Tuesday, June 12, 2012


OSINT News uses this resource to look up the address of any IP number: IP Number Address. I'm sure our Intelligence Community (IC) already does so, but tracking down locales and specific addresses of certain visitors to Blogs and Websites of interest may prove fruitful. Each of the hundreds of millions of computers on the global Internet has a unique number assigned to it...the IP address. Without a unique IP address assigned to your computer, you cannot communicate with other devices, users, and computers on the Internet...nor can terrorists. It's akin to a telephone number, each one representing a way to reach you and no one else.

IP addresses are 32 bit binary numbers that consist of four decimal numbers, each between zero and 255, separated by periods. It is common for a router to have an IP address and for the router to act as the front man for many computers on a Local Area Network (LAN). Each computer hooked up to the LAN is connected to the outside world by the router. So, a single IP address, assigned to the router, is shared by many computers. Because of this, there’s no way the outside world can ID one computer on the LAN from another.

However, the outside world can communicate with the router you use, and chances are you’re sharing your wireless network with your neighbors. Hmmm...that makes a radical Islamic cell slightly less identifiable and anonymous. If a "bad guy" gets on to your wireless network and does something illegal, law enforcement may knock on your door...or everybody's door who shares the same wireless network as you. All computers on the LAN have the same public IP address, which is that of the router.

Another neat site to detect an IP address location is MyIPTest.  

Interestingly, ex-Governor Palin’s Yahoo email account was hacked and they can‘t seem to find out who the culprit was. Read Palin’s Yahoo email hacked.

Ever think about how the Intelligence Community (IC) could apply the IP number address finders to help protect America even better? For example, they could create a "front" Blog or Website that would attract radical Islamists, lone wolves, or terrorist sympathizers. Daily posts could be written on the site about timely information that these "bad guy" Internet surfers couldn't resist reading. A StatCounter application could be hooked into the site (takes about 4 minutes to install) that would provide the IC's counterintelligence and counterterrorist officials with the following information on every visitor to their site:
  1. The entry page
  2. The exit page
  3. Their IP address
  4. Where they came from around the world to visit the site
  5. The particular post they read
  6. How long they stayed on that particular post (visit length)
  7. How many times they returned to visit the site (returning visits)
  8. Which search engine they used
  9. Their address on a Google map
  10. ISP stats
  11. HTTPS tracking
By simply creating a "terrorist-friendly" Website and installing this one, free application to it, our IC's counterintelligence and counterterrorism officers could obtain a plethora of information on the site visitor's addresses, their system settings, what link referred them to the site and their navigation path through to the site. The IC officers would also learn the Internet pathways preferred by the "bad guys".

Applications such as StatCounter also have a Keyword Analysis that OSINT News believes would be of use. Keyword Analysis is normally used by lay Blog or Website owners to find the search engine words people use to find their site, in order to increase traffic by making sure these same words are typed into the site's post titles. However, the IC could use it for another reason: Intelligence professionals could learn what key words the "bad guys" use to find the "front" site or specific articles posted on it. Chances are, they're using these same word combo's to find useful information on other sites on the Web. So, in a reverse strategy, IC officials could learn key words that the "bad guys" are using at a particular time and specific article and Internet blogs and Websites they obtain upon using them in search engines. 

Also, by installing the "+1 Button" and "Google plus Badge" applications, the IC to discover what friends the "bad guys" are connecting to and what information they desire to forward to them. 

Any ideas on how our Intelligence Community (IC) can use IP addresses, StatCounter applications, or other applications, for counterintelligence and counterterrorist usage? Share your thoughts on the Secure Contact Form and OSINT News will  publish your ideas. Please include your name if you want to receive credit for your idea(s).

We recommend the resource "Security Informatics and Terrorism"(below),which is intended to be of interest to the IC's counterterrorism experts and professionals, to academic researchers in information systems, computer science, political science and public policy, and to graduate students in these areas. The book highlights several aspects of patrolling the Web that were raised and discussed by experts from different disciplines. It includes academic studies from related technical fields, namely, computer science and information technology, the strategic point of view as presented by intelligence experts, and finally the practical point of view by experts from related industry describing lessons learned from practical efforts to tackle these problems.

Learn more
The book (above) is organized into four major parts: definition and analysis of the subject, data-mining techniques for terrorism informatics, other theoretical methods to detect terrorists on the Web, and practical relevant industrial experience on patrolling the Web. 

300x100 - NOOK Tablet™ 8GB

Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIOIC). A portion (10%) of this site's ad revenues is donated to the AFIO. The views expressed on this site do not represent those of any organization he is a member of. We're always looking for different perspectives regarding the Intelligence Community- got a thought, article or comment you'd like to submit? Contact us on the Secure Contact Form

No comments: