Afghanistan Evacuation, Donald Trump, Election 2024, Foreign Policy Research & Analysis, Intelligence Collection, Analysis & Estimates, Joe Biden, Kamala Harris, Middleeast, Military Operations, History & Cyber Warfare, National Security, U.S. Presidency

A Tribute to the 13 Troops Who Lost Their Lives at Hamid Karzai International Airport During the Evacuation of Afghanistan on August 26, 2021. 🇺🇸🫡🙏🎖️

Standard
Donald Trump, Election 2024, Foreign Policy Research & Analysis, Intelligence Collection, Analysis & Estimates, Military Operations, History & Cyber Warfare, near-peer adversary, U.S. Presidency

A.I.’s Impact on 60 million American Workers in jobs such as, office support, customer service/sales, food services, and light production, are susceptible to A.I. replacement. The necessary workforce retraining into other occupations will create a National Security risk over the next six years when the country is in a critical position of being pulled into a near-peer shooting war.

Standard
Foreign Policy Research & Analysis, Intelligence Collection, Analysis & Estimates, National Security, Terrorism Information

RNSK Vol I, Edition 5

September 3, 2020

Transnational Organized Crime: What Makes It An American National Security Interest?  

NGO: Transnational Organized Crime Groups Make US$ 2.2 trillion a Year   photo courtesy of Global Financial Integrity

Introduction

The expanding size, scope, and influence of transnational organized crime and its impact on U.S. and international security and governance represents one of the most important challenges to nearly every country. During the past 20 years, technological innovation and globalization have proven to be an overwhelming force for good. However, transnational criminal organizations have taken advantage of our increasingly interconnected world to expand their illicit enterprises.

Threat Risks From Transnational Organized Crime

• Penetration of Foreign Government Institutions, Corruption, and Threats to Their Governance. Developing countries with weak rule of law can be particularly susceptible to Transnational Organized Crime (TOC) penetration. TOC penetration of states is deepening, leading to co-option in a few cases and further weakening of governance in many others. The apparent growing nexus in some states among TOC groups and elements of government—including intelligence services—and high-level business figures represents a significant threat to economic growth and democratic institutions.

• Threats to the Economy, U.S. Competitiveness, and Strategic Markets. Transnational Organized Crime threatens U.S. economic interests and can cause significant damage to the world financial system through its subversion, exploitation, and distortion of legitimate markets and economic activity. U.S. business leaders worry that U.S. firms are being put at a competitive disadvantage by Transnational Organized Crime and corruption, particularly in emerging markets where many perceive that rule of law is less reliable. The World Bank estimates over $1 trillion is spent each year to bribe public officials, causing an array of economic distortions and damage to legitimate economic activity. The price of doing business in countries affected by Transnational Organized Crime is also rising as companies budget for additional security costs, adversely impacting foreign direct investment in many parts of the world.

• Crime-Terror-Insurgency Nexus. Terrorists and insurgents increasingly are turning to Transnational Organized Crime to generate funding and acquire logistical support to carry out their violent acts. The Department of Justice maintains a classified report known as the Consolidated Priority Organization Targets (CPOT) list. The last time CPOT was declassified via a FOIA request was 2015.  That edition of the CPOT listed a total of 63 organizations, 29 of which, are significant international drug trafficking organizations (DTOs) that threaten the United States, AND have links to terrorist groups. Involvement in the drug trade by the Taliban and the Revolutionary Armed Forces of Colombia (FARC) has been critical to the ability of these groups to fund terrorist activity. The U.S. Law Enforcement and  Intelligence Community is concerned about Hezbollah’s drug and criminal activities, as well as indications of links between al-Qaeda in the Lands of the Islamic Maghreb and the drug trade. Further, the terrorist organization al-Shabaab has engaged in criminal activities such as kidnapping for ransom and extortion, and may derive limited fees from extortion or protection of pirates to generate funding for its operations.  ISIS has also been very active in the TOC arena.

• Expansion of Drug Trafficking. Despite demonstrable counter-drug successes in the past 8-9 years, particularly against the cocaine trade, illicit drugs remain a serious threat to the health, safety, security, and financial well-being of Americans. The demand for illicit drugs, both in the United States and abroad, fuels the power, impunity, and violence of criminal organizations around the globe. Mexican DTOs have escalated their violence to consolidate their market share in the Western Hemisphere, protect their operations in Mexico, and expand their reach into the United States. In West Africa, Latin American cartels are exploiting local criminal organizations to move cocaine to Western Europe and the Middle East. Kenya, in Eastern Africa, has become a major distribution hub for heroin coming from Afghan DTOs to Europe and the United States. Many of the well-established organized criminal groups that had not been involved in drug trafficking—including those in Russia, China, Italy, and the Balkans—have now established ties to drug producers to develop their own distribution networks and markets.

