However, the outside world can communicate with the router you use, and chances are you’re sharing your wireless network with your neighbors. Hmmm...that makes a radical Islamic cell slightly less identifiable and anonymous. If a "bad guy" gets on to your wireless network and does something illegal, law enforcement may knock on your door...or everybody's door who shares the same wireless network as you. All computers on the LAN have the same public IP address, which is that of the router.
Another neat site to detect an IP address location is MyIPTest.
Interestingly, ex-Governor Palin’s Yahoo email account was hacked and they can‘t seem to find out who the culprit was. Read Palin’s Yahoo email hacked.
Ever think about how the Intelligence Community (IC) could apply the IP number address finders to help protect America even better? For example, they could create a "front" Blog or Website that would attract radical Islamists, lone wolves, or terrorist sympathizers. Daily posts could be written on the site about timely information that these "bad guy" Internet surfers couldn't resist reading. A StatCounter application could be hooked into the site (takes about 4 minutes to install) that would provide the IC's counterintelligence and counterterrorist officials with the following information on every visitor to their site:
- The entry page
- The exit page
- Their IP address
- Where they came from around the world to visit the site
- The particular post they read
- How long they stayed on that particular post (visit length)
- How many times they returned to visit the site (returning visits)
- Which search engine they used
- Their address on a Google map
- ISP stats
- HTTPS tracking
Applications such as StatCounter also have a Keyword Analysis that OSINT News believes would be of use. Keyword Analysis is normally used by lay Blog or Website owners to find the search engine words people use to find their site, in order to increase traffic by making sure these same words are typed into the site's post titles. However, the IC could use it for another reason: Intelligence professionals could learn what key words the "bad guys" use to find the "front" site or specific articles posted on it. Chances are, they're using these same word combo's to find useful information on other sites on the Web. So, in a reverse strategy, IC officials could learn key words that the "bad guys" are using at a particular time and specific article and Internet blogs and Websites they obtain upon using them in search engines.
Also, by installing the "+1 Button" and "Google plus Badge" applications, the IC to discover what friends the "bad guys" are connecting to and what information they desire to forward to them.
Any ideas on how our Intelligence Community (IC) can use IP addresses, StatCounter applications, or other applications, for counterintelligence and counterterrorist usage? Share your thoughts on the Secure Contact Form and OSINT News will publish your ideas. Please include your name if you want to receive credit for your idea(s).
We recommend the resource "Security Informatics and Terrorism"(below),which is intended to be of interest to the IC's counterterrorism experts and professionals, to academic researchers in information systems, computer science, political science and public policy, and to graduate students in these areas. The book highlights several aspects of patrolling the Web that were raised and discussed by experts from different disciplines. It includes academic studies from related technical fields, namely, computer science and information technology, the strategic point of view as presented by intelligence experts, and finally the practical point of view by experts from related industry describing lessons learned from practical efforts to tackle these problems.
Learn more
The book (above) is organized into four major parts: definition and analysis of the subject, data-mining techniques for terrorism informatics, other theoretical methods to detect terrorists on the Web, and practical relevant industrial experience on patrolling the Web.
No comments:
Post a Comment