28.06.2013 Views

OSINT Nuggets - Allsource Global Management

OSINT Nuggets - Allsource Global Management

OSINT Nuggets - Allsource Global Management

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

I N S I D E T H I S I S S U E :<br />

Critical Infrastructure 1<br />

Border Patrol 2<br />

Law Enforcement 3<br />

IEDs/EFPs 4<br />

Arizona/Southwest Border 5<br />

Northern Border 8<br />

Drones 9<br />

Punch, Counterpunch 13<br />

Steganography 13<br />

<strong>OSINT</strong> 15<br />

The Criminal Mind 18<br />

Russia 18<br />

China/Russia 22<br />

China 23<br />

News For Parents 24<br />

Nuclear Terrorism 25<br />

Open Source Intelligence<br />

(<strong>OSINT</strong>): Open source<br />

intelligence refers to intelligence<br />

based on information gathered<br />

from open sources, i.e.<br />

information available to the<br />

general public. This includes<br />

newspapers, the internet, books,<br />

phone books, scientific journals,<br />

radio broadcasts, television, and<br />

others. Collection of information<br />

in <strong>OSINT</strong> format is a very<br />

different process in comparison<br />

to the collection of other<br />

intelligence disciplines because,<br />

by definition, the information<br />

sources are publicly available<br />

versus covertly collected.<br />

In the second issue I talked<br />

about what critical<br />

infrastructure (CI) is and how<br />

it may not be seen the same<br />

by any two individuals. What<br />

may be seen as CI by one is<br />

not necessarily seen as CI by<br />

another. Here are two<br />

examples.<br />

On or about June 22, 2012,<br />

a vandal or vandals shot<br />

holes into a 165,000 gallon<br />

water tank that serves the<br />

Golden Acres subdivision in<br />

Sierra Vista, AZ. This<br />

affected approximately 600<br />

residents in the area.<br />

Security cameras were also<br />

shot out, and the damage to<br />

the tank was about a foot<br />

from the bottom. This clearly<br />

illustrates that the intent was<br />

to render the tank unusable.<br />

To the residents of this<br />

area this is truly CI to them<br />

since it is the only source of<br />

water. They cannot wash<br />

clothes, flush the toilet,<br />

practice personal hygiene,<br />

and they need to get to work<br />

in the morning. To help out,<br />

all the residents did their part<br />

by conserving so that all<br />

would benefit equally for the<br />

days they were without total<br />

<strong>OSINT</strong> <strong>Nuggets</strong><br />

Volume 1, Issue 4 Wednesday, August 1, 2012<br />

You Tell Them It’s Not Critical Infrastructure<br />

service.<br />

The rest of the city would<br />

not consider this CI since it<br />

did not affect the city as a<br />

whole and it was business<br />

as usual.<br />

Another incident took<br />

place in a different part of<br />

the city which involved<br />

electrical power. A<br />

mechanical failure at an<br />

electrical substation<br />

resulted in power loss<br />

to 8-10,000 people. The<br />

mechanical failure also<br />

sparked a small fire, further<br />

damaging the substation<br />

equipment.<br />

It was approximately 2<br />

hours before power was<br />

restored which affected an<br />

area that extended about a<br />

mile from the substation.<br />

The substation is also not<br />

equipped for a backup<br />

system.<br />

As in the first case, the<br />

city would not consider this<br />

as CI, however, you try<br />

telling that to the residents.<br />

It is also safe to say that if<br />

the substation had affected<br />

areas like the police, city<br />

hall or the fire department<br />

then it would be a different<br />

Publisher & Layout Design: Mr. E. Ben Benavides, bbenavides@agmaz.com<br />

Chief Editor: Mr. Brad Branderhorst, bbranderhorst@agmaz.com<br />

story and it would be<br />

classified as CI for the city<br />

to continue functioning and<br />

then perhaps a backup<br />

system would be in place.<br />

There are several areas<br />

around practically any city<br />

in the U.S. that affect only a<br />

small portion of the<br />

population, but to classify<br />

each and every one CI and<br />

provide countermeasures is<br />

way too expensive.<br />

You may recall the major<br />

outage that knocked out<br />

power to almost 5M people<br />

in the Southwest and<br />

Mexico on Sept. 8, 2011,<br />

when a worker doing<br />

simple maintenance in a<br />

Yuma, AZ, substation<br />

accidentally tripped a<br />

power line. The outage<br />

knocked out power all the<br />

way to San Diego, CA. and<br />

two nuclear reactors went<br />

offline after losing<br />

electricity.<br />

CI definition: the basic<br />

facilities, services, and<br />

installations needed for the<br />

functioning of a community<br />

or society. Now, out of the<br />

three incidents where do<br />

you think the focus is going<br />

to be?<br />

The views expressed in this Newsletter are those of the authors and do not reflect policy or<br />

position of AllSource <strong>Global</strong> <strong>Management</strong>.<br />

All input is based on open source harvesting and should not be considered open source<br />

intelligence, but more specifically should not be considered as actionable intelligence.<br />

Anyone wishing to contribute an item for publication is highly encouraged and should contact Mr.<br />

Benavides at the above email.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Border Patrol News<br />

Page 2 of 25<br />

July 10, 2012, Closure of Border Patrol stations across four states triggers alarm. The Obama<br />

administration is moving to shut down nine Border Patrol stations across four states, triggering a<br />

backlash from local law enforcement, members of Congress and Border Patrol agents<br />

themselves.<br />

Critics of the move warn the closures will undercut efforts to intercept drug and human<br />

traffickers in well-traveled corridors north of the U.S.-Mexico border. Though the affected stations are scattered throughout<br />

northern and central Texas, and three other states, the coverage areas still see plenty of illegal immigrant activity -- one<br />

soon-to-be-shuttered station in Amarillo, Texas, is right in the middle of the I-40 corridor; another in Riverside, Calif., is<br />

outside Los Angeles.<br />

U.S. Customs and Border Protection says it's closing the stations in order to reassign agents to high-priority areas<br />

closer to the border.<br />

"These deactivations are consistent with the strategic goal of securing America's borders, and our objective of<br />

increasing and sustaining the certainty of arrest of those trying to enter our country illegally," CBP spokesman Bill Brooks<br />

said in a statement. "By redeploying and reallocating resources at or near the border, CBP will maximize the effectiveness<br />

of its enforcement mandate and align our investments with our mission."<br />

But at least one Border Patrol supervisor in Texas has called on local officers to "voice your concerns" to elected<br />

officials, warning that the "deactivation" will remove agents from the Texas Panhandle, among other places. Several<br />

members of Congress have asked Border Patrol Chief Michael Fisher to reconsider the plan. Local officials are also getting<br />

worried about what will happen once the Border Patrol leaves town, since they rely on those federal officials to assist in<br />

making immigration arrests.<br />

"It could impact us tremendously since we've only got two agents up here now for 26 counties," Potter County<br />

Sheriff Brian Thomas told FoxNews.com.<br />

Potter County, in the Texas Panhandle, would be affected by the planned closure of the Amarillo station.<br />

Thomas said that while his area is far from the border, it's still a major "corridor" for illegal immigrants -- and he said<br />

his office depends on Border Patrol to respond to their calls.<br />

"I can't hold a carload of people out there on I-40 for eight hours while somebody comes from El Paso," he said. "I<br />

mean, that's just crazy."<br />

Border Patrol's resident agent in charge in Amarillo expressed similar worries, in a recent memo to local law<br />

enforcement alerting them to the planned closure. The official, Robert Green, warned that the "entire complement" of two<br />

agents would be reassigned from Amarillo to somewhere closer to the border. He said "there is no active plan" right now for<br />

Immigration and Customs Enforcement to fill the void on assisting local officials with stops.<br />

Empathizing with local officials, he wrote: "As a former deputy I found myself on the other end of the radio hoping to<br />

contact USBP to assist me with a vehicle full of undocumented foreign nationals on the side of the road."<br />

And in an unusual plea, he urged the recipients of his memo to contact elected officials about the change. "I would<br />

encourage you, if you have found USBP assistance valuable in the past, to contact your political representatives and voice<br />

your concerns," Green wrote.<br />

The letter was first posted online by the Lubbock Avalanche-Journal. Thomas confirmed to FoxNews.com that he<br />

received it. Bob Dane, communications director with the Federation for American Immigration Reform, also said he's<br />

confirmed the letter's authenticity with ICE. CBP later acknowledged the memo, but said in its statement that Green was<br />

expressing his "personal opinion."<br />

Lawmakers have started to get involved. Republican Rep. Mac Thornberry, who represents Amarillo, joined two<br />

other Texas lawmakers whose districts would be affected in asking the Border Patrol chief to "reconsider the proposal."<br />

A letter sent Tuesday to Fisher warned the plan would "leave our area vulnerable." They noted that the Amarillo and<br />

Lubbock stations alone, two of those affected, accounted for 638 apprehensions of illegal immigrants just this year.<br />

FAIR also blasted the Obama administration for the plans.<br />

"It's part of the systematic dismantling of both border and interior enforcement," Dane told FoxNews.com. "It<br />

complements the non-enforcement policy of this administration."<br />

He warned that local officials in those areas will have a hard time summoning far-away Border Patrol agents to<br />

assist, and said the tone of Green's memo was a "not-so-subtle shout-out" that the agency feels "outmanned, outgunned ...<br />

by their own government."<br />

The stations set for closure in about six months include six in Texas. They are in: Lubbock, Amarillo, Dallas, San<br />

Angelo, Abilene and San Antonio. The other three are in Billings, Mont.; Twin Falls, Idaho; and Riverside, Calif.<br />

f 25


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 3 of 25<br />

Brooks said that the closures do not mean agents will be out of contact.<br />

"Though Border Patrol agents would no longer be located in these areas, the Border Patrol intends to maintain<br />

strong and meaningful law enforcement partnerships with Immigration and Customs Enforcement and local law enforcement<br />

f 25<br />

agencies in these areas through continuing to actively share intelligence and information" and other avenues, he said.<br />

Detractors, though, say the changes are part of a pattern. The administration recently announced it would stop<br />

deporting young illegal immigrants who came to the U.S. as children and have not committed a serious crime. Additionally,<br />

after the Supreme Court upheld one plank of Arizona's controversial immigration enforcement law last month, federal<br />

officials said ICE would be selective in responding to calls about immigration status - prioritizing cases that meet certain<br />

criteria, like whether the suspect is wanted for a felony.<br />

Rep. Randy Neugebauer, R-Texas, who signed the Thornberry letter, also voiced concern about the latest<br />

announcement on station closings in a written statement.<br />

"The Department of Homeland Security hasn't demonstrated that sending additional resources to the border will be<br />

a more efficient use of resources than maintaining a presence further north," Neugebauer said. "I'd like to see numbers that<br />

reassure me that this strategy change won't ultimately result in fewer arrests."<br />

http://www.foxnews.com/politics/2012/07/10/closure-border-patrol-stations-across-four-states-triggers-alarm/<br />

Comment/Analysis: Sometime in 2011, NPR (National Public Radio), published an<br />

interactive map of just how far into the United States drug trafficking<br />

organizations (DTOs) had extended their reach<br />

(https://www.npr.org/templates/story/story.php?storyId=124703094 ).<br />

Another article stated that Mexican cartels have long operated in the US<br />

and forged ties on a smaller level with American gangs, using them to<br />

sell drugs on street corners. A report by the National Drug Intelligence<br />

Center said that Mexican cartels already operate in more than 1,000<br />

US cities, or almost every urban area in the US. That was in 2011 so I<br />

am sure that in 2012 the number of cities having been infiltrated is<br />

now more. See the attached interactive map for a feeling of just how<br />

far the DTOs have extended their influence. After superimposing the<br />

interactive map atop Google earth and then studying the terrain,<br />

national parks, East-West and North-South corridors, transportation<br />

routes, etc., my conclusion would be to only close two stations and<br />

modify another. Close San Angelo and Lubbock in Texas; and close the<br />

Billings, Montana but open it up in more of a North-South corridor.<br />

http://www.globalpost.com/dispatch/news/regions/americas/unitedstates/111102/mexican-cartels-mexico-drug-war<br />

Related: http://test.dailycaller.com/2011/09/30/drug-war-mexican-cartels-us-reach-expands-over-400-percent-in-two-years/<br />

Law Enforcement<br />

July 3, 2012, ATN Introduces PS7 Night Vision Goggle. American Technologies Network has<br />

introduced the ATN PS7 night vision goggle for law enforcement, according to the company.<br />

The ATN PS7 is a lightweight, high-performance night vision goggle that produces<br />

optical images in great clarity and detail even in unfavorable conditions, according to ATN.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 4 of 25<br />

The ATN PS7 can be used as a hand-held goggle or head-mounted with the hands-free, flip-up head mount<br />

assembly that comes standard with the goggle. It can also be used as a helmet-mounted model with an optional MICH or<br />

PAGST helmet mount kit.<br />

The multi-coated, all-glass optics also feature a "sacrificial window" that shields the optics from sand or debris that<br />

may scratch the lens. The ATN PS7 is available with several different high-resolution image intensifier tubes. The ATN PS7<br />

also has a built-in Infrared dual-focus and wide-angle Illuminator that enables vision in darkness.<br />

The goggle is available in 3x, 5x and 8x lenses. It requires one 3-volt lithium CR123A battery or one 1.5 AA battery.<br />

http://www.policemag.com/Channel/Technology/News/2012/07/03/ATN-Introduces-PS-7-Night-Vision-<br />

Goggle.aspx?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+POLICE-<br />

All+%28POLICE+Magazine%29<br />

July 6, 2012, Pelican Introduces Multi-Color LED Flashlight. Pelican Products has<br />

introduced the 2370 multi-color LED flashlight, which works in a variety of<br />

environments, according to the company. The light has four operating modes (high<br />

and low white as well as night-vision-friendly red and blue) that can be easily changed<br />

with a magnetically actuated selector switch.<br />

Powered by two included AA batteries, its powerful LED provides clean,<br />

brilliant light for nearly four hours of usable light with a peak output of 106 lumens in<br />

high mode. Its low mode (great for close quarter use and battery life extension) shines<br />

13 lumens and runs for more than 41 hours.<br />

The 2370 LED is weather resistant and features a CNC-machined,<br />

aerospace-grade aluminum body with a knurled "no slip" grip pattern and a tough, matte black, Type II anodized finish.<br />

Weighing in at 6.5 ounces with batteries, the flashlight includes a removable clip for easy pocket transport.<br />

Also available is an optional holster and nylon lanyard for more transportation choices. The 2370 LED retails for $59.95.<br />

http://www.policemag.com/Channel/Patrol/News/2012/07/06/Pelican-Introduces-Multi-Color-LED-<br />

Flashlight.aspx?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+POLICE-<br />

All+%28POLICE+Magazine%29<br />

IEDs/EFPs<br />

What is an Improvised Explosive Device (IED)? An IED is an improvised delivery system to deliver an explosive charge. It<br />

includes nearly any common object from a pipe to a vehicle, an empty coke can or light bulb. The types of IEDs are only<br />

limited by the imagination of the bomber.<br />

(U//FOUO) Cold Pack Chemicals: Potential Use in Improvised Explosives. Cold packs,<br />

packaged and sold commercially, contain chemicals—usually 30 to 85 grams of ammonium<br />

nitrate or urea—that, when extracted in sufficient quantity, can be used as precursors for<br />

improvised explosives. The chemicals are packaged in prill (pelletized) form, and can be<br />

used directly or ground into powder when being used in homemade explosive production.<br />

Five hundred packs would yield 30 to 90 pounds of precursor material for use in an<br />

improvised explosive device (IED). https://info.publicintelligence.net/DHS-ColdPacks.pdf<br />

July 14, 2012, BARRIE, ONT.—Police have found at least 50 improvised explosive devices at a Barrie home in a search<br />

that has forced the evacuation of the neighbourhood.<br />

Nine of the homemade bombs were exploded Sunday afternoon in a controlled detonation on the edge of the city.<br />

Const. Angela Butler of Barrie police said the roughly 60 people who have been kept from their homes since Thursday won’t<br />

be able to go home yet.<br />

“It will be a few more days at least,” said Butler. “The total of what we’re doing seems to heighten every day . . . As<br />

the officers go through the home, they’re finding more and more improvised explosives.”<br />

The house at 30 Virgilwood Cres. seemed just like any other on a quiet street in Barrie’s suburbs, said residents of<br />

the neighbourhood, until police arrested a father and son in connection to a 1978 murder of 26-year-old Michael Traynor last<br />

week.<br />

f 25


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 5 of 25<br />

The explosives were found after the arrests of Donald Feldhoff, 54, who has been charged with murder, and his<br />

father William Feldhoff, 75, charged with being an accessory after the fact.<br />

Police said further charges are pending.<br />

Residents who have been evacuated are staying with friends, at hotels or in accommodations arranged by the Red<br />

Cross.<br />

f 25<br />

“I’m majorly upset,” said one resident who didn’t want her name used for fear of retaliation. “This could have blown<br />

up at any time.”<br />

John Picken, who lives nearby, said he’d never noticed anything strange about the house where members of the<br />

bomb squad are now combing through the property.<br />

“I take my kids trick-or-treating there every year,” said Picken. “This is totally off the wall for this neighbourhood.<br />

“It’s a total shock.” http://www.thestar.com/news/ontario/article/1226748--barrie-bombs-police-uncover-50-explosivedevices-in-home-of-accused-killer<br />

Related: Police continue to uncover homemade bombs at Barrie home.<br />

http://www.thestar.com/news/gta/crime/article/1226576--barrie-bomb-house-evacuation-to-last-into-sunday<br />

Comment/Analysis: Looks like your typical neighborhood doesn’t it? But yet there was something going on and neighbors<br />

failed to note anything. Surely the indicators were there waiting to be discovered. What about the activities of the tenants?<br />

Were they up late at night or did they take care of business early in the<br />

morning? What about visitors? What about strange odors? What I’m trying to<br />

drive home is that IEDs are real and sooner or later we are going to be<br />

confronted with that threat in our own areas. Now is the time to start looking<br />

for the indicators that say something is amiss. Start paying attention to your<br />

surroundings and see how they change from day-to-day. Can you spot<br />

abnormal activity? It’s all there; it’s just a matter of interpreting the<br />

information.<br />

Arizona, The Southwest Border and Beyond<br />

July 7, 2012, Bust of 20 Mexican drug cartel members by Arizona police recovers THREE-TONS of marijuana and $2.4M<br />

cash.<br />

The arrest of 20 suspected members of the deadly Mexican Sinaloa drug cartel in Arizona has turned over three<br />

tons of marijuana, 30lbs of Methamphetamine drugs and $2.4 million dollars in cash.<br />

Tempe Police Narcotics Detectives announced the six-month investigation's conclusion on Friday that also includes<br />

the confiscation of an airplane, 10 vehicles and 14 firearms.<br />

The cartel often described as the largest and most powerful in the Western Hemisphere is headed by Leonel<br />

Galvez Leal, Norberto Meza Montoya, and Jose Alonzo Rodriguez Rosas.<br />

"Operation Nayarit Stampede” marks an end to an extensive poly drug trafficking organization that stretched across<br />

the Mexico border and into Arizona and beyond,' said DEA Special Agent in Charge Doug Coleman in a release.<br />

Police named New York, Alabama, and California as being recipient states of the cartel's delivery.<br />

The drugs were transported through hidden compartments in commercial tractor-trailers crossing the Mexican<br />

border according to police.<br />

'DEA and our partners have taken large quantities of drugs, millions of dollars in drug trafficker assets, and powerful<br />

weapons off our streets.<br />

We will continue to do everything in our power to bring to justice those who try to poison our communities,' Coleman<br />

said.<br />

Police reported tip-offs of possible drop houses in Tempe leading to the discovery by detectives with state and<br />

federal law enforcement agencies.<br />

Fifteen search warrants have since also been filed.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

http://www.dailymail.co.uk/news/article-2170304/Bust-20-Mexican-drug-cartel-members-<br />

Arizona-police-recovers-THREE-TONS-marijuana-2-4M-cash.html#ixzz20Ab0NrLN<br />

Page 6 of 25<br />

Comment/Analysis: This is a picture of a home used as a drop-off house. It sort of reminds us<br />

of a typical home in a typical neighborhood in a typical city (Tempe, AZ in this case). However,<br />

there are always indicators (open source information) that one home is different from the others<br />

either from human or vehicle traffic, and also the appearance of the home. In other words, it<br />

just doesn’t blend in. A word of caution. Do not walk over and innocently start a casual conversation to try and glean<br />

information. These people are not stupid, they will see right through you and it is dangerous!<br />

July 15, 2012, Sinaloa Cartel, the Threat to Arizona. The Sinaloa cartel is the largest drug trafficking criminal organization<br />

that threatens more counties in Arizona that traditionally have large problems with drug trafficking. This has been the case<br />

through their continued dominance in and through the region, according to a Justice Department report of the United States.<br />

The U.S. Drug Enforcement Agency (DEA) estimated that drug trafficking organizations that have allied with the<br />

"Sinaloa Cartel" belonging to cells of "El Chapo" Guzman Loera, and "EL Mayo" Zambada Garcia, are currently responsible<br />

for approximately 90% of all drugs crossing the border into Arizona and recently there have been a series of arrests in that<br />

state that have connections to the powerful cartel.<br />

On Friday, July 6, Arizona authorities dismantled a network that was smuggling different types of drugs from<br />

Tempe, Arizona, to the rest of America, and the operation arrested 20 people, some of whom had many years working<br />

within the U.S. for the Sinaloa cartel.<br />

Some of those arrested were responsible for the coordination and distribution of drug shipments coming into<br />

Arizona from Mexico through hidden compartments in commercial trailers," said Ramona Sanchez, a spokeswoman for the<br />

DEA.<br />

In contrast, she added, the organization used aircraft to send currency from profits of drug sales in the United<br />

States to Mexico, Central and South America. Property seized in raids included a Cessna 421 that was found in a hangar<br />

located south of Tucson.<br />

In addition to the 20 people arrested and the Cessna, Arizona authorities executed search warrants in several safe<br />

houses in the cities of Phoenix, Tucson, and Tempe where they confiscated about $2.4 million in U.S. currency, three tons<br />

of marijuana, methamphetamine, 14 weapons, 10 vehicles, and large amounts of cocaine.<br />

The Sinaloa cartel uses the control of brokers on both sides of the U.S.-Mexico border to extend their dominance in<br />

Arizona and controls most of the illicit money and weapons that are trafficked across the border and areas of high level of<br />

drug trafficking in that state.<br />

Throughout 2011, the Sinaloa Cartel dominated the trafficking routes of drug trafficking in Sonora in northern<br />

Mexico and has controlled the drug routes that are connected to the Arizona and Sonora border. "The numerous<br />

organizations that make up the Sinaloa cartel control most of the corridor that includes the Indian Reservation of Tohono<br />

O'Odham and the Nogales port of entry," she went on to say. http://www.borderlandbeat.com/2012/07/sinaloa-cartel-threatto-arizona.html<br />

June 26, 2012, The Colombian Navy has found a semi-submersible vessel used to traffic drugs on the Pacific coast, thought<br />

to belong to the Rastrojos drug gang, in the second such finding this year.<br />

On Sunday, the Colombian Navy, with the help of the U.S. Drug Enforcement Administration (DEA) and the<br />

Colombian Attorney General's Office, discovered a semi-submersible vessel believed to be used in<br />

the drug trade. It was found in a jungle river near the town of Mosquera in the western department of<br />

Nariño, according to a navy announcement.<br />

The craft is reported to be 20 meters long and capable of carrying up to four people and eight<br />

tons of cocaine. Its two engines would allow it to travel easily to the Central American coast,<br />

according to estimates provided to El Espectador.<br />

Vice Admiral Rodolfo Amaya stated that the semi-submersible was used by the Rastrojos<br />

gang. The vessel has an estimated worth of $1 million.<br />

f 25


<strong>OSINT</strong> <strong>Nuggets</strong><br />

InSight Crime Analysis<br />

Page 7 of 25<br />

Seventy-seven drug trafficking vessels that were capable of traveling at least partly submerged beneath the surface of the<br />

ocean have been found in the region in the past decade -- 60 of those within Colombian waters, El Mundo reported.<br />

According to the Navy, only two of the devices f were 25 fully submersible.<br />

In February 2011, Colombian authorities seized their first fully submersible vessel, which constituted “a huge<br />

technological leap” for traffickers, according to Admiral Hernando Willis of Colombia’s Pacific Joint Command.<br />

The vessel is the second semi-submersible to be seized this year by Colombian police. Most such “narco-subs” lack<br />

the technology to travel completely underwater, but still allow drug traffickers to transport their goods to countries like Costa<br />

Rica and Guatemala without detection. The Rastrojos, one of the most powerful transnational crime syndicates in Colombia,<br />

is believed to have a fleet of drug submarines at its disposal.<br />

The recent discovery is further evidence of narcotraffickers’ growing reliance on sophisticated technology to<br />

outmaneuver authorities. As drug enforcement agencies increasingly target routes used by traffickers, smugglers must find<br />

less conspicuous ways to transport their goods. Colombian drug trafficking organizations like the Rastrojos have long used<br />

coastal routes to smuggle drugs up to Central America and Mexico, from where they are shipped to the United States.<br />

http://www.insightcrime.org/insight-latest-news/item/2821-colombia-seizes-one-of-rastrojos-drug-sub-fleet<br />

