{
"type": "FeatureCollection",
"features": [
{
"type": "Feature",
"id": 1,
"properties": {
"ID": 0,
"Name": "NSA Headquarters"
},
"geometry": {
"type": "Polygon",
"coordinates": [
[
[-76.77255, 39.10559],
[-76.77255, 39.11029],
[-76.76675, 39.11029],
[-76.76675, 39.10559],
[-76.77255, 39.10559]
]
]
}
}
]
}
👷🛠️UNDER CONSTRUCTION🚧🏗
INTEL
The Crooked Cycle is a relentless pursuit of gathering “information” and morphing it into “intelligence” for those who thrive on the edges of legality. The steps in this well-oiled machine are: Direction (choosing the path with the least resistance from the law), Collection (scooping up dirt like a pro), Processing (massaging the facts until they squeal), Exploitation (turning secrets into profit, because ethics are for losers), and Dissemination (spreading the “truth” like a rumor in a backroom deal).
👷🛠️UNDER CONSTRUCTION🚧🏗
OSINT
- Awesome OSINT
- Sherlock Project
- Breach Directory
- MD5 Decrypt
- Name OSINT
- IP Logger
- IP Tracker
- Location Tracker
- URL Checker
- MAC Address Lookup
- Message Header Analyzer (Online)
- Message Header Analyzer (GitHub)
- Rainbow Tables (Hashes)
- Magic Numbers
- Blockchain Sherlock
- Web Cache
- Sinal (“ ”): Search for an Exact Term
- Sign (+): Search for Two Terms
- Sinal (-): Exclusion of a Certain Term
- Sinal (*): Acceptance of Key Term/Wildcard
- OR Sign: Acceptance of One or the Other
- Site: Exclusive Search on a Certain Site
- Inurl: Search for Words in the URL
- Intitle: Search for Words in the Site Title
- Filetype: Search for a Specific File Type
- Related: Search for Pages Similar to a URL
- Info: Search for Information on a Site
- Cache: Search for Cached Information on a Site
- Google Guide Advanced Operator Quick Reference
- NSA Lessons - Untangling the Web
- Department of Defense (DoD) FOIA/MDR Logs
- Google Alerts and Google News
- TinEye Reverse Image Search
- Google Images
- Jeffrey Friedl's Image Metadata Viewer
- Google Art & Culture Experiment - Art Palette
- Yandex Images
- Aliseeks
- Google Reverse Image Search for Mobile
- Internet Archive
- CachedView
- Page Cached
- Google Cache Browser 3.0
- Cached Websites Check from Google Webcache and Archive.org
- Arquivo.pt: Search Past Pages
- Free VIN Code Search Service
- Vehicle History Reports
- 17VIN - VIN Code Lookup
- Vehicle History - VIN Lookup
- CARFAX - Vehicle History Reports
- AutoCheck - Vehicle History Reports
- VIN Audit - Vehicle History Reports
- NMVTIS - National Motor Vehicle Title Information System
- REVS Check - Australia Vehicle History Reports
- Cochea - Vehicle Information (Latin America)
- AutoScout24 - Vehicle Listings and Information
- AutoTrader - Vehicle Listings and History
- Motor1 - Vehicle History Reports
- Cars.com - Vehicle History Reports
- CheckVIN - VIN Lookup and Vehicle History
- VIN Car History - Vehicle History Reports
- VIN Checkup - Vehicle History Reports
- Trucar - Vehicle History and Pricing
- Vehicle Identification Number - VIN Lookup
- VIN-Info - Vehicle Information and History
- 宜配网 VIN查询 (Yiparts VIN Lookup)
- 奉新行 VIN查询 (Fengxin VIN Lookup)
- 车信会 VIN查询 (Chexinhui VIN Lookup)
- 力洋汽车信息查询 (Liyang Auto Information)
- **汽车网 - VIN查询 (China Car VIN Lookup)
- 搜配网 - VIN码识别 (Sopei VIN Lookup)
- 聚合数据 - VIN码查询 (Juhe VIN API)
- 极速数据 - VIN车辆识别代码查询 (Jisu API VIN Lookup)
- 易源数据 - 车架号VIN查询 (Yiyuan VIN API)
- Libgen
- Semantic Scholar
- Library Genesis
- Wolfram|Alpha
- e-Marefa - The Digital Arabic Database: Studies & Researches
- ERIC - Education Resources Information Center
- Scinapse - Academic Search Engine for Papers
- SweetSearch - A Search Engine for Students
- CORE - Aggregating the World’s Open Access Research Papers
- BASE (Bielefeld Academic Search Engine): Basic Search
- Multi-service Image Search
- SauceNAO Image Search
- WAIT: What Anime Is This?
