Statements (Policies), Inmate Information, and Employment Information Federal Bureau of
Prisons
Gateway to preparation information and related links Federal Emergency Management Agency
Training Resources Federal Law Enforcement Training Center
Publications and other resources Financial Crimes Enforcement Network
Research Venue Gang Prevention, Inc.
Gateway to high-tech law enforcement High-Tech Crime Network
Institute Resources and events Institute of Police Technology and Management
Association Resources International Association of Campus Law Enforcement Administrators (IACLEA)
Association Resources International Association of Chiefs of Police
Gateway to Law Enforcement Information Technology Resources International Association of Chiefs of Police
Technology Clearinghouse
Standards and Continuing Education International Association of Directors of Law Enforcement Standards and
Training
Association Resources International Association of Law Enforcement Intel Analysts
Forum, Association Resources International Association of Law Enforcement Planners
Association Resources International Association of Women Police
Association Resources International Narcotics Control Board
Information and trends in targeting narcotics traffickers International Narcotics Interdiction Association (INIA)
Association Resources International Police Association (IPA)
Association Resources International Police Association (IPA) USA Section
Forum, News and Events Justice For All — A Criminal Justice Reform Organization
114
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
115
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
116
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Lessons Learned
Library Resources
The Researching Librarian’s Database Library. (Note: I cannot recall where I obtained the following
database but I certainly cannot take credit for it. I selected several at random to see if they were still
active and inputted keywords that returned good results.)
AATA Online: Abstracts of visitors, for free. All you need to do is English Language Bibliography)." --
International Conservation Literature register with us." -- Title page "About" page
http://aata.getty.edu/NPS/
117
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
"All Academic is an academic index. It is "The Bibliographic Database of the dedicated reading devices. BookServer
designed to provide scholars and Conservation Information Network (BCIN) facilitates pay transactions, borrowing
researchers with useful on-line source provides access to over 190,000 books from libraries, and downloading
information about scholarly works. . . . bibliographic citations for conservation free, publicly accessible books." --
Links are direct from source citations to literature. BCIN includes citations from the Homepage
scholarly publications. All Academic Art and Archaeology Technical Abstracts
catalogs free publications only! Links to (prior to 1998), technical reports,
commercial and fee based scholarly conference proceedings, journal articles, British Library Catalog
publications are not included in this books and audiovisual and unpublished http://catalogue.bl.uk/
database." -- "About" information materials. The database also includes
previously unavailable material from
"This service provides simple searching
private sources, as well as new
American Library Association and ordering of documents from the
information gathered by a worldwide
Archives: Holdings Database British Library's extensive collections." --
network of contributors." -- "About BCIN"
http://www.library.illinois.edu/archives/ Homepage
page
ala/holdings//
British Library Manuscripts Catalog
Bibliographical Society of the
"This website provides a searchable http://molcat.bl.uk/
University of Virginia
interface for the American Library http://bsuva.org/
Association Archives' 'control card'
"This On-line Catalogue is designed to
database. The system includes records for
offer a single means of access to the
over 1,100 archives or manuscript Of monumental importance, the first 51
mainstream catalogues of the Department
collections which have been arranged volumes of Studies in Bibliography,
of Manuscripts covering accessions from
according to the archival principle of offering a vast library of articles on
1753 to the present day." -- "About" page
provenance. Materials are arranged in a bibliography and textual criticism, has
three-part classification scheme of record been made available online by the
group, record sub-group, and record Bibliographical Society. Also available are British Official Publications
series." -- Title page Shakespearean Prompt-Books of the Collaborative Reader Information
Seventeenth Century and Emily Lorraine Service (BOPCRIS)
de Montluzin's Attributions of http://www.southampton.ac.uk/library/l
Anthropological Index of the Royal Authorship in the Gentleman's du/projects.html
Anthropological Institute Magazine and Attributions of
http://lucy.ukc.ac.uk/AIO.html Authorship in the European Magazine.
"You can use this web site to search and
browse information from British Official
A small but surprising number of entries Book History Online: International Publications over the period 1688-1995.
concerning libraries. "The Anthropological Bibliography of the History of the You can also read abstracts, and view
Index Online is based on the journal Printed Book and Libraries detailed consistent subject indexing, of
holdings of The Anthropology Library at http://www.kb.nl/bc/abhb-en.html key documents. You can then read the
the The British Museum (Museum of
digitised full-text version of a limited
Mankind) which receives periodicals in all
number of these documents." -- Title page
branches of anthropology, from academic "Book History Online (BHO) is designed,
institutions and publishers around the managed, maintained and published by
world." -- Title page the Koninklijke Bibliotheek, National C-SPAN Video Library
Library of the Netherlands, in co-operation http://www.c-
with national committees in countries all spanvideo.org/videoLibrary/
ARCHON Directory over the world. BHO is a database in
http://www.nationalarchives.gov.uk/arc English on the history of the printed book
hon/ and libraries. It contains titles of books "The C-SPAN Archives records, indexes,
and articles on the history of the printed and archives all C-SPAN programming for
book worldwide. It is based on ABHB, the historical, educational, research, and
"The ARCHON Directory includes contact
Annual Bibliography of the History of the archival uses. Every C-SPAN program
details for record repositories in the United
printed Book and Libraries." -- aired since 1987, now totaling over
Kingdom and also for institutions
"Introduction" page 160,000 hours, is contained in the C-
elsewhere in the world which have
SPAN Archives and immediately
substantial collections of manuscripts
accessible through the database and
noted under the indexes to the National Book Search Mashup electronic archival systems developed and
Register of Archives." -- Title page http://kokogiak.com/booksearch/ maintained by the C-SPAN Archives." --
About page
arlis.net Periodicals Database (formerly This mashup created by Web developer,
Union List of Art, Architecture and Alan Taylor at his site Kokogiak, lets you Canadian Association of Research
Design Serials) runs queries in Google Books, Amazon Libraries Open Archives Metadata
http://www.arlis.net/ Search Inside/A9 and MSN Live Book Harvester
simultaneously. Results appear side-by- http://carl-abrc-oai.lib.sfu.ca/
side in 3 columns for quick comparison.
"The arlis.net service is designed to help
users to locate art, architecture and
"Welcome to the Canadian Association of
design publications, plus related materials. BookServer Research Libraries (CARL) Institutional
The service currently consists of a http://www.archive.org/bookserver Repositories Pilot Project Harvester. This
database of periodical titles (or magazines
Harvester is the search service for the
/ journals / serials), and a related directory
CARL Institutional Repositories Pilot
of art library resources in general. " Click "The BookServer is a growing open
Project and aggregates material from
on the periodicals tab at the top of the architecture for vending and lending digital
each of the participating Canadian
page. -- "Introduction"Bibliographic books over the Internet. Built on open
institutions, allowing users to seamlessly
Database of the Conservation catalog and open book formats, the
search all of the repositories at once,
Information Network (BCIN) BookServer model allows a wide network
using one common point of access." --
http://www.bcin.ca/ of publishers, booksellers, libraries, and
About this Archive page
even authors to make their catalogs of
books available directly to readers through
their laptops, phones, netbooks, or
118
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Catalogue of Digitized Medieval DART-Europe E-theses Portal From the Digital Library Federation.
Manuscripts http://www.dart-europe.eu/basic- "Our purpose is to promote effective use
http://manuscripts.cmrs.ucla.edu/ search.php of distributed digital library content for
teaching, learning, and research in the
area of American culture and life. We
"The Catalogue of Digitized Medieval "DART-Europe is a partnership of support scholarly discovery and access
Manuscripts offers a simple and research libraries and library consortia by: Developing schemas, protocols and
straightforward means to discover who are working together to improve communities of practice to make digital
medieval manuscripts available on the global access to European research content available to scholars and students
web. Very much a work in progress, the theses." - Homepage where they do their work; Developing the
database will initially provide links to best possible systems for finding,
hundreds of manuscripts, which we expect identifying and using digital resources in
quickly to grow to thousands. Basic DataFerrett
context by promoting digital library best
information about the manuscripts is fully http://dataferrett.census.gov/
practices and developing tools and
searchable, and users can also browse services to improve digital resource
through the complete contents of the access and use" -- Title page
"DataFerrett is a unique data mining and
database. As the project develops, a
extraction tool. DataFerrett allows you to
richer body of information for each
select a databasket full of variables and
manuscript, and the texts in these E-LIS - The open archive for Library
then recode those variables as you need.
codices, will be provided, where and Information Science
You can then develop and customize
available." -- About us page http://eprints.rclis.org/
tables. Selecting your results in your table
you can create a chart or graph for a
Collection of Computer Science visual presentation into an html page. "E-LIS is an open access archive for
Bibliographies Save your data in the databasket and scientific or technical documents,
http://liinwww.ira.uka.de/bibliography/ save your table for continued reuse." - published or unpublished, on
Homepage Librarianship, Information Science and
Technology, and related areas. E-LIS
"This is a collection of bibliographies of relies on the voluntary work of individuals
scientific literature in computer science DLIST - Digital Library of Information
from a wide range of backgrounds and is
from various sources, covering most Science and Technology (University of
non-commercial. It is not a funded project
aspects of computer science. The about Arizona)
of an organization. It is community-owned
1200 bibliographies are updated monthly http://arizona.openrepository.com/arizo
and community-driven. We serve LIS
from their original locations such that you'll na/handle/10150/105067
researchers by facilitating their self-
always find the most recent versions here. archiving, ensuring the long-term
The collection currently contains more preservation of their documents and by
"Established in 2002, DLIST, Digital
than one million references (mostly to providing world-wide easy access to their
Library of Information Science and
journal articles, conference papers and papers." -- Title page
Technology is a cross-institutional,
technical reports) and consists of 660
subject-based, open access digital archive
MBytes of BibTeX entries. More than
for the Information Sciences, including
16000 references contain crossreferences English Short Title Catalogue
Archives and Records Management,
to citing or cited publications. More than http://estc.bl.uk/F/?func=file&file_name
Library and Information Science,
100,000 references contain URLs to an =login-bl-list
Information Systems, Museum
online version of the paper. There are
Informatics, and other critical information
more than 2000 links to other sites
infrastructures. The dLIST vision is to "The English Short Title Catalogue
carrying bibliographic information." -- Title
serve as a dynamic archive in the (ESTC) lists over 460,000 items:
page
Information Sciences, broadly understood, published between 1473 and 1800; mainly
and positively impact and shape scholarly in Britain and North America; mainly, but
COPAC communication in our closely related not exclusively, in English; from the
http://www.copac.ac.uk/ fields." -- About page collections of the British Library and over
2,000 other libraries. " -- Title page
"COPAC provides FREE access to the Digital Collections Registry
merged online catalogues of 21 of the http://dlf.grainger.uiuc.edu/DLFCollecti ERIC Database
largest university research libraries in the onsRegistry/browse/ http://www.eric.ed.gov/
UK and Ireland." -- Title page
From the Digital Library Federation. A "The Education Resources Information
Current Cites searchable database of members' public Center (ERIC), sponsored by the Institute
http://currentcites.org/ domain, online digital collections. of Education Sciences (IES) of the U.S.
Department of Education, produces the
world’s premier database of journal and
"A team of librarians and library staff Directory of Union Catalogs (IFLA)
non-journal education literature. The new
monitors information technology literature http://archive.ifla.org/VI/2/duc/index.ht
ERIC online system, released September
in both print and digital forms, each month m
2004, provides the public with a
selecting only the best items to annotate centralized ERIC Web site for searching
for a free publication. The resulting issue the ERIC bibliographic database of more
"This Directory is a complete listing of all
of 10-20 annotated citations of current than 1.1 million citations going back to
known current national union catalogues
literature is emailed to a mailing list and is 1966. Effective October 1, more than
in the world, including monograph, serial
redistributed on other electronic fora. The 107,000 full-text non-journal documents
and general union catalogues. In order for
individual citations are also individually (issued 1993-2004), previously available
catalogues to be included, they must be
indexed so that you can dynamically through fee-based services only, will be
both national (or international) and
create your own Bibliography On- available for free. " -- Title page
current. Closed catalogues and regional or
Demand. The items that are freely
local catalogues are not listed. Specific
available on the Internet are also retrieved
subject catalogues are included where
and indexed so that you can perform an ERIC/AE Draft Abstracts
known, as well as those with a general
Article Search of the full-text of these http://ericae.net/sinprog.htm -- No
subject coverage." -- Title page
items." -- Title page longer available (closed by U.S. Dept.
of Education as of 12/09/03)
DLF Aquifer
http://www.diglib.org/aquifer/
119
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
"Processing of an ERIC abstract typically more than 300 magazines and journals, GrayLIT Network - See Science.gov
takes six to nine month from the time we dating back to 1998. FindArticles even
prepare an abstract to the final product brings some print-only publications to the
appearing in Resources in Education or Web for the first time." -- "Help" page HCI Bibliography: Human-Computer
the Current Index to Journals in Interaction Resources
Education. To help you obtain the latest http://www.hcibib.org/
information on assessment and TheFreeLibrary.com
evaluation, we created this experimental http://www.thefreelibrary.com/
"The HCI Bibliography is a free-access
database of our abstract drafts. We
online bibliographic database on Human-
update this database every Thursday or
"Since 2003, The Free Library has offered Computer Interaction. The basic goal of
Friday night. Since we usually prepare
free, full-text versions of classic literary the Project is to put an electronic
abstracts within 2 or 3 weeks of receiving
works from hundreds of celebrated bibliography for most of HCI on the
the paper or journal, this information is
authors, whose biographies, images, and screens of all researchers, developers,
very current." -- Title page
famous quotations can also be found on educators and students in the field
the site. Recently, The Free Library has through the World-Wide Web and
ERIC/AE Full Text Internet Library been expanded to include a massive anonymous ftp access." -- "About" page
http://ericae.net/ftlib.htm -- No longer collection of periodicals from hundreds of
available (closed by U.S. Dept. of leading publications covering Business
and Industry, Communications, Index Translationum
Education as of 12/09/03)
Entertainment, Health, Humanities, Law, http://www.unesco.org/culture/xtrans/
Government, Politics, Recreation and
Includes sections of full-text articles on Leisure, Science and Technology, and
"INDEX TRANSLATIONUM data base
educational quality, learning theory, Social Sciences. This collection includes
contains cumulative bibliographical
evaluation, student evaluation, tests and millions of articles dating back to 1984 as
information about books translated and
testing, professional standards, research, well as newly-published articles that are
published in about a hundred of UNESCO
and statistical analysis. Article example: added to the site daily." -- Homepage
Member States from 1979, totalizing some
How to Write a Scholarly Research
1,300,000 notices in all disciplines:
Report.
getCITED literature, social and human sciences,
http://www.getcited.org/ natural and exact sciences, art, history,
"Here you will find links to some of the etc." -- Title page
best full-text books, reports, journal
articles, newsletter articles and papers on "getCITED is a site that exists to facilitate
the dissemination and discussion of Infotrieve
the Internet that address educational
academic research. It has numerous http://www.infotrieve.com/
measurement, evaluation and learning
theory. We have selected these features, but at its core, it consists of two
documents based upon criteria that are things: a database and a discussion
Many LIS journals are indexed in
widely accepted in the library and forum. What makes getCITED's database
ArticleFinder, "Infotrieve's free-to-search
information science community and we truly unique is that it lets scholars and
proprietary bibliographic database
have provided a framework so that you researchers decide what its content
containing over 22 million citations and
can easily browse these resources." -- should be. What makes its discussion
over 10 million abstracts from more than
Title page forum truly unique is the fact that, within
35,000 of the most important scholarly
the comments posted, you can create
journals from fields such as medicine,
LINKS to PUBLICATIONS and
biotechnology, science, engineering, and
ERIC/IT Full Text Database IDENTITIES within the getCITED
law." -- "About" page
http://www.ericit.org/fulltext.shtml -- No database." -- "About" page
longer available (closed by U.S. Dept.
of Education as of 12/09/03) Ingenta
Google Book Search
http://www.ingentaconnect.com/
http://books.google.com/
"Search over 1,000 of the latest research
reports, conference papers, opinion CARL UnCover is defunct, now
papers, selected articles and other ERIC The searchable interface for Google's
incorporated into Ingenta. Free searching.
documents in the fields of Library Science mass book digitization project. page
and Educational Technology and receive
the documents in full text immediately." -- Internet Archive
GPO Access Browse Topics
Title page http://www.archive.org/index.php
http://www.browsetopics.gov/
120
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
yearly fiction indexes, and forthcoming search PubMed in realtime. Simply click convey a richer message through the use
books." -- Homepage on one or more MeSH descriptors in a tag of multimedia and hypermedia
cloud to search PubMed for those terms technologies; to empower universities to
instantly." -- About page unlock their information resources; to
Intute advance digital library technology." -- Title
http://www.intute.ac.uk/ page
Medieval Feminist Index
http://www.haverford.edu/library/refere
"Intute is a free online service providing nce/mschaus/mfi/mfi.html NewspaperCat : Catalog of Digital
you with access to the very best Web Historical Newspapers
resources for education and research. The http://www.newspapercat.org/
service is created by a network of UK Great for items about medieval books,
universities and partners. Subject libraries, etc., with a feminist slant. A quick
specialists select and evaluate the test search turned up, among others, "A "The Catalog of Digital Historical
websites in our database and write high Library Collected by and for the Use of Newspapers (NewspaperCat) is a tool that
quality descriptions of the resources. " -- Nuns" and "Reassessing Women's facilitates the discovery of online digitized
Homepage Libraries in Late Medieval France." "The historical newspaper content from
Medieval Feminist Index covers journal newspapers published in the United
articles, book reviews, and essays in States and the Caribbean. NewspaperCat
lexisONE books about women, sexuality, and was funded by a grant from the George A.
http://law.lexisnexis.com/webcenters/le gender during the Middle Ages." -- "What Smathers Libraries.
xisone/ is the MFI?" page
Search by keyword, newspaper title or by
city, county or state to locate titles. From
Provides full-text of case law (state and MagPortal your search result, click on the link(s) to
federal), legal forms, and a legal internet http://www.magportal.com/ connect to the digital newspaper(s). In
guide.
many cases, this content is keyword
searchable, depending on the hosting
Searches and returns full-text articles from
Library, Information Science & organization.
web publications. Should prove useful for
Technology Abstracts (LISTA) some topics.
http://www.libraryresearch.com/ NewspaperCat currently links to over 1000
full-text newspaper titles with a goal to
National Criminal Justice Reference include links to as many US and
"EBSCO Publishing is proud to provide Service (NCJRS) Abstracts Database Caribbean newspapers with archival
the Library, Information Science & http://www.ncjrs.gov/abstractdb/search digital content as possible.. Plans are to
Technology Abstracts (LISTA) database .asp expand the Catalog as newly digitized
as a free resource to anyone interested in newspaper titles are located." -- Title page
libraries and information management.
Delivered via the EBSCOhost platform, Useful for prison librarianship research.
