This article refers to data mining social networking sites to identify the 'hidden' threat and the more conventional post-arrest work:http://www.washingtonpost.com/wp-dyn...l?hpid=topnews
This article refers to data mining social networking sites to identify the 'hidden' threat and the more conventional post-arrest work:http://www.washingtonpost.com/wp-dyn...l?hpid=topnews
davidbfpo
Social networking can be a double-edged sword (or a source of disinformation, if you're slick)
http://www.jpost.com/Defense/Article.aspx?id=201058The IDF has stepped up its war on Facebook, warning officers throughout the military that the social network site could be used by the country’s enemies to glean classified information.
In a letter sent recently to all commanders in the army from the Operations Directorate, officers were urged to inform their subordinates about the risks that exist on websites such as Facebook.
The letter was sent out following the online publication of a list of officers and soldiers featuring their photographs, names, addresses and other personal details under the title “Israeli War Criminals” for their actions during Operation Cast Lead in the Gaza Strip two years ago.
According to the Operations Directorate, most of the information on the list was authentic and came from two sources – civilian databases such as phonebooks and social network sites such as Facebook.
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail
http://i.imgur.com/IPT1uLH.jpg
If you're talking you are leaking information. You can have a completely unclassified innocuous conversation and leak classified information all the time. Utilizing a variety of analysis techniques and the Internet items that are part of public affairs can be used to gather information. What ship is sent to see, who got promoted, and other details leak substantial details about operations. Since the Internet allows for a deeper dive into repositories of data then was ever available before you can construct substantial dossiers of seemingly disjointed information that then can mean something. I talk about the principles in detail here.
Sam Liles
Selil Blog
Don't forget to duck Secret Squirrel
The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.
Hat tip to JIOX linking to this blog article 'How 'Open-Source Intelligence' Sculpts Targeted Attacks':http://www.internetevolution.com/aut...&doc_id=202619
Which commended this:The presentation is a video of a session, nearly an hour and is called 'Using Social Networks To Profile, Find and 0wn Your Victims':http://www.irongeek.com/i.php?page=v...Your%20VictimsIt was an eye opener, describing how various online applications can be used to data mine personal information and turn it into OSINT.
davidbfpo
Bookmarks