Winn Schwartau: Facebook OSINT Module for Recon-ng

Categories: Software
Tags:
Winn Schwartau

Winn Schwartau

Title: Facebook OSINT Module for Recon-ng
Source: Kc57
Date Published: 25th April 2013

Excerpt:

‘….If you haven’t yet heard of Recon-ng I suggest you check it out. It walks you through the process of collecting recon in various forms and provides a nice framework to store, sort, and report on
everything you collect. You should definitely get this set up if you plan to follow along.

I have been working on a Recon-ng module to do some Facebook OSINT by using the Facebook Graph API to search for phone numbers. It allows you to search for a specific phone number, or brute force
through a range of numbers and grab all of the publicly available information on each associated Facebook account that matches……’

Read complete article with code graphics.

Comments Off
May 2

Journal: Weaponizing Web 2.0

Washington Post Full Story

Washington Post Full Story

By Brian Krebs

July 29, 2009; 3:15 PM ET

The Washington Post

Imagine simply visiting a Web forum and finding that doing so forced your browser to post an embarrassing Twitter message to all of your contacts, or caused you to admit a stranger to your online social network. Now consider the same dynamic being used to move money out of your online auction account or delete the contents of your e-mail inbox.

. . . . . . .

The problem with the token-based security approach, as researchers prior to Hamiel and Moyer have noted, is that it works only if the attacker doesn’t have access to that random string of data as well.

To take the Alice and Bob on the forum example a step further, consider what happens when Alice views a forum posting by Bob that includes a link to an off-site image hosted at a site controlled by Bob. That image, when loaded by Alice’s browser, will automatically send Bob’s site a referrer URL that includes the full token that is unique to Alice’s browser session with that forum. Armed with the referring URL’s token, Bob can then respond to the image request from Alice’s browser with a request to silently take action on that forum in Alice’s name.

. . . . . . .

Moyer said one way to prevent this attack is commonly used on banking Web sites involves what’s known as a nonce, which is essentially a random, one-time-use-only number that is appended to a URL each time a visitor loads a page on that site. He noted that one reason most sites don’t adopt this approach is that it requires far more computational and Web server capacity, which can drive up costs — particularly for high-traffic sites.

DefCon White Paper

DefCon White Paper

+++++++Phi Beta Iota Editorial Comment+++++++

In 1990-1991 Winn Schwartau testified to Congress.  They ignored him the way they ignored Peak Oil testimony in 1974-1975.  In 1995 Robert Steele organized three top experts, Schwartau, Jim A from NSA, and Bill Caelii, and submitted a cross-walk of crystal clear recommendations adding up to $1 billion a year to Marty Harris, responsible for the security of the National Information Infrastructure (NII).  Today the US Government is about to waste $12 billion a year helping NSA further its own agenda while ignoring the root needs of the American people for trusted electromagnetic services.  The federal government is so busy attacking other people it is neglecting the people that created the federal government as a service of common concern.  The gap between those exercising public power and those who elected them and pay them has grown cataclysmic.  Public intelligence in the public interest is one way to help the Republic heal.

Comments Off
Jul 30

2008 Earth Intelligence Network Brief to Hackers on Planet Earth (HOPE)

Tags:
EIN at HOPE

EIN at HOPE

At the recommendation of Winn Schwartau, Robert Steele was invited to open Hackers on Planet Earth (HOPE) in New York City in 1994, and has been a speaker each conference since then.  Although 2008 was billed as the last event, it may continue.  Steele also does a “SPY IMPROVE: Everything You Ever Wanted to Know But Did Not Know Who to Ask.”  Above is the “formal” briefing delivered on 18 July 2008.

Comments Off
Jul 18

Review: INFORMATION WARFARE–Chaos on the Electronic Superhighway

Tags:

Amazon Page

5 Stars Still a Best in Class Endeavor

December 1, 2007

Winn Schwartau

I continue to believe this is one of the best in class original references. Winn, Peter Black (RIP) and I were among the first to warn of electronic Pearl Harbors, with Winn being the most knowledeable and the only one invited to brief Congress, where it went in one ear and out the others.