November 4, 2009, Colombian drug dealers sick of getting busted by law enforcement have come up with numerous ways<br />

to transport their contraband to foreign shores. They used automobiles with secret compartments, human drug “mules,”<br />

high-speed aircraft and boats. Now, they’re trying their luck with submarines. http://declubz.com/blog/2009/11/04/cocainebust-drug-dealers-smuggle-using-submarines-for-transport/<br />

Comment/Analysis: It obviously must be profitable if three years later submarines are still in use. I have no idea how many<br />

loads the cartels are willing to sacrifice to get one through but I imagine the profits more than make up for the losses.<br />

Note: Pictures are hyperlinked to their web pages.<br />

June 29, 2012, US Treasury Points to Hezbollah Presence in Latin America.<br />

The US Treasury Department has blacklisted four Venezuelan and Lebanese men under the Kingpin Act for supporting an<br />

international drug trafficking and money laundering network linked to Hezbollah, revealing some of the group's activities in<br />

the Americas.<br />

One of the designees, Abbas Hussein Harb, a Venezuelan and Lebanese dual citizen, runs a Colombia and<br />

Venezuela-based organization that has laundered millions of dollars for Lebanese drug lord and previous Kingpin Act<br />

designee, the Lebanese drug lord Ayman Joumaa, who was indicted by a US court in late 2011. Another designee


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 8 of 25<br />

reportedly used his position as a bank branch manager in Lebanon to help move money for Harb and Joumaa. Harb's and<br />

Saleh's brothers were both also designated under the Kingpin act.<br />

Ali Mohamed Saleh, a Lebanese Colombian national and former Hezbollah fighter who was designated under the<br />

Kingpin Act in December 2011, is accused of leading a cell to raise money for Hezbollah in Maicao, Colombia. He was<br />

designated under the Treasury's anti-terror authority, Executive Order 13224. Saleh, according to a Treasury press release,<br />

solicited donations for the group and coordinated cash and check transfers using couriers who traveled to Lebanon through<br />

Venezuela. He was previously blacklisted for laundering money for a criminal group linked to the drug lord Ayman Joumaa.<br />

A Treasury official told InSight Crime the terrorism designation for Saleh changes his legal status and puts him on<br />

terrorist watchlists, in addition to the secondary effect of publicizing his status as a supporter of terrorism. The Kingpin<br />

designation blocks US citizens and businesses from working with the four men and freezes any US assets they own.<br />

The department also sanctioned three businesses owned by Harb and Saleh, two of them in Colombia and one in<br />

Venezuela.<br />

InSight Crime Analysis<br />

The designation follows a report by an Italian newspaper alleging that Iran and Hezbollah were plotting a terror<br />

attack in Latin America, which seemingly has not come to fruition, despite some voices who insist on Hezbollah's terrorist<br />

ambitions in the region.<br />

These latest Kingpin Act designations highlight Hezbollah's presence in Latin America, but the threat that the<br />

militant group presents to the region should not be overhyped. Hezbollah does receive a substantial amount of money in the<br />

form of remittances from South America, especially Paraguay's tri-border area shared with Brazil and Argentina, a hub for<br />

all varieties of smuggling and counterfeiting. The tri-border area has a large Lebanese population, some elements of which<br />

are thought to provide financial support to the group. But there is little evidence that Hezbollah is actively involved in<br />

directing criminal enterprises in the region.<br />

http://www.insightcrime.org/insight-latest-news/item/2839-us-treasury-points-to-hezbollah-presence-in-latam<br />

Comment/Analysis: The presence of Hezbollah should not come as a surprise since as early as 2008 Hugo Chavez was<br />

already hosting the group and suspicion was that Venezuela was being used as a base of operations. Hezbollah was also<br />

linked to deadly attacks on Jewish targets in Argentina in the early 1990s. The group has had plenty of time to incubate and<br />

become familiar with Latin America, and should be viewed as an immediate threat. Iran would not have any problems<br />

funding ant-U.S. operations under plausible deniability. However, they are terrible when it comes to such adventures.<br />

The Northern Border and Beyond<br />

July 13, 2012, Graphic: Mexican drug cartels’ spreading influence. Invasion of the Drug Cartels.<br />

The Mexican drug trade has left more than 50,000 bodies in its wake since 2006, and the<br />

cartels appear to be looking to expand their networks. With this in mind, the National Post’s<br />

graphics team takes a look at the flow of drugs across the continent.<br />

https://nationalpostnews.files.wordpress.com/2012/07/fo0714_mexicoweb1500.jpg<br />

Comment/Analysis: This map/graphic should be studied with some caution. Although it does<br />

not give a true representation of all the cartels it does still provide some useful information that<br />

can be used in analysis. The important thing is not to take everything at face value, but do<br />

some background checks to avoid embarrassing briefings or analysis. Compare this graphic to<br />

others and point out the differences, but do not disregard it entirely. Why does the graphic only<br />

shows 4 cartels and 1 unknown, and it does not show any linkages to the Sinaloa Cartel. We<br />

know that the Sinaloa Cartel has already made encroachment into the U.S. The graphic is linked to the web page for better<br />

viewing and reading. I have placed this article under the northern border since we are all too familiar with the southern<br />

border but have not heard too much about the drug cartels being fully operational in Canada. The other reason is that you<br />

will notice the flow of cartel influence arrows stop at the U.S./Canadian border. Well, we know it doesn’t actually stop there<br />

but continues northward, but where exactly? Perhaps with more study the arrows can be extended to their final destination<br />

in Canada. The graphic does serve a purpose, but should not be used as factual representation.<br />

f 25


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 9 of 25<br />

Could That Musca Domestica Be A Drone?<br />

f 25<br />

July 5, 2012, Maple Seed Drones Will Swarm The Future. Imagine a cheap, tiny, hovering aerial drone capable of being<br />

launched with the flick of a person’s wrist and able to provide 360-degree surveillance views that<br />

the user can manipulate.<br />

It’s real, it’s inspired by maple seeds, and the company behind it, Lockheed Martin,<br />

envisions a future in which swarms of the new drones can be deployed at a fraction of the cost<br />

and with greater capabilities than drones being used today by the military and other agencies.<br />

“Think about dropping a thousand of these out of an aircraft,” said Bill Borgia, head of<br />

Lockheed Martin’s Intelligent Robotics Lab, in a phone interview with TPM, “Think about the wide area<br />

over which one collect imagery. Instead of sending one or two expensive, highly valuable aircraft like<br />

we do today, you could send thousands of these inexpensive aircraft, and they are almost expendable.”<br />

The new drone which looks like very similar to a maple seed, with a small pod-like body<br />

attached a single whirring blade, is called the Samarai. The name is derived from the Latin word “samara,” which means a<br />

winged seed, just like the one that inspired its physical design, flight pattern and construction.<br />

In June, Lockheed Martin released a video demo of the drone’s capabilities, and it is clearly impressive, launched<br />

by hand and piloted using a tablet computer, which also displays the drone’s live surveillance feed.<br />

“You can literally pull this out of your pocket, throw it into the air, and it can start flying,” Borgia told TPM. “It can<br />

take off and land vertically indoors.”<br />

Borgia said that the drone, or unmanned aerial vehicle (UAV), was designed to be deployed in confined settings,<br />

such as urban environments or even inside buildings, where it could be piloted into different rooms and hover outside of<br />

windows, collecting surveillance footage with ease.<br />

The technology behind the drone is even more sophisticated than it looks. There are only two moving mechanical<br />

parts in the entire tiny 30-cm aircraft: The piece that makes the propeller rotate and a flap on the large wing that comprises<br />

most of the drone’s form.<br />

Then there’s the Samarai’s realtime video feed, which an operator can pan and tilt in a full 360 degrees, a capability<br />

not found on any other drone of its class, this despite the fact that the drone only contains one camera which is constantly<br />

being whipped around by the rotating motion of the aircraft itself.<br />

In order to obtain a steady video feed with the ability to virtually pan and tilt, Lockheed relies on a series of image<br />

processing algorithms, Borgia told TPM.<br />

“The algorithms sort of de-rotate the video and turn it back into a frame-by-frame view, similar to what you would<br />

see on any basic TV,” Borgia said. “All of the image processing is done onboard.”<br />

That means that even if disconnected from the cloud or a control server, the Samarai would still be able to provide<br />

its operators with constant surveillance capabilities.<br />

Borgia declined to specify the drone’s range or endurance, that is, the time it’s able to stay aloft in the air.<br />

However, he did note that the Lockheed researchers behind Samarai had experimented with battery-powered and<br />

carbon-based fuel versions (the battery powered version is the one demonstrated in the video). Borgia further said that the<br />

researchers had “developed simulation tools that allow us to scale the vehicle to meet specific applications,” asked for by<br />

customers.<br />

Lockheed Martin has not revealed any of its customers or potential partners on the Samarai yet, but Borgia said the<br />

company would make announcements “when the customers were ready.”<br />

Besides the 30-cm (11.8 inches) version shown in the June demo video, Lockheed also has field-tested a 17-cm<br />

(6.7 inches) version and is working now to scale down the Samarai even further, to the size of an actual maple seed.<br />

Asked about any potential privacy concerns presented by the Samarai, especially in light of the recent release of a<br />

voluntary industry “code of conduct” from drone manufacturers, Borgia said that “customers will have to work through the<br />

hurdles.”<br />

Lockheed Martin began work on the Samarai in 2007 under a Defense Department program called “nano air,”<br />

designed to produce “an extremely small, ultra lightweight air vehicle system.”<br />

http://idealab.talkingpointsmemo.com/2012/07/maple-seed-drones-will-swarm-the-future.php<br />

June 27, 2012, China has reportedly developed unmanned aerial vehicles (UAVs) capable of interfering with the navigation<br />

of U.S. aircraft carriers in the Taiwan Strait and the South China Sea, according to foreign reports.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 10 of 25<br />

China Briefing, a news website sponsored by the Washington-based Jamestown Foundation, said China’s<br />

continued investment in UAV research will make it the second UAV country after the U.S., and its rapidly developed UAVs<br />

25<br />

will enable Beijing to interfere with the situation in the two bodies of water.<br />

The UAV has become an important tool for the Chinese navy to carry out “anti-intervention and regional isolation<br />

operations,” and the vehicles will be used particularly in anti-aircraft carrier combat, it said.<br />

Jane’s Defense Weekly reported that the Japan Maritime Self-Defense Force<br />

displayed two pictures captured by its surveillance aircraft that show three People’s<br />

Liberation Army Navy vessels crossing the Miyako waterway into the western Pacific on<br />

April 29.<br />

One of the pictures shows three UAVs practicing vertical take-offs and landings on<br />

the rear deck of China’s Type 054A frigate “Zhoushan.”<br />

Based on the picture, analysts speculated that the UAVs have good stealth<br />

capability and can carry 34 kilograms for six hours.<br />

When performing reconnaissance missions, the UAVs have different types of<br />

sensors mounted on their bellies. Target images recorded by the UAVs will be transferred to<br />

frigates at sea using data link carriers, the weekly reported.<br />

Jane’s Defense Weekly reported that the UAVs spotted by Japan’s defense ministry are similar to the Camcopter S-<br />

100s built by Austria-based Schiebel Corp.<br />

The weekly magazine suspected that the Austrian company breached the European Union’s arms embargo to<br />

China.<br />

But Schiebel Corp. said its sale of civil S-100 UAVs to China in 2010 was in line with European Union regulations<br />

and stressed that the UAVs shown in the photos were not S-100s. The company suspected they might be products<br />

developed independently by the Chinese army.<br />

Whatever the origin of the UAVs, James C. Bussert, editor at the U.S.-based Signal Magazine, said in an article that<br />

simply having UAVs would not be enough for the People’s Liberation Army to attack U.S. aircraft carriers.<br />

The army will need to have a comprehensive operational support system for search, identification, track, locks,<br />

combat and assessments against the “sources of threats,” before it can complete a “kill chain,” Bussert said.<br />

He added, however, that the UAVs will be the integral part of the “kill chain.”<br />

CAMCOPTER S-100 by Schiebel Aircraft GmbH, Austria.<br />

Surveillance and reconnaissance, target acquisition and designation, communications<br />

relay, precision delivery, aerial mapping, traffic control, disaster monitoring, harbor patrol,<br />

pipeline monitoring – land and sea operations by day and night.<br />

Dimensions:<br />

Length: 3.11m<br />

Height: 1.12m<br />

Rotor diameter: 3.4m<br />

Weight: empty: 243lb<br />

MTOW: 440lb<br />

Max payload: 110lb<br />

Performance:<br />

Speed: 120kt<br />

Endurance: 6hr (with 75lb payload) plus optional external fuel tank – extending endurance up to 10hrs<br />