LISTA indexes nearly 600 periodicals plus "The National Criminal Justice Reference OAIster
books, research reports, and proceedings. Service Abstracts Database contains http://www.oclc.org/oaister/
With coverage dating back to the mid- summaries of more than 160,000 criminal
1960s, it is the oldest continuously justice publications, including Federal,
"OAIster is a Mellon-funded project of the
produced database covering the field of State, and local government reports,
University of Michigan Digital Library
information science." -- EBSCO Free books, research reports, journal articles,
Production Services. Our goal is to create
Databases page and unpublished research." -- Title page
a wide-ranging collection of free, useful,
previously difficult-to-access digital
National Union Catalog of Manuscript resources that are easily searchable by
Collections (NUCMC) anyone." -- Title page
http://www.loc.gov/coll/nucmc/
LigerCat : Literature and Genomics
Resource Catalogue OpenDOAR: Directory of Open Access
http://ligercat.ubio.org/ Provides access to the RLIN AMC Repositories
(Archival and Mixed Collections) file and http://www.opendoar.org/
the OCLC bibliographic database
"LigerCat was created as part of the describing archival and manuscript
Biology of Aging project at the MBLWHOI "The OpenDOAR service is being
collections in public, college and
Library at the Woods Hole Marine developed to support the rapidly emerging
university, and special libraries located
Biological Laboratory. movement towards Open Access to
throughout North America and around the
research information. This will categorise
world. "NUCMC, or the National Union
LigerCat is a search tool for NCBI's and list the wide variety of Open Access
Catalog of Manuscript Collections, is a
PubMed that uses tag clouds to provide research archives that have grown up
free-of-charge cooperative cataloging
an overview of important concepts and around the world. " -- Title page
program operated by the Library of
trends. LigerCat aggregates multiple Congress." -- Title page
articles in PubMed, summing their MeSH
Open Access Directory
descriptors and presenting them in a
http://oad.simmons.edu/oadwiki/Main_
cloud, weighted by frequency. Networked Digital Library of Theses
Page
and Dissertations (NDLTD)
Medical Subject Headings (MeSH) is a http://www.ndltd.org/
large controlled vocabulary created and "The Open Access Directory (OAD) is a
maintained by the National Library of compendium of simple factual lists about
Medicine to categorize and index journal The goals of the NDLTD are as follows:
open access (OA) to science and
articles in the life sciences. MeSH "To improve graduate education by
scholarship, maintained by the OA
descriptors are akin to tags in a blog post, allowing students to produce electronic
community at large. By bringing many OA-
but scientific articles are tagged with documents, use digital libraries, and
related lists together in one place, OAD
MeSH descriptors by respected librarians understand issues in publishing; to
will make it easier for everyone to discover
and scientists. increase the availability of student
them and use them for reference. The
research for scholars and to preserve it
easier they are to maintain and discover,
In addition to providing a visual overview electronically; to lower the cost of
the more effectively they can spread
of a set of PubMed articles, LigerCat can submitting and handling theses and
dissertations; to empower students to
121
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
useful, accurate information about OA. " -- important information for such research." - This database includes Office of Scientific
Title page - "About" page and Technical Information's (OSTI)
GrayLIT Network.
Public Library Geographic Database Reference Reviews Europe Online
(PLGDB) Map http://rre.casalini.it/ ScientificCommons.org
http://www.geolib.org/PLGDB.cfm http://www.scientificcommons.org/
"Over 1000 European reference book
"The database includes the locations of reviews online, full-text searchable, "The major aim of the project is to develop
America’s 16,000 public libraries, updated quarterly." -- Title page the world's largest communication
population characteristics from the US medium for scientific knowledge products
Census that best describe people that use which is freely accessible to the public.
libraries, and library use statistics from the refseek ScientificCommons.org is a project of the
National Center for Educational Statistics. http://www.refseek.com/ University of St.Gallen (Switzerland) and
" -- Homepage hosted and developed at the Institute for
Media and Communications
"Currently in public beta, RefSeek is a
Management." -- About
PQDT Open web search engine for students and
ScientificCommons.org
http://pqdtopen.proquest.com/ researchers that aims to make academic
information easily accessible to everyone.
RefSeek searches more than one billion Scirus
"PQDT Open provides the full text of open documents, including web pages, books, http://www.scirus.com/
access dissertations and theses free of encyclopedias, journals, and newspapers.
charge. RefSeek's unique approach offers
students comprehensive subject coverage This search engine retrieves a surprising
You can quickly and easily locate without the information overload of a number of articles from library and
dissertations and theses relevant to your general search engine—increasing the information science journals, in addition to
discipline, and view the complete text in visibility of academic information and relevant web sites. "Responding to the
PDF format." -- About page compelling ideas that are often lost in a need for focused, comprehensive and
muddle of sponsored links and reliable overviews of relevant scientific
commercial results." -- About page information, Elsevier Science has
PubMed (MEDLINE, etc.) developed the powerful Internet search
http://www.ncbi.nlm.nih.gov/entrez/ tool Scirus. Scirus distinguishes itself from
ResearchIndex existing search engines by concentrating
http://citeseer.ist.psu.edu/index.jsp on scientific content only and by searching
Very useful for researching medical library
both Web and membership sources." --
topics, information use in the health care
"About" page
industry, and so on. Bulletin of the "ResearchIndex is a digital library that
Medical Library Association, Health aims to improve the dissemination,
Libraries Review, and Hospital Libraries retrieval, and accessibility of scientific TechRepublic's White Paper Search
are included among journals indexed. literature. Specific areas of focus include http://www.techrepublic.com/whitepape
"PubMed provides access to bibliographic the effective use of web, and the use of rs
information, which includes MEDLINE as machine learning . . . . The
well as the out-of-scope citations (e.g., ResearchIndex project encompasses
articles on plate tectonics or astrophysics) many areas including the location of "TechRepublic® provides IT professionals
from certain MEDLINE journals, primarily articles, full-text indexing of the articles, a valuable technical content resource
general science and chemistry journals, autonomous citation indexing, reference dedicated to meeting their day-to-day
for which the life sciences articles are linking, information extraction, display of demands for timely and relevant
indexed for MEDLINE; citations that query-sensitive summaries, extraction of Information Technology-focused
precede the date that a journal was citation context, distributed error knowledge and insight." -- "CNET
selected for MEDLINE indexing; some correction, related document detection, Networks" page
additional life science journals that submit and user profiling." -- "Welcome" page
full text to PubMedCentral and receive a
qualitative review by NLM." -- "Overview" TRAIL - Technical Report Archive and
page Science Fiction and Fantasy Research Image Library
Database http://digicoll.manoa.hawaii.edu/techre
http://sffrd.library.tamu.edu/ ports/index.php?c=1
RAMBI: The Index of Articles on Jewish
Studies
http://jnul.huji.ac.il/rambi/ "The Science Fiction and Fantasy The Greater Western Library Alliance
Research Database is an on-line, (GWLA) and the Center for Research
searchable compilation and extension of Libraries (CRL) bring us "a collaborative
If you're researching Jewish libraries, their Science Fiction and Fantasy Reference project to digitize, archive, and provide
materials, etc., this catalog is a wonderful Index 1878-1985, Science Fiction and persistent and unrestricted access to
resource. "RAMBI - The Index of Articles Fantasy Reference Index 1985-1991, and federal technical reports issued prior to
on Jewish Studies - is a selective Science Fiction and Fantasy Reference 1975." – Homepage
bibliography of articles in the various fields Index 1992-1995, including material
of Jewish studies and in the study of Eretz located since publication of the last printed
Israel. Material listed in Rambi is compiled volume." -- Introduction UNESDOC: UNESCO Full Text
from thousands of periodicals and from Documents
collections of articles - in Hebrew, Yiddish, http://unesdoc.unesco.org/ulis/
and European languages- mainly from the Science.gov
holdings of the Jewish National and http://www.science.gov/
Provides access to full-text documents
University Library, a world center for
published by UNESCO, many on issues
research on the Jewish people and Eretz
"Science.gov is a gateway to over 50 related to library and information science,
Israel. The main criterion for inclusion in
million pages of authoritative selected such as copyright, access to information,
the bibliography is that the article be
science information provided by U.S. and so on. Note that documents are in
based on scientific research, or contain
government agencies, including research PDF format, which requires the free
and development results." -- Home page. Adobe Acrobat Reader.
122
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.libdex.com/
Libraries and Catalogs Worldwide http://www.library.upenn.edu/catalogs/worldwide.html
Libraries Around the World http://alexandra.di.uoa.gr/NewSite/Links/TT/OtherLibraries.html
http://journalfinder.uncg.edu/uncg/worldlibs.asp
http://www.librarytechnology.org/libwebcats/
http://www.libraryspot.com/libraries/nationallibraries.htm
http://www.ifla.org/VI/2/p2/national-libraries.htm
http://library.usask.ca/catalogs/world.html
Library Servers http://sunsite3.berkeley.edu/Libweb/
Virtual Library http://www.iisg.nl/~w3vl/
http://vlib.org/
Museums Around the World http://vlmp.museophile.com/world.html
Virtual Library Museum Pages http://vlmp.museophile.com/
New York Public Library Digital Gallery http://digitalgallery.nypl.org/nypldigital/index.cfm
Awesome Library http://www.awesomelibrary.org/
Center For Research Libraries (The Center for Research Libraries (CRL) is a consortium of North
American universities, colleges and independent research libraries. The consortium acquires and
preserves newspapers, journals, documents, archives and other traditional and digital resources
for research and teaching) http://www.crl.edu/content.asp?l1=1
Library Search Engines http://www.allsearchengines.com/libraries.html
LibraryThing http://www.librarything.com/
Lone Wolves
Lone wolves: myth or reality (Lone wolves: myth or reality is a new report from Searchlight that
examines the question of whether extreme-right terrorists are isolated individuals – lone wolves – or are
123
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
connected with and the inevitable consequence of the activities of the various far-right, often small,
organisations that espouse a violent racist and fascist ideology.
The project and report arose out of the work of Gerry Gable in gathering and analysing
intelligence on the extreme right since May 1964 and his later work as an independent adviser on race
hate crime to the Metropolitan Police Service. The report includes case studies of nearly 40 individuals
holding far-right political views who have been convicted for serious violence or terrorist offences. It
concludes that they were motivated, and obtained the knowledge and means to carry out their acts,
through dangerous, far-right networks that introduced them to a perverse ideological world. The report
demonstrates conclusively that far-right terrorists are not lone wolves but are connected with a number of
insidious organisations.) Download Report at
http://www.lonewolfproject.org.uk/resources/LW-complete-final.pdf
Lone-Wolf Terrorism
http://www.transnationalterrorism.eu/tekst/publications/Lone-Wolf%20Terrorism.pdf
124
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
AFRICOM http://www.africom.mil/
EUCOM http://www.eucom.mil/
SOUTHCOM http://www.defense.gov/home/features/2009/0109_unifiedcommand/
PACOM http://www.pacom.mil/
CENTCOM http://www.centcom.mil/
CENTCOM Area of Responsibility Interactive Map
http://www.centcom.mil/en/countries/aor/
SOCOM http://www.socom.mil/
STRATCOM http://www.stratcom.mil/
TRANSCOM http://www.transcom.mil/
NORTCOM http://www.northcom.mil/
FORSCOM http://www.forscom.army.mil/
Army Medical Dept AMEDD http://www.armymedicine.army.mil/
Eighth US Army http://8tharmy.korea.army.mil/
Space and Missile Defense Command USASMDC
http://www.army.mil/info/organization/unitsandcommands/commandstructure/smdc/
Third US Army/US Army Forces Central Command http://www.arcent.army.mil/
INSCOM http://www.inscom.army.mil/Default.aspx?text=off&size=12pt
Army Material Command AMC
http://www.army.mil/info/organization/unitsandcommands/commandstructure/amc/
Military District of Washington http://www.mdw.army.mil/
US Army Pacific UARPAC
http://www.army.mil/info/organization/unitsandcommands/commandstructure/usarpac/
US Army Readiness Command USAREC http://www.usarec.army.mil/
US Army Training and Doctrine TRADOC
http://www.army.mil/info/organization/unitsandcommands/commandstructure/tradoc/
Surface Deployment and Distribution Command SDDC (formerly Military Traffic Management
Command) http://www.sddc.army.mil/Public/Home
Installation Management Command (IMCOM) http://www.imcom.army.mil/hq/about/news/
Sheppard Air Force Base http://www.sheppard.af.mil/news/socialmedia/index.asp
Marine Corps http://marines.dodlive.mil/social-media/
http://www.marines.mil/usmc/Pages/SocialMedia.aspx
Military Health System http://www.health.mil/2011MHSConference/socialmedia.aspx
OpenStreetMap http://www.openstreetmap.org/
Atlas of Europe http://www.hoeckmann.de/karten/europa/index-en.htm
125
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Maps Engine
https://accounts.google.com/ServiceLogin?service=mapsengine&passive=1209600&continue=https://map
sengine.google.com/map/?gmp%3Dhome&followup=https://mapsengine.google.com/map/?gmp%3Dhom
e
Arthur Zbygniew http://arthurzbygniew.blogspot.co.uk/p/maps.html
Latitude and Longitude of a Point http://itouchmap.com/latlong.html
WorldAtlas http://www.worldatlas.com/
Google Maps Mania http://googlemapsmania.blogspot.com/
https://maps.google.com/
GEOMA http://www.geoma.ca/Home.aspx
http://www.nomap.ca/%28S%28wyguiwvzserggn55ab2eie55%29%29/Home.aspx
MashupForge (creation tool that allows anyone to easily create a Google Map without having to
use the Google Maps API. The tool allows users to create a Google Map with markers or to create a map
from an uploaded image. Adding markers to a Mashupforge map is a simple process of dropping the
marker on the correct location and entering the information you wish to appear in the information window.
To create a map from an image simply involves uploading an image. The screenshot above shows a map
created from one of NASA's Blue Marble monthly images uploaded to Mashupforge. Custom maps
created with Mashupforge can be embedded in any website by cutting and pasting the provided iframe
code. Alternatively users can just share the link of their created map's URL.) http://mashupforge.com/
MapWindow (The MapWindow GIS project includes a free and open source desktop geographic
information system (GIS) with an extensible plugin architecture; a GIS ActiveX control; and C# GIS
programmer library called DotSpatial.) http://www.mapwindow.org/
http://www.mapwindow.org/conference/2011/
Geo Names http://www.geonames.org/
Shaded Relief https://www.shadedrelief.com/
Relief Shading http://www.reliefshading.com/
Where Am I? How to determine latitude and longitude given a street address, city, state, province,
territory, country or whatever. http://www.hmssurprise.org/Resources/whereami.html
http://www.ajmsoft.com/geocode.php
http://stevemorse.org/jcal/latlon.php
Tactical Digital Hologram (This map with use of a flashlight or other light source brings out a 3D
image of the terrain) http://electronicsbus.com/tactical-3d-digital-holographic-technology/
http://defensetech.org/2011/07/29/special-operators-holographic-maps/
Wikimapia http://www.wikimapia.org/
Free Geography Tools http://freegeographytools.com/
Maps Compare (Maps Compare is a website with four different on-line map services on one page.
The site places Google Maps, the Google Earth browser plugin, Yahoo Maps and Bing Maps beside each
126
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
other, which can be quite useful if you want to compare the map coverage provided by each provider in
different locations) http://geshout.com/mapscompare/all.php
Buncha Maps (Map comparison sites always seem to be very popular. One of the most popular
searches on Google Maps Mania seems to be for sites that let you view the different online map providers
side-by-side. Buncha Maps is a new application that lets you view Google Maps, Bing Maps, ESRI Maps
and OSM all in the same window. Actions in all four maps are synchronised, so if you pan and zoom in
any of the maps the other maps will also show the selected view) http://swingley.appspot.com/maps/four
Dual Maps (Dual Maps is a map creation tool that allows anybody to make an embeddable map
that includes a Google Map, a Google Maps Street View and a Virtual Earth Bird's Eye view of the same
location. You can choose between the various options of either map service, which means you can have
the Google satellite view alongside Virtual Earth's Bird's Eye view or the satellite/aerial View in both maps
etc) http://www.mashedworld.com:80/DualMaps.aspx
World Gazetteer http://www.world-gazetteer.com/
Afghanistan Information Management Services http://www.aims.org.af/root.aspx?seckeyz=39
Map Resources http://www.ndu.edu/library/Map/map.cfm
Quick Maps http://www.theodora.com/maps/
Le Monde Diplomatique English Edtion Maps http://mondediplo.com/maps/
US Geological Survey manages and distributes many kinds of maps. The following links provide a
wealth of information about USGS maps.
Army Geospatial Center http://www.agc.army.mil/
Information about the many kinds of US Geological Survey maps available is at
http://erg.usgs.gov/isb/pubs/booklets/usgsmaps/usgsmaps.html#Top
Information about US Geological Survey topographic (topo) map symbols is at
http://erg.usgs.gov/isb/pubs/booklets/symbols/
An explanation of map scale is at http://erg.usgs.gov/isb/pubs/factsheets/fs01502.html
Information about US Geological Survey topographic map standards is at
http://nationalmap.gov/gio/standards/
More information about map datums on USGS topographic maps is available at the following
links: http://geology.er.usgs.gov/eespteam/GISLab/Cyprus/datums.htm
http://www.ngs.noaa.gov/faq.shtml#WhatNAD
USGS Store http://store.usgs.gov/b2c_usgs/b2c/start/(xcm=r3standardpitrex_prd)/.do
Geospatial Data Navigator (password required) https://gdn.geointel.nga.mil/gdn/gdn.cgi?
Army Geospatial Center http://www.agc.army.mil/tio/index.html
GIS For Dummies http://www.dmos.info/eng/GIS%20For%20Dummies.pdf
GIS Internet Resources http://www.agc.army.mil/gis/
Soviet Maps http://www.sovietmaps.com/index.htm
Maps Of War http://www.mapsofwar.com/
Maps and Driving Directions http://www.reverse-lookup.com/maps.htm
Maps and References http://www.cgrer.uiowa.edu/servers/servers_references.html
CIA World Fact Book http://www.odci.gov/cia/publications/factbook/
Leading source of land information. Note: Learn to use this one and you’ll be quite impressed.
http://edcwww.cr.usgs.gov/
Free Aerial Maps. Note: Learn to use and you’ll get great results.
http://www.sightquest.com/travel/free-aerial-maps-3838.htm
Free GIS http://freegis.org/
ESRI ArcGIS http://www.esri.com/
Free Books On GIS Best Practices http://www.esri.com/showcase/best-practices/index.html
GIS in the Earth Sciences & Map Library http://www.lib.berkeley.edu/EART/gis.html
Latitude/Longitude Distance Calculation http://jan.ucc.nau.edu/~cvm/latlongdist.html
Latitude-Longitude of US Cities http://www.realestate3d.com/gps/latlong.htm
Maps of Countries and Territories http://www.sitesatlas.com/Maps/index.htm
The Map Library http://www.un.org/depts/dhl/maplib/maplib.htm
What do Map Scales Represent http://id.water.usgs.gov/reference/map_scales.html
MapMachine http://plasma.nationalgeographic.com/mapmachine/
127
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Mapquest http://www.mapquest.com/
Map Resources http://www.ndu.edu/library/maps.html
Maps Around the World http://maps.searchking.com/
All The Worlds Maps http://www.embassyworld.com/maps/maps.html
Perry-Castañeda Library Map Collection http://www.lib.utexas.edu/maps/
http://www.lib.utexas.edu/maps/map_sites/map_sites.html
MAPTECH http://mapserver.maptech.com/homepage/index.cfm
Mileage Calculator http://www.symsys.com/~ingram/mileage/index.php
Online Maps to Everywhere http://www.multimap.com/
Quick Maps http://www.theodora.com/maps/abc_world_maps.html
Map Centre http://www.reliefweb.int/rw/rwb.nsf/doc114?OpenForm
Terraserver http://www.terraserver.com/
Spot Image http://www.spot.com/html/SICORP/_401_.php
Topozone http://www.topozone.com/default.asp
United Nations cartographic Section http://www.un.org/Depts/Cartographic/english/htmain.htm
Maporama http://www.maporama.com/share/
World Atlas http://www.worldatlas.com/
What’s Your Latitude/Longitude
http://www.studyworksonline.com/cda/content/explorations/0,,NAV2-5_SEP374,00.shtml
3D Contour Maps http://field.hypermart.net/
Links to Map Resources (no longer updated but still useful)
http://monarch.gsu.edu/jcrampton/maps
Google Maps http://maps.google.com/
TerraServer-USA http://www.terraserver.microsoft.com/
GlobeXplorer http://www.globexplorer.com/
Space Imaging http://spaceimaging.com/
The World Of Maps http://www.maps.ethz.ch/
National Map Viewer http://nationalmap.gov/
http://nmviewogc.cr.usgs.gov/viewer.htm
DigitalGlobe http://www.digitalglobe.com/
GIS Software http://www.gisdevelopment.net/downloads/gis/index.htm
Superpages http://yellowpages.superpages.com/yp.basic.jsp?