Winn Schwartau was one of the first, along with Peter Black (RIP), to warn Congress and the business world that digital systems would be extremely vulnerable. No one listened.

This book is still in my library. It is the non-fiction “first book” in this area.

For the fictional version that will stun with its surprise ending:
Terminal Compromise

For the best movie showing how easy it is to bring a society down:
Live Free or Die Hard (Full Screen Edition)

Other Hacker Books:
The Second Self: Computers and the Human Spirit , Twentieth Anniversary Edition
Hackers: Heroes of the Computer Revolution
The Hacker Crackdown: Law And Disorder On The Electronic Frontier
The Art of Deception: Controlling the Human Element of Security

Other Hacker DVD:
Hackers
Hackers – Wizards of the Electronic Age

Vote on Review

Comments Off
Dec 1

Review: Terminal Compromise

Tags:
Amazon Page

Amazon Page

5.0 out of 5 stars The ORIGINAL Information Warfare Book of Books
October 16, 2007
Winn Schwartau
I am so very glad this book has been reprinted and is now available again from Amazon. I have known the author ever since I ran into him in the 1990′s lecturing on America’s vulnerability to an electronic Pearl Harbor. This book started as non-fiction and scared the lawyers so badly that they insisted he write it as a non-fiction novel.

This is one of the most compelling plots, and is the perfect starter book for anyone who wants to begin understanding cyberwar, cyber espionage, and homeland vulnerability. Then read everything else Winn has published.

He is the ORIGINAL, the “real deal,” and one of the talents I most admire in the Information Operations arena.

See also:
Information Warfare: Second Edition
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption
Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven’t Got a Clue.)
Spies Among Us: How to Stop Spies, Terrorists, Hackers, and Criminals You Don’t Even Know You Encounter Every Day
Zen and the Art of Information SecurityCorporate Espionage: What It Is, Why It’s Happening in Your Company, What You Must Do About It
Information Operations: All Information, All Languages, All the Time

Vote on Review

Vote on Review

Comments Off
Oct 16

Threat Archives on Public Intelligence (1992-2006)

Categories: Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW
Comments Off
Jul 18

Policy Archives on Public Intelligence (1992-2006)

Categories: Policy

2006

US

Policy DoD QDR Shift in Focus 18 Years After Gray and Steele Recommended Same

2006

US

Policy Markowitz Defense Science Board Report on Transitions (NGO, OSINT)

2006

US

Policy Peters Counterrevolution in Military Affairs

2006

US

Policy Steele Terms of Reference for Intelligence Reform 1.1

2006

US

Policy Steele In Search of a Leader (Four Essential Reforms)

2006

US

Policy Steele Electoral Refrom as Precursor to Intelligence Reform

2006

US

Policy Tsuruoka Managing for the Future: Interview with Alvin Toffler

2005

US

Policy Andregg Ethics and the IC: Breaking the Laws of God and Man

2005

UK

Policy BASIC Think Tank Report on US Intelligence Incompetence

2005

EU

Policy EU European Union Proposed Multi-National Intelligence Service

2005

US

Policy Godson Culture of Lawfullness

2005

US

Policy Steele ON INTELLIGENCE: Overview in Aftermath of 9-11

2005

US

Policy Steele Op-Ed on Condi Rice’s Active Deception

2005

US

Policy Steele Cease and desist letter on Naquin

2005

US

Policy Tama Princeton Review on Intelligence Reform

2004

US

Policy Alexander Army G-2 Accepts OSINT as Separate Discipline

2004

US

Policy Andregg Insanity of Planned Intelligence “Reforms”

2004

AU

Policy Anon & Steele Update on OSINT in Australia

2004

FR

Policy Clerc Cognitive Knowledge for Nations

2004

US

Policy Cordesman Questions & Answers on Intelligence Reform

2004

US

Policy Cordesman & Steele Questions & Answers on Intelligence Reform

2004

US

Policy Simmons Congressman Simmons Letter to General Schoomaker on OSINT

2004

US

Policy Steele DoD OSINT Program: One Man’s View of What Is Needed

2004

US

Policy Steele Transcript of Steele at Secretary of State’s Open Forum 24 March 2004

