Name | Tags | Description | Link |
---|---|---|---|
Name | Tags | Description | Link |
BlueJay (BrightPlanet) |
software OSINT tech companies |
Surveillance software with access to every tweet that can geographically tag tweets in real-time, and monitor and analyze selected keywords, locations and watch listed individuals. | View on: brightplanet.com |
Lovely Horse (GCHQ Twitter App) |
leaked document technical document software OSINT GCHQ |
Wiki overview of GCHQ app, "Lovely Horse," created to monitor the public comments made by hackers on social media. | View on: aclu.org |
British Accuse David Miranda, Glenn Greenwald's Partner, Of 'Terrorism' |
news story MI5 Scotland Yard intelligence agencies |
Huffington post article detailing how David Miranda was detained for 9 hours at the Heathrow airport and labeled as a terrorist by Scotland Yard and MI5. | View on: huffingtonpost.com |
Recorded Future |
promotional material software OSINT tech companies |
One of the first internet tech companies to make predictive analytics tools, using open source data feeds, available to law enforcement and intelligence agencies. | View on: recordedfuture.com |
Constellation (Haystax Technology) |
promotional material software OSINT tech companies |
Surveillance software that automates the collection, analysis and scoring of data feeds built on both proprietary and open source technologies, including the Flask framework in Python. | View on: constellation.haystax.com |
Stratfor Emails: US Has Issued Sealed Indictment Against Julian Assange |
leaked document legal document private contractor |
Leaked confidential emails obtained from private intelligence firm Stratfor showing that the US Government has a secret indictment against WikiLeaks founder Julian Assange. | View on: wikileaks.org |
Too Many Choices |
leaked document NSA intelligence agencies |
Entry from the "The SIGINT Philosopher", an intranet column disseminated within the NSA and leaked by Ed Snowden, revealing concerns over too much information. | View on: firstlook.org |
Algorithmic Transparency |
related sources data mining artificial intelligence software legal document |
Epic.org Electronic Privacy Information Center's project on algorithmic transparency, urging companies to reveal the code that makes judgments about us. | View on: epic.org |
U.S. vs. Edward J. Snowden criminal complaint |
news story legal document NSA |
Description: Criminal complaint against NSA whistleblower Ed Snowden, accusing him of espionage for leaking documents. | View on: apps.washingtonpost.com |
The Rise of OSINT in Threat Intelligence Analysis |
news story OSINT software DHS intelligence agencies news story OSINT software DHS intelligence agencies |
Homeland Security Today article arguing that real-time algorithmic processing of open source information can lead to insights that would take hundreds of analysts to emulate. | View on: hstoday.us |
The Rise of OSINT in Threat Intelligence Analysis | Homeland Security Today article arguing that real-time algorithmic processing of open source information can lead to insights that would take hundreds of analysts to emulate. | View on: hstoday.us | |
Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies |
technical document textbook law enforcement |
Guide on criminal intelligence and its methods, standards, processes, management, and resources incorporating information from federal, state, local, and tribal experts. | View on: it.ojp.gov |
For Media Mining, The Future is Now! (part 1) |
leaked document data mining NSA intelligence agencies |
Leaked document that is the first part of a 2006 internal NSA memo detailing some of the capabilities of and off-the-shelf technologies used by intelligence agencies. | View on: firstlook.org |
Boston Marathon bomb trial: FBI agent mistakes Grozny for Mecca in Twitter photo |
news story social media monitoring mistakes FBI intelligence agencies |
Guardian article discussing how Twitter evidence misinterpreted by the FBI in the Boston Bomber trial hurt their case. | View on: theguardian.com |
Top 10 Algorithms in Data Mining |
academic article data mining intelligence agencies |
Paper presenting the top 10 data mining algorithms used for research and by intelligence agencies in their next generation information processing systems. | View on: cs.umd.edu |
Police lack a policy for social media monitoring |
news story FOIA document law enforcement social media monitoring |
Shawn Musgrave's MuckRock article analyzing an internal police memo released through FOIA that shows the role that social media can play in modern policing. | View on: muckrock.com |
FBI Twitter Shorthand |
FOIA document social media monitoring technical document FBI intelligence agencies |
FBI manual obtained via a FOIA request regarding FBI interpretation of "leetspeak", a cryptic form of communication where letters are replaced with numbers, symbols, unusual spellings, and abbreviations. | View on: muckrock.s3.amazonaws.com |
For Media Mining, The Future is Now! (conclusion) |
leaked document NSA intelligence agencies |
