Sunday, September 18, 2011

CIA'S NEW RECRUITS IMPRESSIVE!

This post has been updated! Please go to "9/11 TRANSFORMED CIA" to read about the new CIA recruits.    

Saturday, September 17, 2011

OSINT- 5 GREAT COMPUTER HACKING ONLINE COURSES

Hacking is legal when you use it to secure your own network. It's called "Ethical Hacking" or "White Hat" hacking and uses various common and readily available hacking tools and techniques to audit your network so you can locate and close security holes. Whether you're running a small home network, are an OSINT-gatherer like myself, or you're an enterprise network administrator, we recommend four courses to teach you how to better protect your system against those who wish to gain unauthorized access, and also to teach you skills in computer hacking for your OSINT-gathering effectiveness.

Enroll online- Course No. 1
Course No. 1 OSINT News recommends the Education To Go course on Ethical Hacking (click left photo). They are the industry leader in online learning and partnerships with over 1,800 colleges and universities to provide high-quality courses.

Hackers know the complex method of electronic breaking and entering. In this Ed2Go course you'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. You'll follow packets of data from one point to another through an entire network, and find out where the flaws exist for data loss and security breaches. You'll discover the role of the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. And you'll find out how private data can quickly become public knowledge.

Order online
Hackers are costing businesses around the globe several billions of dollars every year. Don't become part of that sad statistic. Sooner or later, you know that somebody is going to try and break into your network. Why not learn how hackers think so you can harden your defenses against them?

You can also learn hacking skills to enhance your OSINT-gathering capabilities...without breaking the law! Many OSINT-gatherers feel the life-long skill of computer hacking will enhance their effectiveness. Well, they're right. If you want to take formal coursework in computer hacking, remember that there are quite a few different types of ethical hacker courses out there. They fall into several basic categories. According to one expert, "Penetration Testing" is the most common and potentially important course you should take. It involves "ethical hacking."

Course No. 2: OSINT News also recommends the Ethical Hacking Training Program from Innobuzz

There are also classes in "reverse engineering of software", especially malicious software such as viruses, Trojans, and other malware. Some ethical hacker courses are also applicable to other types of careers, such as forensics classes that teach students about finding and constructing metadata from various types of computer files.

A number of schools teach a myriad of different ethical hacker courses that teach you how to hack into computer systems and networks in a way that is responsible and applicable to beneficial hacking by “white hat” hackers. For example, one course teaches "Penetration Testing", where you are trained how to look for weaknesses in a computer system or network and then launch a simulated attack against that system to exploit those weaknesses.

The INNOBUZZ Eithical Hacking teachers have served companies like COLT Telecom, Fidelity Investment, Tata Group, DLF, Unitech, Exchange4media, Arya Ventures, IIT Delhi, Fiat, IBM, and SpiceJet. His most popular information security and hacking training goes in-depth into the techniques used by malicious, "Black Hat" hackers with attention-getting lectures and hands-on lab exercises. True, you can use the hacking skills for malicious purposes, but his classes emphasize hacking techniques to perform a white-hat, ethical hack, on your own organization. In sum, when you take this formal coursework, you finish with the ability to quantitatively assess and measure threats to information assets and discover where your organization is most vulnerable to hacking, in real time, throughout this network security training course.

Course No. 3: Black Hat hackers are always changing their tactics to get one step ahead of the good guys and OSINT News also recommends InfoSec Institute. You will learn how to protect your organization's networks and systems and, in particular, we recommend the 5-day long, Expert Penetration Testing Course. This particular course by InfoSec Institute notes, "Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear --- but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?"

InfoSec Institute also offers an Advanced Ethical Hacking Boot Camp, where you learn how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks. 

Enroll online- Course No. 4
Course No. 4: OSINT News recommends the eLearnSecurity Certified Professional Penetration Tester (eCPPT) is an Ethical Hacking and Penetration Testing Professional certification offered by eLearnSecurity. (left photo) Here's why this particular program impressed us- the eCPPT exam requires you to carry out a real penetration test against a target and to build a penetration testing report. The eCPPT is currently the only security certification requiring the penetration of real targets and the production of a penetration testing report.The eCPPT exam can be taken within 120 days from the date of enrollment in the Penetration Testing Course - Professional. Penetration Testing Course is the distance learning course delivered in e-learning format dubbed as "What CEH should have been".
  

Enroll online- Course No. 5
Course No. 5: OSINT News recommends obtaining Certified Ethical Hacker (CEH) credentials through this program: Preparing for the Certified Ethical Hacker (CEH) Exam Video Mentor. (left photo) This online course is mostly visual and goes step-by-step for six hours through personal video mentoring and discussion by Shon Harris, CISSP, MCSE. Harris is   President of Logical Security, a security consultant, a former engineer in the US Air Force Information Warfare unit, a security instructor for clients such as the U.S. Department of Defense and National Security Agency (NSA), and author of the world's best-selling CISSP book, CISSP All-in-One Exam Guide, now in its Fourth Edition.

