Friday, June 29, 2012

PALESTINIAN MISSILES THREATEN ISRAELI TOWN


The PIJ has found a weak spot in the Iron Dome. A while back, the defense system missed most of the missiles that were fired from Gaza because they were launched almost concurrently. Guerrillas used truck-mounted Grad launchers, reportedly coming mainly from Libya. Israeli citizens wanted to know how many rockets the Iron Dome can deal with simultaneously—in reality, not in theory.




Click to learn more!
Last Tuesday night, however, the Iron Dome worked better. Four Palestinian Grad missiles were aimed at Netivot and launched from the Gaza Strip. Iron Dome destroyed two of them; two others exploded on open ground.The video (Below) shows a Palestinian attack with Grad missiles.




Click to learn more!
OSINT News hopes the IRON DOME system will get even better, for the sake of the children living in Netivot. There are over 22 schools and 4,243 students in the city- 16 elementary schools with 3,053 students, and 11 high schools with 1,190 students. They are a bright group of children! Netivot's schools were chosen for a special pilot project in which elementary school children built their own mini-robots. Last year, Netivot  hosted a robotics festival sponsored by the international organization FIRST (For Inspiration and Recognition of Science and Technology). Also, the city hosts the Mandel Center for Leadership in the Negev (MCLN) and runs a a two-year community-based leadership program in Netivot.
300x100 - NOOK Tablet™ 8GB

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

Wednesday, June 27, 2012

SENIOR COUNTER- INTELLIGENCE ANALYST POSITION OPEN!

An AFIO WIN was sent to OSINT News, and it posted a clip about the Walsingham Group and its search for a Senior Counterintelligence Analyst (SCA) to provide real-time 24/7/365 support at AFG deployed location. The SCA will perform all CI duties and serve as advisor on an intelligence analytical team of military and/or DoD civilian analysts in support of the CJ2X and/or CJ2 analytical requirements.
Note: OSINT News is posting this application for free because we believe a formidable counterintelligence capablility is needed to stop future terrorist attacks.

If you're hired to fill this SCA position, you will provide quality control of CI and CST reporting, identify emerging trends and patterns from CI and CST reporting, develop all-source association matrices on screened individuals of CI interest, construct link diagrams and other data visualization tools, conduct priority intelligence requirements (PIR)/Host Nation Information Requirements (HNIR)/information requirements (IR)s indicator analysis to focus collection efforts, develop and sustain a CI/HUMINT situation map (SITMAP) using existing technologies, support the Senior CI/HUMINT Special Advisor and the supported command CJ2Xs, conduct HUMINT, and multi-discipline CI analysis and mission analysis for the supported commander.

As a Senior Counterintelligence Analyst, you will also be responsible for researching, developing and presenting Counterintelligence and/or intelligence products at the operational and strategic levels for senior leaders, to include counter-terrorism, HUMINT, SIGINT, counterintelligence, force protection and Afghanistan and South West Asia regional issues, political/military analysis and support to targeting.

Interested? Think you qualify? Contact the Walsingham Group, Inc. A Service-Disabled Veteran-Owned Business 1000 Centre Green Way, Suite 200, Cary, NC 27513; 919-228-6472 office; 919-228-6501 fax; www.walsinghamgroup.com

Qualified applicants can send their resume to careers@walsinghamgroup.com

300x100 - NOOK Tablet™ 8GB

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

Sunday, June 24, 2012

GREAT OSINT SOURCE: THE AIR FORCE HISTORICAL RESEARCH AGENCY

The Air Force Historical Research Agency is a great OSINT resource. They maintain 70 million pages of USAF documents. Currently, over a half million of these documents are available online. It has a handy SEARCH engine, where you type in your search terms.

From their Website: "The Air Force Historical Research Agency is a national treasure whose dedicated staff preserves the important history of the United States Air Force and its predecessors. The U.S. military fully recognizes the strategic value of documenting and teaching lessons learned and operational analysis. AFHRA helps preserve the hard-won information contained in pages of historical records and in volumes of oral histories. Beyond that, support provided by AFHRA regularly helps today's Air Force accomplish its missions and operations. AFHRA also commemorates the individuals and military units that in some cases were called upon to achieve the impossible because it needed to be done."