2004

NL

Policy Tongeren (van) Need for Global Alliance for Human Security (Complete)

2004

NL

Policy Tongeren (van) Need for Global Alliance for Human Security (Overview)

2003

US

Policy Czech Steady State Revolution and National Security

2003

CA

Policy Fyffe Intelligence Sharing and OSINT

2003

CA

Policy Fyffe Intelligence Sharing and OSINT (Summary)

2003

UN

Policy Lewis Creating the Global Brain

2003

US

Policy Markowitz OSINT in Support of All Source

2003

US

Policy Markowitz Open Source Intelligence Investment Strategy

2003

US

Policy Steele Open Letter to Ambassadors Accredited to the USA

2003

BE

Policy Truyens Intelligent vs. Intelligence: That Is The Question

2002

Italy

Policy Politi 11th of September and the Future of European Intelligence

2001

US

Policy Heibel Intelligence Training: What Is It?  Who Needs It?

2001

US

Policy Heibel Value of Intelligence & Intelligence Training to Any Organization

2001

US

Policy Oakley Use of Civilian & Military Power for Engagement & Intervention

2000

US

Policy Berkowitz An Alternative View of the Future of Intellligence

2000

RU

Policy Budzko Russian View of Electronic Open Sources and How to Exploit Them

2000

US

Policy Ermarth OSINT: A Fresh Look at the Past and the Future

2000

IT

Policy Politi The Birth of OSINT in Italy

1999

US

Policy Allen (ADCI/C) OSINT as a Foundation for All-Source Collection Management

1999

UK

Policy Rolington Changing Messages in Western Knowledge Over 400 Years (Slides)

1999

UK

Policy Rolington Changing Messages in Western Knowledge Over 400 Years (Text)

1999

UK

Policy Steele Snakes in the Grass: Open Source Doctrine

1998

US

Policy Donahue Balancing Spending Among Spies, Satellites, and Schoolboys

1997

FR

Policy Botbol The OSINT Revolution: Early Failures and Future Prospects

1997

US

Policy Felsher Viability & Survivability of US Remote Sensing as Function of Policy

1997

US

Policy Steele Intelligence in the Balance: Opening Remarks at OSS ‘97

1997

US

Policy Sutton Global Coverage ($1.5B/Year Needed for Lower Tier OSINT)

1997

US

Policy Tsuruoka Asian Perceptions of What Is and Is Not Legal in Economic Intelligence

1997

UK

Policy Tyrrell Proposals to Develop a NATO/PfP OSINT Capability

1996

FR

Policy Clerc Economic and Financial Intelligence: The French Model

1996

US

Policy Kahin What Is Intellectual Property?

1996

US

Policy Steele Creating a Smart Nation (Govt Info Q and also CYBERWAR Chapter)

1996

US

Policy Steele InfoPeace: OSINT as a Policy Option & Operational Alternative

1996

US

Policy Steele Open Sources and the Virtual Intelligence Community

1996

US

Policy Steele Protecting the Civilian Infrastructure as an Aspect of Information Warfare

1996

US

Policy Zuckerman The Central Role of Open Source Economic Intelligence

1995

US

Policy Prusak Seven Myths of the Information Age

1995

US

Policy Steele Conference Executive Summary C/HPSCI and former DCI Colby

1995

US

Policy Steele Creating a Smart Nation: Strategy, Policy, Intelligence, & Information

1995

US

Policy Steele SMART NATIONS: NI Strategies and Virtual Intelligence Communities

1994

US

Policy Ogdin & Giser Cyber-Glut, and What To Do About It

1994

FR

Policy Schmidt Open Source Solutions 1994: The State of Intelligence

1994

US

Policy Schwartau Letter on NII Security

1994

US

Policy Schwartau et al Cross-Walk of 3 Experts’ Spending $1 Billion per Year for NII Security

1994

US

Policy Steele Communications, Content, Coordination, and C4 Security: Talking Points

1994

US

Policy Steele Correspondence to Mr. Marty Harris, NII Commission

1994

US

Policy Steele DATA MINING: Don’t Buy or Build Your Shovel Until You Know What…

1994

US

Policy Steele Expansion of Questions Posed by Senator John Warner to Aspin-Brown

1994

US

Policy Steele Letter to the Open Source Lunch Club on PFIAB Being Useless

1994

US

Policy Steele National and Corporate Security in the Age of Information

1994

US

Policy Steele Private Enterprise Intelligence: Its Potential Contribution to Nat’l Sec.