- ASCII2D - Anime Image Search
- Flight Tracker | Flightradar24
- Flightradar24 - How It Works?
- FlightAware
- Flightadsb - Real-Time Flight Tracking
- Direct Flights - Explore Non-Stop Flights
- AirNav RadarBox - Live Flight Tracker
- ADS-B Exchange - Aircraft Tracking
- FlightView Flight Tracker
- Plane Flight Tracker
- FlightStats - Global Flight Status & Tracker
- iFly.com - Flight Status
- FAA Registry - Aircraft N-Number Inquiry
- Virtual Radar
OSINT Brazuca - https://github.com/osintbrazuca/osint-brazuca
OSINT Brazuca Regex - https://github.com/osintbrazuca/osint-brazuca-regex
Pre-paid Cell - https://cadastropre.com.br/#consultation
Cell Status - https://consultanumero.abrtelecom.com.br/consultanumero/consulta/consultaSituacaoAtualCtg
3.2. Veículos / Rodovias 3.2.1. Detran Pará 3.2.2. APP Sinesp Cidadão
3.2.3. Consulta de Multas da PRF 3.2.4. Consulta de Condições de Rodovias
3.3. Voos / Aeroportos 3.3.1. Fly Radar 24 3.3.2. Flight Aware 3.4.
Navegações / Portos 3.4.1. Marine Graffiti 3.4.2. Vessel Fi 3.5. Sistema
Telefônico 3.5.1. Telebrasil (estações rádio base 3.5.2. Consulta Número
3.5.3. Qual Operadora? 3.5.4. Portal TP2 Location 3.5.5. Truecaller
3.5.6. Teleco 3.6. Poder Executivo 3.6.1. Portal da Transparência 3.6.2.
Painel de Preços 3.6.3. Portal Brasileiro de Dados Abertos 3.6.4. Ipea
Data 3.6.5. IBGE Data 3.6.6. Portal de Acesso à Informação da CGU 3.6.7.
Pesquisa de Relatórios da CGU 3.6.8. Painel Monitoramento de Dados
Abertos da CGU 3.6.9. Painel de Corregedorias da CGU 3.6.10. Secretaria
do Tesouro Nacional 3.6.11. Banco do Brasil 3.6.12. Licitações-e 3.6.13.
BNDES 3.6.14. Portal dos Convênios do Governo Federal 3.6.15. Diários
Oficiais 3.6.16. Programa Bolsa Família 3.6.17. Portal da Transparência
do Governo do Estado do Pará 3.6.18. Diário Oficial do Governo do Estado
do Pará 3.6.19. Portal de Consulta da Sefaz do Estado do Pará 3.6.20.
Portal de Serviços da Sefaz do Estado do Pará 3.6.21. Portal da Transparência
da Prefeitura de Belém/PA 3.7. Poder Legislativo 3.7.1. Portal da Transparência
da Câmara dos Deputados 3.7.2. Portal da Transparência do Senado Federal
3.7.3. Portal da Transparência da Assembleia Legislativa do Pará 3.7.4.
Portal da Transparência da Câmara Municipal de Belém 3.8. Poder Judiciário,
Tribunais de Contas e Ministérios Públicos 3.8.1. Portal da Transparência
do STF 3.8.2. Portal da Transparência do STJ 3.8.3. Portal da Transparência
do STM 3.8.4. Portal da Transparência do TST 3.8.5. Portal da Transparência
do TSE 3.8.6. Divulgação de Candidaturas e Contas Eleitorais 3.8.7.
Portal da Transparência do TJ/PA 3.8.8. Portal da Transparência do
TCU 3.8.9. Portal da Transparência do TCE/PA 3.8.10. Portal da Transparência
do TCM/PA 3.8.11. Portal da Transparência do MPF 3.8.12. Portal da
Transparência do MP/PA 3.9. Certidões 3.9.1. Cadastro de Pessoa Física
3.9.2. Certidão de Débitos Tributários Federais 3.9.3. Portal Cartório
de Protestos 3.9.4. Certidão Negativa de Débitos Trabalhistas 3.9.5.
Certidão Negativa de Débitos da Justiça Militar 3.9.6. Certidão de
Regularidade da Justiça Eleitoral 3.9.7. Regularidade de Empregador
3.9.8. Regularidade Perante o TCU 3.10. Sistema de Segurança Pública
3.10.1. Atlas da Violência 3.10.2. Monitor da Violência 3.10.3. Antecedentes
Criminais - PF 3.10.4. Antecedentes Criminais - PC/PA 3.10.5. Mandados
de Prisão 3.11. Sistema de Educação Pública 3.11.1. IBGE Educa 3.11.2.