OSINT NEWS uses the AFHRA site for much research and article-writing, including the story, "U2 Spy Plane Still Spying".

300x100 - NOOK Tablet™ 8GB

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

Saturday, June 23, 2012

EX-CIA SPY PLAME CONSULTANT FOR DOCUMENTARY: "COUNTDOWN TO ZERO"

Valerie Plame (Wilson), the CIA case officer outed by Dick Cheney, Scooter Libbey and Karl Rove during the Bush administration, is promoting a new movie/documentary. French journalists interviewed Plame during its premier showing: "Countdown to Zero". It focuses on non-proliferation of nuclear weapons and was screened at the Cannes Film Festival. Plame is a consultant behind the movie on the global will to stop the spread of nuclear arms. As you know, Valerie Plame was a CIA agent whose mission was to fight the spread of nuclear arms. After her identity was exposed in the White House Scandal, she turned to film-making, yet retained the same ideals. OSINT News wrote an article on her outing, called "White House Leak Made All Americans "Fair Game".
Learn more
All employees of the Central Intelligence Agency must sign a confidentiality agreement that requires that they submit their writings to the CIA for prepublication review. Valerie Plame Wilson, whose work for the CIA entailed covert operations, of course abided by this agreement, and her manuscript was reviewed by the CIA and returned to her with numerous redactions — cuts — that the CIA determined were necessary. Many of these cuts related to material that would disclose Ms. Wilson's dates of service, information that has already been widely disseminated.

As has been reported, Simon & Schuster and Ms. Wilson brought a legal action against the CIA; we felt that the redactions required by the CIA went beyond any reasonable requirements of national security and impaired important First Amendment rights. A federal district court has disagreed, determining, essentially, that while Ms. Wilson's dates of service may be in the public domain, they cannot be reported by Ms. Wilson. Accordingly, Ms. Wilson's portion of this book contains only that information that the CIA has deemed unclassified and has allowed her to include.
Many sections of Fair Game (Above left photo) that have been blacked out indicate the places where the CIA has ordered cuts. Still, even with these substantial redactions, the book still conveys the power of Ms. Wilson's story. However, an afterword by reporter Laura Rozen was legally done and is intesting to read, for it uncovers much of what she (Plame) was unable to publish (Nothing that interferes with national security). Drawn from interviews and public sources, it provides historical background and recounts portions of Ms. Wilson's life and career that she was unable to include herself. When the afterword is read together with Fair Game, a full and vivid picture of Valerie Plame Wilson emerges. Ms. Wilson has had no input or involvement in the creation of the afterword, which she has not seen before the publication of this book.
Audio Book- Learn more


300x100 - NOOK Tablet™ 8GB

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

Friday, June 22, 2012

A NUCLEAR IRAN'S TERRORIST PROXIES THE REAL THREAT!

Last year Tehran announced that 20 suspected nuclear scientist assassins were detained. Iran’s Intelligence Minister Heidar Moslehi said 20 members of an alleged Israeli plot to assassinate Iranian nuclear scientists were under arrest. He said they were about to travel between Israel and Iran through a third country, identified by Iranian sources as Azerbaijan. This is merely symptomatic of how close the US, Israel and Iran are on to a collision course over the Persian state's nuclear weapon development.


Tehran newspapers also report that the assassins of nuclear scientists Mostafa Ahmadi-Roshan and Majid Shahriari have been arrested and that the terrorist acts were engineered by Israeli spies and conducted by their "mercenaries in Iran". Interestingly, the CIA has recruited spies inside Iran as well.

Ahmadi-Roshan, who received a master’s degree in chemical engineering from Sharif University of Technology and was an official at the Natanz nuclear enrichment facility, was assassinated in Tehran on January 11, 2012. Majid Shahriari, who was a professor at Shahid Beheshti University, was assassinated in Tehran on November 29, 2010. In both incidents, terrorists riding motorcycles attached magnetic bombs to their cars.

The report referred to Iran‘s intelligence agents as “The unknown soldiers of Imam Zaman”. The first terrorist act conducted against Iranian nuclear experts occurred on January 12, 2010 in Tehran when particle physicist Masoud Ali-Mohammadi was assassinated. A remote-control bomb attached to a motorcycle parked in front of his house was detonated just after he left his home.