TerraFly http://www.terrafly.com/
Mapper http://mapper.acme.com/
Comet Web Search http://search.starware.com/
Traffic Reports For 60 Cities
http://autos.msn.com/everyday/trafficreport.aspx?metro=PHX&src=QL
Earth Satellite Corporation http://www.mdafederal.com/home
National Geographic Map Machine http://plasma.nationalgeographic.com/mapmachine/
Windows Live Local http://local.live.com/
Online Map Creation http://www.aquarius.geomar.de/omc/
Planiglobe Beta http://www.planiglobe.com/omc_set.html
Mapquest Complete List Of Maps http://www.mapquest.com/atlas/main.adp?region=index
ReliefWeb http://www.reliefweb.int/mapc/
http://www.reliefweb.int/rw/rwb.nsf/doc114?OpenForm
National Guard DMS Portal http://ngbcdmaps.gtri.gatech.edu/
Earth Browser http://www.earthbrowser.com/index.html
Reference Maps http://www.exxun.com/exon/rm__index.html
Flash Earth http://www.flashearth.com/
Maps of the world (3,728 country maps) http://maps.nationmaster.com/
Gheos World Guide (click on gheos world guide) http://gheos.com/atlas/
Maps Of War (Interactive) http://www.mapsofwar.com/ind/imperial-history.html
Digital Ortho Image Center For Kentucky http://kymartian.ky.gov/doqq/
Mapserver.Maptech
http://mapserver.maptech.com/homepage/index.cfm?CFID=3094259&CFTOKEN=52789276
Geo Community http://www.geocomm.com/
128
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Marine Corps
One-Eight Basetrack is an experimental media project, tracking the deployment of 1/8 – 1st
Battalion, Eighth Marines, throughout the duration of their deployment to southern Afghanistan. A small
team of mobile media operators is embedded with the battalion, transmitting their reports and reflections
from Helmand province as they travel across the battalion’s area of operations.
http://googlemapsmania.blogspot.com/2011/08/follow-eighth-marines-on-google-
maps.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+GoogleMapsMania+
%28Google+Maps+Mania%29
http://basetrack.org/
Marine Corps Intelligence and Security Doctrine http://www.fas.org/irp/doddir/usmc/index.html
129
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Medical Intelligence
130
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Military Magazines
131
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
132
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.rand.org/pubs/monographs/2004/RAND_MG210.pdf
Small Wars Journal (lots of reference material on MOUT) http://www.smallwarsjournal.com/
The Urban Operations Journal http://urbanoperations.8media.org/
Street Smart: Intelligence Preparation of the Battlefield for Urban Operations
http://www.rand.org/pubs/monograph_reports/MR1287/index.html
Small Wars Center of Excellence http://www.smallwars.quantico.usmc.mil/sw_manual.asp
Small Wars Registered User http://www.smallwars.quantico.usmc.mil/RegsiteredUser.pdf
Unrestricted Warfare http://www.jhuapl.edu/urw_symposium/pages/proceedings.htm
Irregular Warfare Special Study
http://merln.ndu.edu/archive/DigitalCollections/IrregWarfareSpecialStudy.pdf
Irregular Warfare Specialty Track http://www.usma.edu/dmi/irregular_warfare.htm
A Ner Era Of Irregular Warfare
http://www.usma.edu/dmi/IWmsgs/A%20Canadian%20Perspective%20of%20Irregular%20Warfare.pdf
Irregular Military http://en.wikipedia.org/wiki/Irregular_military
The U.S. Army And Irregular Warfare http://www.wooster.edu/history/jgates/book-contents.html
History Of Irregular Warfare
http://www.sais-jhu.edu/programs/ir/strategic/courses/docs/irregular_warfare_syllabus.pdf
Some Thoughts On Irregular Warfare https://www.cia.gov/csi/studies/96unclass/iregular.htm
Complex Irregular Warfare
http://www.fpri.org/enotes/20060106.military.hoffman.complexirregularwarfare.html
Small Wars Journal http://smallwarsjournal.com/index.php
Small Wars Journal Research Links http://smallwarsjournal.com/research/#OnlineJournalFree
Minimanual Of The Urban Guerilla http://news.skilluminati.com/?p=33
Chinese Report On Unrestricted Warfare http://news.skilluminati.com/?p=14
Counterinsurgency Army Web Page
https://www.us.army.mil/suite/page/451386?c=YmVuLmJlbmF2aWRlcw==
Unrestricted Wrafare Symposium 2007
http://www.jhuapl.edu/urw_symposium/pages/proceedings/2007/chapters/URW%202007%20Book.pdf
http://www.jhuapl.edu/urw_symposium/pages/proceedings2007.htm
Unrestricted Warfare http://www.cryptome.org/cuw.htm
Small Wars And Low Intensity Conflicts Currently Taking Place Throughout The World
http://www.smallwars.quantico.usmc.mil/sw_today.asp
Militia Groups
Note: Many links are very much inactive or have been discontinued, however, a good keyword
searh with the listed names will turn out excellent results.
Rise in Militia Groups http://www.breitbart.com/article.php?id=D9A140QG0&show_article=1
Militias by State http://www.mathaba.net/www/militia/index.shtml
http://www.indexoftheweb.com/Patriot/Militia.htm
Militia Links http://www.angelfire.com/ny3/captbly/militia.html
Missile Threat
133
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Muslim Brotherhood
134
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
135
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
136
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Search for organisations in our database of 393 AlertNet member organisations from 92
countries. http://www.alertnet.org/member_directory.htm
http://www.crisisgroup.org/en/publication-type/blogs/strong-and-prosperous/south-korean-ballistic-missile-
ranges.aspx
137
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
North of Changch'an-ni
Chông-ch'on
Hwangju-up
Kaech'on-up
West of Kangdong-up
Kusong
Kwanso-ri
Orang-up
P'abal-li
Pangp'o-ri
North of Pyongyang
North of Samjiyon-up
North of Sanbon-dong
Sindangan-dong
Sinuiju
Southwest of Sinp'yông-ni
Toran-gol
Wonsan
Yongang-ni
North of Yonghung-ni
South of Yonghung-ni
138
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
139
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
gao-11-447r.htm Federal Reserve Banks InfoSys Controls Need Fix March 31, 2011
isfsi-security.pdf US Nuclear Spent Fuel Storage Security March 30, 2011 (410KB)
isfsi-eyeball.htm US Nuclear Spent Fuel Storage Casks Eyeball March 24, 2011
jnpp-safety.zip Japan Nuclear Power Station Safety Design March 17, 2011 (2.4MB)
Guide (offsite) Responding to a Nuclear Emergency March 17, 2011
NISA GOV (offsite) Japan Nuclear and Industrial Safety Agency March 17, 2011
JNES NGO (offsite) Japan Nuclear Energy Safety Organization March 17, 2011
GE Hot Rods (offsite) General Elctric Spent Nuclear Fuel Rods Threat March 16, 2011
DG JP (offsite) Digital Globe Images of Japan Quake Damage March 15, 2011
Megadeath (offsite) Reducing Consequences of Nuclear Detonation March 11, 2011
secnav-5510-35b.pdf Navy Nuclear Weapons Personnel Reliability March 3, 2011 (361KB)
HBG-TENPP.pdf HBGary Targeting Exelon Nuclear Power Plant February 13, 2011
NPP (offsite) Nuclear Power Reactor Inspections 12/27/2010 February 4, 2011
nw-council.pdf Megadeath Nuclear Weapons Council December 25, 2010
nw-effects.pdf Megadeath Nuclear Weapons Effects December 25, 2010
nw-survive.pdf Megadeath Nuclear Weapons Effects Survivabilty December 25, 2010
nw-info.pdf Megadeath Nuclear Weapons Info Classification December 25, 2010
doe-452-z.pdf Control of Megadeath Nuclear Weapons Data December 25, 2010
cnwdi.pdf Control of Megadeath Nuclear Weapons Design Info December 25, 2010
dnfsb122710.pdf Hazards of Nuclear Weapons Waste Storage December 24, 2010
nrc120110.pdf NRC Sets Nuclear Info Safeguards for Toshiba November 30, 2010
wmd-risks.pdf Nuclear Weapons Disassembly Risks 2010 September 21, 2010
doe072710.htm Compensation for Nuclear Damage July 28, 2010
mega-kill.zip Nuclear Weapon Effects July 20, 2010 (2.1MB
A-bomb (offsite) Touring US Atomic Bomb Facilities Photos July 15, 2010
Chernobyl (offsite) Touring Chernobyl Facilities Photos July 15, 2010
dodi-3150-10.pdf DoD Response to US Nuclear Weapon Incidents July 3, 2010
opnav-8110-18c.zip Navy Nuclear Weapons System Safety Program July 2, 2010 (5.5MB)
secnav-5710-28.pdf Navy Compliance with US-IAEA Nuke Safeguards July 2, 2010
nuke-sites.htm US IAEA-Declared Nuclear Sites Eyeball June 4, 2009
nuke-air.htm Nuclear Weapons Air Shipment Eyeball December 26, 2008
alert-nukes.htm Alert Nuclear Weapons Storage Facilities Eyeball November 20, 2008
nuke-offshore.htm US Nuclear Weapons Storage Offshore Eyeball August 23, 2008
pantex-gertie.htm Pantex Gravel Gertie Eyeball August 19, 2008
prc-nukes.htm China's Nuclear Weapons Facilities Eyeball May 28, 2008
syrian-site.htm Syrian Alleged and North Korean Reactors April 26, 2008
negev-eyeball.htm Negev Nuclear Research Center Eyeball January 12, 2008
pantex-birdseye.htm Pantex Nuclear Warhead Facility Birdseye January 6, 2007
juragua-eyeball.htm Cuban Juragua Nuclear Power Plant Eyeball November 24, 2007
turkey-birdseye.htm Turkey Point Nuclear Power Plant Birdseye November 23, 2007
peach-npp.htm Peach Bottom Atomic Power Plant Birdseye November 11, 2007
sequoyah-npp.htm Sequoyah Nuclear Power Plant Birdseye November 11, 2007
pilgrim-npp.htm Pilgrim Nuclear Power Plant Birdseye November 11, 2007
fitz-birdseye.htm Fitzpatrick Nuclear Power Plant Birdseye August 4, 2007
boomer-refit.htm Nuclear Boomer Refit Birdseye June 30, 2007
san-onofre-npp.htm San Onofre Nuclear Power Plant Birdseye December 16, 2006
nwsa-eyeball.htm Nuclear Weapon Storage Areas Eyeball Update November 27, 2006
chornobyl-npp.htm RU Chornobyl Nuclear Power Plant Eyeball November 13, 2006
kursk-npp.htm RU Kursk Nuclear Power Plant Eyeball November 13, 2006
ignalina-npp.htm RU-LT Ignalina Nuclear Power Plant Eyeball November 13, 2006
140
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
dprk-test.htm North Korea Nuclear Test Site Eyeball Revised October 14, 2006
lanl-eyeball.htm Los Alamos National Laboratory Eyeball Update September 13, 2006
bangor-eyeball.htm Bangor Submarine Base-Nuclear Weapons Storage August 31, 2006
kings-eyeball.htm Kings Bay Submarine Base-Nuclear Weapons Storage August 31, 2006
tnrc-eyeball.htm Tehran and Bushehr Nuclear Reactors Eyeball August 25, 2006
soreq-eyeball.htm Eyeballing Israel Soreq Nuclear Research Center June 27, 2006
npp2-eyeball.htm Eyeballing US Nuclear Plants and Facilities 2 June 16, 2006
perry-birdseye.htm Perry Nuclear Power Plant Birdseye February 22, 2006
indian-birdseye.htm Indian Point Nuclear Generating Station Birdseye February 21, 2006
tmi-birdseye.htm Three Mile Island Nuclear Power Plant Birdseye February 21, 2006
62npp-eyeball.htm Eyeballing 104 Nuclear Reactors/63 Power Plants January 17, 2006
kumsc-birdseye.htm Kirtland Nuclear Storage Complex Birdseye December 25, 2005
kumsc2-eyeball.htm Eyeballing Kirtland Nuclear Weapons Storage 2004 August 20, 2005
mcg-nps-eyeball.htm Eyeballing McGuire Nuclear Power Station March 2, 2005
dresden-eyeball.htm Eyeballing Dresden Nuclear Power Plant March 1, 2005
braid-eyeball.htm Eyeballing Braidwood Generating Station March 1, 2005
salem-eyeball.htm Eyeballing Salem-Hope Creek Nuclear Power Plant February 28, 2005
oyster-eyeball.htm Eyeballing Oyster Creek Nuclear Power Station February 28, 2005
barkbig-eyeball.htm Big Eyeballing Barksdale Nuclear Weapons Storage May 1, 2004
gray-eyeball.htm Eyeballing Gray AFB Nuclear Weapons Storage Area April 10, 2004
bark-eyeball.htm Eyeballing the Barksdale AFB Nuclear WSA December 14, 2003
nuke-fuze.htm Nuclear Weapons Arming and Fuzing August 31, 2003
laken-eyeball.htm Eyeballing US Nuclear Weapons Storage in Britain July 28, 2003
dnws-eyeball.htm Eyeballing Defense Nuclear Weapons School January 3, 2003
wipp-eyeball.htm Eyeballing the WIPP Nuclear Waste Target September 9, 2002
daf-eyeball.htm Eyeballing Nuclear Device Assembly Facilities August 12, 2002
hanford-eyeball.htm Eyeballing Hanford Nuclear Reservation July 9, 2002
pantex-eyeball.htm Eyeballing Pantex Nuclear Warhead Plant June 26, 2002
nwsa-eyeball.htm US Nuclear Weapons Storage Areas June 17, 2002
nellis-eyeball.htm Eyeballing Nellis Nuclear Weapons Storage Area June 14, 2002
dcnpp-eyeball.htm Eyeballing the Diablo Canyon Nuclear Power Plant June 7, 2002
ccnpp-eyeball.htm Eyeballing Calvert Cliffs Nuclear Power Plant June 7, 2002
pnpp-eyeball.htm Eyeballing the Pilgrim Nuclear Power Plant June 7, 2002
mnpp-eyeball.htm Eyeballing the Millstone Nuclear Power Plant June 7, 2002
snpp-eyeball.htm Eyeballing the Seabrook Nuclear Power Plant June 7, 2002
ornl-eyeball.htm Eyeballing Oak Ridge National Laboratory July 21, 2002
llnl-eyeball.htm Eyeballing Lawrence Livermore National Lab May 21, 2002
ymp-eyeball.htm Eyeballing the Yucca Mountain Project May 10, 2002
nts-eyeball.htm Eyeballing the Nevada Nuclear Test Site April 28, 2002
anl-eyeball.htm Eyeballing Argonne National Laboratory April 28, 2002
ipngs-eyeball.htm Eyeballing Indian Point Nuclear Generating Sta. April 28, 2002
tp-terr.htm TerrPanel on WMD Terrorism (Full HTML 314K) December 18, 1999
tp-terr.zip TerrPanel on WMD Terrorism (Full Zipped 108K) December 18, 1999
tp-terr-pt2.htm TerrPanel Report on Domestic WMD Terrorism Pt2 December 18, 1999
tp-terr-pt1.htm TerrPanel Report on Domestic WMD Terrorism Pt1 December 17, 1999
wmdp112699.txt WMD Terrorism Panel Meet November 26, 1999
HM (offsite) Nuclear Weapons Secrecy /SA November 17, 1999
hasc102699.htm Mini Nuke Sabotage October 27, 1999
Nukes (offsite) US Stored Nuclear Weapons in Many Nations October 20, 1999
doe101599.txt Secret Nuke Meet, DE U-235 to CN October 15, 1999
srb090199.htm Samuel Berger on Curbing WMD September 2, 1999
141
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
142
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
143
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
144
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Nuclear Terrorism
What Are the Odds of Surviving a Nuclear Blast (great interactive google map showing the effects
of a nuclear blast on a nearby city) http://www.wouldisurviveanuke.com/
How to Build a Nuclear Bomb
http://www.nationbooks.org/book/136/How%20to%20Build%20a%20Nuclear%20Bomb
Nuclear Posture Review Report 2010
http://www.globalsecurity.org/wmd/library/policy/national/2010-nuclear-posture-review.pdf
Nuclear Dangers http://www.nae.edu/File.aspx?id=19815
The Virtual Nuclear Tourist (Includes Individual State Maps of Nuclear Waste Transportation
Routes) How much easier can we make it? http://www.nucleartourist.com/
Create your own blast map by simply entering a zip code
http://www.nuclearterror.org/blastmaps.html
Video footage of nuclear explosions http://nuclearfiles.org/revideos/filmindex2.html
Links http://www.nuclearterror.org/links.html
Nuclear Weapon Effects Calculator
http://www.fas.org/main/content.jsp?formAction=297&contentId=367
Oil
Bibliography for the Study of Oil and War http://www.endgame.org/oilwars-biblio.htm
World Oil Market and Oil Price Chronologies: 1970 – 2003
http://www.eia.doe.gov/emeu/cabs/chron.html
Oil Demand
http://www.eia.doe.gov/pub/oil_gas/petroleum/analysis_publications/oil_market_basics/Demand_text.htm
Energy Review http://archive.wn.com/2004/07/21/1400/energyreview/
OPEC http://www.opecnews.com/
PeakOil http://www.peakoil.org/
The Oil Wars: Parts 1 and 2 http://www.angelfire.com/ab/trogl/oilwar/
http://www.angelfire.com/ab/trogl/oilwar/part2.html
World Energy "Areas To Watch" http://www.eia.doe.gov/emeu/cabs/hot.html
Online Services
OSINT Global – Open Source Intelligence from across the globe http://www.osintglobal.com/
OSINFO – Open Sources Information http://www.opensourcesinfo.org/
145
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
146
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
147
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
This is a website that describes various terrorist groups of the world. It lists their known activities,
their strength, location/area of operation and external aid. It is part of the SITE Institute's website that
documents and tracks terror-related violence and "extremist websites, public records, and international
media reports" to establish "links among terrorist entities and their supporters." Site features links to
news, background on terrorist groups, material about court cases, and audio and video clips. Some
material in other sections of the site available for a fee. Publisher: SITE Intelligence Group.
http://www.clrn.org/weblinks/details.cfm?id=2316
http://news.siteintelgroup.com/
National Virtual Translation Center (The National Virtual Translation Center (NVTC) was
established in February, 2003 " for the purpose of providing timely and accurate translations of foreign
intelligence for all elements of the Intelligence Community.) http://www.nvtc.gov/
148
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Spokeo - People search engine and free white maps future events– all while providing
pages finds phone, address, email, and photos. traceability back to sources. From OSINT to
Find people by name, email, address, and classified data, Recorded Future offers
phone for free. innovative, massively scalable solutions.
theHarvester - This tool is intended to help MobiStealth - Mobistealth Cell Phone Spy
Penetration testers in the early stages of the Software empowers you to get the answers you
penetration test in order to understand the truly want and deserve. Including a host of
customer footprint on the Internet. It is also advanced surveillance features, our Cell Phone
useful for anyone that wants to know what an Spy Software secretly monitors all cell phone
attacker can see about their organization. activities and sends the information back to your
Foca - FOCA 3.2 Free is a fingerprinrint and Mobistealth user account.
information gathering tool for pentesters. It Snoopy - Snoopy is a distributed tracking and
searchs for servers, domains, URLS and public profiling framework
documents and print out discoverd information Stalker - STALKER is a tool to reconstruct all
in a network tree. It also searches for data leaks captured traffic (wired or wireless alike) and
such as metadata, directory listing, unsecure parse out all of the “interesting” information
HTTP methods, .listing or .DS_Store files, disclosures. It goes beyond just grabbing
actived cache in DNS Serves, etc… passwords and emails out of the air as it
Shodan - Search for computers based on attempts to build a complete profile of your
software, geography, operating system, IP target(s). You would be amazed at how much
address and more data you can collect in 15 minutes.
Maltego - Maltego is a unique platform LinkedIn Maps - Your professional world.
developed to deliver a clear threat picture to the Visualized. Map your professional network to
environment that an organization owns and understand the relationships between you and
operates. Maltego’s unique advantage is to your connections
demonstrate the complexity and severity of LittleSis - LittleSis is a free database of who-
single points of failure as well as trust knows-who at the heights of business and
relationships that exist currently within the scope government.
of your infrastructure. Entity Cube - EntityCube is a research prototype
Deep Magic - Search for DNS records and other for exploring object-level search technologies,
fun stuff which automatically summarizes the Web for
Jigsaw - Jigsaw is a prospecting tool used by entities (such as people, locations and
sales professionals, marketers and recruiters to organizations) with a modest web presence.
get fresh and accurate sales leads and business TinEye - TinEye is a reverse image search
contact information. engine built by Idée currently in beta. Give it an
Hoovers - Search over 85 million companies image and it will tell you where the image
within 900 industry segments; Hoover’s Reports appears on the web.
