/My-INTEL

Open Source Intelligence (OSINT)

Primary LanguageHTML

🔍🕵🧐 INTEL 🧐🕵🔎

"Even if you're not doing anything wrong, you are being watched and recorded. And the storage capability of these systems increases every year, consistently by orders of magnitude. You don’t have to have done anything wrong, you simply have to fall under suspicion." (Edward Snowden)


{
  "type": "FeatureCollection",
  "features": [
    {
      "type": "Feature",
      "id": 1,
      "properties": {
        "ID": 0,
        "Name": "NSA Headquarters"
      },
      "geometry": {
        "type": "Polygon",
        "coordinates": [
          [
            [-76.77255, 39.10559],
            [-76.77255, 39.11029],
            [-76.76675, 39.11029],
            [-76.76675, 39.10559],
            [-76.77255, 39.10559]
          ]
        ]
      }
    }
  ]
}
Loading

👷🛠️UNDER CONSTRUCTION🚧🏗

INTEL

The Crooked Cycle is a relentless pursuit of gathering “information” and morphing it into “intelligence” for those who thrive on the edges of legality. The steps in this well-oiled machine are: Direction (choosing the path with the least resistance from the law), Collection (scooping up dirt like a pro), Processing (massaging the facts until they squeal), Exploitation (turning secrets into profit, because ethics are for losers), and Dissemination (spreading the “truth” like a rumor in a backroom deal).

Intel References

👷🛠️UNDER CONSTRUCTION🚧🏗

OSINT

OSINT Resources

Google Search Operators

  • Sinal (“ ”): Search for an Exact Term
  • Sign (+): Search for Two Terms
  • Sinal (-): Exclusion of a Certain Term
  • Sinal (*): Acceptance of Key Term/Wildcard
  • OR Sign: Acceptance of One or the Other
  • Site: Exclusive Search on a Certain Site
  • Inurl: Search for Words in the URL
  • Intitle: Search for Words in the Site Title
  • Filetype: Search for a Specific File Type
  • Related: Search for Pages Similar to a URL
  • Info: Search for Information on a Site
  • Cache: Search for Cached Information on a Site

Google Advanced Search Resources

Reverse Image Search

Web Snapshots

Package Information

Car Information

Vehicle Identification Number Code

Academic Information

ACG (Anime, Comics, Games)

Flight and Airplane Information

Brazillian OSINT

OSINT Brazuca - https://github.com/osintbrazuca/osint-brazuca
OSINT Brazuca Regex - https://github.com/osintbrazuca/osint-brazuca-regex

Pre-paid Cell - https://cadastropre.com.br/#consultation
Cell Status - https://consultanumero.abrtelecom.com.br/consultanumero/consulta/consultaSituacaoAtualCtg