Ceiling: 18,000ft<br />

Mission radius: 150km<br />

Endurance speed: 55kt<br />

Payload: universal mount allows for a wide variety of payloads – EO/IR laser, designation and various radars<br />

Data Link: C-band Guidance/Tracking: DGPS/INS<br />

Launch: VTOL Recovery: VTOL Structure Material: carbon fibre.<br />

System Components: two aerial vehicles, one GCS Electrical Power: 500W at 28V DC GCS: two network-based mission<br />

planning/control and payload workstations, tracking antenna, UHF backup antenna, GPS reference module, pilot control<br />

unit.<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 11 of 25<br />

Comment/Analysis: The more the U.S. pushes into China’s backyard, the more the Chinese will develop and experiment<br />

with technology to counter systems based around carrier battle groups. The Chinese are well aware that an aircraft carrier,<br />

even with all that firepower on board, is extremely vulnerable if they can negate some or all of its accompanying protection.<br />

My guess is that they will go after the supporting protection f 25 first. Expect to see more emphasis on isolating the carrier’s<br />

tentacles.<br />

July 1, 2012, Despite concerns about U.S.-made drones ending up in enemy hands, American military contractors are<br />

lobbying the government to loosen export restrictions and open up foreign markets to the unmanned aircraft that have<br />

reshaped modern warfare.<br />

Companies such as Northrop Grumman Corp. and other arms makers are eager to tap a growing foreign appetite<br />

for high-tech — and relatively cheap — drones, already being sold on the world market by countries such as Israel and<br />

China.<br />

Comment/Analysis: There was a time when the U.S. had really cornered the market on drone technology, and to some<br />

extent we still have the upper hand, however, we must admit that even countries like Iran are fast catching up. Might as well<br />

get in on the action and bring in some revenue. I see the day when the U.S. will actually acquire drones from other countries<br />

because of superior capabilities. I’m wondering if we haven’t already done so. Hint, hint.<br />

August 16, 2010, Bomb Kills Iran's Military Drone Program Chief. On Aug. 1, Reza Baruni, the father of Iran's military UAV<br />

program, died in a mighty explosion that destroyed his closely secured villa, debkafile's military and intelligence sources<br />

reveal. He lived in the high-scale neighborhood secluded for high Iranian officials in the southern town of Ahwaz in oil-rich<br />

Khuzestan.<br />

Very few people in the country outside the top leaders and air force knew about his job and so his death was not<br />

generally appreciated as fatally stalling Iran's military drone program for many years.<br />

The official version produced the old standby of an exploding gas canister as the cause of the blast.<br />

However, DEBKA-Net-Weekly's intelligence source report that bombs were planted in at least three corners of the building<br />

and expertly rigged to explode simultaneously and bring the ceilings crashing down on its occupants. The bomber must<br />

therefore have had access to the Baruni home.<br />

The authorities tended to fix the blame on underground organizations representing the local Arab-speaking<br />

Ahwazis' fight for self-rule against the repressive regime. Some suspect certain Gulf Arab emirates' intelligence services<br />

commissioned the Baruni murder.<br />

Hiding behind his public face as a retired army major, the dead man created Iran's program for manufacturing<br />

military drones from scratch and trained a new generation of engineers and planners to take over. But despite his efforts<br />

and the hefty sums Iran invested in the industry, the product never really came up to the advanced standards achieved by a<br />

very few countries.<br />

Five months ago, U.S. Defense Security Robert Gates told the Senate Appropriations Committee. "Countries like<br />

Iran are developing their own UAVs and already have a UAV capability. That is a concern because it is one of these areas<br />

where, if they chose to - in Iraq, in Afghanistan - they could create difficulties for us."<br />

There is also a growing concern that drone technology could be sold to terrorist groups.<br />

Gates was responding to a statement last February by the Iranian Air Force's coordination deputy, Brigadier General Aziz<br />

Nasirzadeh, that Iran had successfully tested the prototype of its first domestically-built "stealth drone" calling it Sofeh Mahi<br />

(Manta Ray)."<br />

He boasted that the drone, "due to its physical attributes and the material used in its body, cannot be detected by<br />

any radar." But he also introduced a cautious note by explaining that the production process would not be rushed, as such<br />

complex systems need thorough analysis and exhaustive testing. http://rense.com/general91/drone.htm<br />

Comment/Analysis: This article is 2 years old but I’m wondering how much progress has been made since that time. The<br />

death of Reza Baruni brings to mind the deaths of Iran’s nuclear physicists and blamed on Israel. Is there a pattern here?<br />

July 1, 2012, Gray Eagle Gets Down. The U.S. Army began moving platoons (each with four aircraft) of its new MQ-1C<br />

Gray Eagle UAV (unmanned aerial vehicle) to Afghanistan late last year. Two months ago it sent the first MQ-1C company<br />

to Afghanistan, where it has completed over 200 sorties. An MQ-1C aviation company has 115 troops, 12 MQ-1Cs, and five<br />

ground stations. The army has been adding a lot of new electronics to the MQ-1Cs and this has caused some reliability


<strong>OSINT</strong> <strong>Nuggets</strong><br />

problems. This has lowered the rate of available (for flying) MQ-1Cs, but the army believes it will<br />

overcome all the software problems and that the MQ-1Cs that do get into the air are doing<br />

outstanding work at tracking and attacking the enemy.<br />

In addition to the usual surveillance and attack chores, some MQ-1Cs are assigned to<br />

QRC (Quick Reaction Capability) platoons of four aircraft. These QRC units are kept in<br />

readiness, especially during large operations against the Taliban, to quickly get into the air and<br />

pursue new information (or fleeing Taliban believed to be leaders or other key personnel). With<br />

their night vision and SAR (Synthetic Aperture Radar), the MQ-1Cs rarely lose anyone they spot<br />

on the ground. Since an MQ-1C can stay in the air over 20 hours at a time, they can work in<br />

shifts if they have to until hidden Taliban fugitives eventually come out again. This use of Gray<br />

Eagles has greatly increased the losses among the Taliban leadership.<br />

The first MQ-1C aviation company was formed three years ago and was assigned to the<br />

U.S. Army 160th SOAR (Special Operations Aviation Regiment), which belongs to SOCOM<br />

(Special Operations Command). The army plans to eventually equip each combat brigade with an<br />

MQ-1C company and establish over three dozen of these companies.<br />

The Gray Eagle is joining a large existing UAV fleet. At its peak two years ago, the army<br />

had 87 RQ-7 Shadow UAV systems (with several UAVs each), six MQ-5 Hunter systems, nine<br />

MQ-1Cs, 12 Sky Warrior Alphas, over 4,000 Ravens (in 1,300 systems, assigned to infantry<br />

companies, convoys, and base defense), and 16 RQ-18 MAV (helicopter type) systems. Army<br />

UAVs spent over 25,000 hours a month in the air. It took army UAVs 13 years to achieve their<br />

first 100,000 air hours and 8.5 years to get their next 900,000 hours. With the withdrawal of troops<br />

from Iraq and the reduction of forces in Afghanistan, many of the older UAVs are being retired.<br />

The MQ-1C weighs 1.5 tons, carries 135.4 kg (300 pounds) of sensors internally, and<br />

up to 227.3 kg (500 pounds) of sensors or weapons externally. It has an endurance of up to 36<br />

hours and a top speed of 270 kilometers an hour. MQ-1C has a wingspan of 18 meters (56 feet)<br />

and is 9 meters (28 feet) long. The MQ-1C can carry four Hellfire missiles (compared to two on<br />

the Predator), or a dozen smaller 70mm guided missiles. Each MQ-1C costs about $10 million.<br />

Page 12 of 25<br />

The army uses warrant officers as operators. The MQ-1C has automated takeoff and<br />

landing software and is equipped with a full array of electronics (target designators and digital<br />

communications so troops on the ground can see what the UAV sees).<br />

The original MQ-1 Predator is a one ton aircraft that is 8.7 meters (27 feet) long with a<br />

wingspan of 15.8 meters (49 feet). It has two hard points, which usually carry one (47 kg/107<br />

pound) Hellfire each. Max speed of the Predator is 215 kilometers an hour while max cruising<br />

speed is 160 kilometers an hour. Max altitude is 8,000 meters (25,000 feet). Typical sorties are<br />

12-20 hours each.<br />

The 159 kg (350 pound) Shadow 200s carry day and night cameras and laser designators but usually no weapons.<br />

Most of the new army heavy UAVs delivered over the next five years will carry missiles, and by 2015, the army wants to<br />

have over 500 MQ-1Cs.<br />

The army has been quietly building its new force of larger UAVs for a while. Six years ago the army quietly bought<br />

twenty Predator type UAVs (called Sky Warrior Alpha) from the same firm that manufactures the Predator and Gray Eagle.<br />

These were in Iraq for over two years, mainly for counter-IED work with Task Force Odin. The one ton Sky Warrior Alpha<br />

can carry 204.5 kg (450 pounds) of sensors and 134.5 kg (300 pounds) of weapons, and a few of them have fired Hellfire<br />

missiles. Sky Warrior Alpha is, officially, the I-Gnat ER, which is based on a predecessor design of the Predator, the Gnat-<br />

750, and an improved model, the I-Gnat (which has been in use since 1989). The I-Gnat ER/ Sky Warrior Alpha looks like a<br />

Predator but isn't. In terms of design and capabilities, they are cousins.<br />

As its model number (MQ-1C) indicates, this UAV is a Predator (MQ-1) replacement. The U.S. Air Force had<br />

planned to replace its MQ-1s with MQ-1Cs but later decided to buy only larger Reapers. The MQ-1C was developed by the<br />

Army. The third member of the Predator family is the MQ-9 Reaper. This is a 4.7 ton, 11 meter (36 foot) long aircraft with a<br />

20 meter (66 foot) wingspan that looks like the MQ-1. It has six hard points and can carry about a ton (2,400 pounds) of<br />

weapons. These include Hellfire missiles (up to eight), two Sidewinder or two AMRAAM air-to-air missiles, two Maverick<br />

missiles, or two 227 kg (500) pound smart bombs (laser or GPS guided). Max speed is 400 kilometers an hour, and max<br />

endurance is 15 hours. The Reaper is considered a combat aircraft, to replace F-16s or A-10s in ground support missions.<br />

http://www.strategypage.com/htmw/htairfo/articles/20120701.aspx<br />

25<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 13 of 25<br />

Punch, Counterpunch<br />

f 25<br />

The Cyber Punch: June 19, 2012, U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say.<br />

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in<br />

preparation for cyber-sabotage aimed at slowing Iran’s ability to develop a nuclear weapon, according to Western officials<br />

with knowledge of the effort.<br />

The <strong>Global</strong> Cyber Counterpunch: June 11, 2012, India to greenlight state-sponsored cyber attacks. The Indian<br />

government is stepping up its cyber security capabilities with plans to protect critical national infrastructure from a Stuxnetlike<br />

attack and to authorise two agencies to carry out state-sponsored attacks if necessary.<br />

Sources told the Times of India that the government’s National Security Council, headed by prime minister<br />

Manmohan Singh, is currently finalising plans which would give the Defence Intelligence Agency (DIA) and National<br />

Technical Research Organisation (NTRO) the power to carry out unspecified offensive operations.<br />

India is also hoping to co-ordinate its defensive capabilities better, in the event of an attack which could debilitate its<br />

critical infrastructure.<br />

The country was reportedly hit by Stuxnet, although it doesn’t appear to have caused any serious damage and was<br />

unlikely to have been a deliberately targeted attack.<br />

With this in mind, the NTRO is likely to be called on to create a 24-hour National Critical Information Infrastructure<br />

Protection Centre (NCIPC) to monitor threats, while sector-specific Computer Emergency Response Teams (CERTs) will<br />

also be recommended, the report said.<br />

The NTRO and Intelligence Bureau (IB) will be given responsibility for the security of various government networks,<br />

it added.<br />

The Indian government is some way behind the US and UK in its formulation of a coherent national cyber security<br />

policy, and has been criticised in the past for its slow response to denial of service and web defacement attacks.<br />

Most recently it has been under fire from hacktivist collective Anonymous in retaliation for its stance on illegal file<br />

sharing, while hackers from neighbouring rival Pakistan are thought to represent a constant threat.<br />

Last month Symantec warned that the lack of security know-how among the country's growing urban population and<br />

small and medium sized businesses is being exploited with increasing ruthlessness by criminals.<br />

