SlideShare a Scribd company logo
1 of 18
Download to read offline
Infogence – A Brief Introduction
• Infogence LTD was established in order to answer
  the security information needs of SME’s as well as
  large organisations. We aim to provide reports which
  are beneficial for all levels of personnel in the
  security sector; from managers as well as front line
  staff.
• Infogence Intelligence Report is a monthly report
  consisting of fully analysed topics ranging from new
  methods of operations, to IED’s, to past terror events,
  and many others.

• With our unique accessibility to terror knowledge
  databases, we form the most accurate reports which are
  based on real-life scenarios and events.
Our Team of Experts
• Our team of experts consists of:

    – Researchers and Translators
    – Analysts
    – Experts in the Various Security Related Subjects

• All of our experts are highly skilled and experienced within their field;
  they all have a military (intelligence) background and/or extensive
  security-related experience.

• They are fluent in several languages in order to gather and interpret
  information in an efficient matter.
Our Products
We offer several products, all suited to our consumers’ needs. These
  products are:

1) Monthly Shelf Reports – Data collected mainly from online sources,
   analysed, translated and summarised. Our monthly reports include 4
   topics.

2) Tailor-Made Reports – Tailor-made reports can be produced
   according to a specific organisation’s needs.

3) Specified Reports – These reports are dedicated entirely to ONE
   specific subject ranging from politics and security, IED’s, case
   studies and many more.
Core Competencies

 Veterans of the various units of the IC
 Special ops planners and operatives       Web 2.0 subject matter expertise
 Diversity                                 Cyber navigation
 Collection and analysis                   Forensics skills
 interactiveness

                              Superior actionable
                                 intelligence



 Native speakers                           Working methodology – active
 Arabic, Farsi, Turkish, Russian, English access
 Unique Web language –                     On-going monitoring
‘Arabish’, ‘Penglish’                      Flexibility
                                           Proactive collection – Virtual Humint
                                                                              5
The Web Opportunity

 Sources       Restricted Mailing Groups           Formats
               Forums         Animation
          Open            Discussion
                   Blog EntriesAge        Posts Voice Prints
Websites             Dialect
          Forums          Groups               Documents
                   Denomination         OS
                 File Share Presentations
Blogs

       RoomsWhere…
       Chat Address
          IP     Services       Instant
                     Still footage
                 Profession
                    Media
                            Audio
                                 Phone
                                 Numbers
                                        Language
                                Messaging Videos Zone
                                                 Time

                    Coverage                 Alias
                                              Electronic

            ?      Full Name
                            Recordings


                   Visual Hooks
                                   Email
                                   Address
                                   Login Name
                                              books
                                                   Data


                                                          6
Terror Capabilities
• A 3600 analysis of the various components
  underlying global terror threats:

IEDs                               Countermeasure awareness
initiation systems                 target intel collection
Stand-off weapons                  Concealment
Improvised armaments               Fake / assumed identities



 Weapons proficiency
 “how to” everything                Madrid Bombings
 Attack specific training           Marriot VBIED




                                                      7
PORTFOLIO EXAMPLES


           8
Terror Capabilities: Attack on Marriot
                Hotel
  Source – AlHesbah (Prominent Jihad forum), posted September 21st 2008
   .
                              “The mariot barricades”
   “…I present to you images and videos about types of barriers used in
   hotels, military installations, embassies, camps, etc.
   This image illustrates the destruction and wreckage sustained by a truck
   attempting to storm that barrier:




...I found no better way of storming it than with motorcycles of a storming
and breaching unit. Even if they get to clash with the guards, they will clear the
way for their fellows, to hit and run.”