1993

FR

Policy Beaumard France: Think-tank to Anticipate & Regulate Economic Intelligence Issues

1993

FR

Policy Beaumard Learned Nations: Competitive Advantages Via Knowledge Strategies

1993

US

Policy Brenner Law and Policy of Telecommunications and Computer Database Networks

1993

US

Policy Castagna Review of Reich, The Work of Nations

1993

AU

Policy Chantler Need for Australia to Develop a Strategic Policy on OSI

1993

US

Policy Cisler Community Computer Networks

1993

US

Policy Civille The Spirit of Access: Equity, NREN, and the NII

1993

US

Policy Fedanzo A Genetic View of National Intelligence

1993

US

Policy Haver Intelligence Aim Veers to Amassing Overt Information

1993

JP

Policy Kumon Japan and the United States in the Information Age

1993

SE

Policy Leijonhelm Economic Intelligence Cooperation Between Government Industry

1993

US

Policy Love Comments on the Clinton Administration’s ‘Vision’ Statement for the NII

1993

US

Policy Petersen A New Twenty-First Century Role for the Intelligence Community

1993

GE

Policy Schmidt History of Failure, Future of Opportunity: Reinventions and Deja Vu

1993

US

Policy Steele A Critical Evaluation of U.S. National Security Capabilities

1993

US

Policy Steele ACCESS: Theory and Practice of Intelligence in the Age of Information

1993

US

Policy Steele Executive Order 12356, ‘National Security Information’

1993

US

Policy Steele Reinventing Intelligence in the Age of Information (TP for DCI)

1993

US

Policy Steele Reinventing Intelligence: The Advantages of OSINT

1993

US

Policy Steele Role of Grey Lit & Non-Traditional Agencies in Informing Policy Makers

1993

US

Policy Toffler (Both) Knowledge Strategies, Intellience Restructuring,  Global Competitiveness

1993

US

Policy Wallner Overview of IC Open Source Requirements and Capabilities

1993

US

Policy Wood The IC and the Open Source Information Challenge

1992

US

Policy Barlow EFF and the National Public Network (NPN)

1992

US

Policy Castagna Review of Toffler’s PowerShift

1992

SE

Policy Dedijer Open Source Solutions: Intelligence and Secrecy

1992

US

Policy Gage Open Sources, Open Systems

1992

US

Policy Greenwald Unrepresented Nations & Peoples Organization: Diplomacy’s Cutting Edge

1992

US

Policy Hughes An Affordable Approach to Networking America’s Schools

1992

US

Policy Kahin New Legal Paradigms for Multi-Media Information in Cyberspace

1992

US

Policy Kahn Outline of a Global Knowledge Architecture, Visions and Possibilities

1992

US

Policy Steele E3i: Ethics, Ecology, Evolution, and Intelligence

1992

US

Policy Steele Inaugural Remarks Opening 1st International Conference

1992

US

Policy Steele Information Concepts & Doctrine for the Future

1992

US

Policy Steele OSINT Clarifies Global Threats: Offers Partial Remedy to Budget Cuts

1992

US

Policy Steele Review Strassmann, Information PayOff

1992

US

Policy Wood Remarks, Don’t Be Suspicious of Contractors

1991

US

Policy JFK Working Group National Intelligence and the American Enterprise: Possibilities

1991

US

Policy Karraker Highways of the Mind

1991

US

Policy Steele How to Avoid Strategic Intelligence Failures in the Future

1990

US

Policy Steele Recasting National Security in a Changing World

1957

US

Policy Wright Project for a World Intelligence Center
Comments Off
Jul 18

Military Archives on Public Intelligence (1992-2006)

Categories: Military
Archives 1992-2006

Archives 1992-2006

2005

US

Military Steele US Army Conference: E3i: Making the Revolution

2005

US

Military USA Army Modernization Briefing

2004

US

Military Simmons Foreword to the Draft SOF OSINT Handbook

2004

NL

Military Wiebes SIGINT in Bosnia

2003

US

Military Hardee OSINT in Support of Special Operations

2003

US

Military Harrison OSINT Requirements, Collection, & Production Management

2003

US

Military Steele SOUTHCOM: Strategic Threat Assessment

2003

US

Military Steele AFCEA Texas: C4I Revolution and National Security

2003?