3.2. Veículos / Rodovias 3.2.1. Detran Pará 3.2.2. APP Sinesp Cidadão 3.2.3. Consulta de Multas da PRF 3.2.4. Consulta de Condições de Rodovias 3.3. Voos / Aeroportos 3.3.1. Fly Radar 24 3.3.2. Flight Aware 3.4. Navegações / Portos 3.4.1. Marine Graffiti 3.4.2. Vessel Fi 3.5. Sistema Telefônico 3.5.1. Telebrasil (estações rádio base 3.5.2. Consulta Número 3.5.3. Qual Operadora? 3.5.4. Portal TP2 Location 3.5.5. Truecaller 3.5.6. Teleco 3.6. Poder Executivo 3.6.1. Portal da Transparência 3.6.2. Painel de Preços 3.6.3. Portal Brasileiro de Dados Abertos 3.6.4. Ipea Data 3.6.5. IBGE Data 3.6.6. Portal de Acesso à Informação da CGU 3.6.7. Pesquisa de Relatórios da CGU 3.6.8. Painel Monitoramento de Dados Abertos da CGU 3.6.9. Painel de Corregedorias da CGU 3.6.10. Secretaria do Tesouro Nacional 3.6.11. Banco do Brasil 3.6.12. Licitações-e 3.6.13. BNDES 3.6.14. Portal dos Convênios do Governo Federal 3.6.15. Diários Oficiais 3.6.16. Programa Bolsa Família 3.6.17. Portal da Transparência do Governo do Estado do Pará 3.6.18. Diário Oficial do Governo do Estado do Pará 3.6.19. Portal de Consulta da Sefaz do Estado do Pará 3.6.20. Portal de Serviços da Sefaz do Estado do Pará 3.6.21. Portal da Transparência da Prefeitura de Belém/PA 3.7. Poder Legislativo 3.7.1. Portal da Transparência da Câmara dos Deputados 3.7.2. Portal da Transparência do Senado Federal 3.7.3. Portal da Transparência da Assembleia Legislativa do Pará 3.7.4. Portal da Transparência da Câmara Municipal de Belém 3.8. Poder Judiciário, Tribunais de Contas e Ministérios Públicos 3.8.1. Portal da Transparência do STF 3.8.2. Portal da Transparência do STJ 3.8.3. Portal da Transparência do STM 3.8.4. Portal da Transparência do TST 3.8.5. Portal da Transparência do TSE 3.8.6. Divulgação de Candidaturas e Contas Eleitorais 3.8.7. Portal da Transparência do TJ/PA 3.8.8. Portal da Transparência do TCU 3.8.9. Portal da Transparência do TCE/PA 3.8.10. Portal da Transparência do TCM/PA 3.8.11. Portal da Transparência do MPF 3.8.12. Portal da Transparência do MP/PA 3.9. Certidões 3.9.1. Cadastro de Pessoa Física 3.9.2. Certidão de Débitos Tributários Federais 3.9.3. Portal Cartório de Protestos 3.9.4. Certidão Negativa de Débitos Trabalhistas 3.9.5. Certidão Negativa de Débitos da Justiça Militar 3.9.6. Certidão de Regularidade da Justiça Eleitoral 3.9.7. Regularidade de Empregador 3.9.8. Regularidade Perante o TCU 3.10. Sistema de Segurança Pública 3.10.1. Atlas da Violência 3.10.2. Monitor da Violência 3.10.3. Antecedentes Criminais - PF 3.10.4. Antecedentes Criminais - PC/PA 3.10.5. Mandados de Prisão 3.11. Sistema de Educação Pública 3.11.1. IBGE Educa 3.11.2. Educação Inteligente 3.11.3. Portal Dados Abertos do MEC 3.11.4. Portal Dados Abertos do INEP 3.11.5. Consulta de Liberações de Recursos do FNDE 3.11.6. Conselho de Acompanhamento e Controle Social do FUNDEB 3.12. Sistema de Saúde Pública 3.12.1. Sistema de Apoio à Elaboração de Relatórios do SUS 3.12.2. Sistema Nacional de Auditoria do SUS 3.12.3. Sistema de Monitoramento de Convênios da FUNASA 3.12.4. Portal da Saúde do SUS 3.12.5. Informações e Avaliações de Operadoras 3.13. Sistema Ambiental, Agrário e Geolocalização 3.13.1. Portal Amazônia Protege 3.13.2. Portal Brasileiro de Dados Geoespaciais 3.13.3. Sistema DETER (Mapa de alertas) 3.13.4. Sistema PRODES (Mapa de Desmatamento) 3.13.5. Banco de Dados de Queimadas 3.13.6. Mapas de Cobertura e Uso do Solo 3.13.7. Mapas de Mudanças de Cobertura e Uso 3.13.8. Autuações Ambientais e Embargos 3.13.9. Cadastro Técnico Federal 3.13.10. Documento de Origem Florestal 3.13.11. Dados Georreferenciados e Estatísticas do CTF 3.13.12. Transporte Interestadual de Produtos Perigosos 3.13.13. Sistema Nacional de Informação sobre o Fogo 3.13.14. Cadastro Mineiro 3.13.15. Sala da Cidadania do Incra 3.13.16. Guia Floresta da SEMA/PA 3.13.17. SIMLAM da SEMA/PA 3.13.18. Cadastro Ambiental Rural do Pará 3.13.19. Instituto Nacional de Pesquisas Espaciais 3.13.20. Google Earth 3.13.21. Wayback Imagery 3.13.22. Google Maps e Google Street View 3.13.23. Suncalc 3.14. Domínios e Sites Web 3.14.1. Registro .br 3.14.2. Who Is 3.14.3. Domain Dossier 3.14.4. Domain Tools 3.14.5. IP Hostinfo 3.14.6. Site Dossier 3.14.7. Where Does This Link Go 3.14.8. Check Short URL 3.14.9. Trend Micro Site Safety Center 3.14.10. McAfee Site Safety Center 3.14.11. Ransomware Tracker Abuse 3.14.12. DNS Sinkhole 3.14.13. Malware Domain List 3.14.14. DNS Dumpster 3.14.15. View DNS Info 3.14.16. Archive Machine 3.14.17. HTTPTrack Web Site 3.14.18. Redirect Detective 3.14.19 Spiderfoot 3.14.20. Redirect Detective 3.15. Mensagens Eletrônicas 3.15.1. IP Logger 3.15.2. Mx Toolbox 3.15.3. G Suite Toolbox 3.15.4. IP Tracker on line 3.15.5. My Addr.com 3.15.6. DNSlytics 3.16. Redes Sociais 3.16.1. Fake Name Generator 3.16.2. Check Usernames 3.16.3. Knowem 3.16.4. Name Checkr 3.16.5. Facebook e Whatsapp 3.16.5.1. Solicitação ao Facebook de Preservação de Registros 3.16.5.2. Solicitação ao Facebook de Acesso aos Registros 3.16.5.3. Solicitação ao Facebook de Remoção de Conteúdo 3.16.5.4. Solicitação ao Whatsapp de Preservação de Registros 3.16.5.5. Solicitação ao Whatsapp de Acesso aos Registros 3.16.5.6. Find Your Facebook ID 3.16.5.7. What is My Facebook ID? 3.16.5.8. Graph Tips 3.16.5.9. _IntelligenceX 3.16.5.10. Extract Face 3.16.15. Twitter 3.16.15.1. Twitter Advanced Search 3.16.15.2. Trends Topics Brazil Twitter 3.16.15.3. Twipu 3.16.15.4. All My Tweets 3.16.15.5. Tweet Map 3.16.15.6. Trend Map 3.16.15.7. Followerwonk 3.17. Imagens e Vídeos 3.17.1. Exif Tool 3.17.2. JPEGsnoop 3.17.3. GeoSetter 3.17.4. Google Imagens 3.17.5. Tineye Images 3.17.6. Camera Trace 3.17.7. CatchVideo

