Intelligence Subscription Reports Brochure
Transcription
Intelligence Subscription Reports Brochure
TERROGENCE E x p e r t W e b I n t e l l i g e n c e f o r C o u n t e r - Te r r o r i s m PRODUCTS & CAPABILITIES w w w. t e r r o g e n c e . c o m 2 Open Source Web Intelligence for Counter-Terrorism Founded in 2004, Terrogence is a private open source web intelligence company dedicated to exposing terrorist capabilities and intent. Staffed with experienced intelligence professionals, the company has pioneered powerful, web-specific methodologies and tools for collection, analysis and research, enabling us to provide counter-terrorism intelligence of the highest caliber to governments and organizations worldwide. Based on these proven methodologies, the company employs a cutting-edge web intelligence system called HIWIRE™, to drive the entire OSINT production lifecycle end-to-end. ¡¡ Ten years at the forefront of OSINT ¡¡ Highly trained linguists: Arabic, Persian, Russian, French, Spanish, Chinese, Turkish etc. ¡¡ Intelligence products by renowned SMEs ¡¡ Unparalleled in-house C-IED and HME expertise ¡¡ Flexible collection for tailored time-sensitive intelligence ¡¡ Expert Virtual HUMINT™ operations and deep web and Darknet research Our unique intelligence capabilities, coupled with the commercial nature of our company, enable us to accommodate the intelligence and security needs of organizations worldwide. 3 Table of Contents Intelligence Reports ..............................................................................................................................................................4 AL- KHEMIA™ Forensic Chemical Analysis of Authentic Terrorist HME Recipes ...........................................................6 MÖBIUS™ Deep C-IED Intelligence & Terrorist TTPs Exposed ...................................................................................9 TGALERTS™ Near Real-Time Tactical Alerts with Contextual Analysis ....................................................................12 HYDRA™ Tracking Terrorist Trends & Strategic Developments in the World of Jihad ................................................15 Tailored Services ................................................................................................................................................................18 Customized Intelligence Reports .........................................................................................................................19 Corporate Intelligence ...........................................................................................................................................19 Training & Workshops.............................................................................................................................................20 w w w. t e r r o g e n c e . c o m 4 3 INTELLIGENCE REPORTS 5 3 Covering Terrorism from all Angles Islands, with participants from Egypt, Somalia, Algeria and Denmark assessing his methods and plans and offering “lessons-learned” tips from previous failed attacks. This scenario has played itself out in every major terrorist attack or attempt over the past few years. a™ IE ™ ius he mi Es Ds ler TGA TT P HM -K w w w. t e r r o g e n c e . c o m Al Today’s web-based terror backbone is inherently without geographic boundaries. An untrained terrorist in Spain can download an explosives manufacturing tutorial video posted by a Hezbollah IED expert from Lebanon, and learn how best to conceal it onboard an aircraft by participating in a jihadist forum registered to a server in the Canary Hy a™ KS OR W tS™ NE T dr Terrogence intelligence reports combat the inherent nature of modern-day terrorism by exposing every facet of online terror activities; from the websites and forums they operate in, to the emerging developments in TTP’s and weapons technologies being disseminated e and deployed in conflict zones vic r Se and home-fronts around the world. s Mö b Terrogence understands that global terrorism is exactly that: global. Terror capabilities and know-how are no longer limited to specific geographies once they reach the web. Terrogence’s expert reports provide tactical, technical and strategic insight into terrorist activities worldwide. 