Comment/Analysis: Expect for more countries to follow India’s example with tacit government approval. The realization<br />

should be that other countries are beginning to see the U.S. as a cyber cowboy that gives them the right to act in the same<br />

fashion. Too much has already been made public about U.S. cyber capabilities and is sure to make other countries<br />

suspicious about the U.S.. One has to consider, based on previous reporting, that our critical infrastructure is vulnerable to<br />

attack.<br />

Steganograhy<br />

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and<br />

intended recipient, suspects the existence of the message. The idea is to hide information inside information.<br />

Jul 21, 2012, Every picture tells a (secret) story. The image is simple: a photograph of a fierce tiger leaping across a field of<br />

clean snow.<br />

But there is more. What you don't see is the two embedded images - a wide-eyed kitten and a handwritten<br />

message.<br />

They are deeply embedded in the digital information of the photograph, hidden in such a way that they only slightly,<br />

almost imperceptibly alter the photo's appearance. But to a viewer armed with the message's unique algorithm decoder,<br />

they are simple to unpick.<br />

Using a new technique developed by a Dubai researcher, hiding those images may have just become easier to do,<br />

and more difficult to detect if intercepted. Steganography, a data-hiding method that aims to ensure that only the message's


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 14 of 25<br />

sender and receiver know there is secret content, has typically used an approach that manipulates the image's pixels or<br />

data.<br />

25<br />

Chief among the field's uses is the desire of those involved in covert intelligence work to transmit messages without<br />

being snooped upon by others. Beyond that, it has potential for use in digital "watermarking" - embedding copyright<br />

information in an image in a way that's hard to spot, and therefore hard for a potential plagiariser to remove, but that the<br />

original owner can hold up as evidence that the image is theirs.<br />

Now a pioneering new method by Dr Tamer Rabie, a computer science professor at the Canadian University of<br />

Dubai, claims to embed more information that is harder to spot and is less susceptible to tampering.<br />

"The idea is, if the tiger image is intercepted, they shouldn't notice a change or notice anything odd about this<br />

ordinary-looking photograph," Dr Rabie said.<br />

"Then the hidden messages need to be recovered without too much degradation."<br />

Dr Rabie revealed his algorithm, which effectively scatters the hidden image three times across all the pixels of the<br />

"host" image, at a conference in Dubai in April.<br />

This threefold scattering, he says, makes the hidden image secure enough that it can be sent with confidence<br />

across an insecure network.<br />

Starting with a standard JPEG - the most common type of image on the internet - the method first identifies the part<br />

of the image that will be least affected visually by the addition of the secret data.<br />

"You hide information in the insignificant parts of the image," said Dr Rabie. "It could be anything - another image,<br />

sound. You could do it on a small laptop. Anybody could do it."<br />

The method uses fast fourier transform (FFT) to break pictures down into their constituent elements of frequency,<br />

magnitude and phase. The phase part describes how the objects in the picture are positioned in relation to each other, a<br />

valuable component of the way eyes perceive images.<br />

Tampering with that would be easily seen in the picture. So in inserting the secret image, it is left unaltered. But the<br />

magnitude can be modified with barely any effect on the overall appearance of a picture. And the magnitude element can be<br />

further broken down into two parts - colour and brightness - allowing two images to be hidden within a single picture.<br />

Of those, we are more sensitive to changes in brightness than colour, making messages hidden in the colour<br />

channel much harder to spot.<br />

In his paper, Dr Rabie notes that FFT "promises high fidelity, double the capacity of previous methods, higher<br />

security and robustness to tampering".<br />

Older "stego" techniques allowed images to be hidden within only about 12 per cent of the area of the "host" image.<br />

The FFT method increases that to as much as half the area. And it is more robust, with images retaining their secrets under<br />

heavier manipulation than previous methods. With the new method, up to 60 per cent of the information in the "host" image<br />

can be destroyed before the hidden message becomes unreadable.<br />

Even with extreme tampering on the image, including repainting and rotating the image 90 degrees, the hidden<br />

message remains intact.<br />

This is because the secret information is embedded - not in individual pixels - but spread across all of them. And the<br />

algorithm makes hiding a picture easy.<br />

Dr Rabie says he has taught students how to unlock a hidden messages in just one lecture There are, however,<br />

concerns about the technique's practical use.<br />

"The paper does not study what is called 'steganographic security', which is a serious drawback," said Jessica<br />

Fridrich, a professor at the State University of New York at Binghamton and author of Steganography in Digital Media.<br />

"It belongs to a category that I call 'data stuffing' - hide as much as you can so that the visual quality does not<br />

degrade ... I can apply computer algorithms and prove beyond doubt that there is a hidden message in the image."<br />

If that is the case, she says, anyone looking for a hidden message within a picture could do the same. And knowing<br />

a hidden image is there is a good step towards working out what it is. Dr Rabie admits his work does not address the<br />

additional security needed to ensure a computer algorithm could not pick up on hidden messages.<br />

"Full steganography means the information also has to be very secure, but my research is a new idea for<br />

information hiding," he said.<br />

"If someone wanted to use it, they would have to add an extra layer of security to make it more secure, but that's not<br />

part of my research."<br />

But he says the possibilities for further steganography research using the FFT approach are far from exhausted. It<br />

could be applied to other types of media - audio and video, for example. http://www.thenational.ae/news/uae-news/everypicture-tells-a-secret-story#full<br />

Comment/Analysis: In 2010 there were approximately 294 billion emails sent per day, and it is estimated there are<br />

somewhere between 500 billion to 1 trillion photos from all sources on the internet. I have no idea if these figures are<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 15 of 25<br />

accurate as there is really no way to come up with a precise number. Trying to determine which have secret information<br />

embedded in them is not an easy task. I suspect the advantage would have to go to the criminal.<br />

f 25<br />

<strong>OSINT</strong><br />

June 28, 2012, Covering your digital footprints. Scanning the Internet for open source intelligence can leave a trail back to<br />

U.S. government networks. Cybersecurity expert Andrea L. Hlosek explains the risks of <strong>OSINT</strong> and how analysts can cover<br />

their tracks.<br />

The average citizen's Internet activity is easily tracked, information that in the hands of tech-savvy marketers may<br />

be helpful or merely annoying. But in the hands of cyber adversaries, it's downright dangerous.<br />

The Internet delivers so much information to our fingertips that it's no surprise the “Google it” phenomenon has<br />

expanded to our professional lives. Government employees, particularly in the fields of intelligence, law enforcement,<br />

national security and defense, make highly effective use of the Internet as a research tool, but more emphasis needs to be<br />

placed on ensuring cyber adversaries can't follow someone's online and open source searches back to sensitive<br />

government networks.<br />

Even the U.S. intelligence community may not be doing a good enough job in helping Web-surfing analysts hide<br />

their open source research, and some government agencies don't attempt to hide their research tracks at all.<br />

A perfect storm of conditions has brought this danger to the forefront: Overstretched intelligence collection<br />

resources have spurred the growth of open source intelligence, or <strong>OSINT</strong>, now referred to as the “source of first resort”; the<br />

digital information explosion has made open source research highly lucrative; the high operations tempo of intelligence<br />

analysts has cut severely into training time and tradecraft development; and cyber adversaries have grown tremendously in<br />

sophistication.<br />

For intelligence analysts competing for scarce traditional collection resources, the growth of the Internet provides<br />

ample new digital information that can help meet information requirements. A recent Cisco Visual Networking Index found<br />

that about one-quarter of all Internet traffic consists of published reports, documents, website content, comments and other<br />

postings on accessible Web pages, including social networking sites. The law enforcement community also benefits from<br />

open source research, particularly publicly shared information on social networking sites.<br />

The danger is that not everyone is adequately informed of the threats such Internet activity can pose. While<br />

professional intelligence analysts (those conducting first-level analysis) are usually well-trained with strict oversight and<br />

control of their research methods, all-source, fusion or “ops intel” analysts at the unit level frequently don't have the same<br />

access to training or emphasis on open source tradecraft. They often use open source research to plug intelligence gaps in<br />

support of operational planning or assessment, and sometimes even operational staff planners are tempted to Google their<br />

way through intelligence gaps when intel support lags.<br />

Internet users must understand that unprotected open source research, conducted from attributable network<br />

domains (those that reveal the type of organization you are affiliated with, for example a .gov or .mil network), invites<br />

operational and cybersecurity risks. Today's cyber-savvy adversaries can easily determine that they are the subjects of<br />

online research from government Internet proxies. Not only does this create an operations security threat, tipping off<br />

operational focus areas, but it opens the door for malicious actors to adopt cyber countermeasures or mount exploitation<br />

campaigns against government networks to gain access to unclassified sensitive information.<br />

Widely deployed network defense tools such as anti-virus software and firewalls protect networks from incoming<br />

threats, but they do nothing to mask an organization's IP address when users venture onto the Internet. Government users<br />

(particularly <strong>OSINT</strong> novices) operating on the Internet in an unprotected manner leave a trail that can lead cyber<br />

adversaries back to high-payoff, data-rich government networks.<br />

One of the best ways to mitigate this vulnerability is to use non-attributable Internet connections, a solution many<br />

workers in the intelligence community have used for years. However, existing non-attribution measures may not stand up<br />

well to sophisticated cyber adversaries, and they need to be upgraded or modified to meet current cybersecurity needs.<br />

Non-attributable access allows government users to conduct open source research and Internet operations in an<br />

environment where their government affiliation is obscured. There are many reasons why government personnel should not<br />

reveal their analytic interest in particular topics and subjects on the Internet. The cover of anonymity is essential for<br />

intelligence analysts conducting open source foreign intelligence, or homeland security and law enforcement officials<br />

investigating hacking activity or monitoring an extremist Web forum.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 16 of 25<br />

Non-attributable networks are critical to conducting cyber reconnaissance of adversary networks or tracking<br />

criminals via their social media posts. Analysts supporting diplomatic or information operation missions may need quick and<br />

25<br />

reliable access to foreign websites when developing sociocultural understanding in support of strategic communication,<br />

humanitarian or crisis operations.<br />

Beyond national security, organizations such as the Department of Agriculture may need to research foreign crop or<br />

livestock conditions, trade markets, etc., but their users don't know they might be stumbling onto malicious websites or can<br />

be tracked by foreign intelligence services through their own digital footprint.<br />

Not only can visited websites be a source of malware, but browsing activity alone reveals sensitive information — a<br />

digital footprint — about your computer and network, particularly if the research activity is persistent or repetitive. Every time<br />

a user visits an Internet site, their Internet Protocol (IP) address is recorded in that site's Web server log. Basic analysis of<br />

such logs enables administrators to establish cyber personas of their frequent visitors.<br />

In addition to your IP address, US-CERT, in its “How Anonymous Are You?” security guide, explains that the<br />

following specific information is revealed every time you visit a website:<br />

• Date and time of visit.<br />

• Domain name, such as .mil or .gov<br />

• Software details, including which browser and operating systems you use.<br />

• Pages visited.<br />

“If a website uses cookies, the organization may be able to collect even more information, such as your browsing<br />

patterns, which include other sites you've visited,” US-CERT notes.<br />

When aggregated, organizational users who reside on common network IP addresses, with a characteristic network<br />

configuration and similar data handling practices, leave a highly targetable digital footprint for adversaries to pursue.<br />

Once a cyber-savvy adversary is tipped off to “suspicious” monitoring of their websites, a little further cyber<br />

exploitation of suspect IP addresses can reveal even more computer and network details that contribute to the cyber profile<br />

of a government user. Once adversaries identify a suspicious “footprint,” a quick search of the IT systems and suites<br />

purchased, installed or maintained by U.S. government organizations completes the puzzle, and a particular IP address is<br />

tagged as government or law enforcement affiliated.<br />

Think this is hard? Check out the “Careers & Employment” sections on corporate websites of vendors who provide<br />

IT support to your organization. High turnover in the IT field means frequent job advertising, and those employment ads list<br />

required skills specific to IT products and services affiliated with your organization's networks — valuable details used in<br />

compiling a digital footprint.<br />

Adversary Countermeasures<br />

Once a digital footprint is established, critical information about your organization's mission sets and operational<br />

focus is revealed through the analysis of visited websites, and analysts can become victims of cyber countermeasures.<br />

At a minimum, research subjects alerted to government interest can block access to their websites from incoming<br />

.gov or .mil addresses, or they can move or take down their site altogether. Going a step further, adversaries can spoof<br />

government research efforts by re-directing “suspicious” IP addresses to fake websites that provide minimal or even false<br />

information. Worst case: Cyber adversaries introduce malware on the spoofed website, ensuring that unwanted visitors<br />

download malicious code upon accessing the page. The malware might be spyware that facilitates further reconnaissance,<br />

or worse, delivers malicious code that exploits unpatched vulnerabilities in network systems.<br />