• Human Smuggling/Trafficking. Human smuggling is the facilitation, transportation, attempted transportation, or illegal entry of a person or persons across an international border, in violation of one or more country’s laws, either clandestinely or through deception, whether with the use of fraudulent documents or through the evasion of legitimate border controls. It is a criminal commercial transaction between willing parties who go their separate ways once they have procured illegal entry into a country. The vast majority of people who are assisted in illegally entering the United States and other countries are smuggled, rather than trafficked. International human smuggling networks are linked to other transnational crimes including drug trafficking and the corruption of government officials.  In the past few years trafficking in children has begun to pick-up.

• Weapons Trafficking. Criminal networks and illicit arms dealers also play important roles in the black markets from which terrorists and drug traffickers procure some of their weapons. As detailed in the 2010 UN Organization on Drugs & Crime report, The Globalization of Crime (Note: this report was a massive undertaking and cannot be replicated yearly, however a new one was in preparation for 2020 before the COVID-19 Pandemic, so it is unlikely to be published this year), the value of the documented global authorized trade in small arms (i.e.; handguns, rifles, shotguns, machine guns) has been estimated at approximately $2.08 billion in 2010, with unrecorded but legal transactions making up another $120 million or so. The most commonly cited estimate for the size of the illicit market is approximately 20% of the legal market. According to the head of UNODC, these “illicit arms fuel the violence that undermines security, development and justice” worldwide. U.S. Federal law enforcement agencies have intercepted large numbers of weapons or related items being smuggled to China, Russia, Mexico, the Philippines, Somalia, Myanmar, Mali, Somalia, Turkmenistan, Syria and Yemen.  It is important to note this discussion does NOT include heavier weaponry, such as: Rocket Propelled Grenades, anti-tank rockets, heavy barrel machine guns (like the U.S. M2 .50 caliber machine gun, for example), fragmentation grenades, 40mm grenade launchers, mortars & field artillery.

• Intellectual Property Theft. TOC networks are engaged in the theft of critical U.S. intellectual property, including through intrusions into corporate and proprietary computer networks. Theft of intellectual property ranges from movies, music, and video games to imitations of popular and trusted brand names, to proprietary designs of high-tech devices and manufacturing processes. This intellectual property theft causes significant business losses, erodes U.S. competitiveness in the world marketplace, and in many cases threatens public health and safety. Between FY 2003 and FY 2010, the yearly domestic value of customs seizures at U.S. port and mail facilities related to intellectual property right (IPR) violations leaped from $94 million to $188 million. Products originating in China accounted for 66% of these IPR seizures in FY 2010.  Estimates for 2020 are in excess of $450 million, and China still leads the pack.

• Cybercrime. TOC networks are now significantly involved in cybercrime, as it has become increasingly difficult to launder money, and/or defeat institutional security systems which are controlled by networked computer systems.  Cybercrime costs consumers tens of billions of dollars annually, threatens sensitive corporate and government computer networks, and undermines worldwide confidence in the international financial system. Through cybercrime, transnational criminal organizations pose a significant threat to financial and trust systems—banking, stock markets, e-currency, and value and credit card services—on which the world economy depends. For example, some estimates indicate that online frauds perpetrated by Central European cybercrime networks have defrauded U.S. citizens or entities of more than $1 billion in a single year. According to the U.S. Secret Service, which investigates cybercrimes through its 31 Electronic Crimes Task Forces, financial crimes facilitated by anonymous online criminal elements, result in billions of dollars in losses to the Nation’s financial infrastructure. The National Cyber Investigative Joint Task Force, led by the Federal Bureau of Investigation (FBI), functions as a domestic focal point for 18 federal departments or agencies to coordinate, integrate, and share information related to cyber threat investigations, as well as make the Internet safer by pursuing terrorists, spies, and criminals who seek to exploit U.S. system.

Information Warfare. The 2016 Presidential Election demonstrated that shadowy foreign government agencies, in concert with private TOC groups, have a significant capability of committing Information Warfare by exploiting America’s open society and means of mass communication.  Common social media platforms, such as YouTube, Twitter, Instagram, TikTok, SnapChat, Facebook, Google, and others, have been infiltrated to influence public thinking.  Other aspects of criminal information warfare include developing misleading documents, such as the now debunked dossier procured by the Democratic National Committee that attempted to implicate the Trump Campaign in colluding with Russia to rig the election.  This dossier was actually used as evidence by the FBI to get a warrant to tap the phones of a Trump Campaign staffer.  We are seeing just the tip of the iceberg in TOC involvement in information warfare.  The allure of adversary governments using TOCs for these activities is simple:  TOCs are adept at working in the shadows, below the radar, because getting caught is not as big of a problem as losing tens or even hundreds of millions of dollars in the process.  TOCs could care less about their operatives going to jail; they are not happy about losing money.  Adversary governments and terrorist groups are more than willing to pay for access to a TOCs well-developed network of money launderers, cyber criminals, black bag experts, etc.  At this juncture, no one really knows how much money TOCs are pulling-in to facilitate information warfare projects.  It now appears that some of these same shadowy TOCs are acting as conduits for money, planning and organizing insurrection and subversive activities in the U.S.