Educação Inteligente 3.11.3. Portal Dados Abertos do MEC 3.11.4. Portal
Dados Abertos do INEP 3.11.5. Consulta de Liberações de Recursos do
FNDE 3.11.6. Conselho de Acompanhamento e Controle Social do FUNDEB
3.12. Sistema de Saúde Pública 3.12.1. Sistema de Apoio à Elaboração
de Relatórios do SUS 3.12.2. Sistema Nacional de Auditoria do SUS 3.12.3.
Sistema de Monitoramento de Convênios da FUNASA 3.12.4. Portal da Saúde
do SUS 3.12.5. Informações e Avaliações de Operadoras 3.13. Sistema
Ambiental, Agrário e Geolocalização 3.13.1. Portal Amazônia Protege
3.13.2. Portal Brasileiro de Dados Geoespaciais 3.13.3. Sistema DETER
(Mapa de alertas) 3.13.4. Sistema PRODES (Mapa de Desmatamento) 3.13.5.
Banco de Dados de Queimadas 3.13.6. Mapas de Cobertura e Uso do Solo
3.13.7. Mapas de Mudanças de Cobertura e Uso 3.13.8. Autuações Ambientais
e Embargos 3.13.9. Cadastro Técnico Federal 3.13.10. Documento de Origem
Florestal 3.13.11. Dados Georreferenciados e Estatísticas do CTF 3.13.12.
Transporte Interestadual de Produtos Perigosos 3.13.13. Sistema Nacional
de Informação sobre o Fogo 3.13.14. Cadastro Mineiro 3.13.15. Sala
da Cidadania do Incra 3.13.16. Guia Floresta da SEMA/PA 3.13.17. SIMLAM
da SEMA/PA 3.13.18. Cadastro Ambiental Rural do Pará 3.13.19. Instituto
Nacional de Pesquisas Espaciais 3.13.20. Google Earth 3.13.21. Wayback
Imagery 3.13.22. Google Maps e Google Street View 3.13.23. Suncalc
3.14. Domínios e Sites Web 3.14.1. Registro .br 3.14.2. Who Is 3.14.3.
Domain Dossier 3.14.4. Domain Tools 3.14.5. IP Hostinfo 3.14.6. Site
Dossier 3.14.7. Where Does This Link Go 3.14.8. Check Short URL 3.14.9.
Trend Micro Site Safety Center 3.14.10. McAfee Site Safety Center 3.14.11.
Ransomware Tracker Abuse 3.14.12. DNS Sinkhole 3.14.13. Malware Domain
List 3.14.14. DNS Dumpster 3.14.15. View DNS Info 3.14.16. Archive
Machine 3.14.17. HTTPTrack Web Site 3.14.18. Redirect Detective 3.14.19
Spiderfoot 3.14.20. Redirect Detective 3.15. Mensagens Eletrônicas
3.15.1. IP Logger 3.15.2. Mx Toolbox 3.15.3. G Suite Toolbox 3.15.4.
IP Tracker on line 3.15.5. My Addr.com 3.15.6. DNSlytics 3.16. Redes
Sociais 3.16.1. Fake Name Generator 3.16.2. Check Usernames 3.16.3.
Knowem 3.16.4. Name Checkr 3.16.5. Facebook e Whatsapp 3.16.5.1. Solicitação
ao Facebook de Preservação de Registros 3.16.5.2. Solicitação ao Facebook
de Acesso aos Registros 3.16.5.3. Solicitação ao Facebook de Remoção
de Conteúdo 3.16.5.4. Solicitação ao Whatsapp de Preservação de Registros
3.16.5.5. Solicitação ao Whatsapp de Acesso aos Registros 3.16.5.6.
Find Your Facebook ID 3.16.5.7. What is My Facebook ID? 3.16.5.8. Graph
Tips 3.16.5.9. _IntelligenceX 3.16.5.10. Extract Face 3.16.15. Twitter
3.16.15.1. Twitter Advanced Search 3.16.15.2. Trends Topics Brazil
Twitter 3.16.15.3. Twipu 3.16.15.4. All My Tweets 3.16.15.5. Tweet
Map 3.16.15.6. Trend Map 3.16.15.7. Followerwonk 3.17. Imagens e Vídeos
3.17.1. Exif Tool 3.17.2. JPEGsnoop 3.17.3. GeoSetter 3.17.4. Google
Imagens 3.17.5. Tineye Images 3.17.6. Camera Trace 3.17.7. CatchVideo
HUMINT
Human Intelligence (HUMINT) involves gathering information through human sources, including informants and agents. Various intelligence agencies utilize different methods and tactics for HUMINT operations.