Iran's Intelligence Ministry said that after the first nuclear expert was assassinated, it launched an intensive and comprehensive intelligence effort, and later redoubled and expanded these efforts, eventually gaining intelligence on a number of Israeli intelligence and operational bases and stations.

They managed to identify a number of Israeli spies and their mercenaries in Iran. Later, Iran stated that it was able to follow up on clues in Iran and abroad, which finally led to the identification of key elements behind the assassinations and their arrest.

I believe that Iran's acquirement of nuclear weapons is not the real danger. The chilling thought is that they would provide nuclear weapons to terrorists. A suitcase bomb or a "dirty radioactive" bomb with high-grade plutonium could be detonated inside Israel, or America. This possibility would create angst and a continuous state of apprehension for Americans, Europeans and Israelis. No population deserves to live in such an atmosphere where mass casualties could be done by proxy, and Iran has demonstrated how deft it is at terrorism via its terrorist proxy, Hezbollah.

Look at the facts. Hezbollah has plotted to murder Jews in Azerbaijan, Thailand and Bulgaria. CIA analysts and intelligence experts believe Greece is another venue for Iran's proxy terrorist hits...via Hezbollah.



I believe all western governments will be on Iran's hit list if it develops nuclear weapons...or even high-grade plutonium that could be detonated inside a "dirty bomb". There is no doubt that Hezbollah or al Qaeda cells would adopt Iran's wishes with relish.

Iran's nuclear scientists have been assassinated by foreign intelligence services. Israeli, American, and Saudi Arabian intelligence is extremely on edge over Iran's nuclear ambitions. Of course, Iran has an inclination to assassinate those it dislikes. Ironically, Iran's assassinations open up CIA recruiting channels for new spies.



Robert Morton, Ed., Ed.S. is a member of the  Association Of Former Intelligence Officers (AFIO) and writes the online spy series "Corey Pearson- CIA Spymaster in the Caribbean." Got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

DAILY UPDATES ON EVERY SPY AGENCY ON EARTH!

OSINT News is gradually creating a Spy agency Info-Network on every intelligence agency on earth. Here's how to use it:
1. Scroll down the right margin to "TODAY'S HEADLINES ABOUT ANY INTELLIGENCE AGENCY ON EARTH- UPDATED DAILY!".  There you'll find an alphabetically-listed number of "COUNTRIES WITH SPY AGENCIES." Each country is assigned a number. Scroll further down the right margin and find that country via its assigned number.

2. All intelligence services operating for that particular country are listed.

3. Click on the intelligence service and newspaper, journal, and magazine articles about that country's spy agency appear. These resources are updated daily!

Note: Translator services- Scroll to earth photo in right margin to "TRANSLATE FOREIGN LANGUAGE SPY NEWS TO ENGLISH". Most of the Spy agency resources are written in English; however, some are not. Simply cut and paste the article text into the Translator if it is written in an unfamiliar language, to be translated into English or other languages.

Here's the countries we have thus far with their assigned number:
(1) ARGENTINA
(18) AUSTRALIA
(2) BELGIUM
(3) BRAZIL
(4) BULGARIA
(6) CANADA
(7) CZECH REPUBLIC
(8) DENMARK
(24) EGYPT 
(9) ESTONIA
(10) FINLAND
(11) GERMANY
(5) GREAT BRITAIN (MI-5 and MI-6)
(12) GREECE
(21) HAITI
(13) HUNGARY
(19) IRAN
(14) ISRAEL
(15) ITALY
(16) JORDON
(23) NORTH KOREA
(20) SYRIA
(22) TURKEY
(17) ZIMBABWE
Note: More countries are added each week
300x100 - NOOK Tablet™ 8GB

Robert Morton, M.Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO) and writes about the U.S. Intelligence Community (IC). A portion of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

Tuesday, June 12, 2012

THE ULTIMATE COUNTERTERRORISM WEAPON: INTERNET BOOBY-TRAPS

OSINT News uses this resource to look up the address of any IP number: IP Number Address. I'm sure our Intelligence Community (IC) already does so, but tracking down locales and specific addresses of certain visitors to Blogs and Websites of interest may prove fruitful. Each of the hundreds of millions of computers on the global Internet has a unique number assigned to it...the IP address. Without a unique IP address assigned to your computer, you cannot communicate with other devices, users, and computers on the Internet...nor can terrorists. It's akin to a telephone number, each one representing a way to reach you and no one else.