Easy-to-read reports on key competitors, Google Hacking DB - Google Search Query Fu
financials, and executives to find the secret sauce
Market Visual - Search Professionals by Name, ServerSniff - ServerSniff.net – Your free “Swiss
Company or Title Army Knife” for networking, serverchecks and
FoxOne Scanner - Non- Invasive and Non- routing with many many little toys and tools for
Detectable WebServer Reconnaissance administrators, webmasters, developers,
Scanner powerusers und security-aware users.
Creepy - creepy is an application that allows you MyIPNeighbours - My IP Neighbors lets you find
to gather geolocation related information about out if any other web sites (“virtual hosts”) are
users from social networking platforms and hosted on a given web server.
image hosting services. Social Mention - Social Mention is a social
Recorded Future - Recorded Future intelligence media search engine that searches user-
analysis tools help analysts understand trends in generated content such as blogs, comments,
big data, and foresee what may happen in the bookmarks, events, news, videos, and more
future. Groundbreaking algorithms extract Glass Door - Search jobs then look inside.
temporal and predictive signals from Company salaries, reviews, interview questions,
unstructured text. Recorded Future organizes and more – all posted anonymously by
this information, delineates results over employees and job seekers.
interactive timelines, visualizes past trends, and
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
NameCHK - Check to see if your desired Addict-o-matic – Nice little search aggregator.
username or vanity url is still available at dozens Allows you to enter a search term and build a
of popular Social Networking and Social page from search and social networking sites.
Bookmarking websites. PasteLert - PasteLert is a simple system to
Scythe - The ability to test a range of email search pastebin.com and set up alerts (like
addresses (or account names) across a range of google alerts) for pastebin.com entries. This
websites (e.g. social media, blogging platforms, means you will automatically recieve email
etc…) to find where those “targets” have active whenever your term(s) is/are found in new
accounts. pastebin entries!
Recon-NG – A nice Python Script that Kurrently – Real Time Search Engine for Social
automates recon on LinkedIn, Jigsaw, Shodan Media.
and some search engine fu. CheckUsernames - Check for usernames
Pushpin – Awesome little Python script that will across 160 Social Networking Sites.
identify every tweet, flicker pic and Youtube Whos Talkin - social media search tool that
video within an area of a specific Geo address. allows users to search for conversations
Silobreaker – Enterprise Semantic Search surrounding the topics that they care about
Engine, allows virtualisation of data, analytics most.
and exploration of key data. 192 - Search for People, Businesses and Places
Google Trends – See what are the popular in the UK.
related topics people are searching for. This will Esearchy - Esearchy is a small library capable
help widen your search scope. of searching the internet for email addresses. It
Google Alerts - Google Alerts are email updates can also search for emails within supported
of the latest relevant Google results (web, news, documents.
etc.) based on your queries. TouchGraph SEO – Java based tool for
importing and visualising various data types.
150
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
First off let me state that no self respecting criminal would be without a wireless connection and all the
apps that go with it.
This section is devoted to technology that is very easily exploitable by criminals. I use the word “criminal”
as an umbrella term for anything from gangs to terrorists, human/drug/weapon smugglers to burglars, and
anything in between. In other words, it is all-encompassing. It is not difficult to think like a criminal; all of
us have at some point thought about doing something cruel. But for the most part we do not carry out our
thoughts into action because we are law abiding citizens and we are rational people. Think about the time
when a neighbor, a friend, girlfriend, boyfriend, or relative did something to displease us. Human nature,
and psychology, says get even and do something back. But again, we are rational people. What I am
trying to drive here is the point that all of us are capable of evil thought and it does not matter who we are.
We just don’t admit to it. Remember Jimmy Carter and lust; not necessarily evil though. How about Bill
Clinton and “I did not inhale “. They admitted to things in the hope that by doing this they would get
positive results but instead those innocent comments came back to haunt them and they became the butt
end of jokes. So, go ahead! Think like a human or drug smuggler. Think like a terrorist. Think like a gang
banger. Think like a drug cartel boss. But most of all think! How can I exploit technology to further my
criminal enterprise? By doing this brand of thinking you help law enforcement counter the threat whatever
it may be or at least make them aware of the type of countermeasures to employ.
Why is it that most of the OSINT discussions are held behind firewalls and there is a requirement for
passwords to access the subject? No, enough! I am going out on a limb and invite all to it. What a
contradiction in terms. Open source but yet very hush, hush. We are not fooling anyone. Even criminals
know how to exploit open source information and create intelligence from it. When I told a good friend of
mine of what I intended to do, this is what he had to say. “We are not dealing with ignorant or stupid
people. These people come from our professions, the computer industry, are computer engineers, etc. If
you check open source you will see the bad guys asking for people with these skills. Not putting the
information out in the open or in a book because the bad guys will find out and use it is only for those that
are new to the game, do not understand the criminal element or their MO. In addition not having this
information will hinder us as the new people to the game may not even know we know... Bad guys leave
trails when they get sloppy and they do.”
Personal Drones: When and where does it end? That is, making it easier for the enemy. Let’s go
beyond celebrity stalking and spying on your neighbors. Drug Cartels, human and drug smugglers are
always on the lookout for anything that will make their activities more successful. Let’s role play: I am a
smuggler (humans or drugs) and I have lookouts on high hills overlooking the border fence reporting
activities back to me, however, they are static and cannot maneuver from their high points. I can utilize
drones to hover over the fence/border for 360 degree coverage. I can see where the Border Patrol vehicle
is on the other side of the fence; something my lookout even on a high point cannot observe. I can also
determine how long it takes for the patrol to make a round of the area. What else can I make out? What
they look like and now I can make contact with them when they are off duty for possible bribery. The
options are without limits. I have millions at my disposal. I will buy several for the kids along the border to
enjoy flying while I interleave my own surveillance drone into the mix. I could also land mine on the other
side to lay in wait and observe. Granted the batteries do not last long but I don’t need that much
151
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
downtime. As soon as I observe what I need, I can bring my craft back over the fence and send another
to lie in wait or do other types of collection. I can hire techies and have them experiment with the drones
to extend their range and battery life. Does it sound far fetched? I don’t think so.
Pandora’s Box
http://www.dailymail.co.uk/sciencetech/article-1327343/Personal-recreation-drones-developed.html
http://robotsrule.com/html/ar-parrot-drone.php?ref=drone1#video
http://techcrunch.com/2011/01/29/drones/#
Smartphone Applications
Now here are two apps no self respecting terrorist or smuggler should be without; Compass and
GpsCompassMap. My intentions are not of sounding heartless or to delve into the macabre but rather to
point out the control criminals obtain with this technology. The following examples deal mostly with
Google Earth and how it has been utilized by terrorists. With the newer applications one does not need
the desktop or laptop computer but a simple smartphone with all the bells and whistles of a regular CPU.
The other advantage is that you do not leave as large an electronic footprint. The smartphone GPS is
turned on as needed to avoid detection. There are other ways also.
No doubt you have heard or read about Iraqi insurgents having Google Earth imagery of British military
bases (http://news.nationalgeographic.com/news/2007/03/070312-google-censor.html).
There are indications that the gunmen who stormed Mumbai on November 26, and the people who
trained them, were technically literate. The group appears to have used complex GPS systems to
navigate their way to Mumbai by sea. They communicated by satellite phone, used mobile phones with
several different SIM cards, and may have monitored events as the siege unfolded via handheld
Blackberry web browsers
(http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article5311241.ece).
Israel’s fears in regards to Google Earth’s satellite imaging tools have come to fruition. Members of
Palestine’s al-Aqsa Martyrs Brigade, a group aligned with the Fatah political party, has admitted to using
Google Earth for mapping targets for rocket strikes. Khaled Jaabari, the group’s commander, has said
that they are using Google Earth images to check details against their own maps in order to find sensitive
areas that are vulnerable to strikes (http://mashable.com/2007/10/25/missile-attacks-israel-google-earth/).
Compass – I have tried this one and although still a little quirky it gives GR8 results. I can just begin to
imagine the ways a criminal can put this technology to use. It is accurate when it comes to the
coordinates and addresses. I cross referenced it with Google Earth, also on my smartphone, and it is right
on. Using those two in concert give excellent results. Very handy for a criminal away from built up areas
where all they want are coordinates that can be saved and returned to at a later date. I think you get my
implication here.
152
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
GpsCompassMap – Another great little app. Combine Google Earth, Compass and this one and you
have some power at your disposal. This one could replace Compass altogether but the more apps to
cross check for accuracy, the better. Criminals are sure to fall in love with this one. It is extremely
accurate. Went home for lunch and adjusted all the settings for the round-trip. It tells how many satellites
are available and the number it is taking advantage of. Speed (miles, kilometers, knots, etc) of vehicle is
very accurate as I compared it to my speedometer. As you leave the departure point the screen adjusts to
show the entire track and at the end shows distance traveled. Geo coordiantes which change according
to location are a great feature. Superb tool for smugglers on the Southwest (Arizona/Mexico) Border, but
that’s as far as I go with how to use it.
Untraceable Encrypted Blackberrys - Mexico has no reliable register of handsets, mobile numbers, or
users. Vendors are unregistered and sell the phones and SIM cards for cash, no questions asked. In
other words, the cartels have nothing to worry about until such a time that Mexico makes strides to
establish an official registry. (http://www.theage.com.au/national/bikies-trafficking-in-data-secrecy-using-
mexican-blackberrys-20110205-1aht9.html)
OPSEC Awareness for Military Members, DoD Employees and Contractors (This is an
interactive web-based course that provides OPSEC awareness for military members, government
employees, contractors and dependents. The course provides information on the basic need to protect
unclassified information about operations and personal information to ensure safe and successful
operations and personal safety. The course includes a printable certificate which can serve as evidence
that a student completed the course. When a student takes the course using this link, DSS will not
maintain any record of that student by name or any personally identifiable information. If the student
needs documentation that he or she has completed the course he or she will have to print the certificate
at the end of the course. ) The course may take a few minutes for the initial download on slow internet
connections. This training will take approximately 45 minutes to complete.
http://cdsetrain.dtic.mil/opsec/index.htm
Government contractor Frazier-Masonry provides detailed photographs of some of their contract
work. Clients include Navy SEALS, NCIS, Marine Corp Special Operations Command West, EOD and
various other agencies in and around Southern California. The work of these mostly U.S. Navy agencies
is highly sensitive and the release of such photos, which reveal location, building lay-out and structural
nature is a serious violation of Operational Security(OPSEC). Posted on social networking site.
http://cryptome.org/0001/frazier.htm
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x6407146
Organized Crime
153
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.yorku.ca/nathanson/default.htm
Organized Crime Database Search http://www.yorku.ca/nathanson/search.htm
Organized Crime Selected Resources
http://www.questia.com/Index.jsp?CRID=organized_crime&OFFID=se5
Pakistan
Patriot Groups
People Finder
123People http://www.123people.com/
411Canada http://411.ca/
AnyWho http://www.anywho.com/whitepages
Badoo https://badoo.com/
PeekYou http://www.peekyou.com/
PeopleSearch http://www.peoplesearch.net/
SnitchName http://snitch.name/
The New Ultimates http://www.newultimates.com/
Yatedo http://www.yatedo.com/
YoName http://www.yoname.com/
Isearch http://www.isearch.com/
ZabaSearch http://www.zabasearch.com/
ZoomInfo http://www.zoominfo.com/
IceRocket http://www.icerocket.com/
Spock http://www.spock.com/
PeekYou http://www.peekyou.com/
Pipl http://pipl.com/
Wink http://wink.com/
Piracy
Import Genius https://importgenius.com/
Vessel Tracker http://www.vesseltracker.com/app
Maersk – Track ships in real time. (we certainly do make it easy for pirates!)
154
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.maerskfleet.com/#live-map
Ship Tracking http://www.sailwx.info/shiptrack/shiplocations.phtml
Ships Map http://www.marinetraffic.com/ais/
http://www.boat-project.com/cruises/ais.php
VesselTracker http://www.vesseltracker.com/en/Googleearth.html
http://www.digital-seas.com/
Piracy Watch (interactive Map) http://vfdemo.idvsolutions.com/piracy/
Operation Ocean Shield http://www.shipping.nato.int/CounterPir
International Maritime Bureau Piracy Reporting Center
http://www.icc-ccs.org/index.php?option=com_content&view=article&id=30&Itemid=12
Piracy Map 2005 http://www.icc-
ccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10
4
Piracy Map 2006 http://www.icc-
ccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10
3
Piracy Map 2007 http://www.icc-
ccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=10
2
Piracy Map 2008 http://www.icc-
ccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=89
Piracy Map 2009 http://www.icc-
ccs.org/index.php?option=com_fabrik&view=visualization&controller=visualization.googlemap&Itemid=21
9
Piracy News http://www.icc-
ccs.org/index.php?option=com_content&view=category&layout=blog&id=60&Itemid=51
USCG Ship Traffic Density Plot http://www.amver.com/density.asp
Combating Piracy http://www.hansonwade.com/events/combating-piracy-09/index.shtml
Ports Worldwide
World Port Source provides interactive satellite images, maps and contact information for 4,764
ports in 196 countries around the world. Quickly find any port using our regional map of the world. Or, if
you're looking for a bit of fun, see if you can guess today's Port of Call.
http://www.worldportsource.com/index.php
Directory of Worldwide Ports http://sailings.to/ports-home.html
Port Guide http://www.portguide.com/
International Ports
http://www.mesteel.com/cgi-bin/w3-msql/goto.htm?url=http://www.mesteel.com/countries/intl/ports.htm
Port Index (this one is especially valuable when used in conjunction with Google Earth. Cut and
paste the port names from the alphabetical listing into Google Earth for instant views)
http://www.schednet.com/port_index/port_index.asp
Links to Worldwide Cargo Ports http://www.infomarine.gr/ports/
Ports Worldwide http://www.anlloyd.be/Ports_worldwide/default.html
http://www.sailorschoice.com/worldports/
http://www.ilwu19.com/links/portlinks.htm
Cargo Port Links http://www.hal-pc.org/~nugent/port.html
http://www.mesteel.com/cgi-bin/w3-msql/goto.htm?url=http://www.mesteel.com/countries/intl/ports.htm
Propaganda (anti-U.S.)
Camera/Iraq This site was active between 2004 and 2008 and it may still come in handy for research.
Very much a propaganda site so read with caution.
http://web.archive.org/web/*/http://www.camerairaq.com/2004/05/doctored_photos.html
155
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Public Intelligence
A note to everyone: This site publishes documents that have been discovered through open
source methods available to any member of the public. It includes U/FOUO, U/LES, U/FOUO/LES, and
other classifications. However, with the recent release of documents by WikiLeaks I can understand how
some may feel about releasing more sensitive material. I will not publish any of the material here but
direct you to the site. I will remove this category if you feel too much is being released.
http://publicintelligence.net/
Rail
Amtrak http://www.amtrak.com/servlet/ContentServer?pagename=Amtrak/HomePage
Federal Railroad Administration http://www.fra.dot.gov/
Freight World http://www.freightworld.com/railroads.html
Metra Rail http://www.metrarail.com/
Military Rails http://military.railfan.net/
New York City Transit http://www.mta.nyc.ny.us/nyct/
North American Passenger and Urban Transit
http://www.railserve.com/Passenger/North_America/
Freight Product Information by State http://www.tomorrowsrailroads.org/industry/moving.cfm
Short Line Railroads http://www.uprr.com/customers/shortline/lines/index.shtml
Railroads Page http://www.tours.com/railroads.php
Rail Industry Links http://www.railindustry.com/industry/pages/
Reference/Research Tools
156
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Adherents http://www.adherents.com/
Major Religions of the World http://www.adherents.com/Religions_By_Adherents.html
Religion Studies http://www.foreignpolicy.com/resources/links.php?cat=35
157
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
158
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Russia
Positions of Satellites Around Earth This collection by Analytic Graphics Inc. shows real-time
(updated every 30 seconds) positions of 13,000 satellites around the Earth. The positions come from a
government-sponsored database which shows all satellites. You get the idea that our near-earth space is
getting kind of cluttered don’t you? Read about space debris. Read more about this collection in the GEB
post. http://www.gearthblog.com/satellites.html
Satellite and Space Views http://www.leonardsworlds.com/info/satellite.htm
Space Imaging http://spaceimaging.com/
Real Time Satellite Tracking http://www.n2yo.com/?s=24786
159
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
UVRX (Search social media sites, including Facebook, Twitter, MySpace and LinkedIn)
http://www.uvrx.com/
UVRX Search Them All (Search Megaupload, Rapidshare, Badongo, filefactory, depositfiles,
easy-share, sharedzilla, gigasize, divshare, sendspace, yousendit, Mediafire, Zshare, 4shared, letitbit,
drop, filesurf, hotshare, usaupload, savefile, bigupload, up-file, hyperfileshare, zippyshare, uploaded.to,
uploading, sharebee, sharebomb, rapidspread, yourfilehost, Taringa and more in one easy search.
To be able to download files directly from most of these online file storage services, you need to know the
exact URL, Just use the search engine above to search them all... When you search online file storage
services for files to download, you sometimes return a variety of different file types. To narrow down your
search you can add a file extension to your search term, such as mp3, zip, rar, avi, mpg, exe etc. Quite
often people will compress files with winzip or winrar to make them easier to download.
Always scan files you download from online file storage services with an anti virus program before you
attempt to open them) http://www.uvrx.com/search-all.html
SCIRUS is the most comprehensive scientific research tool on the web. With over 575 million
scientific items indexed at last count, it allows researchers to search for not only journal content but also
scientists' homepages, courseware, pre-print server material, patents and institutional repository and
website information. Recently added: Cambridge University Press and Oxford University Press
http://www.scirus.com/srsapp/
Complete Planet- Discover over 70,000+ searchable databases and specialty search engines
(deep web) http://aip.completeplanet.com
WWW Virtual Library (first human index of content on the world wide web) http://vlib.org/
Internet Public Library (deep web, maintained by professional research librarian cadre)
http://www.ipl2.org
Open Directory Project (deep web, comprehensive human-edited directory) www.dmoz.org
Clusty Visualization Search Engine www.clusty.com
Gigablast www.gigablast.com
Yippy (does not track activity, store history, record searches) http://www.yippy.com/
Ixquick (private search engine; does not track your IP address or retain search history)
www.ixquick.com
Duck Duck Go (Search anonymously; removes referral information; disallows cookies)
160
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
https://duckduckgo.com/
Vimeo (Video sharing site) www.vimeo.com
2Lingual (Simultaneous search in two different languages) www.2lingual.com
Blinkx (Video Search Engine) www.Blinkx.com
Lexxe (natural language queries) www.lexxe.com
Pixsy (videos and images) www.pixsy.com
Baidu (Asian-focused search engine) www.baidu.com/
Search Both www.searchboth.com
Powerset – technology that attempts to mine meaning out of web pages -- specifically, Wikipedia
articles. This isn't a general-purpose search engine, but it is a tremendous tool if you are looking for
information on a subject that spans a number of Wikipedia articles, or that has a number of meanings.
http://www.powerset.com/
Hakia – Same as Powerset above. http://www.hakia.com/
Top 15 Most Popular Search Engines | September 2012
http://www.ebizmba.com/articles/search-engines
Search Engine Watch (tips on conducting good searches)
http://searchenginewatch.com/sereport/
International Search Engines http://www.arnoldit.com/lists/intlsearch.asp
Search Engine Listing http://www.arnoldit.com/lists/searchlist.html
Search Engines of The World
http://www.escapeartist.com/Search_Engines/Search_Engines.html
Search Engine Colossus http://www.searchenginecolossus.com/
Quick Click To Search Engines http://www.aresearchguide.com/2quick.html
Ixquick (It can search in 17 languages, including Chinese and Turkish) http://www.ixquick.com/
ResearchBuzz (designed to cover the world of Internet research)
http://www.researchbuzz.org/wp/
Country Based Search Engines http://www.philb.com/countryse.htm
SearchEzee http://www.searchezee.com/
QuickFindIt http://www.quickfindit.com/
All Search Engines http://www.allsearchengines.com/
Foreign Search Engines http://www.allsearchengines.com/foreign.html
Search.Com http://www.search.com/
Meta Crawler http://www.metacrawler.com/
Pandia Search Central http://www.pandia.com/
Mamma The Mother Of All Search Engines http://www.mamma.com/
Weblog Search Engines http://www.daypop.com/
http://www.blogsearchengine.com/
http://www.blogdigger.com/
http://www.technorati.com/
Search Engine Optimization http://www.seochat.com/
KartOO (is a metasearch engine with visual display interfaces. When you click on OK, KartOO
launches the query to a set of search engines, gathers the results, compiles them and represents them in
a series of interactive maps through a proprietary algorithm. http://www.kartoo.com/
Quintura http://www.quintura.com/
Country Based Search Engines http://www.philb.com/countryse.htm
Search Engine Guide http://www.searchengineguide.com/
Webbrain (results in tree structure) http://www.webbrain.com/html/default_win.html
ChaCha http://www.chacha.com/
Dog Pile http://www.dogpile.com/
Zuula (takes advantage of 16 search engines) http://www.zuula.com/
Planetsearch (takes advantage of 16 search engines) http://www.planetsearch.com/
GoshMe (You may not know but there are more than half a million search engines out there on
the Internet, with exclusive content and features. GoshMe will be the way to discover them, and even
better, the key to know when and how to use them.) http://www.goshme.com/login.jsp
Yahoo Short Cur Cheat Sheets http://help.yahoo.com/help/us/ysearch/tips/tips-01.html
161
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
WayBack Machine (Browse through over 150 billion web pages archived from 1996 to a few
months ago. To start surfing the Wayback, type in the web address of a site or page where you would like
to start, and press enter. Then select from the archived dates available. The resulting pages point to other
archived pages at as close a date as possible. Keyword searching is not currently supported.) Note: If you
find some links in this handout that no longer work you can get some practice with this site. Copy and
paste the URL that is no longer active into the wayback machine. This should take you back to how the
web page existed. Then by using keywords it’s possible you may be able to reach the new site with new
and updated content. http://www.archive.org/web/web.php
Search Engine For Arabic Speakers http://www.ayna.com/
SearchMash http://www.searchmash.com/
CrossEngine http://www.crossengine.com/
Factbites (A search engine that is calibrated for searchers rather than for surfers. I don't want to
find the hottest web site about Britney Spears; I want information on best practices for call centers, or
background on the California mortgage industry.) http://www.factbites.com/
Intelways (Intelways.com, formerly CrossEngine and before that, mrSAPO, isn't a metasearch
engine; you type in your query and then select which search engine to use. Intelways provides one-click
access to around 300 different search tools, organised by broad channels.) http://www.intelways.com/
Alt Search Engines http://altsearchengines.com/archives/
http://altsearchengines.com/wp-content/uploads/2007/11/the-top-100-alternative-search-engines-
november-2007.pdf
Goshme http://beta3.goshme.com/
Taya It (Arabic) Tayait offers their users the ability to search in the following language modes:
Morphological Search: Results include all inflictions of the keyword. Expanded Search: Results include
all derivatives of the keyword. Synonyms (Thesaurus): Return all synonyms and dialectical variants.
