background preloader / WHOIS & Cie / WHOIS & Cie

Related:  Retours aux sourcesComment je suis devenu un "journaliste hacker"asylosJournalisme 2.0

Document Metadata Extraction Here are tools that will extract metadata from document files. antiword Belkasoft Evidence Center Extracts metadata from various Microsoft Office files (both 97-2003 and 2007-2013 formats), as well as Open Office documents. Besides, can extract plain texts (combining all texts from all XLS/XLSX/ODS pages and PPT/PPTX/ODP slides) and embedded objects.

Echelon's SpookWords Generator For instance, Simon Davies, director of Privacy International, warns that the list of 1,700 suspicious "trigger words" will not outsmart the global surveillance system : "The Echelon system works on a very sophisticated system of word relationships, rather than strictly on keywords. Powerful artificial intelligence software is used to judge the relationship between words, and analyse strings of words." Davies advises protestors to send a whole series of original keyword transmissions through email, rather than relying on someone else's template. (in ZDNet) Using encryption is the best way to bypass Echelon, although more and more governments try to control its use. Feel free to learn how to use it, it's much easy than it's said to be, and quite exciting, too :

Untangling the Web: How to Search the Internet Like the NSA In Archive, Hacking, Internet, NSA on March 25, 2014 at 8:06 PM The National Security Agency has produced a book to help its spies uncover intelligence hiding on the web. The 652-page book is titled Untangling the Web: A Guide to Internet Research and was published by the Center for Digital Content of the National Security Agency. NSA files decoded: Edward Snowden's surveillance revelations explained Two factors opened the way for the rapid expansion of surveillance over the past decade: the fear of terrorism created by the 9/11 attacks and the digital revolution that led to an explosion in cell phone and internet use. But along with these technologies came an extension in the NSA’s reach few in the early 1990s could have imagined. Details that in the past might have remained private were suddenly there for the taking. Chris Soghoian Principal technologist, ACLU NSA is helped by the fact that much of the world’s communications traffic passes through the US or its close ally the UK – what the agencies refer to as “home-field advantage”.

dutchreleaseteam torrent search Torrentz Age: 1d | 3d | 7d | 1m Quality: any | good | verified 8,654 torrents (0.013s) Order by rating | date | size | peers The Bucket List 2007 NL subs xvid DutchReleaseTeam avi » movies Vice leaves metadata in photo of John McAfee, pinpointing him to a location in Guatemala Update: McAfee now claims that he in fact edited the phone’s metadata to throw folks off the scent. More here. Another conference. “Great.” This one’s different, trust us. Our new event for New York is focused on quality, not quantity. The Migrants Files - The Migrants' Files project was launched in August 2013 by a group of European journalists who joined forces to accurately calculate and report the deaths of emigrants seeking refuge in Europe. This pan-European consortium of journalists is partially funded by the European non-profit organization Subscribe to the Migrants Files newsletter for quarterly updates. They know their lives are at risk, yet each year thousands of people from Africa, the Middle East and beyond — war refugees, asylum seekers and economic migrants — leave their homes and try to reach the promised land of Europe.

Open-source intelligence Open sources for intelligence[edit] OSINT includes a wide variety of information and sources: OSINT is distinguished from research in that it applies the process of intelligence to create tailored knowledge supportive of a specific decision by a specific individual or group.[3] Definers for OSINT[edit] Friends and enemies in the Middle East. Who is connected to whom? - interactive As the US and UK are set to again commit to military involvement in the Middle East, this interactive visualises the intricate, complex and sometimes hidden relationships and alliances across the region. Its tangled, opened state is meant as a kind of visual joke, showing how its fabric defies simple solutions. You can filter relationship types ‘on’ and ‘off’ in the bottom left and also rollover and click on different players to get a clarified view.

Clustering Engine Carrot2 Search Results Clustering Engine Carrot2 organizes your search results into topics. With an instant overview of what's available, you will quickly find what you're looking for. Choose where to search: We Are with John McAfee Right Now, Suckers Photo by Robert King VICE editor-in-chief Rocco Castoro and photographer/videographer Robert King have been following John McAfee for the past four days, documenting his life on the run. Rocco and Robert will continue to follow John until the conclusion of his journey and in the coming days will release exclusive preview footage of a forthcoming long-form documentary about his ordeal that will provide answers to many open questions and set the record straight. It will be nothing but absolutely epic, that much we can assure you. UPDATE: The John McAfee saga is a riddle wrapped in a mystery inside an enigma. Here is the latest.

European Parliament Investigation of Echelon 7 September 2001: Link to final version of the European Parliament report on Echelon: (194 pp.; 495KB) Minutes of meeting and Echelon resolution of EuroParl on 5 September 2001: 4 July 2001: Link to EuroParl Motion for Resolution on Echelon dated July 4, 2001. 3 June 2001 Investigation Techniques & Links by Bob Brasich OSINT tools: Facebook, Twitter, Social Networks, Identity verification, and more NetBootCamp Facebook Search Tool Facebook Graph Queries: Profiles, Photos, Pages, Employers, Groups & More