The government user's network now becomes a target for intelligence collection and social engineering. This can<br />

take the form of well-crafted spear phishing campaigns, using reference terms from your own browsing history to gain your<br />

trust and penetrate your network.<br />

Protection Shortfalls<br />

So what has traditionally been done to protect government networks from dangerous Internet practices? The<br />

simplest measure involves local base network administrators blocking access to foreign or other “dangerous” websites;<br />

government users get an “Error: your firewall blocked access” message when trying to browse certain sites. While this is a<br />

sound network defense measure, it can severely impair research efforts.<br />

More often, one or two government computer terminals are connected directly to a commercial Internet service<br />

provider. Users are then allowed access to the Internet through a virtual local area network on the government domain.<br />

These open access terminals tend to be located in common areas or near the IT Help Desk, sometimes a considerable<br />

distance from analyst workspaces, making them rather inconvenient to use. Depending on the configuration of the VLAN,<br />

performance and connection reliability may also be affected, hampering research efforts.<br />

Furthermore, the associated IT equipment and network configurations in use usually conform to government<br />

standards because the ISP-connected computers come from regular IT stock and therefore match the profiles of known<br />

“government” boxes.<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 17 of 25<br />

Finally, the commercial Internet connection in use resolves to a single IP address in a particular city. A cyber<br />

adversary who sees an IP address whose computer and network details match established government profiles simply<br />

Googles known government facilities and organizations hosted within that geographic area, and develops a list of possible<br />

matches.<br />

f 25<br />

More robust legacy non-attribution measures were implemented by the IC to “anonymize” Internet activity through<br />

the use of proxy or anonymizing servers or virtual private networks. In the case of anonymous network proxy servers or<br />

software, several limitations exist: The proxy can be slow in loading desired information, browser add-ons can still be used<br />

to reveal the source IP address, and websites being researched can choose to block access from users browsing via<br />

anonymous proxy servers.<br />

Furthermore, if anonymizing services make use of U.S.-based servers for their connection, users still divulge a U.S.centric<br />

digital footprint — problematic when researching foreign websites. VPNs also reveal information about the user's<br />

cyber profile, namely the browser, the operating system and the language-related character set in use, all of which can<br />

reveal a U.S.-centric cyber presence.<br />

Other more exotic solutions such as Tor, which combines encryption and multiple proxy server hops, may<br />

unknowingly compromise users by routing them through rogue exit nodes. These nodes are hosted by adversaries who act<br />

as members of the Tor network, all the while intercepting and logging your Web traffic.<br />

A final consideration is: “How do I want my cyber profile to appear on the Web?” Yes, a user may appear<br />

“anonymous,” but guess who else uses anonymization measures: cyber criminals, traffickers and child pornographers. The<br />

effort to achieve anonymity can itself draw unwanted attention to online activities — users begin to look suspicious in their<br />

effort to “not look suspicious.”<br />

Today's cyber adversaries are complex and sophisticated professionals with access to funds and resources. They<br />

freelance and rent their services and tools to international criminal networks, foreign intelligence services and extremist<br />

groups, and understand anonymization far better than users do.<br />

Users need to find different and more effective non-attributable Internet solutions that are also agile enough to keep<br />

up with evolving cyber threats. Contrary to most current approaches, the goal of today's open source researchers shouldn't<br />

be an anonymous profile but rather an inconspicuous one.<br />

Effective non-attribution can be achieved when Internet users apply a multipronged approach that helps them to<br />

inconspicuously blend in to, rather than try to hide in, the World Wide Web. Any government agency that has a need for<br />

open source Internet research should implement a secure and comprehensive non-attribution program to minimize cyber<br />

vulnerabilities and maximize open source research opportunities.<br />

http://www.defensenews.com/article/20120628/C4ISR02/306280008/Covering-your-digital-footprints?odyssey=nav|head<br />

Comment/Analysis: What really surprises me is that no matter how many times analysts are warned about leaving digital<br />

footprints, it just doesn’t seem to sink in. This article will be read by many analysts, but by the time they read the last line it is<br />

business as usual. There are many branches of government that make it quite simple to get non attributable access to<br />

conduct safe searches. I have met analysts who try to mask their searches to try and mislead, however, the vast majority<br />

are not trained in the unique tradecraft.<br />

Naval War College Review, Spring 2012, Vol. 65, No. 2, TAKING MINES SERIOUSLY. Mine Warfare in China’s Near Seas.<br />

We have recently completed a two-year-long study of over 1,000 Chinese language articles concerning naval mine warfare.<br />

Our three most important findings are: (1) China has a large inventory of naval mines, many of which are obsolete but still<br />

deadly, and somewhat more limited numbers of sophisticated modern mines, some of which are optimized to destroy<br />

enemy submarines. (2) We think that China would rely heavily on offensive mining in any Taiwan scenario. (3) If China were<br />

able to employ these mines (and we think that they could), it would greatly hinder operations, for an extended time, in<br />

waters where the mines were thought to have been laid. The obvious means of employing mines are through submarines<br />

and surface ships. Use of civilian assets should not be discounted. But we also see signs of Chinese recognition of the fact<br />

that aircraft offer the best means of quickly laying mines in significant quantity. These aircraft would be useless, however,<br />

without air superiority. http://www.usnwc.edu/getattachment/19669a3b-6795-406c-8924-106d7a5adb93/Taking-Mines-<br />

Seriously--Mine-Warfare-in-China-s-Ne<br />

Comment/Analysis: I include the Military Intelligence publication and Naval War College Review under <strong>OSINT</strong> because of<br />

the examples given in using open source information. A two-year review of over 1,000 Chinese articles is a good example of<br />

bringing together information to give a clear picture of capabilities and intentions of an adversary. This also complements<br />

my comments in the July issue of applying asymmetric warfare to a superior force. Chinese mine warfare in conjunction with<br />

fast-attack boat strategy gives China a tremendous defensive capability against ships operating close to the mainland.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

The Criminal Mind in Motion<br />

Page 18 of 25<br />

July 9, 2012, Cops bust man with cocaine-saturated clothes. Dubai Police foiled a bid to smuggle clothes saturated with<br />

cocaine, announced anti-narcotics sources on Sunday.<br />

An Arab businessman identified as MA, 28, with a university education qualification, was intercepted carrying the<br />

illegal items on his way from Sao Paulo in Brazil to Damascus via Dubai International Airport.<br />

Major General Abdul Jalil Mahdi Mohammed Director General of the Drug Enforcement Department of Dubai police<br />

said the antinarcotics airport section managed to foil the smuggling bid while he was heading to the departure gate.<br />

The police had received a tip that MA possessed narcotic drugs. He arrived on June 1. As he was preparing to<br />

depart — believing that he had succeeded — an officer stopped him.<br />

He had two bags on the baggage handling conveyer belt and a small one in his hand. The officer ordered him to<br />

unzip his bags to examine the contents.<br />

They turned out to be containing only clothing supposedly belonging to him. However, the persistent smell of<br />

cocaine emanating from them drew suspicion.<br />

He was referred to the anti-narcotics department where the bags were proved to weigh 56.750kg.<br />

Upon questioning, he confessed that it was a consignment he received from a compatriot, HZ, who promised to<br />

reward him with $5,000. MA was heading to see a person in Damascus who was supposed to meet him at the airport.<br />

However, the police did not disclose the amount of cocaine the clothes were saturated with.<br />

http://www.emirates247.com/news/emirates/cops-bust-man-with-cocaine-saturated-clothes-2012-07-09-1.466412<br />

Comment/Analysis: What next? Entire clothing made out of marijuana. Don’t laugh, take a peek at<br />

this web sites. While hemp will not get you stoned as marijuana does, the day is sure to come when<br />

someone is stopped for wearing shoes made out of marijuana.<br />

http://www.nepalartshop.com/hemphats/9.php<br />

http://shareholidayinfo.wordpress.com/category/vietnam/<br />

Hat description: Made out of green Cannabis (Hemp) plant. Cannabis Sativa one of the most useful<br />

species, grows naturally Nepal’s Himalayan climate. Nepal’s Cannabis Sativa is famous among marijuana users worldwide<br />

for its natural high and unique flavor.<br />

Russia<br />

June 26, 2012, The Bear at the Door. Russian strategic nuclear bombers threatened U.S. airspace near Alaska earlier this<br />

month and F-15 jets responded by intercepting the aircraft taking part in large-scale arctic war games, according to defense<br />

officials.<br />

The Russian war games began the same day President Obama and Russian President Vladimir Putin held a frosty<br />

summit meeting in Mexico June 18.<br />

U.S. officials said the arctic exercises over the Russian Far East and Pacific appeared to be a further sign of<br />

Russia’s hardening posture toward the United States.<br />

The Obama administration made no protest of the bomber intrusions, according to the officials, in line with its<br />

conciliatory “reset” policy of seeking warmer ties with Moscow.<br />

About 30 strategic nuclear bombers and support aircraft took part in the war games that continued through June 25.<br />

The aircraft included Tu-95MS Bear H and Tu-160 Blackjack nuclear-capable bombers, along with Il-76 refueling tankers, A-<br />

50 airborne warning and control aircraft, and Su-27 and MiG-31 jet fighters. Some 200 troops also took part in the Russian<br />

Strategic Aviation forces exercise.<br />

A spokesman for the joint U.S. Northern Command and North American Aerospace Defense command in Colorado<br />

Springs, which monitors air defense intrusions, had no immediate comment. A Pentagon spokesman declined to comment.<br />

25<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 19 of 25<br />

U.S. and Canadian F-15 and F-16 jets were involved in the intercepts that took place near the Air Identification<br />

Zone surrounding Alaskan airspace over the northern Pacific.<br />

The exercises are part of increasingly aggressive Russian military activities in the arctic region in both the eastern<br />

f 25<br />

and western hemispheres, which have created security worries among governments in northern Europe and Canada.<br />

One official said the failure to publicize the threatening bomber maneuvers might have been related to Obama’s<br />

overheard promise in March to Russian President Dmitri Medvedev of “more flexibility.”<br />

According to the defense officials, the arctic bomber exercises are part of Russian efforts to assert control over vast<br />

areas of the arctic circle that are said to contain large mineral and oil deposits.<br />

Retired Air Force Lt. Gen. Thomas McInerney, a former Alaska North American Aerospace Defense commander,<br />

said the Russian exercises should be a concern.<br />

“The Russians continue to exercise our air defense identification zone, which shows Mr. Putin loves to let President<br />

Obama know that they still have global capability,” McInerney said in an interview. “So much for reset.”<br />

McInerney also said the Obama administration kept the encounter between the bombers and U.S. fighters secret<br />

because “they obviously don’t want the world to know that the exercise was done deliberately to coincide with the Obama-<br />

Putin summit.”<br />

Obama and Putin met in Los Cabos, Mexico June 18 in what aides described later as a “businesslike” encounter.<br />

The two leaders, however, were shown in video and photos as unsmiling and displaying a cool demeanor toward each<br />

other.<br />

Russia’s government and military have threatened preemptive military attacks on future U.S. missile defense sites<br />

in Europe as part of a Russian propaganda campaign against those defenses. Moscow views U.S. and NATO missile<br />

defenses as threatening its strategic missiles.<br />

Defense officials said Russian bomber exercises highlight Moscow’s targeting of the U.S. missile defense base at<br />

Fort Greely, Alaska, one of two major ground-based interceptor bases that are part of a limited integrated missile defense<br />

system against North Korean and possibly future Chinese or Russian missiles.<br />

Additionally, the bomber exercises raised concerns that Russia was simulating cruise missile strikes aimed at<br />

disrupting U.S. oil pipelines in Alaska. Currently, the state’s Trans-Alaska pipeline delivers more than 11 percent of U.S. oil.<br />

The Russian bombers involved in the exercises are equipped with long-range precision-guided cruise missiles,<br />

including nuclear and conventional missiles.<br />

A similar bomber exercise in 2007 involved Bear H and Blackjack bombers that conducted simulated cruise missile<br />

attacks on the United States. Those bombers operated from strategic bomber bases at Anadyr, Vorkuta, and Tiksi.<br />

Military reference books state that Bear H bombers are deployed with six Kh-55 or Kh-55SM cruise missiles that<br />

can hit targets up to 1,800 miles away with either a high-explosive warhead or a 200-kiloton nuclear warhead.<br />

Russian Air Force Lt. Col. Vladimir Deryabin, a Defense Ministry spokesman, told Russian state-controlled news<br />

agencies that the main purpose of the war games was to provide practice for strategic, fighter, and special aviation aircrews.<br />

The first phase involved the dispersal of aviation groups to air bases in the northern and eastern region. A second phase<br />

deployed aircraft that flew in groups with fighter cover, he said.<br />

Deryabin said that the mission of the exercise was to “practice destruction of enemy air defenses and strategic<br />

facilities,” according to a June 25 dispatch by the Russian news agency Interfax.<br />

State Department documents made public by Wikileaks have revealed that Russian offensive military exercises in<br />

the arctic during the past several years have been aimed at Moscow’s efforts to “emerge as the dominant arctic power by<br />

default.”<br />

Such exercises have alarmed Norway’s government since many of the exercises took place near Norway’s coast.<br />

International discussions on Russian military exercises in the arctic have been highlighted by Moscow’s failure to<br />

provide pre-flight notification of bomber exercise flights.<br />

It could not be learned if the Russians notified the United States of the recent bomber exercises near Alaska.<br />

Canada has complained that earlier Russian bomber flights were conducted without Russia notifying the Canadian<br />

government.<br />

A classified 2009 cable from the U.S. Embassy Moscow said Russia in May 2009 outlined its policy toward the<br />

arctic for 2020 and beyond, and said Moscow adopted a “cold peace” policy against Europe and the United States. It stated<br />

that the region will be used for strategic resources and that Moscow is seeking to claim exclusive control over an emerging<br />

northern sea route passage.<br />

“The Arctic region, both within Russia’s legally clarified borders and in areas beyond, likely holds vast untapped<br />

resources of oil and gas,” the cable states. “While many Russian analysts are skeptical that any of these resources will be<br />

economically exploitable in the near future, the Russian leadership wants to secure sovereignty over these ‘strategic’<br />

resources.”