US

Military Steele To SecDef: Force Structure Trade-Offs and the Real World

2002

US

Military Hardee Growing an Open Source Intelligence Program

2001

US

Military Steele AUSA: Intelligence Support to a Transforming Army

2001

US

Military Steele AWC: Welcome to the Real World: Force Structure Trade-Offs

2000

CA

Military Cox OSINT at SHAPE…Some Musings

2000

FR

Military Debat The Challenge of Informing European Defence Decisions

2000

US

Military Hughes Open Sources and Intelligent Solutions

2000

Austria

Military Mueller Austrian Military Intelligence Thoughts on OSINT

2000

UK

Military Regan The UK Ministry of Defence OSINT Program

2000

US

Military Reynolds U.S. Transportation Command OSINT

2000

US

Military Steele Briefing to NATO/PfP: One World Ready or Not

1999

US

Military Clark EAGLE VISION: USAF Initiative for Tactical Receipt of Imagery

1999

US

Military Connors PACOM Additional Slides on VIC

1999

US

Military Connors U.S. Pacific Command’s Virtual Information Center (VIC)

1999

US

Military Dearth Intelligence in the 21st Century

1999

US

Military Lee Summary of Military Map Availabililty for Iran

1999

US

Military Myers & Madison Virtual Information Center Concept Refinement

1999

US

Military Prinslow & Bond Information Sharing in Humanitarian Emergencies

1999

US

Military Steele Overview of OSINT Issues & OSINT Utility to DoD

1999

US

Military Steele Setting the Stage for Information Sharing in the 21st Century: 3 Issues

1999

US

Military Steele What Do We Need to Know and Where Do We Get It? (Slides)

1999

US

Military Steele Expeditionary Environment in the 21st Century

1999

US

Military Wirtz Bridging the Culture Gap: OSINT and the Tet Offensive

1998

US

Military Beavers & Shanahan Operationalizing IO in Bosnia-Herzegovina (Book Chapter)

1998

SE

Military Bjore Open Sources and Methods for the Military

1998

SE

Military Bjore OSINT Lessons Learned

1998

UK

Military Rathmell Assessing the IW Threat from Sub-State Groups

1998

US

Military Steele INFORMATION PEACEKEEPING: Purest Form of War (Outline)

1998

US

Military Steele Skeptical Assessment of USN-USMC Based on Real-World OSINT

1998

US

Military Steele TAKEDOWN: The Asymmetric Threat to the Nation

1998

UK

Military Tyrrell OSINT: The Challenge for NATO

1997

US

Military Alger IATAC: Building a Knowledge Base of Emerging IAT

1997

US

Military Clark EAGLE VISION: Tactical Downlink Station for Imagery

1997

US

Military Clinton Managing Complex Contingency Operations

1997

US

Military Molholm DTIC: Building a Virtual Knowledge Warehouse

1997

US

Military Necoba The Marines and OSINT

1997

US

Military Pedtke National Air Intelligence Center Science & Technology OSINT

1997

US

Military Steele CINC Brief: The One that Got CINCSOC (Now CSA) to Buy In

1997

US

Military Steele Creating a Bare Bones OSINT  Capability (Slides)

1997

US

Military Steele Creating a Bare Bones OSINT Unit for DIA

1997

US

Military Steele CINCSOC 10 Minute Brief on OSINT

1997

US

Military Vesely Striking A Balance: National, Operational, & Tactical Acquisition

1996

US

Military Smith Defense Mapping Agency and the Commercial Sector

1996

US

Military Steele Open Source Intelligence Handbook, Chapter 5, OSINT and Military

1996

US

Military Steele DIA/JMITC: National Knowledge Strategy & Revolution in Intelligence

