1 / 13

OSINTGROUP proprietary data/information. Use or disclosure by permission only.

Open Source Intelligence Support Addressing Energy Security Issues & International Terrorism. OSINTGROUP proprietary data/information. Use or disclosure by permission only. What does The OSINT GROUP do?. Apply analysis tools to identify events world-wide

alcina
Télécharger la présentation

OSINTGROUP proprietary data/information. Use or disclosure by permission only.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Open Source Intelligence Support Addressing Energy Security Issues& International Terrorism OSINTGROUP proprietary data/information. Use or disclosure by permission only.

  2. What does The OSINT GROUP do? Apply analysis tools to identify events world-wide applied against continually evolving data • The OSINT Group pinpoints • relationships including: • Trending, Spatial Research • Link Analysis, and • Entity Extraction

  3. What does The OSINT GROUP do? The OSINT GROUP can aggregate unlimited information sources, harvesting information from across 126 countries in 25 languages. Our research software tools use an advanced content tagging system with more than 30 metadata tags and 380 categories to deliver hundreds of thousands of unduplicated real-time content items every day. OSINTGROUP proprietary data/information. Use or disclosure by permission only.

  4. What does The OSINT GROUP do?Unique “Deep Web” Mining The Deep Web is massive -- approximately 500 times greaterthan that visible to conventional search engines -- with much higher quality throughout. The simplest way to describe our technology is a "directed-query engine." It has other powerful features in results qualification and classification, but it is this ability to query multiple search sites directly and simultaneously that allows Deep Web content to be retrieved.

  5. Open Source Research Model OSINTGROUP's Infrastructure Queries Pattern-based Subject-based Iterative & Predictive Analysis Public Source Data Government Data Private Data Newswires Newspapers Weblogs Pictures Maps, Charts, Tables Government documents Scientific literature Reports, Alerts Files, Linkages, Photos, Images Reports & Analyses: CONUS (Continental U.S.) OCONUS (Outside Continental U.S.) OSINTGROUP proprietary data/information. Use or disclosure by permission only.

  6. New Open Source Support Summary passed by the U.S. House of Representatives: H.R. 3815 - Homeland Security Open Source Information Enhancement Act of 2008 – Sponsored by Rep. Perlmutter (D-CO), this bill requires the Secretary of Homeland Security to make use of open source information to develop and disseminate open source homeland security information products. Director of National Intelligence (July 16, 2008) “Analytical Outreach” directive states, “Elements of the Intelligence Community (IC) should use outside experts whenever possible to contribute to, critique, and challenge internal products and analysis…” “Sound intelligence analysis requires the analysts … develop trusted relationships with experts in academia, think tanks, industry, non-governmental organizations, the scientific world, and elsewhere.”

  7. Referential Data Sources (partial listing) Social Security Death Master Index (SSDI): 90+M records of deceased individuals and their S.S. numbers at time of death. Office of Foreign Assets Control (OFAC) Data: A database of Specially Designated Nationals (SDNs) and Blocked Persons. ATF Most Wanted: Bureau of Alcohol, Tobacco, Firearms and Explosives’ (ATF) “Most Wanted” list. FBI Most Wanted: Federal Bureau of Investigations “10 Most Wanted.” FBI Most Wanted Terrorists: Federal Bureau of Investigation’s “Most Wanted Terrorists.” RCMP Most Wanted: Royal Canadian Mounted Police (RCMP) “Most Wanted” list. Secret Service Most Wanted: United States Secret Service’s “Most Wanted” list. DEA Fugitives: Drug Enforcement Administration’s (DEA) “Major International Fugitives”. Interpol International Fugitives: listing of recent fugitive –related information from 186 countries. Worldwide Incident Tracking: Incidents in which sub-national or clandestine groups attacked civilians or noncombatants. Terrorism Knowledge Base: A one-stop resource for comprehensive research and analysis on global terrorist incidents. National Transportation Safety Board (NTSB) Aviation Accidents:Data from 1962 to present about civil aviation accidents. FinCEN Money Services Business: A listing by state of financial institutions called "Money Services Businesses" (MSB). CNN: Cable News Network’s (CNN) top news story headlines. US Cities Local News:Local metro news section of major newspapers.

  8. Linkages from Social Structure Social Network Analysis (SNA) • Human Relationships ~ • People Interact • Application of Interaction “Sameness” • Mother • Address • Emergency Contact • Father • Spouse • Telephone • Sex Offender • Compare All Data

  9. An owner’s manual for an American-made Maverick 88 pump action shotgun found in a training camp south of Kabul. The table of contents for The Poisoner’s Handbook, found in a Harkat house in Kabul.

  10. Deliverables • Printed Reports • Emails • Alerts • Linkage analysis charts • Pattern analysis charts • Social analysis charts • Reports by zip code (All search elements) • Research • Printed Reports • Other Other Deliverables (as required) (Embedded video, news articles, geospatial data, association linkage charts, pattern charts, and other data) Reports Geospatial Data Embedded Video

  11. Immediate Needs Candidate is responsible for performing intelligence analysis activities related to ensuring the quality and accuracy of a terrorist watchlist for the customer. Three major areas of activity will be reviewing incoming watchlist data, performing reviews of historical records following an encounter where a potential discrepancy in watchlist records has been detected, and conducting special quality assurance projects, such as performing a targeted review of specific targeted areas of interest. Candidate will use multiple government databases in order to do substantive deep dive research and analysis. Terrorism Analyst JN: 11423737, Mclean, 048 Watchlisting Analyst JN: 11423744, Mclean, 048 All Source Analyst: Multi-Discipline Intelligence/General Military Intelligence/All Source Intelligence Analyst, participates in production, indications and warning, collection management, targeting, imagery, netwrok analysis, counterintelligence, counter-terrorism, information operations, foreign disclosure, international engagements and threat analysis. Initiates and conducts research efforts; plan, coordinate and synthesize research to produce all-source intelligence products/responses. All Source Analyst JN: 11311919, Reston, 048

  12. Immediate Solution Business Relationship Collection of Open-Source Content Identify, track, monitor, and harvest open-source content on foreign language terrorist-related websites as well as other forums that are used by terrorists and their sympathizers. Translation of Collected Foreign-Language Materials Translate collected materials from foreign language sources, including Arabic, into English for examination and review. Analysis of Collected Materials Ability to determine relevance of collected and translated materials as they relate to terrorism. Outreach Activities with Stakeholders Ability to develop and conduct outreach and engagement strategies targeting first responders, explosives experts, and international, national, state, local, homeland security and counterterrorism officials within the explosive ordnance disposal, explosives, law enforcement, and intelligence communities; engage with interagency and national stakeholders to gather information and compile data and findings to support recommendations and conclusions.

  13. Risk ~ • No R&D Software • IT Infrastructure with 24/7 Operation • Experienced Open Source Intelligence Team • IT Infrastructure, Team Experience, Proven Tools • Flexible Contracting through 8(a)s, SDVOBs, WOSBs, other LOW OSINTGROUP proprietary data/information. Use or disclosure by permission only.

More Related