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 20 of 25<br />

As part of the arctic military expansion, Russia announced May 30 it was re-opening arctic air bases that had been<br />

closed after the Soviet Union collapsed in 1991.<br />

25<br />

Russian officials have said the strategic air bases will be used for arctic operations and include airfields in the far<br />

north at Naryan-Mar, on Novaya Zemlya, and Franz Josef Land.<br />

Naryan-Mar is a mainland strategic air base and Novaya Zemlya and Franz Josef Land<br />

are islands.<br />

Additionally, Russia has announced it is setting up an 8,000-troop Arctic Brigade that<br />

will be deployed on the Kola Peninsula, near Finland and Norway.<br />

In 2010, Adm. James A. Winnefeld, then-commander of the Colorado-based U.S.<br />

North Command, said in an interview that Russia has continued to fly its strategic nuclear<br />

bombers near U.S. airspace as part of Moscow’s efforts to maintain what he termed the illusion<br />

of power.<br />

“In some cases, this is about the illusion of power, where power is not quite there,”<br />

Winnefeld said from the Colorado Springs-based command known as Northcom. “They are<br />

trying to show the world that they are a powerful nation, and we’re not giving them the<br />

satisfaction.” http://freebeacon.com/the-bear-at-the-door/<br />

July 6, 2012, Russian Nuclear-Capable Bombers Intercepted Near West Coast in Second U.S. Air Defense Zone Intrusion<br />

in Two Weeks.<br />

Two Russian strategic nuclear bombers entered the U.S. air defense zone near the Pacific coast on Wednesday<br />

and were met by U.S. interceptor jets, defense officials told the Free Beacon.<br />

It was the second time Moscow dispatched nuclear-capable bombers into the 200-mile zone surrounding U.S.<br />

territory in the past two weeks.<br />

An earlier intrusion by two Tu-95 Bear H bombers took place near Alaska as part of arctic war games that a<br />

Russian military spokesman said included simulated attacks on “enemy” air defenses and strategic facilities.<br />

A defense official said the Pacific coast intrusion came close to the U.S. coast but did not enter the 12-mile area<br />

that the U.S. military considers sovereign airspace.<br />

The bomber flights near the Pacific and earlier flights near Alaska appear to be signs Moscow is practicing the<br />

targeting of its long-range air-launched cruise missiles on two strategic missile defense sites, one at Fort Greely, Alaska and<br />

a second site at Vandenberg Air Force Base, Calif.<br />

In May, Russian Gen. Nikolai Makarov, the chief of the Russian General Staff, said during a Moscow conference<br />

that because missile defense systems are destabilizing, “A decision on pre-emptive use of the attack weapons available will<br />

be made when the situation worsens.” The comments highlighted Russian opposition to planned deployments of U.S.<br />

missile defense interceptors and sensors in Europe.<br />

The U.S. defense official called the latest Bear H incident near the U.S. West Coast “Putin’s Fourth of July Bear<br />

greeting to Obama.”<br />

Retired Air Force Lt. Gen. Thomas McInerney, a former Alaska commander for the North American Aerospace<br />

Defense Command, said the latest Bear H intrusion appears to be Russian military testing.<br />

“It’s becoming very obvious that Putin is testing Obama and his national security team,” McInerney told the Free<br />

Beacon. “These long-range aviation excursions are duplicating exercises I experienced during the height of the Cold War<br />

when I command the Alaska NORAD region.<br />

McInerney said the Bear H flights are an effort by the Russians to challenge U.S. resolve, something he noted is<br />

“somewhat surprising as Obama is about to make a unilateral reduction of our nuclear forces as well as major reductions in<br />

our air defense forces.”<br />

“Actions by Russia in Syria and Iran demonstrate that Cold War strategy may be resurrected,” he said.<br />

“These are not good indications of future U.S. Russian relations.”<br />

Pentagon spokesman Capt. John Kirby said the incident occurred July 4. He said the “out-of-area patrol by two<br />

Russian long range bombers … entered the outer [Air Defense Identification Zone]” and the bombers “were visually<br />

identified by NORAD fighters.”<br />

Kirby said the bombers did not enter “sovereign airspace.” He declined to identify the specific distance the aircraft<br />

flew from the United States due to operational security concerns. He also declined to identify the types of aircraft used to<br />

intercept the bombers.<br />

In last month’s intercept of two Russian Tu-95 bombers, U.S. F-15s and Canadian CF-18s were used. The most<br />

likely aircraft used in Wednesday’s intercept were U.S. F-15 jets based at Elmendorf Air Force Base, Alaska.<br />

Kirby and U.S. Northern Command spokesmen, apparently in line with the Obama administration’s conciliatory reset policy<br />

toward Russia, sought to play down both bomber intrusions.<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 21 of 25<br />

The Pentagon spokesman said the latest Pacific intrusion was “assessed as another training activity.”<br />

Rather than using traditional military terminology common during the Cold War to describe the meeting of the<br />

violating bombers as an “intercept,” Kirby said that the bombers were “visually identified” by jets described only as joint<br />

f 25<br />

U.S.-Canadian North American Aerospace Defense Command (NORAD) jets.<br />

“NORAD is postured to ensure air warning and control for the continental United States, Canada, and Alaska,” Kirby<br />

said. “NORAD maintains an extensive radar system around North America and has aircraft located throughout the United<br />

States and Canada that can respond quickly to any unidentified flights approaching the Air Defense Identification Zone<br />

(ADIZ).”<br />

Kirby said the ADIZ extends about 200 miles from the coast and is “mainly within international airspace.”<br />

“The outer limits of the ADIZ goes well beyond U.S. sovereign air space which only extends 12 nautical miles from<br />

land,” he said. “As part of its mission, NORAD tracks and identifies all aircraft flying in the ADIZ in advance of any aircraft<br />

entering sovereign airspace.”<br />

The Free Beacon reported June 28 that two Bear H’s intruded into the Alaska ADIZ during war games that ended<br />

June 27.<br />

A Northern Command spokesman later disputed the Free Beacon’s assertion that the bombers violated U.S.<br />

airspace and said the air defense zone is not the same as sovereign airspace since it includes international airspace.<br />

However, the ADIZ is defined by the military as a nation’s declared area within which “the ready identification, the<br />

location, and the control of aircraft are required in the interest of national security.”<br />

Canadian Navy Lt. Al Blondin also said in an email that the Russian bombers during the air defense intrusion last<br />

month did not violate U.S. airspace.<br />

“NORAD will track and identify all aircraft flying in the ADIZ prior to those aircraft entering sovereign airspace,”<br />

Blondin said.<br />

“It is important to note the Russian flights followed international flight rules and conducted their flight in a<br />

professional manner,” Blondin said. “As is their right, the Russian Air Force continues to fly in international airspace.”<br />

Earlier, in response to questions about the Alaska Bear H intrusion, Marine Corps Col. Frank H. Simonds, Jr.,<br />

deputy chief of staff for NORAD-U.S. Northcom, also defended the Russian bomber intrusion as nonthreatening.<br />

“NORAD does not consider these flights a threat,” Simonds said, noting “Russia and NORAD routinely exercise<br />

their capability to operate in the North.”<br />

Simonds identified the Alaska defense zone intruders as Tu-95MS bombers that were met by U.S. F-15s and<br />

Canadian CF-18s.<br />

“Interaction between NORAD fighters with these types of aircraft are carried out routinely,” Simonds said. “As part of<br />

its responsibilities to identify all aircraft in its area of operation, which includes the ADIZ, NORAD has visually identified<br />

more than 50 Russian long range bomber aircraft over the last 5 years and NORAD fighters have been interacting with<br />

Russian aviation for over 50 years.”<br />

Simonds said NORAD and Russian aircraft since 2010 take part in an exercise called Vigilant Eagle aimed at<br />

building cooperation on identifying and intercepting hijacked aircraft that cross international boundaries.<br />

Last week, Rep. Michael R. Turner (R., Ohio), chairman of the House Armed Services Strategic Forces<br />

Subcommittee, said the Bear H intrusions near Alaska showed Russia’s response to the administration’s reset policy. He<br />

said air incursions, along with threats to attack U.S. missile defense sites preemptively, were signs of Putin’s aggression in<br />

the face of President Obama’s promised flexibility in talks with Moscow.<br />

The Alaska bomber flights coincided with a summit between Obama and Putin in Mexico June 18.<br />

According to U.S. officials, some 30 bombers and support aircraft took part in the war games, including the Bear Hs<br />

and Tu-160 Blackjack bombers.<br />

Russian Air Force spokesman Lt. Col. Vladimir Deryabin, told reporters in Moscow last month that the arctic<br />

strategic war games “practice destruction of enemy air defenses and strategic facilities.” http://freebeacon.com/putins-july-<br />

4th-message/<br />

Comment/Analysis: It is a known fact that during the Cold War, the U.S. would conduct flights as close as possible to the<br />

Soviet Union borders to see how the Soviets would react and what equipment, mostly air defenses, would come on line<br />

which was a great opportunity to conduct SIGINT operations. Assume that the Russians are now doing the same. In my<br />

opinion the U.S. still has and will have for a long time the best electronic order of battle in the world. There is no system that<br />

can possibly be turned on that we don’t have a database on. The signal will identify the type of equipment along with its<br />

capabilities and vulnerabilities.


China/Russia<br />

<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 22 of 25<br />

Jul 6, 2012, U.S. Courts Uzbekistan as Afghan Drawdown Nears.<br />

The bloodiest massacre of protesters since Tiananmen Square turned Uzbekistan into a pariah state. Now, the<br />

United States needs its help over Afghanistan — and has launched a flurry of overtures while putting aside concerns over<br />

human rights.<br />

Top U.S. officials, including Secretary of State Hillary Clinton, have paid courtesy calls over the past year, while<br />

General Motors and other major U.S. companies look determined to deepen their involvement in the Central Asian nation.<br />

Meanwhile, Uzbekistan has withdrawn from a Russian-led military alliance, signaling a downturn in its relations with<br />

the former overlords in Moscow. This has fed speculation that the nation, hoping to benefit from the transit of U.S. troops<br />

and hardware, could invite the United States to set up a military base on its soil — a development that would infuriate<br />

Russia and raise tensions in the volatile region.<br />

Uzbekistan has been run with unflinching severity by 74-year-old former Soviet party boss Islam Karimov since<br />

before the country gained independence in 1991.<br />

After the 9/11 terrorist attacks, Western leaders overcame their scruples in dealing with Karimov’s government and<br />

the United States secured a lease for the Karshi-Khanabad air base in Uzbekistan.<br />

That all ended when government troops indiscriminately gunned down hundreds of protesters in the eastern city of<br />

Andijan in 2005.<br />

Uzbek authorities expelled U.S. troops from the country in anger over Washington’s criticism and accused Western<br />

powers of complicity in the Andijan protests, which they said formed part of efforts to foment revolutions across the former<br />

Soviet Union. Uzbekistan has also been the subject of persistent allegations of torture of political prisoners and other human<br />

rights abuses.<br />

With access to the country barred to almost all foreign reporters, verifying claims by some State Department officials<br />

that the rights situation has improved marginally is virtually impossible.<br />

When NATO convoys through Pakistan began coming under sustained militant attack in 2009, U.S. military<br />

planners looked north and saw the makings of a route snaking thousands of miles through Central Asia and perennial<br />

strategic foe Russia.<br />

Trucks carrying NATO goods are rolling across Pakistan’s border into Afghanistan again this week after the U.S.<br />

apologized to Pakistan for the deaths of 24 Pakistani troops last fall. But despite the additional expense, the safety of the<br />

northern route makes it a more attractive option.<br />

Until now, the traffic through Uzbekistan has mainly gone in the direction of Afghanistan, but the priority in coming<br />

years will be shifted to reverse transit along the Northern Distribution Network.<br />