The CIA is a major U.S. intelligence agency responsible for collecting and analyzing information about foreign governments, corporations, and individuals through human sources. Key methods include undercover operations, agent recruitment, and covert operations.
The Gestapo was the secret police of Nazi Germany, known for its extensive use of informants and brutal interrogation methods. It was instrumental in suppressing dissent and gathering intelligence on political opponents and suspected enemies of the state.
The FBI focuses on domestic intelligence and counterintelligence. Its HUMINT efforts include counterterrorism operations, criminal investigations, and the recruitment of informants to gather information on potential threats within the U.S.
The STASI was the East German secret police, renowned for its extensive network of informants and detailed surveillance. The agency used a variety of methods to monitor, control, and suppress dissent within East Germany.
For detailed information on STASI tactics and operations, refer to these sources:
Mossad, Israel's national intelligence agency, is known for its focus on HUMINT operations, including the recruitment of spies, undercover missions, and intelligence gathering related to national security and international threats.
The KGB was the Soviet Union's primary security agency, involved in extensive HUMINT activities. It conducted espionage, counterintelligence, and surveillance operations, both domestically and internationally, using informants and agents to gather intelligence.
MI5 (Security Service) handles domestic intelligence within the United Kingdom, focusing on counterterrorism and national security. MI6 (Secret Intelligence Service) operates internationally, collecting intelligence and conducting covert operations abroad. Both agencies utilize various HUMINT techniques to support their missions.
- Carrd - Build one-page sites for pretty much anything. Whether it's a personal profile, a landing page to capture emails, or something a bit more elaborate, Carrd has you covered.
- flourish.studio - Beautiful and easy data visualization and storytelling
- mixkit.co - Free assets for your next video project.
- pexels.com - The best free stock photos, royalty free images and videos shared by creators.
- Tell your story with illustrations - Easily create and customize stunning illustrations with collections made by artists across the globe.
👷🛠️UNDER CONSTRUCTION🚧🏗
SIGINT
Signals Intelligence (SIGINT) involves the interception and analysis of electronic signals for intelligence purposes. It encompasses a variety of techniques and technologies used to collect, process, and exploit signals from various sources.
The National Security Agency (NSA) is a key player in SIGINT.
- Backbone Filtering: Monitoring and filtering data as it travels through the internet's major infrastructure points. This allows for the collection and analysis of large volumes of data.
Cyber surveillance involves the monitoring and tracking of digital communications and activities. A basic cyber surveillance system may include the following components:
- Bulk Data Collection: Aggregating large amounts of data from diverse digital sources.
- Search and Filtering: Implementing search tools to efficiently sift through collected data and extract relevant information.
- Cookie and User Tracking: Tracking user activity through web cookies and other identifiers to monitor behavior across different sites.
- User Identification: Techniques to identify users who are attempting to remain anonymous.
- Malware Deployment: Inserting malicious software into target devices to enable further surveillance and data collection.
Various techniques and tools are used in SIGINT operations, including both commercial and DIY approaches:
- Satellite Communication Interference: This includes jamming, eavesdropping, and hijacking satellite communications. These methods are used to disrupt or intercept signals.
- Home-Made Satellite Jammers: Devices designed to disrupt satellite signals, often for the purpose of preventing communication or transmission.
👷🛠️UNDER CONSTRUCTION🚧🏗
GEOINT
- Awesome Geojson
- United States Geospatial Intelligence Foundation (USGIF)
- National Geospatial-Intelligence Agency (NGA)
- GIS Lounge
- Geospatial World
- Esri
- Earth Imaging Journal (EIJ)
- Geospatial Intelligence Forum
- L3Harris Geospatial Solutions
- Five GEOINT Tools for Federal Agencies - GCN
- GeoCommunity SpatialNews
- QGIS - Open Source Geographic Information System
- ArcGIS - Esri
- CARTO
- GeoForensic Tools
- GeoGuessr - Geography Game (used for fun and educational purposes)
- How Drones Are Used for Surveillance - RAND
- Surveillance Drones: The Eye in the Sky - BBC Future
- National Geospatial-Intelligence Agency (NGA)
- The Role of Satellites in GEOINT - Geospatial World
- Military Drones as Eyes in the Sky - Military.com
- Eyes in the Sky: Military Satellite Surveillance - National Defense Magazine