1996

US

Military Stein Mapping, Charting, and Geodetic Needs for Remote Sensing Data

1995

SE

Military Bjore Six Years of Open Source Information (OSI): Lessons Learned

1995

US

Military Dandar Army Intelligence XXI, Open Source Status Report

1995

US

Military Dandar OSIF Exploitation for Army Intelligence XXI: Summary

1995

UK

Military Garfield Update on the UK MoD OSINT Programme (Slides)

1995

UK

Military Garfield Update on the UK MoD OSINT Programme (Text)

1995

US

Military Ricardeli OSINT in Support of Haiti Invasion (Slides)

1995

US

Military Ricardeli OSINT in Support of Haiti Invasion (Text)

1995

US

Military Steele The Military Perspective on Information Warfare: Apocalypse Now

1995

US

Military Steele AWC: Open Source Intelligence for the Military

1994

US

Military Brooks & McKeeyer Split-Based Ops in DESERT STORM: Glimpse of the Future Digital Army

1994

US

Military Munro INFORMATION WARFARE: Snake Eaters Meet Net-Heads

1994

US

Military Pedtke NAIC & The Intelligence Community Open Source Architecture

1994

US

Military Steele DIA/JMITC: NS via the Reinvention of National & Defense Intelligence

1992

US

Military Clift Military OSINT Requirements, Capabilities, and Contracting Directions

1992

US

Military Pedtke et al NAIC S&T Open Source Intelligence Requirements & Capabilities

1992

US

Military Petersen New Roles for the U.S. Military

1992

US

Military Schwartau Introduction to Information Warfare

1992

US

Military Steele Intelligence Lessons Learned from Recent Expeditionary Operations

1992

US

Military Steele Comments Prepared for Future War Roundtable

1992

US

Military Strassmann Forcing Innovation, Cutting Costs, and Increasing Defense Productivity

1991

US

Military Steele Defense Intelligence Productivity in the 1990′s

1990

US

Military USMC & Steele Expeditionary Environment Research & Analysis Model

1990

US

Military USMC & Steele Expeditionary Mission Area Factors Summaries
Comments Off
Jul 18

Review: Pearl Harbor Dot Com

Tags:

Amazon Page

Amazon Page

5.0 out of 5 stars Everything You Need to Know About the Next Attack–And Fun,

February 6, 2002
Winn Schwartau
This book is a based on a *non-fiction* manuscript about U.S. vulnerabilities to electronic that was so hot that the author’s lawyers insisted he turn it into a novel to avoid liability.It is absolutely superb and written by one of the most authoritative persons around. Unlike most academic and industry security specialists, the author has from the very beginning understood, respected, and been in touch with the elite hackers who worked very hard in the 1980′s to expose the outrageously vulnerable electronic systems used by our financial, transportation, power, and communications industries.

In my view, books like this as well as the non-fiction books such as “Information Warfare: Chaos on the Electronic Superhighway” have been vital elements in educating consumers, stockholders, and voters. If you want to know just how vulnerable your bank account is, read this book.

I won’t reveal the surprise ending, but will say that it is absolutely a shocker, and totally credible.

Vote on Review

Vote on Review

Comments Off
Feb 6

Review: Cybershock–Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

Tags:

Amazon Page

Amazon Page

5.0 out of 5 stars Sensationalist, Populist, Useful, Worthy,

August 22, 2000
Winn Schwartau
There will be those quick to trash this book as sensationalist, and they are partly right. What most people, including the critics, do not realize is that Winn Schwartau went out on a limb in the late 1980′s and early 1990′s and is *the* primary reason Congress got concerned enough about these issues to demand a Critical Infrastructure Protection program funded at over $1B–it was Winn, not others quick to claim the line, that testified to Congress about an “electronic Pearl Harbor” on 24 June 1991. This book is unabashedly populist and seeks to make this very complex threat entertaining and understandable, and for that reason alone it is worth the time to consider. There are many other serious books for engineers, this is the one for anyone at all from housewife to student to executive. Great airplane book, won’t save the world, but will certainly increase your consciousness across the board. Worthy.
Vote on Review

Vote on Review

Comments Off
Aug 22