                                                                                     9
Terror Capabilities: Madrid Train
Bombing
  “A brief and detailed analysis report Of the blessed Attack
           on Madrid And the fatal mistake” - Abdullah Dhu Al-
 TheThe first mistake (consists of 2 parts):
     first train                             Bajadin
 1. In order to acquire this strong explosive, the brothers had to expose themselves to the people
 that supplied it to them.
                     them

 2. The important disadvantage and the fatal mistake is that the brothers used cellular phones as
 timers for the IEDs - they should have used alarm clocks that obviously, couldn't be traced.
                                        It's not conspicuous and can carry the IED
 The second mistake                        without creating suspicion or drawing
                                                         attention.
 The cars that the mujahedin used to get to their targets were left in front of the targeted train
 stations. This is a big mistake because it could have been stolen.

 The third mistake

 The mujahedun brothers forgot that they must not touch the cellular phones with their bear hands
 because it can turn into criminal evidence.
                                                      The nails that were used in the bombings.
                                                     The more corrosion sets in, the deadlier and
                                                         more toxic the fragmentation will be.10
Virtual HUMINT and the Terrobox Data Warehouse

METHODOLOGY


                         11
Methodology
 Managing a virtual identity over the Web is a
HUMINT operation for all intents and purposes
         Q: What do you know about Al-
         Mizan Participants ?
           A: I have read many publications by
           our brother Fares Al-Jihad in other
           forums, and I have immense
           respect for him

        Q: How did you get to know about
        Al-Mizan forum on the internet ?

          A: Via Another Web forum, Majid
          Al-Islam, I was a member there
Methodology




Alias: ya_hussein Al-Mumahhed
Alias: ya_hussein Al-Mumahhed
 Alias: ya_hussein Al-Mumahhed
Denomination: Shiite
Denomination: Shiite
Origin: LebaneseShiite
 Denomination:
Origin: Lebanese
 Origin: Lebanese
Place of residence: UK, London    We operate over 100 active
Place of residence: UK, London
 Place of residence: UK, London
Registered to forums: […]
Registered to forums: […]         entities, registered to
 Registered to forums: […]
Active in operations: […]
Active in operations: […]
 Active in operations: […]        hundreds of hard core
                                  Jihadi sites
Monthly Reports

• Our monthly report contains 4 articles, mostly
  regarding different topics. They are based on
  past/present events, current terror activities and
  threats.
• In addition to written material, the reports are
  accompanied by genuine video clips which
  illustrate the different stages of the event.
Tailor-Made Reports

If a tailor-made report is required for a business
on a specific topic which has not been covered,
we can create one based on the consumer’s
needs.
Off-the-Shelf Reports
Currently there are 4 off-the-shelf reports:

1. Mobius – represents current capabilities in
  manufacturing IED’s, VBIED’s, body worn IED’s,
  detonators, camouflage etc.



2. Al-Khemia – presents and analyses real-life explosives
  recipes as they appear in hardcore terrorists’ knowledge
  bases.
Off-the-Shelf Reports (Cont.)
3. Hydra – aims to provide the reader with
   an understanding of the nature, scope,
   scale and change dynamics of the
   extremist use of the internet, i.e. forums
   etc.
4. Looking Glass – an analysis of leading
   extremist behavioural patterns over the
   web. The report will focus on prominent
   experts in the field of explosives and IED
   manufacturing.
• More reports are coming soon…
Thank You..

More Related Content

Viewers also liked

Special hightlight on pandemic preparedness business continuity and pandemic...
Special hightlight on pandemic preparedness  business continuity and pandemic...Special hightlight on pandemic preparedness  business continuity and pandemic...
Special hightlight on pandemic preparedness business continuity and pandemic...
Enterprise Security Risk Management
 
Understanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good PracticesUnderstanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good Practices
Enterprise Security Risk Management
 

Viewers also liked (11)

Travel risk management solutions: Duty of Care by Tony Ridley
Travel risk management solutions: Duty of Care by Tony RidleyTravel risk management solutions: Duty of Care by Tony Ridley
Travel risk management solutions: Duty of Care by Tony Ridley
 
Special hightlight on pandemic preparedness business continuity and pandemic...
Special hightlight on pandemic preparedness  business continuity and pandemic...Special hightlight on pandemic preparedness  business continuity and pandemic...
Special hightlight on pandemic preparedness business continuity and pandemic...
 
Understanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good PracticesUnderstanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good Practices
 
Duty of care and travel risk management: Lag Indicators
Duty of care and travel risk management: Lag IndicatorsDuty of care and travel risk management: Lag Indicators
Duty of care and travel risk management: Lag Indicators
 
Its Not In The Policy
Its Not In The PolicyIts Not In The Policy
Its Not In The Policy
 
Reducing maritime threats
Reducing maritime threatsReducing maritime threats
Reducing maritime threats
 
Social Media Technologies for Business Intelligence (Crisis, Security, Travel...
Social Media Technologies for Business Intelligence (Crisis, Security, Travel...Social Media Technologies for Business Intelligence (Crisis, Security, Travel...
Social Media Technologies for Business Intelligence (Crisis, Security, Travel...
 
Corporate Security-Training and Education
Corporate Security-Training and EducationCorporate Security-Training and Education
Corporate Security-Training and Education
 
An Overview Of The Airport Security Market,
An Overview Of The Airport Security Market,An Overview Of The Airport Security Market,
An Overview Of The Airport Security Market,
 
UN Global Road Safety Report and Analysis
UN Global Road Safety Report and AnalysisUN Global Road Safety Report and Analysis
UN Global Road Safety Report and Analysis
 
Deloitte Business Continuity Management
Deloitte Business Continuity ManagementDeloitte Business Continuity Management
Deloitte Business Continuity Management
 

Similar to Predictive Threats Analysis

Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Invincea, Inc.
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 

Similar to Predictive Threats Analysis (20)

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
Cisel1 d
Cisel1 dCisel1 d
Cisel1 d
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The year that shook the world
The year that shook the worldThe year that shook the world
The year that shook the world
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 

More from Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Predictive Threats Analysis