She is recognized by Information Security Magazine as one xof the field's top 25 women, and specializes in helping clients develop secure enterprise infrastructures, security governance, and enterprise wide risk management and control programs. She was contributing author to Hacker's Challenge and Gray Hat Hacking.


This DVD package (upper left photo) is part of the new Shon Harris Security Series, products that will include the right resource for every CEH candidate, regardless of your learning style. In addition to this DVD, they will deliver CertPrepOnline, FlashCardOnline, Online Course, and Cert Snack offerings. It's the best of classroom training for a fraction of the price.
Order online
There are many Online Learn Ethical Hacking Programs available out there. Make sure the training courses are geared to your sophistication and knowledge level. If you are a neophyte in this field, call them on the cell phone and talk with them, personally. They will steer you to an appropriate entry-level course. For beginners...start at the beginning! Sign up for an Ethical Hacking Training Program that covers the basics in each area of Information Security. Remember, learning goes from the known to the unknown, especially in regards to Ethical Hacking.
Order online

Unfortunately, there are many unscrupulous hackers out there. They conduct malicious network intrusions with their cutting-edge techniques. their demented minds target systems, defeat production schemes, write malicious codes, exploit flaws in Windows and Linux systems, and send out malware and rootkits using honeypots and Sandboxes... the list of their endless efforts to disrupt the WWW is overwhelming. With the threats of cyber terrorism and corporate espionage increasing, the need for trained network security professionals continues to grow. OSINT News hopes these five recommended resources will help you in developing penetration-testing tools and techniques to protect your computer network, and that of your employer's as well- whether it be a business or member of the Intelligence Community. Good luck in your endeaver to become an ethical hackers and security tester! 

Want a great site to define what a Hacker is? click HACKER.

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. OSINT News is always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the secure Bpath Mail Form

Friday, September 16, 2011

OSINT SUGGESTS US-PAKISTAN RELATIONS IMPROVING

Farhan Bokhari, a JDW Correspondent in Islamabad believes the recent increase in al-Qaeda arrests points to warming of US-Pakistan relations'. According to Bokhari's sources in Islamabad, Pakistan and the United States have quietly resumed intelligence-sharing co-operation and are actively discussing ways to rebuild the military co-operation that was curtailed in May after US special forces killed Osama bin Laden in the northern Pakistani city of Abbottabad, high-ranking Pakistani and Western defence and security officials have told Jane's .


Tangible evidence on the resumption of intelligence and possible military co-operation came on 5 May when Pakistan Army and US officials revealed the arrest of Sheikh Younis al-Mauritani, a high-level Al-Qaeda militant, outside the western Pakistani city of Quetta. Significantly, both sides confirmed that the arrest had been carried out in a joint operation by US and Pakistani intelligence services.


Analysis
The arrest of Sheikh Younis al-Mauritani and the 10th anniversary of the 9/11 attacks reinforce the importance to the US of security co-operation with countries like Pakistan that are home to Islamist groups and others intent on launching terrorist attacks against Western nations.


The anniversary of the attacks on the US mainland also serves to highlight the major change in security priorities for Washington over the past 10 years – and the convoluted relationship it has had with Islamabad since the mid-1960s.


Pakistan remains suspicious of US intentions and regularly contrasts the relationship with China's 'all-weather friendship'. The Bin Laden raid and its fallout brought this into sharp relief, although Pakistan's attempts to cosy up to its eastern ally were treated with a certain amount of detachment by Beijing.


The drawdown of US forces in Afghanistan and their eventual combat withdrawal in 2014 will probably alleviate US-Pakistan tensions. However, the reduction in US interests in Afghanistan also risks restarting the cycle of neglect and self-interested intervention that has characterised US policy towards Pakistan since ties were first established.

Emergency Essentials/BePrepared

Note: The content and analysis of this article was conducted by Farhan Bokhari, a JDW Correspondent in Islamabad, not by OSINT NEWS. However, we discovered this article and other information about the warming of U.S./Pakistani relations after reviewing Pakistan News, Pakistan Dawn, and One Pakistan, three of Pakistan's top newspapers. OSINT analysts would enjoy a site that accesses many foreign newspapers, that print editions in English at Foreign Newspapers

Lowest Prices on the web at CheapHumidors.com!