IP addresses are 32 bit binary numbers that consist of four decimal numbers, each between zero and 255, separated by periods. It is common for a router to have an IP address and for the router to act as the front man for many computers on a Local Area Network (LAN). Each computer hooked up to the LAN is connected to the outside world by the router. So, a single IP address, assigned to the router, is shared by many computers. Because of this, there’s no way the outside world can ID one computer on the LAN from another.

However, the outside world can communicate with the router you use, and chances are you’re sharing your wireless network with your neighbors. Hmmm...that makes a radical Islamic cell slightly less identifiable and anonymous. If a "bad guy" gets on to your wireless network and does something illegal, law enforcement may knock on your door...or everybody's door who shares the same wireless network as you. All computers on the LAN have the same public IP address, which is that of the router.

Another neat site to detect an IP address location is MyIPTest.  

Interestingly, ex-Governor Palin’s Yahoo email account was hacked and they can‘t seem to find out who the culprit was. Read Palin’s Yahoo email hacked.


Ever think about how the Intelligence Community (IC) could apply the IP number address finders to help protect America even better? For example, they could create a "front" Blog or Website that would attract radical Islamists, lone wolves, or terrorist sympathizers. Daily posts could be written on the site about timely information that these "bad guy" Internet surfers couldn't resist reading. A StatCounter application could be hooked into the site (takes about 4 minutes to install) that would provide the IC's counterintelligence and counterterrorist officials with the following information on every visitor to their site:
  1. The entry page
  2. The exit page
  3. Their IP address
  4. Where they came from around the world to visit the site
  5. The particular post they read
  6. How long they stayed on that particular post (visit length)
  7. How many times they returned to visit the site (returning visits)
  8. Which search engine they used
  9. Their address on a Google map
  10. ISP stats
  11. HTTPS tracking
By simply creating a "terrorist-friendly" Website and installing this one, free application to it, our IC's counterintelligence and counterterrorism officers could obtain a plethora of information on the site visitor's addresses, their system settings, what link referred them to the site and their navigation path through to the site. The IC officers would also learn the Internet pathways preferred by the "bad guys".

Applications such as StatCounter also have a Keyword Analysis that OSINT News believes would be of use. Keyword Analysis is normally used by lay Blog or Website owners to find the search engine words people use to find their site, in order to increase traffic by making sure these same words are typed into the site's post titles. However, the IC could use it for another reason: Intelligence professionals could learn what key words the "bad guys" use to find the "front" site or specific articles posted on it. Chances are, they're using these same word combo's to find useful information on other sites on the Web. So, in a reverse strategy, IC officials could learn key words that the "bad guys" are using at a particular time and specific article and Internet blogs and Websites they obtain upon using them in search engines. 

Also, by installing the "+1 Button" and "Google plus Badge" applications, the IC to discover what friends the "bad guys" are connecting to and what information they desire to forward to them. 

Any ideas on how our Intelligence Community (IC) can use IP addresses, StatCounter applications, or other applications, for counterintelligence and counterterrorist usage? Share your thoughts on the Secure Contact Form and OSINT News will  publish your ideas. Please include your name if you want to receive credit for your idea(s).

We recommend the resource "Security Informatics and Terrorism"(below),which is intended to be of interest to the IC's counterterrorism experts and professionals, to academic researchers in information systems, computer science, political science and public policy, and to graduate students in these areas. The book highlights several aspects of patrolling the Web that were raised and discussed by experts from different disciplines. It includes academic studies from related technical fields, namely, computer science and information technology, the strategic point of view as presented by intelligence experts, and finally the practical point of view by experts from related industry describing lessons learned from practical efforts to tackle these problems.


Learn more
 
The book (above) is organized into four major parts: definition and analysis of the subject, data-mining techniques for terrorism informatics, other theoretical methods to detect terrorists on the Web, and practical relevant industrial experience on patrolling the Web. 