Cross Language: The ability to input English words to search through Arabic Documents Phrase: The
ability to link multiple keywords more loosely or tightly. http://www.tayait.com/
YamLi (Arabic) http://www.yamli.com/
Ayna (Arabic) http://www.ayna.com/
Araby (Arabic) http://www.araby.com/
Le Moteur (French) http://lemoteur.orange.fr/
Carrot Clustering Engine An open source search-results-clustering engine, just recently out in
beta. In a nutshell, it takes search results, analyzes them and, on the fly, creates groups of the most
common concepts or terms from those results. Since this is all done by algorithms rather than by humans,
expect the odd result every once in a while. (BatesInformation Services, www.BatesInfo.com/tip.html)
http://demo.carrot2.org/demo-stable/main
Tianamo has developed a visually search engine that represents your search results as a terrain
map. You decide if it has utility. http://search.tianamo.com/index2.php
Semantics – in a nutshell, the study of words. Great site of 302 semantic web videos and
podcasts. http://www.semanticfocus.com/blog/entry/title/302-semantic-web-videos-and-podcasts/
Secret Armies
Secure Email
162
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Shopping Malls
Social Engineering
Social engineering is the act of manipulating people into performing actions or divulging
confidential information. The term typically applies to trickery or deception for the purpose of information
gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with
the victim.
Social Engineering Fundamentals, Part I: Hacker Tactics
http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
Social Engineering Fundamentals, Part II: Combat Strategies
http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies
Social Networking
Social networking sites can be especially useful for the analyst. Many of the sites are used by
terrorists, gangs, criminals and others with less than honorable intentions. Careful analysis of these open
source worlds can yield intelligence you never knew existed. Like a jigsaw puzzle, you may have to visit
several sites (as the enemy does to post bits and pieces of information so as to not leave a trail) to bring it
all together. This is the heart of analysis: bringing it all together to monitor the beat.
163
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Social Networking Intelligence Web Search. This is a custom Google search that goes through
various social networking and other similar sites to maximize your intelligence search capabilities and
efficiency by reducing the clutter and false positives you are likely to encounter when searching the web.
http://www.google.com/cse/home?cx=013791148858571516042:ntbykhk-kus
Kurrently - A real-time search engine for Facebook and Twitter (just for the heck of it, I searched for
“drug cartels” and very interesting conversations were taking place) http://www.kurrently.com/
SPY (spy can listen in on the social media conversations you're interested in. What do you want
to listen for?) http://www.spy.appspot.com/
Spokeo (not your grandmas phone book) http://www.spokeo.com/
Searching for Saddam. A five-part series on how the U.S. military used social networking to
capture the Iraqi dictator. http://www.slate.com/id/2245228/
164
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
165
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
166
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
167
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
variety of 2D or 3D graphs and queries. Interfaces i Visalix, a free web application for visual data
with Access 95, 97, 2000 analysis and clustering.
VisDB, a Visual Data Mining and Database
Exploration System, supporting Pixel-oriented
Techniques (Spiral, Axes, and Grouping
Graphviz, open source graph visualization Techniques), Parallel Coordinates, and Stick
software. Figures.
IBM OpenDX: Open Visualization Data Explorer, Weave, a web-based visualization platform
visualization framework for animating data. designed to enable visualization of any available
InetSoft Dashboardfree: Style Scope Free Edition, data by anyone for any purpose.
a free downloadable web-based application for XDAT: X-dimensional Data Analysis Tool, reads
interactive Flash dashboards and visualizations. high-dimensional data in column-based format and
InetSoft Visualize Free, a free web-based uses parallel-coordinates to visualize and analyse
visualization service for sifting through multi- all dimensions at once.
dimensional data. XGOBI, a data visualization system for viewing
JuiceKit™ from JuiceAnalytics, a Software high-dimensional data
Development Kit (SDK) for building visualizations XmdvTool, a public-domain software package for
and Information Experience™ applications. the interactive visual exploration of multivariate
Tulip, an information visualization framework data sets.
dedicated to the analysis and visualization of
relational data (free).
Encryption Wizard (EW) DoD Software Protection Initiative - EW is an SPC implementation of the
Advanced Encryption Standard (AES) (Rijndael) augmented with a file manager Graphical User Interface
(GUI) for ease of use. The 128-bit encryption/decryption algorithm used by Encryption Wizard is
considered cryptographically strong and is routinely used in National Security Agency (NSA) and National
Institute of Standards and Technology (NIST) certified products. Encryption Wizard is designed to protect
data at rest and in transit (such as email attachments). EW is an easy to use tool for protecting sensitive
(but not classified) documents, and for protecting files before transmission via email. It allows a user to
encrypt files using a 128-bit implementation of the Advanced Encryption Standard (AES) with simple
drag-and-drop efficiency. Encryption Wizard can significantly increase an organization‘s security posture
at little to no cost to protect sensitive data in transit (E-mail, FTP, or shared web folders) or at rest on a
removable storage device. http://spi.dod.mil/ewizard.htm
Epi Info 7 - Epi Info is a suite of free data management, analysis, and visualization tools designed
specifically for the public health community. It is used extensively, not just at CDC, but also domestically
at the state and local level, as well as internationally. Epi Info allows you to: Rapid Electronic Form
Creation and Data Entry - Rapidly create electronic data entry forms; these forms can have intelligence
built into them. For example, you can automatically calculate a patient’s age based on the survey data
date of birth; you can also move the cursor past certain fields; you can even hide and unhide fields based
on various conditions. It also allows you to enter data into those forms. Statistical Analysis - You can
conduct various types of statistical analysis, including frequencies, 2x2 (two by two) tables, analysis of
variance, conditional and unconditional logistical regression, Kaplan Meier survival analysis, complex
samples, and many others. Mapping and Visualization - Epi Info also allows you to create several types of
168
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
maps, and also has graphing and charting capabilities. Report Design and Generation - And finally, Epi
Info allows you to design and generate reports. http://wwwn.cdc.gov/epiinfo/7/index.htm
Mendeley - Mendeley is a free reference manager and academic social network that can help you
organize your research, collaborate with others online, and discover the latest research.
ing
http://www.mendeley.com/
Near Repeat Calculator - This software originates with the relatively recent discovery of the near
repeat phenomenon in burglary patterns, a discovery that has highlighted the communicability of crime
events that affect the risk level at nearby locations. The near repeat phenomenon states that if a location
is the target of a crime (such as burglary), the homes within a relatively short distance have an increased
chance of being burgled for a limited number of weeks (Townsley et al, 2003; Bowers and Johnson, 2004;
Johnson and Bowers, 2004a, 2004b). This communicability of risk to nearby locations for a short amount
of time raises the possibility that other crime types may also suffer from a near repeat spatiotemporal
pattern of behavior. The analytical method employed builds on a space-time clustering methods first
pioneered by Knox (1964) to study the epidemiology of childhood leukemia. The Knox test seeks to
determine whether there are more event-pairs observed that occur with a closer proximity in space and
time than would be expected on the basis of a random distribution. To do this, each shooting for a
particular dataset is compared with every other and the spatial and temporal distance between them
recorded. The result is a matrix of space-time distances. http://www.temple.edu/cj/misc/nr/
Orange - Open source data visualization and analysis for novice and experts. Data mining
through visual programming or Python scripting. Components for machine learning. Add-ons for
bioinformatics and text mining, and data analytics. http://orange.biolab.si/
for IronPython)
http://www.python.org/
169
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.qiqqa.com/
Quantum GIS - Quantum GIS (QGIS) is a user friendly Open Source Geographic Information
System (GIS) licensed under the GNU General Public License. QGIS is an official project of the Open
Source Geospatial Foundation (OSGeo). It runs on Linux, UNIX, Mac OSX, Windows and Android and
supports numerous vector, raster, and database formats and functionalities. http://www.qgis.org/
Decision Analyst STATS 2.0- This easy-to use, Windows-based statistical software for marketing
research performs multiple functions, including:
range
-tabulation
http://www.decisionanalyst.com/download.aspx
Squidmat – Decision analysis software. The program compares two or more courses of action
based on two or more evaluation criteria. The user arranges the evaluation criteria in descending order of
importance and tells the program how much more important each criterion is than the next lower criterion.
These importance ratings are used to calculate weights for each criterion. SquidMat takes usersupplied
values for each course-of-action/criterion combination and converts them to Z scores. Using the criterion
weights, the program calculates weighted sums for each course of action. The course of action with the
highest weighted sum is considered to be the best. SquidMat is designed as a replacement decision
matrix program for the CAS3 program DECMAT.
http://faculty.tamu-commerce.edu/jmstauffer/squidmat/squidmat.htm
CrimeStat III - CrimeStat III is a spatial statistics program for the analysis of crime incident
locations, developed by Ned Levine & Associates under the direction of Ned Levine, PhD, that was
funded by grants from the National Institute of Justice. The program is Windows-based and interfaces
with most desktop GIS programs. The purpose is to provide supplemental statistical tools to aid law
enforcement agencies and criminal justice researchers in their crime mapping efforts. CrimeStat is being
used by many police departments around the country as well as by criminal justice and other researchers.
The latest version is 3.3. The program inputs incident locations (e.g., robbery locations) in 'dbf', 'shp',
ASCII or ODBC-compliant formats using either spherical or projected coordinates. It calculates
various spatial statistics and writes graphical objects to ArcGIS®, MapInfo®, Surfer for Windows®, and
other GIS packages. http://www.icpsr.umich.edu/CrimeStat/
Significant Activities, abbreviated as SigActs, is a military term that refers to incidents occurring
on a battlefield. In today’s globalized economy, news and events transpiring around the world can have
an impact on international supply chains and local public safety. SigActs.com is an attempt to identify and
display the geographic relevance of news from around the globe.
http://www.sigacts.com/endpoints/map/webapp/#
170
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
from avoidable error, and improves their chances of making a correct judgment. This software was
developed by Palo Alto Research Center (PARC) in collaboration with Richards J. Heuer, Jr. It was
developed for use by the U.S. Intelligence Community with funding from the Intelligence Community's
Advanced Research and Development Activity (ARDA) and the Office of Naval Research (ONR).
In distributing ACH, PARC is making the presently downloadable version of the program available to the
general public at no cost when used for non-commercial or educational purposes subject to the terms and
conditions of its end user license. http://www2.parc.com/istl/projects/ach/ach.html
CARVER2 - Target Analysis Software -- CARVER2, a free software tool that provides a non-
technical method of comparing and ranking critical infrastructure and key resources. It is the only
assessment tool that ranks critical infrastructure across sectors. The CARVER2 vulnerability assessment
tool is designed to quickly and easily identify and compare potential natural disaster and/or terrorist
targets at the local, state and national levels in order to assist government officials in the allocation of
protective resources. The CARVER2 target analysis tool is available free of charge to federal, state, and
local government officials and agencies, as well as non-profit and educational institutions.
http://www.ni2cie.org/CARVER2.asp
Computer Online Forensic Evidence Extractor -- Microsoft COFEE is being made available to
individuals employed by law enforcement agencies within the United States and Canada. COFEE means
the Computer Online Forensic Evidence Extractor tool that fits on a USB drive and automates the
execution of commands for data extraction and related documentation. Distribution is limited to law
enforcement agencies. Access to the COFEE product requires verification of employment with a law
enforcement agency and agreement to the terms and conditions of the Microsoft/NW3C Sublicense
Agreement. The verification process is automated if you have an email account with RISS.NET or
LEO.GOV, or have an account with NW3C. https://cofee.nw3c.org/
Computer Security Evaluation Tool -- The Department of Homeland Security (DHS) has
released its latest cyber system assessment tool to the Critical Infrastructure/Key Resources (CI/KR)
community. The Computer Security Evaluation Tool (CSET) is a desktop software tool that guides users
through a step-by-step process to evaluate their cyber systems and network security practices against
recognized industry standards. According to DHS, the benefits of CSET include:
CrimeStat III -- CrimeStat III is a spatial statistics program for the analysis of crime incident
locations, developed by Ned Levine & Associates under the direction of Ned Levine, PhD, that was
funded by grants from the National Institute of Justice. The program is Windows-based and interfaces
with most desktop GIS programs. The purpose is to provide supplemental statistical tools to aid law
enforcement agencies and criminal justice researchers in their crime mapping efforts. CrimeStat is being
used by many police departments around the country as well as by criminal justice and other researchers.
The latest version is 3.3. The program inputs incident locations (e.g., robbery locations) in 'dbf', 'shp',
ASCII or ODBC-compliant formats using either spherical or projected coordinates. It calculates various
spatial statistics and writes graphical objects to ArcGIS®, MapInfo®, Surfer for Windows®, and other GIS
packages. http://www.icpsr.umich.edu/CrimeStat/
171
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Decrypto 8.5 -- Decrypto is a fast and automated cryptogram solver by Edwin Olson. It can
decode word games often found in newspapers, including puzzles like cryptoquips and patristocrats. You
can also download a stand-alone version. [We have also found this program useful for quickly breaking
simple substitution ciphers used by some criminal gangs.]
http://www.blisstonia.com/software/WebDecrypto/
Near Repeat Calculator -- This software originates with the relatively recent discovery of the
near repeat phenomenon in burglary patterns, a discovery that has highlighted the communicability of
crime events that affect the risk level at nearby locations. The near repeat phenomenon states that if a
location is the target of a crime (such as burglary), the homes within a relatively short distance have an
increased chance of being burgled for a limited number of weeks (Townsley et al, 2003; Bowers and
Johnson, 2004; Johnson and Bowers, 2004a, 2004b). This communicability of risk to nearby locations for
a short amount of time raises the possibility that other crime types may also suffer from a near repeat
spatio-temporal pattern of behavior.
The analytical method employed builds on a space-time clustering methods first pioneered by Knox
(1964) to study the epidemiology of childhood leukemia. The Knox test seeks to determine whether there
are more event-pairs observed that occur with a closer proximity in space and time than would be
expected on the basis of a random distribution. To do this, each shooting for a particular dataset is
compared with every other and the spatial and temporal distance between them recorded. The result is a
matrix of space-time distances.
To establish a null hypothesis measure against which to test the shooting patterns, we employ a Monte
Carlo simulation process. By computing multiple simulations of the expected values, it is possible to
generate an expected distribution under a null hypothesis – using the actual study data. This provides a
unique way to examine what would occur if there were no near repeat patterns.
http://www.temple.edu/cj/misc/nr/
Problem Analysis Module -- Problem Analysis Module (PAM) gives you a framework for
analyzing any persistent crime and public safety problem. PAM will ask you to input information
concerning every aspect of the problem and then suggest the kinds of responses you could try. PAM was
developed to assist police problem solving through the asking of specific questions. The questions come
from research into a set of powerful theories within the field of Environmental Criminology – particularly
Routine Activity Theory, Situational Crime Prevention, and Crime Pattern Theory.
http://www.popcenter.org/learning/pam/
172
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
RFFlow 5 -- RFFlow is a powerful, yet easy to use, tool for drawing flowcharts, organization
charts, and many other kinds of diagrams. You will quickly create professional-looking charts for
documents, presentations, or the Web. RFFlow has the capability to generate crime analysis charts.
http://www.rff.com/index.htm
http://www.rff.com/sample_criminal_analysis.htm
RAIDS On-Line Public Crime Map -- BAIR’s free public crime map, RAIDS Online, connects law
enforcement with the community to reduce crime and improve public safety. RAIDS Online is absolutely
free to law enforcement and the public! RAIDS On-line’s public crime map works with any RMS to allow
law enforcement to share crime data with the public through an easy-to-use online crime map and
analytics dashboard. The data is displayed with 8 fields of limited offense information to protect victim
privacy. This is a valuable tool for law enforcement to communicate crime activity to their citizens and the
media. http://bairanalytics.com/raidsonline
Squidmat (courses of action evaluation program) -- The program compares two or more courses
of action based on two or more evaluation criteria. The user arranges the evaluation criteria in
descending order of importance and tells the program how much more important each criterion is than the
next lower criterion. These importance ratings are used to calculate weights for each criterion. SquidMat
takes user-supplied values for each course-of-action/criterion combination and converts them to Z scores.
Using the criterion weights, the program calculates weighted sums for each course of action. The course
of action with the highest weighted sum is considered to be the best. SquidMat is designed as a
replacement decision matrix program for the CAS3 program DECMAT.
http://faculty.tamu-commerce.edu/jmstauffer/Squidmat/
173
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Google Fusion
Visualization app/service Yes Yes Browser 1 External server Yes
Tables
Public external
Many Eyes Visualization app/service Yes Limited Browser 1 Yes
server
Public external
Tableau Public Visualization app/service Yes Yes Windows 3 Yes
server
Local or external
Choosel Framework Yes Yes Chrome, Firefox, Safari 4 Not yet
server
Local or external
Exhibit Library Yes Yes Code editor and browser 4 Yes
server
Local or external
Protovis Library Yes Yes Code editor and browser 4 Yes
server
IBM Word-Cloud
Word clouds No No Desktops running Java 2 Local As image
Generator
174
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://instedd.org/technologies/geochat/
Granted there are many units out there that do not have the budget to buy or subscribe to
expensive analytical software, but this should not stop the analyst from doing his/her work. There are
abundant resources of freebies that when used in conjunction with each other provide just as powerful
analytical capabilities. I actually view this as a heavy plus (+). When we use expensive commercial
versions of analytical software that give instantaneous analysis/gratification we tend to depend too much
on the outcome and in many cases take the results for granted. When we do this we cheat ourselves from
doing our own critical thinking and critical analysis for good predictive analysis. However, by taking
advantage of the free (or very cheap) community versions and using them together we force ourselves to
do more critical thinking/analysis because we are trying to determine what information to input into one
program based on the output of another program.