  • 1.
  • 2. Infogence – A Brief Introduction • Infogence LTD was established in order to answer the security information needs of SME’s as well as large organisations. We aim to provide reports which are beneficial for all levels of personnel in the security sector; from managers as well as front line staff. • Infogence Intelligence Report is a monthly report consisting of fully analysed topics ranging from new methods of operations, to IED’s, to past terror events, and many others. • With our unique accessibility to terror knowledge databases, we form the most accurate reports which are based on real-life scenarios and events.
  • 3. Our Team of Experts • Our team of experts consists of: – Researchers and Translators – Analysts – Experts in the Various Security Related Subjects • All of our experts are highly skilled and experienced within their field; they all have a military (intelligence) background and/or extensive security-related experience. • They are fluent in several languages in order to gather and interpret information in an efficient matter.
  • 4. Our Products We offer several products, all suited to our consumers’ needs. These products are: 1) Monthly Shelf Reports – Data collected mainly from online sources, analysed, translated and summarised. Our monthly reports include 4 topics. 2) Tailor-Made Reports – Tailor-made reports can be produced according to a specific organisation’s needs. 3) Specified Reports – These reports are dedicated entirely to ONE specific subject ranging from politics and security, IED’s, case studies and many more.
  • 5. Core Competencies Veterans of the various units of the IC Special ops planners and operatives Web 2.0 subject matter expertise Diversity Cyber navigation Collection and analysis Forensics skills interactiveness Superior actionable intelligence Native speakers Working methodology – active Arabic, Farsi, Turkish, Russian, English access Unique Web language – On-going monitoring ‘Arabish’, ‘Penglish’ Flexibility Proactive collection – Virtual Humint 5
  • 6. The Web Opportunity Sources Restricted Mailing Groups Formats Forums Animation Open Discussion Blog EntriesAge Posts Voice Prints Websites Dialect Forums Groups Documents Denomination OS File Share Presentations Blogs RoomsWhere… Chat Address IP Services Instant Still footage Profession Media Audio Phone Numbers Language Messaging Videos Zone Time Coverage Alias Electronic ? Full Name Recordings Visual Hooks Email Address Login Name books Data 6
  • 7. Terror Capabilities • A 3600 analysis of the various components underlying global terror threats: IEDs Countermeasure awareness initiation systems target intel collection Stand-off weapons Concealment Improvised armaments Fake / assumed identities Weapons proficiency “how to” everything Madrid Bombings Attack specific training Marriot VBIED 7
  • 9. Terror Capabilities: Attack on Marriot Hotel Source – AlHesbah (Prominent Jihad forum), posted September 21st 2008 . “The mariot barricades” “…I present to you images and videos about types of barriers used in hotels, military installations, embassies, camps, etc. This image illustrates the destruction and wreckage sustained by a truck attempting to storm that barrier: ...I found no better way of storming it than with motorcycles of a storming and breaching unit. Even if they get to clash with the guards, they will clear the way for their fellows, to hit and run.” 9
  • 10. Terror Capabilities: Madrid Train Bombing “A brief and detailed analysis report Of the blessed Attack on Madrid And the fatal mistake” - Abdullah Dhu Al- TheThe first mistake (consists of 2 parts): first train Bajadin 1. In order to acquire this strong explosive, the brothers had to expose themselves to the people that supplied it to them. them 2. The important disadvantage and the fatal mistake is that the brothers used cellular phones as timers for the IEDs - they should have used alarm clocks that obviously, couldn't be traced. It's not conspicuous and can carry the IED The second mistake without creating suspicion or drawing attention. The cars that the mujahedin used to get to their targets were left in front of the targeted train stations. This is a big mistake because it could have been stolen. The third mistake The mujahedun brothers forgot that they must not touch the cellular phones with their bear hands because it can turn into criminal evidence. The nails that were used in the bombings. The more corrosion sets in, the deadlier and more toxic the fragmentation will be.10
  • 11. Virtual HUMINT and the Terrobox Data Warehouse METHODOLOGY 11
  • 12. Methodology Managing a virtual identity over the Web is a HUMINT operation for all intents and purposes Q: What do you know about Al- Mizan Participants ? A: I have read many publications by our brother Fares Al-Jihad in other forums, and I have immense respect for him Q: How did you get to know about Al-Mizan forum on the internet ? A: Via Another Web forum, Majid Al-Islam, I was a member there
  • 13. Methodology Alias: ya_hussein Al-Mumahhed Alias: ya_hussein Al-Mumahhed Alias: ya_hussein Al-Mumahhed Denomination: Shiite Denomination: Shiite Origin: LebaneseShiite Denomination: Origin: Lebanese Origin: Lebanese Place of residence: UK, London We operate over 100 active Place of residence: UK, London Place of residence: UK, London Registered to forums: […] Registered to forums: […] entities, registered to Registered to forums: […] Active in operations: […] Active in operations: […] Active in operations: […] hundreds of hard core Jihadi sites
  • 14. Monthly Reports • Our monthly report contains 4 articles, mostly regarding different topics. They are based on past/present events, current terror activities and threats. • In addition to written material, the reports are accompanied by genuine video clips which illustrate the different stages of the event.
  • 15. Tailor-Made Reports If a tailor-made report is required for a business on a specific topic which has not been covered, we can create one based on the consumer’s needs.
  • 16. Off-the-Shelf Reports Currently there are 4 off-the-shelf reports: 1. Mobius – represents current capabilities in manufacturing IED’s, VBIED’s, body worn IED’s, detonators, camouflage etc. 2. Al-Khemia – presents and analyses real-life explosives recipes as they appear in hardcore terrorists’ knowledge bases.
  • 17. Off-the-Shelf Reports (Cont.) 3. Hydra – aims to provide the reader with an understanding of the nature, scope, scale and change dynamics of the extremist use of the internet, i.e. forums etc. 4. Looking Glass – an analysis of leading extremist behavioural patterns over the web. The report will focus on prominent experts in the field of explosives and IED manufacturing. • More reports are coming soon…