6 AL-KHEMIA™ Forensic Chemical Analysis of Authentic Terrorist HME Recipes Al-Khemia™ reports expose and analyze authentic terrorist home-made explosives (HMEs) as they emerge on terrorist forums and knowledge bases. The Al-Khemia™ Recipe Bank is an unparalleled repository of forensic HME analysis, aimed at rooting out the IED threat at its HME source. w w w. t e r r o g e n c e . c o m 7 Overview The rapid dissemination of explosives recipes and manufacture know-how via the web means that as soon as a home-made explosive recipe is perfected and disseminated in one part of the world, the threat becomes real in conflict zones and combat theaters everywhere. In each Al-Khemia™ report, a real-life HME recipe, harvested from within online forums and websites used by global terrorists and local insurgents, is meticulously synthesized step-by-step in a controlled laboratory setting and analyzed in perfect detail by forensic chemists and explosives experts. Authentic terrorist HME’s analyzed include: ¡¡ ¡¡ ¡¡ ¡¡ ¡¡ ¡¡ Nitroglycerin ¡¡ Mercury Fulminate Gelatin Dynamite ¡¡ DDNP HDN ¡¡ C4 Astrolite ¡¡ More… Sorbitol Hexanitrate Methyl Ethyl Ketone Peroxide (MEKP) 8 Inside Al-KhemiaTM A typical Al-Khemia TM report comprises two parts: Authentic Terrorist HME Recipe in Full translation Al-Khemia™ reports provide full translation of the original terrorist HME recipe (video, image, document attachment, textual explanation etc.), including all stages and instructions, with preliminary notes on how the HME recipe measures up against scientific synthesis of the same explosive, and what it might be used for. Laboratory Synthesis Reconstruction Terrogence forensic chemical experts deliver the results of a meticulous step-by-step laboratory re-synthesis of the material, along with an exhaustive assessment of its physical and chemical properties in the context of counter-terrorism efforts. w w w. t e r r o g e n c e . c o m “…Our synthesis reconstruction yielded a highly pure compound that will definitely detonate…” 9 MÖBIUS™ Deep C-IED Intelligence & Terrorist TTPs Exposed Möbius™ exposes current and developing IED capabilities and operational TTPs of terrorists and insurgents worldwide, featuring rigorous technical analysis and expert assessment of real-world terrorist MOs as they develop deep within online terrorist networks. w w w. t e r r o g e n c e . c o m 10 Overview As the internet morphs into one vast social network, terrorists work keenly to harness global online collaboration and social networking platforms to share knowledge and improve technological and operational capabilities. Yesterday’s jihadi bomb tutorial from Lebanon becomes today’s bomb in a radical Londoner’s basement, and tomorrow’s disaster in Mumbai. Researched and written by expert WTI and C-IED specialists, Möbius™ reports apprise subscribers of the latest trends in terrorist IEDs and TTPs, as they emerge in online sources including password protected social media platforms where global terrorists seek to recruit, radicalize and plot their next attack. ` 11 Inside Möbius™ The typical Möbius™ digest includes eight individual reports per month, each assigned to one of two categories: Knowledge Base The latest IED developments, instructional materials and technical discussions extracted from terrorist web forums and social networks worldwide. Case Studies Techno-tactical assessments of the most recent IED applications by terrorists globally, often based on videos taken by insurgents on the ground. Each individual CLI is further marked off against six salient categories of tactical intelligence. ¡¡ IED construction ¡¡ Concealment/camouflage ¡¡ Initiation systems ¡¡ Countermeasure awareness ¡¡ Modus operandi ¡¡ Standard weapon utilization w w w. t e r r o g e n c e . c o m “…The last parcel IED was different to the others…a fire bomb without fragmentation…” 12 TGALERTS™ Near Real-Time Tactical Alerts with Contextual Analysis Upon uncovering new and emerging terrorist activities of imminent interest on the web, Terrogence circulates a techno-tactical intelligence alert containing preliminary WTI analysis alongside tactical and contextual relevancy. w w w. t e r r o g e n c e . c o m 13 Overview During the course of our strategic web-intelligence operations, Terrogence collection professionals often encounter outright threats or terror-capability developments of imminent interest. These items immediately enter a techno-tactical analysis fast track to be disseminated in near realtime via the TGAlert Service (TGAlertS™). In order to avoid inundating subscribers with the low threshold of “just news”, TGAlertS™ digs a level deeper, providing context and interpretation. Though strictly dictated by events, TGAlertS™ subscribers receive one alert per week. As the events that inspire near real-time TGAlertS™ develop further, some alerts grow into full-blown intelligence reports worthy of inclusion in our Möbius™ product. 