The most reliable route starts on a recently completed railroad that crosses the Amu-Darya River, which marks<br />

Uzbekistan’s 82-mile border with Afghanistan, and provides the speediest and simplest transportation northward.<br />

In an apparent effort to soothe concerns that the United States will abandon Central Asian as soon as its<br />

engagements in Afghanistan are wound down, investments enthusiastically backed by Washington are trickling in.<br />

General Motors stepped up its local presence in November by opening a new engine plant. The GM Uzbekistan<br />

joint venture, in which the U.S. company controls a 25 percent stake, provides work for around 6,600 people and turns out<br />

200,000 Chevrolet passenger vehicles annually.<br />

In June, U.S. engineering giant KBR said it will provide its technology to develop a chemical plant in Uzbekistan that<br />

will seek to better exploit the country’s substantial natural gas reserves.<br />

Still, U.S. officials hope to build on those types of achievements and a large congressional delegation is due soon<br />

for another round of diplomatic cordiality aimed at cementing business ties.<br />

There are also increasing hints that the U.S. will intensify military ties with Uzbekistan. That development would<br />

dismay the advocacy community, which has for years been drawing attention to the country’s egregious rights record.<br />

The U.S. in January waived a ban on providing military assistance to Uzbekistan, although the State Department<br />

insisted it would only be eligible to receive non-lethal equipment, including night vision goggles, uniforms, GPS devices and<br />

other defensive equipment.<br />

Last week, Uzbekistan announced it had suspended its participation in the Russia-dominated Collective Security<br />

Treaty Organization security pact.<br />

25<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 23 of 25<br />

“Dropping out of the CSTO means that something deemed more desirable by Karimov’s regime is available<br />

elsewhere. That’s highly likely to be material benefits and international respect garnered by being a partner on the<br />

drawdown in Afghanistan,” said Deirdre Tynan, Central Asia project director for the International Crisis Group.<br />

f 25<br />

Analysts across the former Soviet space have read the CSTO pullout as a prelude to closer cooperation with the<br />

United States.<br />

“We will soon hear about how Uzbekistan has entered into a new strategic alliance and granted its territory for U.S.<br />

military bases,” said Vadim Kozyulin, Central Asia expert at the Moscow-based Russian Center for Policy Studies, in a<br />

research note.<br />

A U.S. diplomat said on condition of anonymity that the United States has made no request to open a military base<br />

in Uzbekistan.<br />

Such a base would deeply antagonize Moscow, which has historically tried to assert its say on what foreign military<br />

presence is permitted in a region it considers its geopolitical backyard. The United States already has an air base in<br />

neighboring Kyrgyzstan that it uses for ferrying troops in and out of Afghanistan and staging airborne refueling mission.<br />

It looks possible that Central Asian governments could become recipients of U.S. military hardware as the Pentagon<br />

looks to limit the expense of hauling the materiel out of Afghanistan. The U.S diplomat said the process for the transfer of<br />

excess defense equipment would require approval from the State Department.<br />

Russian daily Kommersant in June cited an unnamed government source in Kyrgyzstan as saying talks on a plan<br />

over exchanging military hardware for Afghan access were held during a March visit by Secretary of Defense Leon Panetta.<br />

The newspaper suggested similar agreements were in place with other governments, including Uzbekistan’s.<br />

The centrality of Uzbekistan’s role in the Afghan drawdown means they will be in a strong bargaining position for<br />

obtaining as much as possible in return, however.<br />

“There is a significant, even likely, chance that the Uzbeks get their hands on some lethal stuff that originally was<br />

not planned,” said Alexander Cooley, political science professor at Columbia University. “If the Uzbeks ask for some specific<br />

pieces of equipment and are at first denied, they’ll keep trying and bargaining until they get them.”<br />

http://militarytimes.com/news/2012/07/ap-military-us-courts-uzbekistan-afghanistan-drawdown-nears-070612/<br />

Comment/Analysis: I have placed this under the Russia/China banner because if the U.S. does manage to obtain an<br />

agreement to open a military base within the country it will only bring China and Russia that much closer together. President<br />

Vladimir Putin has already made it quite clear and has shown that he will respond to stop U.S. expansionism. The word<br />

nuclear appears to be part of his vocabulary and uses it quite loosely. The Chinese on the other hand are also not pleased<br />

with the U.S. so close to its border in Kyrgyzstan and the word nuclear appears quite often in their language as shown in the<br />

following article under the China banner. The U.S. also would have to tone down its criticism of China and its human rights<br />

record to avoid a Chinese backlash, sure to include Russia, that it courts other countries with their own human rights<br />

violations in order to advance American influence. In my opinion President Putin will never warm up to the U.S. and will<br />

always view the U.S. with suspicion. This is dangerous because Putin still views Russia as a superpower with its nuclear<br />

weapons. Chinese President Hu Jintao is not as verbal as Putin, but appears to have a hidden agenda and deserves close<br />

scrutiny. Then there’s the Iranian issue which effectively surrounds any American bases in the Stan’s area. President<br />

Mahmoud Ahmadinejad is a nut and will side with anyone as long as it hurts America.<br />

China<br />

July 18, 2012, Chinese general warns that new missile shield may spark China nuclear upgrade. From Fredrik Dahl,<br />

Reuters: China may need to modernize its nuclear arsenal to respond to the destabilizing effect of a planned U.S.-backed<br />

missile defense system, a senior Chinese military officer said on Wednesday.<br />

"It undermines the strategic stability," said Major General Zhu Chenghu of China's National Defense University<br />

about the U.S.-led development of a missile shield, which has also alarmed Russia.<br />

The United States is spending about $10 billion a year to develop, test and deploy missile defenses, which would<br />

include a European shield as part of a layered system.<br />

The defenses would also include ship-based interceptors that could be deployed in the Middle East and Asia-Pacific<br />

- for instance as a hedge against North Korea - plus ground-based missile interceptors in silos in Alaska and California.<br />

Moscow says the interceptors that the United States and NATO are deploying will be able to destroy its own<br />

warheads in flight by about 2018, upsetting the post-Cold War balance of power.


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 24 of 25<br />

The comments by Zhu - who stirred controversy in 2005 by suggesting China could use nuclear weapons if the<br />

United States intervened militarily in a conflict over Taiwan - indicated this is an argument that also resonates in China.<br />

25<br />

China "will have to modernize its nuclear arsenal" because the deployment of a missile defense system "may<br />

reduce the credibility of its nuclear deterrence," Zhu told the seminar. . . .<br />

China closely guards information about its nuclear weapons. However, the U.S. Department of Defense has said<br />

that China has about 130-195 deployed nuclear-capable ballistic missiles.<br />

Comment/Analysis: The Chinese and Russians realize all too well the U.S. is no pushover for one country to handle and<br />

will merge to counter and expel the U.S. encroachment into their backyards while at the same time continuing to develop<br />

and upgrade their weapon systems.<br />

Jul 4, 2012, Cuba's Raul Castro visiting trading partner China. Cuban leader Raul Castro is in China for talks with President<br />

Hu Jintao and other leaders, his first visit to his country's key trading partner since taking office as president.<br />

Castro arrived Wednesday for a four-day visit. Cuban state media said he was accompanied by senior Cabinet<br />

official Ricardo Cabrisas Ruiz and Foreign Minister Bruno Rodriguez. Neither side has said what issues are to be discussed.<br />

Castro visited Vietnam and China while defense minister, a post he held from 1959 until he replaced his older<br />

brother Fidel as president in 2008. He is to visit Vietnam again after leaving China.<br />

While the three nations are among the last Communist-ruled countries in the world, China has opened broadly to<br />

private business and has thrived economically while Cuba remains largely poor. During a 1997 trip to China, Raul Castro<br />

spoke approvingly of its mixture of socialism and market liberalization.<br />

Cuba is China's biggest commercial partner in the Caribbean. Beijing helped prop up the Cuban economy after the<br />

withdrawal of Russian aid in the 1990s. Bilateral trade totaled $1.8 billion in 2010, state-run website Cubadebate said.<br />

http://hosted.ap.org/dynamic/stories/A/AS_CHINA_CUBA?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2<br />

012-07-04-10-46-44<br />

Jul 4, 2012, Argentina signs deals with China's military. Argentina's defense minister is visiting China, signing military<br />

agreements and praising the weapons on display during a six-day tour.<br />

Defense minister Arturo Puricelli says cooperation agreements that he signed with Chinese Defense Minister Liang<br />

Guanglie will strengthen ties between the Asian giant and Argentina.<br />

He calls China an economic, political and military partner and says the two countries' strategic positions in terms of<br />

international security are almost entirely consistent.<br />

Argentina's defense ministry says in a Wednesday statement that Puricelli also has visited Chinese defense<br />

contractors, viewing helicopters at one and guided weapon systems and anti-aircraft artillery at another.<br />

Chinese state-run media in Beijing have reported on the visit and say China wants to expand military cooperation<br />

with Argentina.<br />

Comment/Analysis: Could this be China’s answer to the American presence in their backyard? The Russians are already<br />

in our backyard just across the water from Alaska.<br />

Related News. July 27, 2012, Russia wants naval bases abroad. Russia hopes to establish its first naval base abroad since<br />

the 1991 collapse of the Soviet Union and is looking at Cuba, Vietnam and the Seychelles as possible locations, state-run<br />

RIA news agency quoted the navy chief as saying on Friday. http://news.yahoo.com/russia-wants-naval-bases-abroadreport-114011895.html?_esi=1<br />

Comment/Analysis: The related news came in after my initial analysis on the previous articles. I rest my case.<br />

News for Parents: Protecting Our Children<br />

World Drug Report for 2012. About 230 million people, or 5 per cent of the world’s adult population,<br />

are estimated to have used an illicit drug at least once in 2010. Problem drug users number about<br />

27 million, which is 0.6 per cent of the world adult population. Throughout the world, illicit drug use<br />

appears to be generally stable, though it continues to be rising in several developing countries.<br />

f


<strong>OSINT</strong> <strong>Nuggets</strong><br />

Page 25 of 25<br />

Heroin, cocaine and other drugs kill around 0.2 million people each year, shattering families and bringing misery to<br />

thousands of other people. Illicit drugs undermine economic and social development and contribute to crime,<br />

instability, insecurity and the spread of HIV. https://www.unodc.org/documents/data-andanalysis/WDR2012/WDR_2012_web_small.pdf<br />

f 25<br />

Nuclear Terrorism<br />

Of the the original National Planning Scenarios developed in the mid-2000s, the first involved the threat of terrorists<br />

employing a 10-kiloton improvised nuclear device in a large metropolitan area. Using highly enriched uranium stolen from<br />

another country, an unnamed group builds its own nuclear weapon and drives to the center of a city to detonate the device.<br />

In addition to wrecking havoc on the city, the nuclear weapons effects — heat, blast, radiation, and EMP — create<br />

significant challenges to the immediate area around the explosion. The scenario depicts hundreds of thousands of injured<br />

people and more than a million displaced persons. This scenario is offered to state and local emergency managers as a<br />

basis to plan for how they are going to deal with this possibility — a scenario that<br />

mandates involvement by the federal government because of the catastrophic<br />

scope of the damage. http://www.hsaj.org/?fullarticle=8.1.9<br />

Interactive Blast Maps<br />

Have you ever wondered what would happen if a nuclear bomb goes off in your<br />

city? With Google’s Maps framework and a bit of Javascript, you can see the<br />

outcome. And it doesn’t look good. Utilize this map and key to determine the<br />

survivability of a blast in the city or address of your<br />

choice. http://www.truthistreason.net/ground-zero-ii-interactive-nuclear-blastcalculator-and-fallout-map<br />

http://www.carloslabs.com/node/16/<br />

The threat of nuclear terrorism is not limited to New York City or Washington, DC. While New York is widely seen as the<br />

most likely target, it is clear that Al Qaeda is not only capable, but also interested in mounting attacks on other American<br />

cities, where people may be less prepared. Imagine the consequences of a 10-kiloton weapon exploding in San Francisco,<br />

Houston, Chicago, Los Angeles, Charlotte, or any other city Americans call home. From the epicenter of the blast to a<br />

distance of approximately one-third mile, every structure will be destroyed and no one would be left alive. A second circle of<br />

destruction extending three-quarters of a mile from ground zero would leave buildings looking like the Federal Office<br />

Building in Oklahoma City. A third circle reaching out 1 mile would be ravaged by fires and radiation.<br />

http://www.nuclearterror.org/blastmaps.html

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!