Recorded Future (scour the web, extract, analyze and rank, then explore the past, present and
future.) https://www.recordedfuture.com/
IP Locator (Find an Internet user’s geographic location without invading visitor’s privacy
IP Locator Object is a multiplatform API that will help you understand your visitors better by
geographical location. IP Locator Object provides a wealth of information you can use to geotarget.
http://www.melissadata.com/dqt/ip-locator.htm
IP Address 216.231.3.166
Latitude 33.4774
Longitude -117.705
ZIP 92624
Region CALIFORNIA
Name COX COMMUNICATIONS INC
Domain COX.NET
City Name DANA POINT
Country UNITED STATES
Abbreviation US
Google Goggles. You have to try this one and see for yourself. My mind wandered as I gave this
one a spin. Suppose a drug cartel member is interviewed in a strange location, however, in the distance
you are able to distinguish a building and…. What if you found a note at a terrorist location in a different
language. The possibilities are endless. Google Goggles lets you search Google using pictures from your
camera phones. We take an image as input, and using several image recognition backends (object recognition,
place matching, OCR, etc), we return relevant search results.
http://www.google.com/mobile/goggles/#text
Google Squared. Google Squared is an experimental tool that takes a category (like US presidents,
roller coasters, or digital cameras) and attempts to create a starter "square" of information, automatically
fetching and organizing facts from across the web. You can modify your square by removing rows and columns
you don't like--or by adding new rows and columns and having Google Squared attempt to fetch the relevant
facts. Verify and correct the facts in your square by exploring the original sources and investigating other
175
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
possible values. If you're happy with your square you can save it and come back to it later. Google Squared
does the grunt work for you, making research fast and easy. I use this one often. You can then export the
results into an excel spreadsheet that you can then modify to suit your needs. Using this one in conjunction
with Google Squared helps fill in the blanks. http://www.google.com/squared
Google News Timeline is a web application that organizes information chronologically. It allows users
to view news and other data sources on a zoomable, graphical timeline. You can navigate through time by
dragging the timeline, setting the "granularity" to weeks, months, years, or decades, or just including a time
period in your query (ie. "1977"). I queried MS-13 and was amazed at the results. Went back to 1996 and was
able to do some raw trend analysis. Did the same thing with “California Gangs”. It will take patience.
Available data sources include recent and historical news, scanned newspapers and magazines, blog posts
and Twitter status messages, sports scores and various types of media like music albums and movies.
Using this one in conjunction with Google Squared helps fill in the blanks.
http://newstimeline.googlelabs.com/
Maltego is an open source intelligence and forensics application. It will offer you timous mining
and gathering of information as well as the representation of this information in a easy to understand
format. Coupled with its graphing libraries, Maltego allows you to identify key relationships between
information and identify previously unknown relationships between them. http://www.paterva.com/web5/
ORA is a dynamic meta-network assessment and analysis tool developed by CASOS at Carnegie
Mellon. It contains hundreds of social network, dynamic network metrics, trail metrics, procedures for
grouping nodes, identifying local patterns, comparing and contrasting networks, groups, and individuals
from a dynamic meta-network perspective. *ORA has been used to examine how networks change
through space and time, contains procedures for moving back and forth between trail data (e.g. who was
where when) and network data (who is connected to whom, who is connected to where …), and has a
variety of geo-spatial network metrics, and change detection techniques. *ORA can handle multi-mode,
multi-plex, multi-level networks. It can identify key players, groups and vulnerabilities, model network
changes over time, and perform COA analysis. It has been tested with large networks (106 nodes per 5
entity classes).Distance based, algorithmic, and statistical procedures for comparing and contrasting
networks are part of this toolkit. http://www.casos.cs.cmu.edu/projects/ora/
RFFlow is a powerful, yet easy to use, tool for drawing flowcharts, organization charts, and many
other kinds of diagrams. You will quickly create professional-looking charts for documents, presentations,
or the Web. 30 day free trial period; $49.00 thereafter for individual. http://rff.com/
The Brain Simply type in your ideas. Drag and drop files and web pages. Any idea can be linked
to anything else. Using your digital Brain is like cruising through a Web of your thinking. See new
relationships. Discover connections. Go from the big picture of everything to a specific detail in seconds
http://www.thebrain.com/
SPY (spy can listen in on the social media conversations you're interested in. What do you want
to listen for?) http://www.spy.appspot.com/
Spokeo (not your grandmas phone book) http://www.spokeo.com/
Silobreaker (for those familiar with Analyst Notebook, I think you’ll like this)
http://www.silobreaker.com/
176
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
A Periodic Table of Visualization Methods (If you've ever wondered how to model something, or
were looking for new ideas for segmenting and presenting complex concepts, this is an incredible online
resource. A neat graphical explanation and example of each "element" (ex; a cycle diagram) appears as
soon as your cursor scrolls over them. For instance, they've color-coded their categories: data, metaphor,
concept, strategy, information, and compound visualisation techniques. As if that were not enough to
spark your brain, the creators also provide clues as to whether the model works best for convergent or
divergent thinking, and whether it is more for an overview vs. detailed perspective.)
http://www.visual-literacy.org/periodic_table/periodic_table.html
Sentinel Visualizer (for those of you who have experience with Crime Link and Analyst Notebook
this one should be quite interesting. You can download a 45-day fully functional with all the bells and
whistles copy and take it for a spin, and at the same time train yourself to use the software. It may come
in handy down the road and you can always say you know how to use it) http://www.fmsasg.com/
The Best Ever Freeware Utilities http://www.techsupportalert.com/
Ideas Worth Spreading: Imagine what the open source analyst has at his/her disposal with this
type of technology. View the video and see what I mean http://www.ted.com/index.php/talks/view/id/129
Free Antivirus And Spyware Software http://free.grisoft.com/doc/5390/us/frt/0
Want Your Own Blog? It’s Easy. It’s Free https://www.blogger.com/start
http://wordpress.com/
TOR Anonymizer http://www.torproject.org/
Images (convert 2D to 3D online for free) The 3D face reconstruction may have utility if you only
have a frontal face shot of a suspect.
http://sourcesandmethods.blogspot.com/2008/02/convert-2d-to-3d-online-for-free.html
http://make3d.stanford.edu/
Semantics – in a nutshell, the study of words. Great site of 302 semantic web videos and
podcasts. http://www.semanticfocus.com/blog/entry/title/302-semantic-web-videos-and-podcasts/
NNDB Mapper (a visual tool for exploring the connections between people in NNDB, linking them
together through family relations, corporate boards, movies and TV, political alliances, and shadowy
conspiracy groups. Maps can be saved and shared for others to explore.) http://www.nndb.com/
Generate Maps of the Blogosphere (Generate animated clickable maps of connected blogs from
Blogger . Simply enter the URL of a blog website to start mapping.
http://www.lococitato.com/blogger_map/blogger_map.html
http://www.lococitato.com/
TouchGraph Google Browser (The touch graph google browser reveals the network of
connectivity between websites, as reported by Googles database of related websites)
http://www.touchgraph.com/TGGoogleBrowser.html
SquidMat (The program compares two or more courses of action based on two or more
evaluation criteria. The user arranges the evaluation criteria in descending order of importance and tells
the program how much more important each criterion is than the next lower criterion. These importance
ratings are used to calculate weights for each criterion. SquidMat takes user-supplied values for each
course-of-action/criterion combination and converts them to Z scores. Using the criterion weights, the
program calculates weighted sums for each course of action. The course of action with the highest
weighted sum is considered to be the best. http://faculty.tamu-commerce.edu/jmstauffer/Squidmat/
Decision Matrix Software Download http://www.dcswift.com/military/software.html
NNDB Tracking the Entire World. Not sure if this one has any utility but I throw it in for your
perusal. I had fun with Fidel Castro, Hugo Chavez and Vladimir Putin. NNDB is an intelligence aggregator
that tracks the activities of people we have determined to be noteworthy, both living and dead.
Superficially, it seems much like a "Who's Who" where a noted person's curriculum vitae is available (the
usual information such as date of birth, a biography, and other essential facts.). But it mostly exists to
document the connections between people, many of which are not always obvious. A person's otherwise
inexplicable behavior is often understood by examining the crowd that person has been associating with.
http://www.nndb.com/
Visualization Software: Analysts are great when it comes to understanding relationships. Visual
results jump right at you. If they can query a search engine that produces results in a relational (visual)
format, they immediately grasp the information and start drawing conclusions. Visual results are more
177
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
appealing than endless lists of browsing results which are extremely time consuming even when doing
key word searches.
Viewzi is a metasearch engine. It searches not only Google and Yahoo, but also Flickr, YouTube
and other great sources of information to present the search results blended in different “flavors”. You not
only get one, but seemingly countless ways to view your search results, each using thubmnail images,
screenshots and more as visual aids http://www.viewzi.com/
NeXplore lets you choose between three ways of viewing search results. For starters, there is the
regular list of web search results: Title, description and URL. But you get much more than that. Thumbnail
images and pop-up previews which make it easier to browse the search result and decide which to click.
http://www.nexplore.com/
TouchGraph http://touchgraph.com/TGGoogleBrowser.html
Quintura http://quintura.com/
In 2010 Moscow communicated with a ring of alleged spies in America by encoding instructions in
otherwise innocent-looking images on public websites. It’s a process called steganography.
Steganography is a smart way to hide data into other files, called carriers. Modified carriers will look like
the original ones, without perceptible changes. The advantage of steganography, over cryptography
alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages will
arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.
Today we can use some free tools to create covert transmission for any sensitive data or to protect your
copyright.
Protecting files copyright is by using Watermarking which is the process of embedding information into a
digital signal which may be used to verify its authenticity or the identity of its owners. Still images, video,
music, text, and software are all easily copied and illegally distributed, causing the authors to lose out on
considerable income in royalties.
By embedding identifying information in a file, watermarking software enables authors to control the
distribution of and to verify ownership of their digital information.
The first tool is OpenPuff a freeware steganography tool for Microsoft Windows created by Cosimo
Oliboni and still maintained as independent software author.
The program is notable for being the first steganography tool (version 1.01 released on December 2004)
that:
Let’s users hide data in more than a single carrier file. When hidden data are split among a set of
carrier files you get a carrier chain, with no enforced hidden data theoretical size limit (256Mb,
512Mb… depending only on the implementation)
Implements 4 layers of hidden data obfuscation (cryptography, scrambling, whitening and
encoding)
Extends deniable cryptography into deniable steganography
178
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
The current version is OpenPuff 3.40 and released on the 18th of July.
Another interesting tool is QuickStego which lets you hide text in pictures so that only other users of
QuickStego can retrieve and read the hidden secret messages.
Once text is hidden in an image the saved picture is still a ‘picture’, it will load just like any other image
and appear as it did before.
The image can be saved, emailed, uploaded to the web as before, the only difference will be that it
contains hidden text
Sudan
Suicide Bombers
179
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Following is a checklist for observing, reporting, responding and investigating suicide bombing incidents.
It is not designed as a comprehensive or complete list of all considerations in these areas but is
suggestive of the types of common concerns that may affect police and other emergency service
responders. A noted authority on terrorism states that Israeli authorities and psychologists have carefully
developed behavioral profiles that might help security personnel identify a potential suicide bomber. The
following are among the most obvious signs of such persons according to this source.
• The wearing of heavy clothing, no matter what the season. Long coats or skirts may be used to conceal
explosive belts and devices.
• An unusual gait, especially a robotic walk. This could indicate someone forcing or willing himself/herself
to go through with a mission.
• Tunnel vision. The bomber often will be fixated on the target and for that reason will look straight ahead.
He or she also may show signs of irritability, sweating, tics, and other nervous behavior. (The Al Qaeda
terrorist Ahmed Ressam, who was captured at a border crossing in Washington state while driving a car
filled bomb-making materials, caught the attention of authorities because of his excessive sweating,
furtive eyes, and other nervous movements.)
• The appearance of being drugged. The suicide truck bomber who attacked the U.S. Marine Barracks in
Beirut in 1983 had been drugged before the attack and was tied to the seat of his vehicle.
• Signs of drug use - including, for example, enlarged pupils, fixed stare, and erratic behavior.
• Bags or backpacks (used to carry explosives, nails, and other shrapnel). The bomber generally holds his
or her bag or backpack tightly, sometimes gingerly, and may refuse to be separated from it.
• A fresh shave—a male with a fresh shave and lighter skin on his lower face may be a religious Muslim
zealot who has just shaved his beard so as not to attract attention, and to blend in better with other
people in the vicinity.
• A hand in the pocket or tightly gripping something—this could be someone clutching a detonator or a
trigger for an explosive device. Such triggers, which may be designed in the form of button, usually are
rather stiff so that they may not be set off accidentally. (One Israeli acquaintance described how he and
several guards shot a would-be bomber numerous times, but found his twitching finger still on the
button—and still posing a danger, thereafter.)
• Evasive movements. It seems obvious that anyone who tries to avoid eye contact, or to evade security
cameras and guards, or who appears to be surreptitiously conducting surveillance of a possible target
location, may be a bomber.
Such profiles are valuable not only for law enforcement personnel but for all persons who work in security
or related fields in facilities or other locations that are potential targets or, where intelligence indicates an
elevated risk of a terrorist attack. Programs throughout the United States have successfully recruited key
180
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
personnel within the community to act as additional eyes and ears for law enforcement. Mall security
officers for example have been introduced to the above type of profile information in order to more
effectively spot potential terrorist threats. Similarly, community outreach programs provided training to
other persons who are in positions where they are more likely to interact with terrorist cells or operatives,
such as car rental agents, truck rental agents, security storage operators, hotel and motel managers,
school and hospital security officers, and related persons.
Questions
1. Which of the following statements is false?
(a) Suicide bombing attempts have not yet been made within the United States.
(b) Most of what we know presently about suicide bombings has come from experiences
overseas in Israel and Iraq.
(c) A major disadvantage of suicide bombers on foot is the limited amount of explosives
that they can reasonably conceal and carry.
(d) A major advantage of suicide bombers on foot is that they can penetrate targets
not otherwise available to motor vehicles.
(a) The main advantage of vehicular suicide bombers is the ability to carry large
explosive payloads.
(c) Suicide bombers can and have penetrated heavily fortified compounds.
(a) Suicide bombers often target location where large numbers of persons gather.
(c) Most commonly, suicide bombers are unmarried males between 16 and 40
years of age.
Answers
1. (a) Suicide bombing attempts have been made within the United States.
2. (d) None of the statements is false.
3. (d) Females have been used as suicide bombers.
Suspicious Packages
How to Handle Suspicious Mail
181
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
What constitutes a suspicious letter or parcel? Some typical characteristics which ought to trigger
suspicion include letters or parcels that:
Syria
182
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Taiwan
Military Air Bases And Airports http://eyeball-series.org/tw-bases/tw-bases.htm
Cimei Township
Hsinchu Airport
Hualien City
Husi Township
Husi Township 2
Linluo Township North
Linluo Township South
Mituo Township
Quemoy Island
Shueishang Township
Situn District
Song Sang Airport
Taichung Airport
Tainan Airport
Taitung City
Taitung City Military
Taiwan International
Taiwan International Military
Wang An Township
Wu Liting Hengchun Airport
Taliban
183
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.nps.edu/Programs/CCS/index.html
Technology Theft/Transfer
Terrorism and Political Violence Threat Map 2011 (great interactive map)
http://www.aon.com/risk-services/political-risk-
map2/map/Interactive_Risk_Map/2011_Terrorism_Political_Violence_Map/index.html
Action Against Terrorism http://www.coe.int/t/dlapil/codexter/default_en.asp
National Counterterrorism Center http://www.nctc.gov/site/other/wits.html
Worldwide Incidents Tracking System https://wits.nctc.gov/FederalDiscoverWITS/index.do?N=0
Tactics of Eco-Terrorists to Thwart Cops (U/LES) http://cryptome.org/0003/fbi-ecoterrorism.pdf
Country Reports on Terrorism 2009, August 2010
http://www.state.gov/documents/organization/141114.pdf
Terrorism Tracker https://www.terrorismtracker.com/index.php
Terrorist Groups Interactive Map http://www.nctc.gov/site/map/map.html
Terrorist Website Search Engine (kind of dated but still fulfills a requirement)
http://www.google.com/cse/home?cx=012389276654712134826%3Amiiykhqamla
Tracking The Threat http://www.trackingthethreat.com/
Terrorism World http://terrorismworld.com/
Fact Sheets On Terrorist Attacks (The National Academies has prepared, in cooperation with the
Department of Homeland Security, fact sheets on five types of terrorist attacks. Drawing on our many
reviewed publications, the expertise of our members, and the knowledge of other esteemed authorities,
the fact sheets provide reliable, objective information.)