Wednesday, September 14, 2011

CIA RAMPS UP OPERATIONS IN YEMEN

This post has been updated with new findings. Read "CIA In Yemen For Long Haul"



OSINT CRITICAL SOFTWARE AND WORKSHOP ON METHODS & TECHNIQUES TRAINING PROGRAM

Funny thing about OSINT information gathering. Most people do it every day, they just don't know they're using Open Source Intelligence (OSINT) analysis. OSINT has been around for a long time, and is the starting place for the CIA's analysts. Unlike Human Intelligence (HUMINT) or Signals Intelligence (SIGINT), intelligence professionals don't wear epaulets with "OSINT" warrior pinned on their lapels. There's no real Intelligence Community (IC) occupational specialties formally named the  "OSINT UNIT". Yet, within the intelligence community, it is  rapidly increasing due to the explosive growth of Information Age technologies. With 3.5 billion people accessing the Internet today, life as we know it is radically changing. Experts estimate there are over 50,000 extremist and terrorist web sites alone.

OSINT NEWS recommends high-quality data mining software tools. SIMCA-P+ has been used by scientists, researchers, product developers, engineers and others who have huge datasets to cope with. Click the mouse a few times and the OSINT data you collect transforms into information you can use. It's user-friendly and has powerful visualization and the Workset Wizard and Analysis Advisor guides you through all necessary steps from data to information. It's easier than Turbo Tax! A  Report Generator creates a report with all the plots and necessary explanations, making it easier for you to add your deductions and conclusions.

Data analysis is much easier with SIMCA-P+.

Everyone is collecting data on the internet and most end up with raw, disorganized, thus inapplicable information. OSINT NEWS recommends that novice and professional analyzers read how to make that information meaningful: to organize, filter, and analyze it. 

Anyone can apply data analysis tools and get results, but without the right approach those results may be useless. Author Philipp Janert teaches you the right approach, how to think about data. By studying his book "Data Analysis with Open Source Tools", you'll learn how to approach data analysis problems and how to extract all of the available information from your data. Janert covers univariate data, data in multiple dimensions, time series data, graphical techniques, data mining, machine learning, and many other topics.

Janert also reveals how seat-of-the-pants knowledge can lead you to the best approach right from the start and how to assess results to determine if they're meaningful.

Yes, the information passing along at the speed of light on the Internet is vast, almost cosmic in nature. That's why OSINT NEWS recommends OSINT practitioners apply these or other OSINT softwares. You want to program your own pertinent knowledge and separate the wheat from the chaff in the expanding universe of Internet information.

Open Source Intelligence Methods and Techniques Training Program
In conjunction with Reuser's Information Services (RIS), IHS Consulting now offers an Open Source intelligence (OSINT) collection and analysis training service. The program enables Open Source researchers to more effectively collect and analyze information and produce better quality reports. For complete workshop details:  http://www.ihs.com/products/consulting/services/security-risk-assessment/osint.aspx?tid=t2

The week-long Open Source research and analysis training course is designed to assist intelligence analysts and researchers perform the following core tasks: Deconstruct analytical problems, devise collection plans to answer these problems, Identify and access key sources, Assess and analyze various streams of information, Assess and analyze various streams of information, Understand and assess source bias, Synthesize information and insight from varied sources, Produce open source intelligence products. For complete details, click: http://www.ihs.com/products/consulting/services/security-risk-assessment/osint.aspx?tid=t2


Robert Morton, M.Ed., Ed.S. is a member of the Association For Intelligence Officers (AFIO) and writes about the U.S. Intelligence Community (IC). A portion of Ad revenues generated on this site is donated to the AFIO. His ideas are his own and do not represent those of any organization he's a member of. We will publish your ideas and comments at no charge...for the good of the order! Contact us on the secure Bpath Mail Form.

Monday, September 12, 2011

OSINT NEWS, CIA AND HOMELAND SECURITY ANALYSTS PRAISE "IHS JANE'S"

These are 10 of JANE's excellent OSINT resources for analysts everywhere. Open Source News uses information from IHS JANE'S often to find information way before it appears in the mainstream news media.
10 excellent resources from JANE'S
IHS JANE'S offers intelligence, consultancy and advertising solutions to the defense, national security, law enforcement and transport sectors. The "Jane's News" section is particularly valuable, is free, and offers information that's oftentimes not in the mainstream news media. I consult with their site on a daily basis. "Jane's" is a household work for many OSINT analysts, for it has been in business for over a century and is considered reliable, accurate and impartial in its information and advice. IHS Jane's intelligence is a great resource for the professional OSINT analyst working in the defence, security, public safety transport, law enforcement and for professional in the Intelligence Community (IC).

OSINT NEWS supports IHS Jane’s, for they are the ultimate OSINT supporters of open source intelligence gathering, reporting and analysis.

