NATO Intelligence Exploitation of the Internet

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

NATO Intelligence Exploitation of the Internet. October 2002.

Author(s): NATO
Publisher: NATO
Year: 2002

Language: English
Commentary: decrypted from DDE8F8D562D65A6CAAA8459211CBB6E5 source file
Pages: 104

TABLE OF CONTENTS
INTRODUCTION
CHAPTER I: INTERNET OVERVIEW
Section A: World-Wide-Web (WWW)
Section B: Newsgroups
Section C: Email List Overview
Section D: Chat
CHAPTER II: DIRECTION
Section A: Mission Analysis
Steps in Mission Analysis
Step 1: Sources of the Mission
Step 2: Superior’s Mission and Intent
Step 3: Derive Elements of Own Mission
Step 4: Identify Assumptions
Step 5: Identify Objectives
Section B: Primary Intelligence Requirement (PIR) Development
Direction Development Worksheet
CHAPTER III: COLLECTION
Section A: Collection Planning
Collection Management
Making a Collection Plan
An Internet Collection Plan
The Internet Collection Planning Steps
Step 1: Determine Searchable Information Requirements
Step 2: Determine Best Site or Search
Step 3: Identify the Details to Access or Find Specific Information
Step 4: Determine Search Time Constraints
Using the Internet Collection Plan
Standing Requirements
Internet Collection Plan
Section B: Search Strategies
Search Methodology
Prepare Before You Search
Step 1: Identify Key Concepts
Step 2: Identify Possible Search Terms
Topic Development Worksheet
Step 3: Decide Which Method to Use To Search
Step 4: Construct Your Search
a. Select Operators to Connect Search Words
b. Identify Search Terms that are Phrases
c. Include Variant Forms of Search Words
d. Use Parentheses to Group Search Words
e. Recommended Strategies for Keyword Searching
Step 5. Limit Your Search
Limiting in a Web Index
Step 6. Refine Your Search
Section C: Search Worksheet
Section D: Search Tools
Search Engines
What are search engines?
How do search engines work?
What are the pros and cons of search engines?
Are search engines all the same?
How do search engines rank web pages?
When do you use search engines?
Major Search Engine – Features Guide - 2002
Search Tools
Copernic
Deep-Web/Invisible Web
Searching the Invisible Web
Deep Query Manager
Section E: Searching Anonymously On The Web
CHAPTER IV: PROCESSING
Section A: Source Evaluation
Critically Analysing Information Sources
Determining the Source of Web Pages
Step 1: Study the URL
Step 2: Do a “whois” on the domain name
Step 3: Perform a Traceroute to the host name
Step 4: Read the web-page and follow-up with the point of contact (if any)
How to Read a URL
Traceroute
McAfee Visual Trace
Section B: Evaluation Checklists
Evaluation Checklist for an Advocacy Web Page
Evaluation Checklist for a Business/Marketing Web Page
Evaluation Checklist for a News Web Page
Evaluation Checklist for an Informational Web Page
Evaluation Checklist for a Personal Web Page
Section C: Validated Source Lists
Powermarks 3.5
Section D: Effective Summary
Copernic Summarizer
CHAPTER V: DISSEMINATION
Section A: Report Layering
Section B: Dissemination with Microsoft Outlook
Section C: Dissemination and Classification
ANNEXES:
Annex A: More information on Source Evaluation
Searching Upstream
Annex B: Selected Information Sources
a. Terrorist Threat Research (Rev 04 Mar 02)
b. Hostile Intelligence Threat Research (15 Feb 02)
c. Criminal Threat Research (15 Feb 02)
d. Medical Threat (Rev 08 May 02)
e. Geo-Political, Military & Country Information Research (Rev 04 Mar 02)
f. Geo-Political & Military Information – Russian
g. Gazetter, Port, Geodessy and Map Research (Rev 02 May 02)