300x100 - NOOK Tablet™ 8GB

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIOIC). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

Sunday, June 3, 2012

FORMIDABLE COUNTERINTELLIGENCE CAPABILITY NEEDED TO STOP TERRORIST ATTACKS

Learn more
The U.S. needs a domestic, counterintelligence agency. Since the breakup of the Soviet Union, we haven’t transformed our internal and international structures to effectively battle radical Islam. The UN, single and independent states NGO‘s, international laws, etc. are all geared to the Cold War and life after WWII. These entities are not equipped to battle al Qaeda, Hamas, or any one of dozens of extreme and radical Islamic cell bent on replacing democratic institutions with a sharia law-driven government. We continue to use “Cold Tools” and out-dated thinking to handle the new problems in fighting al Qaeda. They are not the traditional enemies we defeated. It would be nice if President Obama could pick up his Blackberry and summon Osama bin Laden, Abu Nidal, Ayman Al Zawahiri, Carlos the Jackal, or Hafiz Mohammad Saeed to a UN Security Council meeting or to Camp David for a one-on-one with President Obama where they are given some ultimatums and conditions to conduct global business with. 


Learn more
You can do this with a President, Premier, or any head of State that presides over a populace. But, radical Islamic terrorist groups have no State. We can’t impose sanctions over an organization with no formal currency, economy, territory, traditional army, or financial system, borders. We can’t attack al Qaeda’s territory because they don’t own any…they’re merely tenants in foreign lands. The way we organized for our safety in years past are no longer applicable. Our economic, diplomatic and military leverage is passe. With terrorism, there’s no state to leverage against them or to negotiate and work with them via the “carrot” of foreign aid. We used nuclear weapons as deterrents in the Cold War, called “MAD”- Mutually Assured Destruction. Even the MAD concept is passé. Now, a small suicidal terrorist cell could detonate a suitcase nuclear bomb or radioactive “dirty” bomb in downtown Manhattan.

We’re using a mandarin system which is unproductive in penetrating self-autonomous, leaderless terrorist cells that stretch around the world and communicate via Internet, fax machine, and cellular phone to plan future attacks and to quickly swarm together to strike inside America. Only an effective counterintelligence capability can uncover terrorist cells that believe martyrdom and certainty of paradise can be reached…by detonating “dirty” radioactive bombs, biological or chemical weapons…whatever…inside America.

Our “Cold Tools” and out-dated thinking of 50 years ago no longer apply. Our war machine, diplomatic actions, our international law and NGO’s operating worldwide are designed for a different world in the post WWII era. None of them are effective anymore. So, we resort to protecting our assets, in beefing-up security measures around the world to protect our belongings. We talk about “hard” and “soft” targets and how to shield them. Instead, we should be go on an aggressive offense and develop the most effective and deadly counterespionage machine ever invented…one focused on radical Islamic terrorists. We need to end reacting…and begin acting. We need to determine in advance what our enemy’s plans are and counter them with deadly force before they materialize. 
Learn more
America’s “seamless” border is splintered by distinguished drug and human-trafficking pipelines. Her heartland greets countless flights arriving each day from Europe, Asia and the middle east. Terrorist cell members fly around the world, and into America, carrying incomparable false passports and visas. The fact that radical Islamic Muslims bent on killing westerners and toppling democratic governments can travel around the globe so easily, incognito, is further reason to develop a redoubtable counterespionage service that can identify quickly and globally, anyone traveling around the world using another name, in disguise, undercover, or carrying false documents. No longer should anyone be allowed to slip through the cracks.








The way to prevent radical Islam from developing sleeper cells in America and to deter massive attacks is through intelligence… by creating a formidable counterintelligence force. True, we must continue on the defensive in some areas, such as hardening targets that terrorists would enjoy blowing themselves up to destroy, like the White House or Capital building. But, what about the “soft targets” like hotels, stadiums and the hundreds of places Americans gather? It was good counterintelligence that exposed the terrorist cells in Lackawana, NY. Likewise, first-rate counterintelligence unearthed the organizations in Virginia that were a hop, skip and a jump from CIA HQ and were financing terrorist cells. For the sake of brevity, I won’t mention a dozen other instances where CI probably saved American lives. I only wonder what may these arrested cells have done to harm America’s heartland down the road? The U.S. has a serious problem with al Qaeda sleeper cells and other terrorist organizations, as well as their fund-raising capabilities.

300x100 - NOOK Tablet™ 8GB

Robert Morton, M.Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIOIC). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form