14 Inside the TG Alert™ Service (TGAlertS™) A typical TGAlertS™ is structured as follows: e Alert Terrogence Alert Waist-Belted y Abu Oma r al-Shish wais Incident Summar www .terr ogen Waist on right arm, CQC Wristwatch worn ce. com m of 5 Tagged: from a militant in Fanny pack PBIED recovered Ismailiyyah, Egypt Page 4 of 5 ani (left t-be(AQ) ) and triba ding al-Qaeda lted PBIEDs (red arro l sheikhs ssed an expan in al-Raqq ws) and we have witne wristwa Ds), now not only tches (yell ah (right) wearing and into 2014 right arm ow arro s n-borne IEDs (PBIE Throughout 2013 ws) on thei Abu Wah attested to -strapped perso ib r style PBIE with bandolieres, previously ment" of waist D (red arro "fashion state onal-use" devic "pers ently wristwa frequ These w) and tch (yell are now e bombers. on his righ ow arrow) ased militants, sported by suicid g sus-b ankin Cauca Genera t arm ing high-r ional garb of l No operatives, includ as the tradit AQ in te of ced s s waist tly surfa recen around the The Syr act belts have documented comp ian These -Iraqi are Iraq and Syria. na has strapped commanders in demons PBIED fas trated hion am belts as: an evolut Egypt. ong ISIS ion in commande the per rs, who sonal wa are now ist A stasus now Key points seen spo tus sym the Cauca in seen rting the bol previously -strapped PBIED waist nal Inspiratio Perso n for oth Iraq and Egypt Syria, ers in ance ring by indica appea and "insur symbol A ting the deterrent both a status as ir s wil ander lingness "insuranc truck SVBIED by ISIS comm toAustralian e policy" sacrificesuicide bomber standing on his PBIED sported This tre their live PBIED, Deir ez-Zor, Syria in case of nd also wearing a waist-belted s capture or re ear app captu policy" s to be to risk pact of ed com waist-bel popular operatives expos wh among ted PBIED yed by field en corner those fiel who ma TTP also emplo ed and d operat y choose combat (CQC) ers thu ive eve quart s to s tak close n wearing initiate exhibitplan e out the engaging in the dev ed the the ir advers a contingency ice as a use of aries wit such PBIEDs as presumabl last resort thin-layer y for the h them. documented using ed PBIED Iraqi mil same pur SVBIED drivers PBIED Con itants hav s concea pose (cf. cealed insi led in e Terrogenc de Belt 13244). compac e Alert™ - Growin In genera t belts, TGA0285 g Trend l, these killings among Low-Sig devices than ma Iraqi Mil nature are more ss-casualty itants HIW effective terror att IRE™ II.ID in close It is worth acks. proximity noting tha targeted t some SVB these PB IEDs (cf. IED driver Möbius™ TGA0295 s in Syria in Deir No.: report Aus were als ez-Zor, Syria HIW o docum tralian Sui 14008 intende ented we IRE™ II.ID cide-Bom HIWIRE™ II.ID: d to be aring ber Initiate 13353). used as 14 February 2014 SVBIED This sug s Truck a conting Publication Date: initiation ges SVB ency pla ts that IED malfunctio 2013-2014 n for tar the PBIED Web: n. A sim geting ene Appeared on the s were ilar TTP my forces Isaac (Tzachi) Ganor of an SVB Author: in case IED driv networks of ce. com ww w. te Syria, Iraq, Egypt, AQ, ISIS, rrogen Jihadist social er wit www.te Source: h a PBIED rro sus, Cauca ge , nc e. co was -belted PBIED ted PBIEDs "Fashion Statement”: Waist-Bel TGA0295 Al-Qaeda n Statement”: Terrogence Alert Service™ 7, al-Maqdis in the October the Sinai-based Ansar Bayt also evidenced in Egypt by Directorate (cf. Möbius™ the South Sinai Security 2013 SVBIED Attack against Attack HIWIRE™ II.ID Directorate Targeted in SVBIED report South Sinai Security PBIED in Egypt, as appearance of this compact the of evidence is 13763). There a militant wearing a PBIED 9, 2013, in Ismailiyyah, where documented on February . during a raid on an IED workshop in a fanny-pack was killed Service™ Al-Qaeda "Fashio PBIEDs Service™ ent”: Wa ist-Belted PBIEDs Pag e3 w w w. t e r r o g e n c e . c o m Terrogenc TGA029 5 AlQaeda "Fa shion Sta tem TGAlertS™ Key Benefits: ¡¡ Near real-time delivery upon detection ¡¡ Brief analysis of context and background ¡¡ Assessment of tactical relevancy to PETN, ETN is well suited to terrorist activity…” Page 1 of 5 d PBIEDs ment”: Waist-Belte Tactical Assessment & Notes WTI SMEs at Terrogence elaborate on the harvested material, adding expert notes that paint a fuller intelligence picture of the terror activity detected. A brief assessment follows, shedding light on the tactical relevancy of the Intel. sweetener and its relative ease of production compared ion State Al-Qaeda "Fash TGA0295 Comm. Info & Summary of Intel Brief overview of the intelligence source (platfrom type, affiliation, areas of interest etc.) followed by a summary of the intelligence (e.g. Jihadists on a password-protected forum discuss in detail the synthesis of a unique explosive for the express purpose of downing passenger aircraft). “Due to the availability of erythritol as a natural 15 HYDRA™ Tracking Terrorist Trends & Strategic Developments in the World of Jihad At the very forefront of the online war against global jihad, Hydra™ explores the nature, scope and dynamics of extremists’ use of the Internet, focusing on hardcore jihadist forums and terror activities on