Leaked document that is the second part of a 2006 internal NSA memo detailing some of the capabilities of and off-the-shelf technologies used by intelligence agencies. | View on: firstlook.org |
The Wikileaks Glossary of Military Abbreviations |
leaked document technical document |
Helpful glossary for reading classified documents. | View on: wikileaks.org |
GCHQ Open Source for Cyber Defense |
leaked document technical document GCHQ intelligence agencies social media monitoring |
GCHQ document detailing open-source sites being monitored in real-time, including blogs, websites, chat rooms and Twitter. | View on: aclu.org |
CyberOSINT: Next Generation Information Access |
technical document OSINT social media monitoring law enforcement intelligence agencies tech companies |
$500 technical monograph explaining the software currently available to law enforcement and intelligence agencies for large-scale, automated information processing | View on: phibetaiota.net |
Obtaining and Using Evidence from Social Networking Sites |
FOIA document DOJ law enforcement social media monitoring |
August 2009 presentation from the Department of Justice, Criminal Division, Computer Crime and Intellectual Property Section obtained by EFF through FOIA. | View on: eff.org |
Analyst's Desktop Binder |
FOIA document technical document software OSINT DHS intelligence agencies |
Technical manual for the Department of Homeland Security's social media monitoring program, released through a FOIA lawsuit by the Electronic Privacy Information Center. CSIA keywords and "Items of Interest" categories come from this document. | View on: epic.org |
FBI Files on the Occupy Movement |
FOIA document FBI law enforcement |
A declassified set of documents produced by the FBI about the Occupy Wall Street movement and released to the public with annotations by Jason Leopold of Truthout.org. | View on: documentcloud.org |
MiTAP for Real Users, Real Data, Real Problems |
promotional material software natural language processing OSINT tech companies |
MITRE corporation report about the Mitre Text and Audio Processing (MiTAP) system that automatically gathers, translates, organizes, and presents information from open news sources to monitor disease outbreaks and global events. | View on: mitre.org |
Information Sharing and Collaboration in the United States Intelligence Community |
ethnographic report NCTC intelligence agencies |
2013 sociology dissertation revealing that after 9/11, intelligence agents feel they are drowning in too much information but worry they are not sharing enough information with each other. | View on: upenn.edu |
FBI email to MITRE |
FOIA document natural language processing OSINT FBI intelligence agencies tech companies |
FBI email to the MITRE corporation revealing that agents did not know what a "named entity" was and therefore did not understand the how technology worked. | View on: eff.org |
Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis |
ethnographic report |
2005 ethnographic report detailing intel analysis shortcomings after 9/11. Findings: agencies lack peer reviews, have no “cumulative knowledge structures”, process too much information too quickly, and trust intel reports without replicating findings or correcting errors. | View on: fas.org |
ZeroFOX |
promotional material software OSINT social media monitoring tech companies |
Social media security company whose products generate real-time, automated and predictive social media monitoring and threat assessment. | View on: zerofox.com |
Drowning in Information |
leaked document NSA intelligence agencies |
Entry from the "The SIGINT Philosopher", an intranet column disseminated within the NSA and leaked by Ed Snowden, revealing concerns over too much information. | View on: firstlook.org |
Investigative Data Warehouse (IDW) |
FOIA document FBI intelligence agencies |
EFF report about the FBI's Investigative Data Warehouse, a database containing hundreds of millions of records of personal information based on FOIA records, public information, and IDW datasets. | View on: eff.org |
Natural Language Processing and e-Government |
academic article natural language processing |
Paper discussing an algorithm that uses natural language processing to extract crime information from police reports, newspaper articles, and victims' and witnesses' crime narratives. | View on: claremont.edu |
FBI seeks social media monitoring tool |
news story OSINT social media monitoring FBI |
2012 Computerworld article reporting that the FBI had begun searching for technology to mine data from social networks like blogs, Facebook and Twitter. | View on: computerworld.com |
FBI Anonymous / LulzSec files |
FOIA document FBI intelligence agencies |
Heavily redacted FBI records, obtained by DBA Press and the Center for Media and Democracy (DBA/CMD) via a 2013 FOIA request, pertaining to the Anonymous "hacktivist" group Lulzsec. | View on: leaksource.wordpress.org |
British Tourists Detained, Deported For Tweets |
news story social media monitoring mistakes DHS intelligence agencies |
Two British teenagers were detained and deported for Tweeting slang and references to Family Guy that the HDS interpreted as threats to national security. | View on: huffingtonpost.com |