HUMINT

HUMINT (Human Intelligence)

Human Intelligence (HUMINT) involves gathering information through human sources, including informants and agents. Various intelligence agencies utilize different methods and tactics for HUMINT operations.

CIA (Central Intelligence Agency)

The CIA is a major U.S. intelligence agency responsible for collecting and analyzing information about foreign governments, corporations, and individuals through human sources. Key methods include undercover operations, agent recruitment, and covert operations.

GESTAPO (Geheime Staatspolizei)

The Gestapo was the secret police of Nazi Germany, known for its extensive use of informants and brutal interrogation methods. It was instrumental in suppressing dissent and gathering intelligence on political opponents and suspected enemies of the state.

FBI (Federal Bureau of Investigation)

The FBI focuses on domestic intelligence and counterintelligence. Its HUMINT efforts include counterterrorism operations, criminal investigations, and the recruitment of informants to gather information on potential threats within the U.S.

STASI (Ministerium für Staatssicherheit)

The STASI was the East German secret police, renowned for its extensive network of informants and detailed surveillance. The agency used a variety of methods to monitor, control, and suppress dissent within East Germany.

For detailed information on STASI tactics and operations, refer to these sources:

MOSSAD

Mossad, Israel's national intelligence agency, is known for its focus on HUMINT operations, including the recruitment of spies, undercover missions, and intelligence gathering related to national security and international threats.

KGB (Committee for State Security)

The KGB was the Soviet Union's primary security agency, involved in extensive HUMINT activities. It conducted espionage, counterintelligence, and surveillance operations, both domestically and internationally, using informants and agents to gather intelligence.

MI5 and MI6

MI5 (Security Service) handles domestic intelligence within the United Kingdom, focusing on counterterrorism and national security. MI6 (Secret Intelligence Service) operates internationally, collecting intelligence and conducting covert operations abroad. Both agencies utilize various HUMINT techniques to support their missions.

Presentation of you

  • Carrd - Build one-page sites for pretty much anything. Whether it's a personal profile, a landing page to capture emails, or something a bit more elaborate, Carrd has you covered.

Story telling

  • flourish.studio - Beautiful and easy data visualization and storytelling
  • mixkit.co - Free assets for your next video project.
  • pexels.com - The best free stock photos, royalty free images and videos shared by creators.
  • Tell your story with illustrations - Easily create and customize stunning illustrations with collections made by artists across the globe.

👷🛠️UNDER CONSTRUCTION🚧🏗

SIGINT

SIGINT Overview

Signals Intelligence (SIGINT) involves the interception and analysis of electronic signals for intelligence purposes. It encompasses a variety of techniques and technologies used to collect, process, and exploit signals from various sources.

NSA and SIGINT Operations

The National Security Agency (NSA) is a key player in SIGINT.

  • Backbone Filtering: Monitoring and filtering data as it travels through the internet's major infrastructure points. This allows for the collection and analysis of large volumes of data.

Cyber Surveillance

Cyber surveillance involves the monitoring and tracking of digital communications and activities. A basic cyber surveillance system may include the following components:

  1. Bulk Data Collection: Aggregating large amounts of data from diverse digital sources.
  2. Search and Filtering: Implementing search tools to efficiently sift through collected data and extract relevant information.
  3. Cookie and User Tracking: Tracking user activity through web cookies and other identifiers to monitor behavior across different sites.
  4. User Identification: Techniques to identify users who are attempting to remain anonymous.
  5. Malware Deployment: Inserting malicious software into target devices to enable further surveillance and data collection.

SIGINT Techniques and Tools

Various techniques and tools are used in SIGINT operations, including both commercial and DIY approaches:

  • Satellite Communication Interference: This includes jamming, eavesdropping, and hijacking satellite communications. These methods are used to disrupt or intercept signals.
  • Home-Made Satellite Jammers: Devices designed to disrupt satellite signals, often for the purpose of preventing communication or transmission.

👷🛠️UNDER CONSTRUCTION🚧🏗

GEOINT
GEOINT and Mapping Tools for Forensic Investigators

Eye in the Sky


Others

OSINT and Operations Security Resources

Back to Top ⬆