social media platforms. w w w. t e r r o g e n c e . c o m 16 Overview Hydra™-Terrogence’s most wide-ranging web intelligence report, monitors terrorist trends and developments as they come to light on the web, where terrorists seek to radicalize, recruit, or plot attacks against religious, cultural and political targets. The report evaluates extremist Islamic propaganda, recruitment and radicalization efforts, deep trends within the evolving world of jihad, while providing strategic WEBINT insights to hard-core global jihadists. Hydra™ paints a rich picture of extremists’ use of the Internet, with particular focus on hardcore jihadi peer-to-peer platforms. Each month, the report examines the latest publications, potential targets and underlying motivations of Internet terrorist activists around the world. 17 Inside Hydra™ A typical Hydra™ report comprises two parts: Highlights of the Jihadi Web Diverse assessments of important technical and non-technical developments within active jihadi networks, e.g. tactics and operational issues, politics & ideology, propaganda, and web communications infrastructure. In Focus A robust dive into trends of special interest in the jihadi world, including tectonic shifts in jihadist politics, deep trends in jihadist tactics and overlooked aspects of jihadist organizations. w w w. t e r r o g e n c e . c o m “..al-qaeda and al-shabab have come to appreciate the potential benefits of humanitarian aid as a tool for winning public support…” 18 TAILORED SERVICES Tailored Intelligence Reports | Training & Workshops | Corporate Intelligence Terrogence offers a diverse range of intelligence services specializing in all facets of Open Source Web Intelligence (WEBINT). Our service lines are managed by seasoned intelligence and counter-terror experts, delivering the highest quality results to our customers. w w w. t e r r o g e n c e . c o m 19 Tailored Intelligence Reports Corporate Intelligence Terrogence has two virtues that place it above all others: ¡¡ The highest caliber intelligence professionals, linguists and SMEs Information and timing are everything in business. The Internet represents the greatest collection of information in the history of mankind, and companies that are quick to leverage this mass of information secure a competitive edge on the corporate battlefield. The advanced technology and methods that lend superiority to Terrogence web intelligence operations against terrorists are equally powerful – and timely – in the realm of corporate OSINT. ¡¡ A powerful Web Intelligence system designed to maximize the impact that those professionals, linguists & SMEs have on every Terrogence product. This set-up is highly flexible and very powerful when focused on filling specific customer intelligence gaps. Collection efforts can be trained on a specific geography (e.g. Iraq, Afghanistan, Pakistan, Chechnya, West/East Africa), or on a particular subject (e.g. IEDs, VBIEDs, aviation/maritime threats, cyber-terror, homegrown terror etc.). Terrogence can also hone in on individuals, organizations, corporations, specific activities and more. We often navigate multiple verticals on a single project. ¡¡ Provide detailed reports of the political/corporate terrain in veiled territories. ¡¡ Expose hidden agendas, undisclosed assets. ¡¡ Shed light on existing partnerships or potential partnership deals. ¡¡ Reveal public perception of your business. ¡¡ Expose organizations and individuals that harbor ill-will toward your business. 20 Training & Workshops Terrogence offers a selection of workshops & training sessions to first responders, military, intelligence and counter-terror professionals covering WEBINT practices, methodologies and terrorism subject-matter in varying levels of depth and scope. The trainers for our Web Intelligence workshops and training sessions come from rich intelligence and operational backgrounds in SIGINT, HUMINT, OSINT and HLS strategy. Introduction to WEBINT (2 days) This course introduces the world of open-source, web-based intelligence, covering the structure of information on the web, WEBINT search practices and terrorist utilization of the web. Virtual HUMINT & Web Intelligence Collection (5 days) Designed for law enforcement and security professionals, this course communicates advanced methods and tools for gathering actionable Web Intelligence from active terrorist sources on the web. Open Source Web Intelligence Operator (3 weeks) A comprehensive training course designed to train an Open Source Web Intelligence operator to fully conduct WEBINT collection, processing and analysis operations. The course includes theoretical training and real-life collection exercises. w w w. t e r r o g e n c e . c o m w w w. t e r r o g e n c e . c o m w w w.ter r o g e n c e . c o m