http://www.nae.edu/Programs/MediaPublicRelations/FactSheetsonTerroristAttacks.aspx
Terrorism
https://www.intelink.gov/sharepoint/osp/Terrorism%20OSINT%20Products/Forms/AllItems.aspx
184
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.fbi.gov/mostwant/terrorists/fugitives.htm
Terrorism Research Center http://www.terrorism.com/
Terrorism Portal http://www.theterrorismportal.com/
Terrorism Resources http://library.nps.navy.mil/home/tgp/tgpndx.htm
http://library.nps.navy.mil/home/tgp/tgp2.htm
http://www.ceip.org/files/projects/npp/resources/terrorism.htm
Terrorist Financing http://www1.oecd.org/FATF/TerFinance_en.htm
War on Terrorism Latest News http://www.terrorismfiles.org/
Terrorism/Counterterrorism Web Links http://www.usip.org/library/topics/terrorism.html
Terrorism Questions and Answers http://www.terrorismanswers.org/home/
http://cfrterrorism.org/thisweek/
http://cfrterrorism.org/index/
Terrorism Disasters http://www.disasters.org/emgold/Terrorism.htm
Terrorism and Terrorists http://jurist.law.pitt.edu/terrorism/terrorism1.htm
Terrorism, Anti-Terrorism, Taliban and Afghanistan Links
http://www.windweaver.com/politics/terrorism.htm
Terrorism 2004 http://www.au.af.mil/au/aul/bibs/terrornew/terrorism.htm
South Asia Terrorism Portal http://www.satp.org/
Terrorism and Homeland Security http://www.rand.org/research_areas/terrorism/
WWW Sites related to Terrorism http://www.sima.co.at/terror.htm
http://www.jmu.edu/orgs/wrni/links.html
http://www.blkbox.com/~guillory/terr.html
Patterns of Global Terrorism http://www.mipt.org/Patterns-of-Global-Terrorism.asp
International Global War on Terrorism http://www.au.af.mil/au/awc/awcgate/cps-terr.htm
Terror Analysis http://www.terroranalysis.com/
Comprehensive Guide to International Terrorist Organizations
http://www.specialoperations.com/Terrorism/SOCGuide/Default.htm
Terrorist Group Profiles
http://www.specialoperations.com/Terrorism/Terrorist_Groups/Default.htm
Terrorism Knowledge Base http://www.tkb.org/Home.jsp
A Military Guide To Terrorism In The 21st Century
http://www.au.af.mil/au/awc/awcgate/army/guidterr/
Terror Group Emblems http://www.osis.gov/docs/TerrorGroupEmblems.pdf
Fighting Terror http://www.cnn.com/SPECIALS/2004/fighting.terror/index.html
Terrorism Unveiled http://athena.blogs.com/athena/
Global Terrorr Alert http://www.globalterroralert.com/
Guide to Research Terrorism and Insurgency
http://www.library.georgetown.edu/guides/terrorism/
http://www.library.georgetown.edu/guides/right.htm#int
Terrorism Database Project http://www.rand.org/ise/projects/terrorismdatabase/
Terrorist Attacks and Organizations
http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/
Terrorism Research http://www.washburn.edu/faculty/aschbley/publications.html
Nuclear Terrorism http://www.nci.org/nci-nt.htm
http://www.nuclearterrorism.org/
http://www.fas.org/irp/crs/RL32595.pdf
What If Terrorists Go Nuclear http://www.cdi.org/terrorism/nuclear.cfm
Targeting The Threat (TrackingTheThreat.com is a database of open source information about
the Al Qaeda terrorist network and you can search the database by terrorist name)
http://www.trackingthethreat.com/index.jsp
Tracking The Terror http://www.cnn.com/US/tracking.terror/archive/
Global Terrorism Analysis http://www.jamestown.org/terrorism/
http://www.jamestown.org/terrorism/archives.php?publication_id=9
South Asia Terrorism Updates http://www.satp.org/
Interactive United States/Afghanistan War Machine
http://www.satp.org/satporgtp/usa/Osama.htm#
185
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
186
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Groups And Networks, Individual Terrorists, Apologists or Extremists, Terrorist Organizations And
Other Groups Of Concern http://www.investigativeproject.org/profile/all/
Terrorism Cases http://www.investigativeproject.org/cases.php
The Investigative Project On Terrorism Audi And Video Clips
http://www.investigativeproject.org/multimedia.php
2005 Terrorism Risk Map http://folk.uio.no/erikro/WWW/corrgr/insurance/terrorismMap.pdf
Terrorism Threat Map 2007
http://www.aon.com/se/se/attachments/Aon%20Terrorism%20map%202007.pdf
Terrorism News (News on Terrorism continually updated from thousands of sources around the
net.) http://www.topix.com/news/terrorism
Terrorism 2002-2005 http://www.fbi.gov/publications/terror/terrorism2002_2005.pdf
Terrorist Recognition Cards http://www.dia.mil/site6_images/cards/index.htm
Rewards For Justice http://www.rewardsforjustice.net/
Wanted Terrorists
http://www.rewardsforjustice.net/index.cfm?page=Wanted_Terrorist&language=english
Links To War On Terror http://www.copleydc.com/cns_links/cns_links_terrorism.htm
Rogues Gallery http://www.rantburg.com/rogues_gallery.php
The Intelligence and Terrorism Information Center
http://www.terrorism-info.org.il/site/home/default.asp
Terrorism News (News on Terrorism continually updated from thousands of sources around the
net.) http://www.topix.net/news/terrorism
Terrorism Funding
Terrorist Targets
187
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://fmso.leavenworth.army.mil/fmsopubs/ISSUES/prototypes/prototypes.htm
Foreign Terrorists in America http://www.fas.org/irp/congress/1998_hr/s980224c.htm
Terrorist Attacks on Americans 1979-1988
http://www.pbs.org/wgbh/pages/frontline/shows/target/etc/cron.html
Guarding America: Security Guards and U.S. Critical Infrastructure Protection
http://www.fas.org/sgp/crs/RL32670.pdf
Commercial Nuclear Reactor Sites as Terrorist Targets
http://www.neis.org/literature/Reports&Testimonies/Here_today_there_tomorrow_report_10-22-01.pdf
Transportation and The Terrorist Threat
http://www.strom.clemson.edu/opinion/whitehurst/transterror.pdf
Passenger Ferries Could Be Prime Terrorist Targets
http://www.transportationsec.com/ar/security_passenger_ferries_prime/index.htm
Terrorists planning to assemble bombs on planes
http://transportationsec.com/ar/security_terrorists_planning_assemble/index.htm
Target America http://www.pbs.org/wgbh/pages/frontline/shows/target/
Plan Targets Terrorist Use Of Shipping Containers
http://www.newsmax.com/archives/articles/2002/6/7/52635.shtml
Task Force to Bolster Security for Attractive Terrorist Targets
http://www.signonsandiego.com/news/nation/terror/20040419-0736-terrorism-taskforce.html
The Top 100 Terrorist Targets in the United States (if you can steer away from the political
comments, it makes good for further study)
http://www.lilithgallery.com/articles/terrorist_targets.html
Chronology of Major Terrorist Attacks Against U.S. Targets
http://www.freerepublic.com/focus/f-news/1087538/posts
Thoughts on Terrorist Targets http://antiwar.com/utley/?articleid=1900
Terror’s Next Target http://www.iags.org/n0111041.htm
Developing Trends in Terrorist Strategy
http://www.siteinstitute.org/terrorismlibrary/charts_maps/charts_maps_1103218242.pdf
Mapping The Risks http://www.rand.org/pubs/monographs/2004/RAND_MG142.pdf
How Terrorists Plan And Conduct An Attack On Infrastructure Targets
http://www.ibtta.org/files/PDFs/bell_alan.pdf
Terrorist Websites
188
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
189
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Get Abstracts (commercial) — Large online library of more Regional Economic Conditions (RECON) — Economic data
than 8,000 business book summaries. It is the most efficient available by state, county, and MSA.
way to get the best business titles.
Finance
Newspaper Archives Online Bankrate.com — Database of interest rates for different loan
US newspaper coverage – ResearchGuides lists links to types, mortgages, and savings accounts.
many newspapers InvestIQ — Market data from around the world in regions.
Library of Congress Newspaper Resource List – LOC does a BigCharts — Quotes and performance charts on different
great job getting the list together of wonderful newspaper stocks and mutual funds.
archives. SmartMoney.com Tools — A portal of for stock analysis
NewspaperArchive.com – (commercial) – Known for a large tools.
collection. I haven’t used it, so I can’t confirm this. NASDAQ Trader — A database of stock data from the
xooxleanswers.com – Great list of newspaper archives from NASDAQ stock exchange.
Xooxle. Good list and a funky name. Two thumbs up. SEC Info — EDGAR and SEC filings searchable by name,
University of Penn Newspaper Archive – List of US industry, SIC code, etc.
newspaper archives and dates. Looked like a deeper list of EDGAR Online — SEC filings searchable by ticker or
Texas newspapers, so this effort may be a deep company name.
comprehensive list. Government Search Engines
Copyright Records (LOCIS) — Online copyright records,
Audio Books Online documents, serials, and multimedia.
LibreVox.org – Huge selection of audio recordings and American FactFinder — Aggregate census bureau data to
AudioBooks read by volunteer voice artists be searched by city, county, or ZIP code.
FedStats — Gateway for statistics on 100 US federal
Business Deep Web Engines agencies.
AAAAgencySearch.com — Advertising agencies via the United States Patent and Trademark Office — Database of
American Association of Advertising Agencies. patents, full-text and full-page images.
Agency ComPile — Advertising and marketing agencies. Historical Census Browser — Repository of historical US
Alibaba – An international marketplace of businesses looking census data. Going back to 1790 compiled by the University
for businesses. of Virginia.
Kompass — Business to business search engine. Geospatial One Stop — Awesome GIS data warehouse of
GPO Access Economic Indicators — Gateway for economic geographic data, shapefiles, imagery, and displayable on
indicators from January 1998 to present. maps.
Government Printing Office — Big catalog of stuff published Grants.gov — Grant opportunities, from everything under the
by the Government Printing office. Has business stuff but sun.
much much more. Environmental reports, legal docs, nature Technology Opportunities Program Grants Database —
stuff. Hell, I typed in ‘mushroom’ and pulled up 34 entries. Listing of technology grants, peruse by keyword, state, and
Hoover’s — The Big Boy of info on businesses. year.
ThomasNet — Just an industrial product search directory. United States Government Printing Office (GPO) — I
SBA Loan Data — Loan program approval activity from the mentioned this earlier, they seem to have everything. A
Small Business Administration. search engine for mutliple government databases: US
GuideStar.org — A searchable database of non-profit budgets, campaign reform hearings, code of federal
organizations including 501c. regulations, congressional bills, etc
CIA Electronic Reading Room — The usual uninteresting
Consumer Engines declassified CIA documents.
US Consumer Products Safety Commission Recalled POW/MIA Databases and Documents — Info on POWs and
Products — Listing of products, sortable by company name. MIAs.
Melissa Data — Comprehensive directory of demographic ZIP+4 Lookup — US ZIP codes and ZIP+4 codes
data, sortable by ZIP code.
Kelley Blue Book — A guide to pricing new and used International Search Engines
vehicles. International Data Base (IDB) — Statistical tables and
Edmunds — A recognized and established guide to pricing demographic information for countries and areas.
new and used vehicles. FIRST — http://first.sipri.org/ Military aggression database
Consumer Reports — (commercial) A trusted guide to and weapons holdings.
product reviews, including autos, appliances, electronics, Economics of Tobacco Control — Information regarding
computers, personal finance, etc. I use it. tobacco usage and policy for180 countries.
Country Indicators for Foreign Policy —Statistical tables on
Economic and Job Search Engines countries’ foreign policies.
EUROPA Press Release Database — Database of press World Bank Data — Key development data and statistics for
releases by the European Union. countries and worldwide groups.
FreeLunch.com —Directory of free economic data. CIA Factbook — Reference materials containing information
Bureau of Labor Statistics — Job-based and consumer on every country in the world.
economic info from the US Department of Labor. US International Trade Statistics — International trade
Salary Wizard Calculator — Tools that shows national statistics,by country or type of good.
average salaries adjusted by location for different jobs. US Foreign Trade Highlights — Information of US
Economagic — A data directory containing over 200,000 international trade.
econ files. Energy Information Administration International Energy Data
Penn World Tables — National income data for all countries and Analysis — Energy balances sorted by country. Explains
for the years 1950-2007. why the US gives huge amounts of cash to oil producing
America’s Job Bank — Database of jobs and resumes. countries.
USAJOBS — Portal of data on federal government jobs.
191
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
192
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Duckduckgo bills itself as a search engine alternative to google. Back in April, the question was
how a small company could compete with the google goliath. The CEO stated that it was because they do
not track your searches or target with advertising, and because of that, the company has benefited since
the NSA leak alerted Americans that the government was, in fact, collecting data. Since the NSA news
broke, duckduckgo web traffic has surged 33%. The CEO, Gabe Weinberg, did not anticipate a traffic
increase as a result of competitors giving information to the government? It has long been known that
people didn't want tracked and so it's no surprise that people are making a choice to switch to things,
they can still get great results and also real privacy. In a six-month period yahoo! said that they had
12,000 to 13,000 inquiries from the government, Apple, 4,000 to 5,000 inquiries, duckduckgo had zero
inquiries, and the reason for that is that no data is stored. So if they come to us and they know it's in our
privacy policy, we have nothing to handover. It's all anonymous data. So on big-tech companies
and usually big companies in general, that information is stored in data warehouses and that's why it can
be requested. With duckduckgo all information is literally thrown away. It never gets written into anywhere
and never to disk. A lot of these companies, they're saving the data because they want to get
advertising around that data. So how does duckduckgo make money? We don't need to track users to
make money on web search, because it's based off the key word. You do mortgage research for your
house; you type in mortgage bank rates and get a mortgage ad. We can do that without tracking. We
have an ad on our site based on the keyword, not the person. To put it in perspective, it took 435 days to
get from one to 2 million searches a day, and then only eight days to get from 2 million to 3 million, and all
of them are new customers? I think people are out there having conversations with their friends and
family and saying, hey, we don't want to be tracked. No one wants to be tracked. Why don't you try
duckduckgo? You know, google is out there saying, look, we anonymize the information. They try not to
give out the information and resist the government inquiries as much as possible but at the end of the
day, if you have a valid court order, you have to do what it says.
How to Shield Your Calls, Chats, and Internet Browsing From Government Surveillance
http://www.slate.com/blogs/future_tense/2013/06/07/how_to_secure_and_encrypt_your_email_and
_other_communications_from_prism.html
The Open Technology Fund has supported the development of tools that can be used for secure
communication in the field. These tools include encrypted end-to-end cell phone conversations, encrypted
text messaging, encrypted group chat and document sharing, anonymous communication on the Internet
and secure instant messaging. We’ve created a short guide describing these tools, including available
languages, use cases and where to access the tools for use today. You can download the May 2013
edition of the guide as a PDF document. Download the Guide [pdf]
Tools Included in the Guide
RedPhone is an Android app that secures your calls for free, with iOS support coming in the summer of
2013. RedPhone provides end-to-end encryption, securing your conversations so that nobody can
listen in.
TextSecure is an Android app that secures your SMS/MMS communication, which encrypts your text
messages in transit and on your phone. It’s almost identical to your normal text messaging application,
and is just as easy to use.
Cryptocat is an open, accessible instant messaging platform that encrypts your conversations right in
your browser. Android and iOS apps are expected in the summer of 2013. Cryptocat aims to leverage
both the ease of use and accessibility afforded by web applications and the security provided by client-
side cryptography.
Orbot is an android application that allows mobile phone users to access the web, instant messaging and
email without being monitored or blocked by their mobile internet service provider. Orbot brings the
features and functionality of Tor to the Android mobile operating system. Tor prevents somebody
193
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
watching your Internet connection from learning what sites you visit, and it prevents the sites you visit
from learning your physical location.
Orweb is an android application that works hand in hand with Orbot to provide web access that is able to
circumvent web filters and firewalls, while also improving a users ability to remain anonymous online.
Gibberbot is an android application offering private, encrypted chat for Google, Facebook, AOL and any
Jabber or XMPP server using true verifiable end-to-end encrypted communications.
ChatSecure is an iOS application that offers private, encrypted chat and instant messaging for Google,
Facebook and any Jabber or XMPP server using true verifiable end-to-end encrypted communications.
Tor is free software and an open network that helps you defend against a form of network surveillance
that threatens personal freedom and privacy, confidential business activities and relationships, and state
security known as traffic analysis . Download Tor
Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It
can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity
and know that the message was not changed en route.
GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined
by RFC4880 . GnuPG allows you to encrypt and sign your data and communication, features a versatile
key management system as well as access modules for all kinds of public key directories. GnuPG, also
known as GPG, is a command line tool with features for easy integration with other applications. A wealth
of frontend applications and libraries are available. Version 2 of GnuPG also provides support for
S/MIME.
Cloudfogger encrypts your data on the local device before it gets uploaded to the cloud. That guarantees
that Dropbox and others never get access to the content of your files. Cloudfogger protects your privacy
with 256bit AES (Advanced Encryption Standard) encryption.
Silent Circle to make and receive encrypted calls and send encrypted texts and files, though your
communications will be fully secure only if both parties to the call, text or file transfer are using the app.
The digital age has made it far trickier to thwart eavesdroppers who may be sitting at a desk
thousands of miles away. But it can still be done. There are plenty of software tools anyone can use to
keep prying marketers and hackers out of their business.
TrueCrypt: Security begins at home, and what's on your hard drive can say a lot about you -- and about
everyone you know and communicate with. Encrypting the data on your computer's drive won’t make it
impossible (nothing is impossible), but it’ll be extremely difficult for anyone to uncover what's stored there.
TrueCrypt is free and can be used to encrypt an entire hard drive or a virtual disk to keep prying eyes out.
For individual files, there's AxCrypt, which lets you encrypt and password-protected files with a click. It's
great for sharing confidential documents, but you've also got to share the password.
Tor: Used by political activists and dissidents Tor is a free, open-source Web surfing program that runs in
the background and hides your surfing habits and location. It accomplishes this by routing your
connection through numerous nodes or hops, so it can also slow down your page views. On the other
hand, it has proved adept at thwarting oppressive government officials. It has also been useful for
194
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
criminals delivering viruses, so much so that some security programs automatically tag Tor traffic as
malware.
VPN: One way the authorities (and hackers) trace things back to you is using your IP (Internet Protocol)
address, which ISPs are often forced to render to authorities. That’s how law enforcement sometimes
learns military generals have supposedly secret email accounts, which they can then subpoena without
their knowledge. To prevent such traces you can use a VPN, or virtual private network service, to hide
your IP address. It's the same sort of connection used by many corporations to prevent security breaches
using encrypted tunneling, but you can use it to route your connections through a remote server, often in
a different country, and thus thwart trackers. Free VPN services include Private WiFi and proXPN.
Google Voice: One of the disruptive technologies Google has introduced -- but not enough people use --
is an online phone service based on technology it acquired when it bought Grand Central. Google Voice
is intended to provide a single phone number that you can then use to route calls to any other number (up
to five at a time). It's also great at filtering calls, and because it's free, you can get a new number for
special sources and then close it down, making it difficult for authorities to eavesdrop or even figure out
who called who.
Burner: Based on the concept of so-called burner phones (cheap, temporary cell phones that have no
identifying account information and are later thrown away), the Burner app for Android and iPhones
generates a temporary phone number you can give out instead of your real number. When you're done,
you simply delete the number and it's gone. It's not free, however. Getting a number that lasts a week
with 20 minutes of talk time, for example, costs $1.99. Is it foolproof? Probably not if the government is
trying to track you, but it makes it darn difficult.
DeadDrop: Another tool that has been used in various guises by whistle-blowers is DeadDrop. It uses Tor
and provides a place online where sources can anonymously post confidential documents and
information for reporters (just like the physical dead drops of the spy-vs.-spy cold war). The New
Yorker magazine recently publicly announced it would begin using the technology for
its Strongbox service.
It should be noted that many of these techniques are used by terrorists and ordinary criminals today. Law
enforcement will no doubt decry their use -- and continue to come up with ways to hack into these privacy
tools. http://www.foxnews.com/tech/2013/05/20/tech-tools-to-keep-one-step-ahead-feds/
Tracerouting
Training Resources
MIT OpenCourseWare (hundreds of free classes online) http://ocw.mit.edu/index.htm
Introduction to Intelligence Analysis (1 to 2 Hours)
Data Collection Tradeoffs (2 to 3 Hours)
Critical Thinking Strategies (2 to 3 Hours)
195
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
http://www.anacapatraining.com/webtraining/index.html
Transportation
Tunnels
UAVs
Unmanned http://www.unmanned.co.uk/
United States Air Force Unmanned Aircraft Systems Flight Plan 2009-2047
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA505168&Location=U2&doc=GetTRDoc.pdf
Flight of The Drones http://www.economist.com/node/21531433
NanoEye http://www.scribd.com/doc/68542133/Nano-Eye
http://defensetech.org/2011/10/12/the-armys-tiny-future-spy-satellite/
Drones That Think http://www.c4isrjournal.com/story.php?F=magazine
Unmanned Aircraft Systems Present & Future Capabilities http://cryptome.org/dodi/uav-future.pdf
See what it’s like to fly a UAV: Welcome to the UAV pilot training program. Your mission is to
locate and destroy enemy targets using AGM-114 Hellfire missiles launched from a MQ-9 Reaper.
http://www.airforce.com/interactive/uav/index.html
The Spy Flight Website http://www.spyflight.co.uk/main.htm
The Complete UAV Field Gude http://www.popsci.com/technology/gallery/2010-02/gallery-
future-drones
UAV World http://www.uavworld.com/
A Worldwide Roundup http://www.aiaa.org/aerospace/Article.cfm?issuetocid=365
http://www.aiaa.org/images/PDF/WilsonChart.pdf
http://www.uav-info.com/pdfs/fig6_UAV-Systems_Overview.pdf
UAV World http://www.uavworld.com/
Photo Gallery http://www.uavforum.com/library/photo.htm
Video Theater - A 5-10 Sec Video Clip Of A Featured UAV Each Month
http://web.archive.org/web/20090513061222/http://www.uavforum.com/library/video.htm
List of Unmanned Aerial Vehicles http://en.wikipedia.org/wiki/List_of_unmanned_aerial_vehicles
Unmanned Aerial Vehicles Website Links
http://www.garmin-air-race.freeola.com/links%20listing/77.htm
196
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Venezuela
197
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Water Conflict
WMD https://www.intelink.gov/sharepoint/osp/WMD/Forms/AllItems.aspx
Weapons of Mass Destruction Intelligence Threat Assessments
http://www.fas.org/irp/threat/wmd.htm
198
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Weather
199
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
NewsNow http://www.newsnow.co.uk/h/World+News/Asia/Afghanistan
Miscellaneous
DIRECTORY
200
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
TRICARE West: (888) 874-9378; https://www.triwest.com; AK, AZ, CA, CO, HI, ID, IA (except 82 Iowa ZIP codes near Rock Island,
IL) KS, MO (except the St. Louis area), MN, MT, ND, NE, NM, NV, OR, SD, SW TX, UT, WA, WY
TRICARE Overseas: (888) 777-8343; http://www.tricare.mil/overseas/index.cfm
TRICARE for Life: (866) 773-0404; TDD (866) 773-0405);http://www.tricare.mil/tfl/default.cfm
TRICARE Pharmacy Home Delivery: (877) 363-1303; http://www.tricare.mil/mybenefit/home/Prescriptions/FillingPrescriptions/TMOP
TRICARE Retail Pharmacy: (877) 363-1303; http://www.express-scripts.com
TRICARE Retiree Dental Plan: (888) 838-8737; http://www.TRDP.org
Recreation Centers http://www.armymwr.com
Hale Koa Hotel, Hawaii: (808) 955-9424; (800) 367-6027; http://halekoa.com
Eidelweiss Resort, Bavaria: 011-49-8821-9440; http://www.edelweisslodgeandresort.com
Shades of Green, Florida: (888) 593-2242; (407) 824-3665; http://www.shadesofgreen.org/reservations.htm
Dragon Hill, Korea: 011-82-2-7918-222; http://www.dragonhilllodge.org/DiscoverSeoul/
Veterans Affairs (VA) Information http://www.va.gov
Burial & Memorial Benefits: http://www.cem.va.gov/
Benefits and Services: (800) 827-1000 (Retirees overseas should contact the American Embassy/consulate); TDD (800) 829-
4833; http://benefits.va.gov/benefits/
GI Bill: (888) 442-4551; http://www.gibill.va.gov
Graves Information: (877) 907-8199
Health Care Benefits: (877) 222-8387; http://www.va.gov/health
Insurance: SGLI/VGLI: (800) 419-1473; All other insurance: (800) 669-8477
Sister Service Retiree Publications and News
Early Bird Current News: http://ebird.osd.mil/index.html
Air Force Afterburner: http://www.Retirees.af.mil/afterburner/
Coast Guard Evening Colors: http://www.uscg.mil/ppc/retnews/
Marine Corps Semper Fi: https://www.manpower.usmc.mil/ then click Career/Retired Marines, then Semper Fidelis Newsletter
Navy Shift Colors: http://www.navy.mil/ then click Links/Shift Colors
201
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Overseas RSOs
Europe Kaiserslautern England
06202-80-6029 0631-411-8838 see HQ Europe
RSOAE@EUR.ARMY.MIL usarmy.kaiserslautern.imcom-europe.list.usag-k-ret- Italy/So. Europe/Africa/Mid-East
Germany serv@mail.mil Vicenza
Ansbach Schweinfurt 0444-71-7262
Heidelberg
06221-57-8399
usarmy.badenwur.usag.mbx.retirement@mail.mil
202
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
' ... being able to distinguish the ordinary from the extraordinary'
Coinciding with concerns among some intelligence services that suspected Hezbollah "sleeper
cells" in Canada have been activated, Canadian law enforcement authorities increasingly are training for
spotting potentially suspicious activity and behavior that may indicate terrorists are conducting
surveillance or other goings-on in preparation for targeting a specific structure or location for attack.