Emergency Essentials/BePrepared
Robert Morton, M.Ed., Ed.S. is a member of the Association For Intelligence Officers (AFIO) and writes about the U.S. Intelligence Community (IC). A portion of Ad revenues generated on this site is donated to the AFIO. His ideas are his own and do not represent those of any organization he's a member of. We will publish your ideas and comments at no charge...for the good of the order! Contact us on the secure Bpath Mail Form.

Thursday, September 8, 2011

TOP SECRET CIA DOCUMENTS RELEASED ON LOCKERBIE BOMBING

CIA Files Published by PaperlessArchives.com BACM, which are related to the Pan Am Flight 103, Lockerbie Bombing. The heretofore top secret 255 pages of CIA files can be downloaded and viewed for free by clicking HERE.

The files date from 1984 to 1999. These are the most recent files on Pan Am 103 released by the CIA. This set of files is unique because it includes memos on the direct handling of an intelligence source. This type of information is exempt from the Freedom of Information Act (FOIA) and is not often released by the Agency.



Emergency Essentials/BePrepared

Abdel Basset al-Megrahi
The files cover information received by the CIA on Abdel Basset al-Megrahi. Al-Megrahi is the only person ever convicted in the Pan AM 103 case. The Scottish government in 2009 allowed al-Megrahi to be released from custody and returned to Libya, because of his failing health. With the recent fall of Muammar Qaddafi’s regime, there have been renewed calls for al-Megrahi to be returned to Scottish custody or extradited to the United States and put on trial.

Two months before the bombing, a CIA memo found in this set mentions information from an informant about al-Megrahi, who at that time was a Libyan intelligence officer, and the recent removal of explosives he stored in Malta.

The files contain CIA reports created in the years before the Pan AM 103 bombing, covering Libya’s methods of sponsoring terrorism. This set of files covers the practice of supplying weapons to terrorist groups by Libya under Muammar Gaddafi. The files contain information on the assassinations of Qaddafi’s opponents living abroad. One document contains a chronology of Libyan-sponsored assassination attempts from 1980 to 1985.

Memos outline contacts with a Libyan intelligence agent working for Libyan Arab Airlines in Malta. He first contacted the CIA on August 10, 1988. He described Malta as "a primary launching point" for Libyan intelligence and terrorist teams en route to and from Europe.

About Pan Am Flight 103
Pan Am Flight 103 took off from London’s Heathrow Airport on December 21, 1988. The 259 passengers and crew, including 189 Americans, were on their way to New York City. Twenty-seven minutes after leaving Heathrow, at 7:02 PM, while flying over Scotland, a bomb inside the plane exploded. Everyone on the plane and 11 people on the ground in Lockerbie, Scotland were killed. Thus the incident is often referred to as the Lockerbie Bombing.

An article appearing in the May 11, 1989 issue of the Washington Post reported that the Central Intelligence Agency had concluded that the Iranian government was responsible. The CIA believed that Iran hired a Palestinian group operating in Syria to perform the bombing. Eventually responsibility would be attributed to Libya.

On November 14, 1991 the United States and Britain announced criminal charges against two Libyan intelligence officers, Abdel Basset Ali Al-Megrahi and Lamen Khalifa Fhimah. In August of 1998, Libyan leader Moammar Gadhafi announced that his country would accept the United States and British plan to put the two suspects on trial by a Scottish court convened in the Netherlands. On April 5th, 1999 the two suspects were transported from Libya to the Netherlands. After a 40 week trial, on January 31, 2001, a three judge panel returned a guilty verdict against Abdel Baset Ali Mohamed al-Megrahi. The panel acquitted Al-Amin Khalifa Fhimah.

The files can be downloaded for free by clicking HERE



Emergency Essentials/BePrepared

About BACM Research
BACM Research through PaperlessArchives.com publishes documentary historical research collections. Materials cover Presidencies, Historical Figures, Historical Events, Celebrities, Organized Crime, Politics, Military Operations, Famous Crimes, Intelligence Gathering, Espionage, Civil Rights, Civil War, World War I, World War II, Korean War, Vietnam War, and more.

Source material from Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), National Security Agency (NSA), Defense Intelligence Agency (DIA), Secret Service, National Security Council, Department of Defense, Joint Chiefs of Staff, Department of Justice, National Archive Records and Administration, and Presidential Libraries.


Click HERE to view a full documentary on the Lockerbie Bombing of Pan Am Flight 103
Robert Morton, M.Ed., Ed.S. is a member of the Association For Intelligence Officers (AFIO) and writes about the U.S. Intelligence Community (IC). A portion of Ad revenues generated on this site is donated to the AFIO. His ideas are his own and do not represent those of any organization he's a member of. We will publish your ideas and comments at no charge...for the good of the order! Contact us on the secure Bpath Mail Form.