Several years ago, Robert David Steele, an outspoken veteran intelligence officer, told
HSToday.us that “50 percent of the ‘dots’ that prevent the next 9/11 will come from bottom-up [local] level
observation” and unconventional intelligence from “private sector parties.”
Since 9/11, the Department of Homeland Security (DHS) and law enforcement in the Washington,
DC capital region have actively urged citizens to report “suspicious activity.” Mobile electronic signs
urging people to report suspicious activity are routinely placed at strategic locations throughout the metro
area for periods of time. The last one of these portable warnings I saw was at the convergence of Key
Bridge and George Washington Memorial Parkway on the Virginia-side of the Potomac River just across
from Georgetown.
Lynda Howes, a civilian member of the emergency event and management unit of the Calgary
(Canada) Police Service, told attendees of the “Tri-lateral Security Conference” in Calgary last week that
law enforcement must learn how terrorists operating in order to prevent attacks. She said
counterterrorism is only manageable if it is tackled at the grass roots level. She explained that it’s vital
that everyone - including the public, the police, government and private industry – recognizes the
potential indicators of terrorism and what actions to take if, and when, they are encountered.
Howes said terrorists must recruit members, research their targets, procure resources, receive,
transfer and conceal money, and provide transportation and communication.
And "each one of those phases represents an activity” that can be identified if a person is trained
to know what to be on the look-out for. “Those activities are associated with a behavior. Once we have
that behavior, those are things you and I will be witnessing every single day and are things we can pick
up on as potential indicators.”
In late 2002, The Air Force's Office of Special Investigations launched “Eagle Eyes,” a program to
"deter terrorism by recognizing and reporting pre-attack activities," according to an OSI memo.
"Every terrorist act is preceded by observable planning activities," according to the OSI memo.
"When troops and citizens know what to look for and how to report suspicious activity, terrorist acts can
be prevented."
Department of Defense personnel have routinely been advised to report suspicious
reconnoitering of military facilities, people asking detailed information about specific sites, and any other
activity which could indicate a "dry run” attack.
DHS says “knowing what to look for and being able to distinguish the ordinary from the
extraordinary are the key elements to successful surveillance detection.”
“A persistent stream of reported suspicious incidents requires an understanding of the purpose of
terrorist surveillance, to know what terrorists look for, and how they conduct surveillance operations,”
DHS’s advice states.
DHS states “terrorists conduct surveillance to determine a target's suitability for attack by
assessing the capabilities of existing security and discerning weaknesses in the facility. After identifying
weaknesses, they plan their attack at the point of greatest vulnerability.”
“Because terrorists must conduct surveillance-often over a period of weeks, months, or years-
detection of their activities is possible,” DHS continued, noting, “regardless of their level of expertise,
terrorists invariably make mistakes. The emphasis of surveillance detection is to key in on indicators of
terrorist surveillance activities."
DHS states “successful surveillance detection efforts require immediate reporting of incidents similar
to the following:
o Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or
direction;
o Individuals who stay at bus or train stops for extended periods while buses and trains come and go;
o Individuals who carry on long conversations on pay or cellular telephones;
203
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
o Individuals who order food at a restaurant and leave before the food arrives or who order without
eating;
o Joggers who stand and stretch for an inordinate amount of time;
o Individuals sitting in a parked car for an extended period of time;
o Individuals who don't fit into the surrounding environment because they are wearing improper attire
for the location or season;
o Individuals drawing pictures or taking notes in an area not normally of interest to a tourist or showing
unusual interest in or photographing security cameras, guard locations, or watching security reaction
drills and procedures; and
o Individuals who exhibit suspicious behavior, such as staring or quickly looking away from individuals
or vehicles as they enter or leave facilities or parking areas
204
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
My favorite search engines, and I’m sure you have your favorites, are the Copernic Suite followed by
Google and then others. I use them extensively and use them to my advantage when doing research and
I just don’t have the time to sit in front of the computer and type in all the keywords. First let me start with
the Copernic Suite. It is comprised of Copernic Agent Professional, Copernic Tracker and Copernic
Summarizer. Tracker and summarizer are exactly what the titles imply. The tracker keeps track of
websites and alerts you when there are changes to it. Summarizer will take an article and summarize it to
a more manageable article; and you determine the number of words in the summarized article. The
following applies to copernic agent professional and how to customize it to work for you.
You’ll notice on the graphic below how I have formatted my copy. On the right side is a box where folders
are created as I have done. In the top center are the keywords I used for the Iran folder in the box at right.
I have programmed the engine to do automatic searches at 0800 every day (by this time I have had my
first cup of coffee and just waiting for all the results to come in). You also will notice that on the search
term “Iranian military capabilities” there is a number 24 in parenthesis. These are the new results that
came in at 0800, so you will always know about new results. Just below the box with the keywords are all
the hits that came in. The green check mark indicates that it is a valid link. Now look at the left hand side
in the quick search box and you should notice that I have 1005 search engines enabled. With these many
search engines enabled you should be able to pin down what you’re looking for.
205
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
206
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Let’s now look at Google and see how it can be customized to work for you. What you’re looking at now is
the traditional page. On the upper right is the “sign in” link. Click on this link to establish an account. Once
you establish an account click on the news link to go to the personalized news page.
207
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Clicking on the news link brings up the following page. You’ll notice on the left hand side where I have
established all keywords of interest to me. I have included all the classical “INTS’ along with some others
of interest. Clicking on a keyword, for example “explosively formed projectiles”, brings up the latest search
on that term. I use the same keywords in Copernic above because the results are not always the same
for both search engines. By using two search engines to do my bidding I stand a better chance of getting
a plethora of results and thus more solid news from around the world.
My keywords
Click here to personalize your page.
208
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Things move so fast on the Internet that sometimes the information you are looking for has been removed
or changed. Using Google's Cached Links and the Internet Archive's Wayback Machine can help you find
what you are looking for even if the content is no longer online.
1. If you know that the information you are searching for is no longer online, go to Google.com.
2. Enter as much information as you can into Google's search field and hit enter.
3. When your search results appear, find the result with the most appropriate description and click on the
link at the bottom left of the result that says "Cached." This will open a snapshot of the Web page that
Google took as it was indexing it.
Clicking on the cached link may also be useful if you ever click on a search result link that doesn't work.
4. If you don't know exactly what you are looking for or are curious about a previous version of a Web
page, go to web.archive.org to search the Internet Archive's Wayback Machine, an archive of 85 billion
Web pages dating back to 1996.
5. Type the URL of the Web site you want to see and click "Take Me Back." This will bring up a collection
of archived pages from that Web site, organized by year.
Cached Links may not be available for all Web sites and less popular Web sites may not be included in
the Internet Archive Wayback Machine.
209
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
History
Quincy Wright, “Project for a World Intelligence Center” (1957)
Al Gray, “Global Intelligence Challenges of the 1990’s” (1988-1989)
Robert Steele, Critique of CIA/FBIS OSINT Plan (1989, Still Valid in 2006)
USMC, OSINT Program Debate History (1989-1995)
Robert Steele, “E3i: Ethics, Ecology, Evolution, & Intelligence: An Alternative Paradigm” (1992)
Robert Steele, “God, Man, and Information: Comments to INTERVAL In-House” (1993)
Robert Steele, “Creating a Smart Nation” (1996)
Robert Steele, “The OSINT Story” (2004)
Robert Steele, “Basic Lectures on Secret Intelligence Shortfalls and All-Source Reform” (2004)
Context
MCIA, “Model for Analysis of Expeditionary Environment” (1989)
MCIA, “Expeditionary Environment Strategic Generalizations” (1990)
USMC, “Intelligence Preparation of the Battlefield” (1992)
Robert Steele, “OSINT: What Is It? Why Is It Important to the Military?” (1994)
Robert Steele, “Expeditionary Environment in 21st Century” (1994)
Ben Gilad, Business Blindspots (1996)
Robert Steele, “Virtual Intelligence & Information Peacekeeping” (1997)
Robert Steele, “Information Peacekeeping: The Purest Form of War” (1998)
Robert Steele, “Asymmetric Warfare and Four Forces After Next” (1998)
Robert Steele et al, “Relevant Information” (1999)
Amitai Avishalom, “Overcoming Impediments to Information Sharing” (2003)
Defense Science Board “Strategic Communication” (July 2004)
United Nations, “A More Secure World: Our Shared Responsibility” (2004)
Robert Steele, “Address to the Department of State” (2004)
Robert Steele, “Peacekeeping Intelligence” (2004)
Robert Steele, “Information Peacekeeping” (2004)
Robert Steele, “Questions Any National Intelligence Manager Should Be Able to Answer” (2005)
Robert Steele, “Address to the Department of Homeland Security” (2005)
Robert Steele, “Briefing for the Department of Defense” (2006)
C. K. Prahalad, The Fortune at the Bottom of the Pyramid (2006)
Robert Steele, “Reinventing Intelligence” (2006)
Practice
Robert Steele, “Creating a Bare Bones OSINT Capability” (1994)
Jack Davis, Compendium of Analytic Tradecraft (1997)
Robert Steele,, OSINT Executive Overview (1998)
NATO Open Source Intelligence Handbook (2001)
NATO Open Source Intelligence Reader (2002)
NATO Intelligence Exploitation of the Internet (2002)
Robert Steele, “New Rules for the New Craft of Intelligence” (2002)
Robert Steele, “Peacekeeping Intelligence Leadership Digest 1.0” (2003)
Eobert Steele, “Special Operations Forces Open Source Intelligence Handbook” (DRAFT, 2004)
Robert Steele, “Primer on Public Intelligence” (2005)
Essential Individual Access & Analytic Toolkit via SILOBREAKER (2006)
Robert Steele, The Practice of Intelligence and Related Documents (2006)
210
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Robert Steele, “Commercial Imagery and Geospatial Funding at $600M a Year” (2005)
Robert Steele, “Creating a Combatant Commander Open Source Program” (2005)
Congressman Rob Simmons (R-CT-02), “Foreword” to Book on Information Operations (2006)
Media
John Perry Barlow in Forbes (2002)
Robert STEELE in TIME (2003)
Kris Alexander in WIRED (2005)
“The Power of Us” in Business Week (2005)
Reference
Annual Training Conference, Proceedings, 1992-date (less 2005, none held)
Portal Pages and Archives, www.oss.net, 1992-date
Robert Steele, Amazon Lists of Recommended Books (look at this first)
Robert Steele, Amazon Reviews (Be patient, two hours = overview of
reality
211
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
* Google lets you search for a range of numbers, in any format. To include a number range in your search
query, type in the lower and upper numbers, separated by two periods - e.g., 15..50 I had a chance to try
out this feature in a real-life search; I wanted to find a set of wireless headphones on Amazon.com
costing between $50 and $100. I typed in the query (wireless OR cordless) headphones $50..$99
site:amazon.com and, sure enough, I retrieved a wide selection of wireless headphones within my price
range.
Note that Google is smart enough to recognize decimal points - some of the items I retrieved weren't an
even dollar amount but were, for example, $57.83. This feature could also come in handy if you are
looking for a mention of a range of years.
* Speaking of date-searching on Google, you can limit your search to only those pages added or changed
within the past [whatever] days. This can be a useful feature if you re-run a search regularly; just limit your
search to the pages added or modified since you last ran your search. You can do this not by adding text
in the search box but by modifying the search results page URL by adding the following text to the end of
the URL and clicking [Search]: &as_qdr=dn (where n is the number of days you want searched)
So, for example, to limit my search to the last 18 days, I would add &as_qdr=d18 to the end of the search
results page URL.
Keep in mind that this isn't a perfect date-limiting search. Some web content management systems
automatically refresh a web page frequently, without necessarily making any changes to the page. Those
pages will have a recent date but the content within them may have been unchanged for months.
* If you are based in the US, you can search for local companies through your cell phone, regardless of
whether or not your phone has web capability. If you call 1-800-GOOG411 (1-800-466-4411), you will be
asked to say the city and state you want information on - Boulder, Colorado, for example - then you say
the type of business or specific business name you want - for example, "book store" or "Barnes and
Noble". A text-to-speech program will read you the top eight results from its local search
(http://local.google.com). If you want, Google can automatically dial any of the first eight businesses'
phone number, or you can ask to have the address and phone number read to you.
You can also get quick answers to simple queries by texting Google from a US cell phone. Send a text
message to 466 453 (GOOGLE) and then type your query in the text box and send it. Within seconds,
you will receive a text message with one of Google's Quick Answers. The default is for Google to take
your query and attempt to find a Quick Answer. If you want a search of the web, put the word web at the
beginning of your search, such as web avian flu. This will return you a text message with a snippet of the
first search result, along with a link to mobile-formatted page of the search results. See
http://sms.google.com for more information on this service.
I recently discovered Intelways, a nifty way to search a number of search engines sequentially. It's not a
metasearch engine; it lets you click from one resource to another. Its main claim to fame is that it
categorizes the tools by broad type of search -- general, images, video, news, social (blogs, social
networking sites, social bookmarking sites, etc.), file-type searching, reference, academic, business, tech
and (natch) shopping. (Source: Bates Information Services, www.BatesInfo.com/tip.html )
212
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
PowerSet.com
We have a new player in the semantic search arena; "semantic search" refers to the idea
that a better way to find the most relevant material is to not just look at word frequency,
location, links to a page and so on but to understand the sense of what is being asked and
the sense of what is on web pages, and then to match the most applicable pages. For
example, if I typed in a query for stock, a semantic search engine would see that this was in
the context of livestock, and would find other pages that have to do with animals on farms
rather than about shares of ownership in a company, flowers, or racing cars.
PowerSet uses a technology that attempts to mine meaning out of web pages -- specifically,
Wikipedia articles. This isn't a general-purpose search engine, but it is a tremendous tool if
you are looking for information on a subject that spans a number of Wikipedia articles, or
that has a number of meanings. Take "Barack Obama" as an example. There are thousands
of articles that mention Obama -- the Wikipedia article specifically about him, as well as
articles about politicians who have endorsed him, his early career, the roles of race and
religion in the US presidential campaign, and so on.
Rather than going through all of those entries, including the extensive article specifically on
Obama, head over to PowerSet and you will get a single search result that pulls together
what it judges to be the most relevant information about Barack Obama. There is a nice
summary of who he is, the key facts about his career, and a relevance-ranked list of
Wikipedia pages that mention him.
What I find particularly interesting is the "Factz" section of the page, which attempts to pull
together significant statements about Barack Obama in the Wikipedia articles. So, for
example, the Factz for Barack Obama include information that he introduced the following
pieces of legislation:
While that isn't a comprehensive list of the pieces of legislation he has introduced, these are
probably the most significant ones, since this list includes only legislation that was
mentioned in Wikipedia articles.
PowerSet is best used for those searches that cover a number of topics or areas. It's not
perfect, and it only searches Wikipedia, but I find it an exciting new approach in the efforts
of search engines to make sense out of web content. www.BatesInfo.com/tip.html
213
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Bing,the search engine formerly known as Microsoft Live Search, has surfaced a number of
its advanced search commands. Some of these are new, some simply haven't been
publicized. You can see some of Bing's features in its Advanced Operator Reference, a
minimalist page that lists operators and, with another click, gives a brief description and
example of when the operator could be used.
Contains: specifies that any page retrieved has links to specific file types. Syntax is
contains:files_type Example: apiculture contains:ppt This is not a search within
pages of those file types; the example here is looking for pages that both contain the
word "apiculture" and have links to files with the .ppt extension. Other file type
extensions you can search for include doc, pdf, ppt, rtf, txt and xls.
HasFeed: specifies that any page retrieved has a link to an RSS feed on the page.
Syntax is feed: Example:apiculture hasfeed: As with the contains: command, this
isn't searching within RSS feeds; this search finds pages with RSS feeds on them.
Norelax: lets you specify that all your search terms, not just the first four, be
included in the query. Syntax is norelax:search_word Use this operator to indicate to
Bing that all words in your query must be weighted equally. This tells Bing not to
"relax" its Boolean AND for the fifth and subsequent words in a query. If, for
example, you are creating a more complex query and want to ensure that Bing treats
all words as mandatory, you could search "west nile" mosquito non-toxic
norelax:spraying, using norelax: to make the search word spraying mandatory.
Yahoo! has an experimental service called Correlator, part of its Sandbox area where Yahoo
tries out new ideas. This particular demonstration is useful for research brainstorming; it
gives you information -- not just search results -- that can help you get a better sense of
the various aspects of an idea.
At its core, Correlator is a sophisticated tool for mining Wikipedia; its default search results
page groups Wikipedia snippets by category. The search query "lithium ion batteries", for
example, gives me information organized into areas such as rechargeable batteries, electric
vehicles, and electric batteries. But what's more interesting is that below the search box are
icons for Names, Places, Events, Concepts, News and Answers.
When I click the Names icon, the result is a dynamic word cloud and list of frequently-
occurring names (geographic, personal, company, etc.) related to lithium ion batteries.
214
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
Clicking the Places icon displays a map of the world, with flags in areas that are significant
in the context of lithium batteries, such as China (manufacturing), Austin (research and
development), and Chicago and Japan (which both have tests of lithium battery-powered
vehicles). This alone gives me ideas on where to look next -- local Chicago and Japanese
papers, for example, if I want to know what is past the drawing board stage.
The Events icon displays a time line of events, again culled from Wikipedia, pertaining to Li-
ion batteries. This helps me see, among other things, the speed with which Li-ion batteries
have been incorporated into various devices. The News icon produces snippets from 20 or
so recent stories in Yahoo News on the batteries. Clicking the Answers icon runs my query
in the Yahoo Answers database; since Yahoo Answers tends to be consumer-oriented, the
results help me identify the most common consumer concerns regarding batteries. The
Concepts icon produces another dynamic word cloud and list of key words and phrases from
the relevant Wikipedia articles. Of all the icons, this is the most variable in terms of
usefulness.
While limited to Wikipedia results, I have found Yahoo Correlator to be a quick way to see
the wide range of possibilities for me to explore with a new concept.
215
Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract
216