Ciao,

Steve Miller, IAPWE – Certified & Member
Managing Editor
The Report on National Security Kinetics™
Seattle, WA. USA
vietvetsteve@millermgmtsys.com

Standard
Foreign Policy Research & Analysis, Intelligence Collection, Analysis & Estimates, Military Operations, History & Cyber Warfare, National Security, Terrorism Information, U.S. Presidency, Weapon Systems

RNSK Vol I, Edition 1

Introduction

     This is the premiere Edition of The Report on National Security Kinetics™ (RNSK).  There are dozens of publications out there with content that touches on some of the RNSK Focus Areas, but, require regular monitoring of a half-dozen or more of them to cover it all.  The RNSK format has been designed around a set of Focus Areas to help reduce a reader’s effort in keeping tabs on an important set of topics.

     The RNSK Focus Areas have been selected by the editor based on 40+ years of experience as a U.S. military veteran, national security analyst, international business manager, writer, foreign policy researcher, college teacher, and military & presidential historian.  It has been my honor to meet many women & men with similar backgrounds, including a shared belief in the importance of family, strong morals, human dignity, personal integrity, and putting country above self.  Recognizing the Kinetic nature of National Security, factual & timely information related to the Focus Areas is an important factor to this editor and like-minded individuals.

The RNSK National Security Focus Areas are:

  • Government-related Policy and Actions (U.S. & non-U.S.)
  • Weapon Systems
  • Intelligence Collection, Analysis and Counter-Terrorism
  • Military Operations & Cyber Warfare
  • Historical Commentary

     These Focus Areas may not always be covered in each edition.  Instead, the content will vary from one edition to the next based on what readers are asking for, global events, and the topical insights of RNSK correspondents with many decades of experience.  RNSK content is:

  • Reliable, well researched and factual;
  • Written with minimal opinions, speculation, or someone’s Ouija board;
  • Relative and timely, but, not a cyclical news source; RNSK has no competition-driven publishing deadlines.

The Need for Sources with Trustworthy, Verifiable Facts

     With the widespread use of the internet, it puts a staggering level of content at our fingertips.  The challenge for us, however, is determining the utility of what we read.  Because our research & reading time is limited, it leads us to determine which information sources are most utilitarian, and fit the closest to our needs.  For the serious consumer of useful web-based information, it is understood there is no “perfect” source, nor “one-size-fits-all.”  We look for reliable information sources that provide the best content, without investing too much of our limited time and resources.  In short, we want a good deal!

     When I think about reliable information sources, it reminds me of my paternal grandfather, Albert Miller, a veteran of World War I and World War II.  In between the wars, and for his last 20 years in the workforce, he was a pressroom manager for the Los Angeles Times.  Although he was a loyal consumer of L.A. Times content, he also was a strong proponent of the philosophy, “believe only half of what you read, and nothing of what you hear.”  He was a voracious reader of nearly everything he got his hands on.  Coupled with pondering and introspection, he developed strong convictions based on objectivity.  If he were alive today, he would have already applied his philosophy by carefully studying internet content for the favorable characteristics noted above.  He would be scolding the public for not following his advice, and the global fallout over “fake news.”

History Repeats Itself

     Prior to World War I, the average person was not overly challenged in differentiating between reliable and unreliable information purveyed to the public.  Name brand public information back then included respected outlets such as the New York Times, Wall Street Journal, The Economist, and The Nation.  After World War I, broadcast radio spread like wildfire across the globe, much the same way the Internet has in the past 20+ years.  To illustrate the rapid spread of broadcast radio going into 1922, the year opened with only 28 radio stations in the United States.  At the close of 1922, America could boast of having 570 commercial radio stations!

     Radio broadcasting became so pervasive by the 1930s that Congress enacted legislation to form the Federal Communications Commission to regulate the industry.  Just like television became the entertainment centerpiece in every home by the 1960s, radio held the same position from the 1920s through the 1940s.  In the first half of the 20th Century, radio was literally the human lifeline to the rest of the world, the same as the Internet is today.

     With the ever-increasing pace of a global society throughout the radio era, numerous people took the attitude that they were too busy, and did not have time to read a daily newspaper; the radio industry was more than happy to fill the gap.  Radio carried the news, weather, sports, church services, music, and programmed entertainment, to name a few.  Back then, different types of broadcasts were discernible…news programs and fictional entertainment were done in different styles.  The overreliance on radio for all aspects of life spawned a common phrase that carried the force-of-truth behind it, “hey, I just heard on the radio…”  If you heard it on the radio, it has to be true, right?

     The bubble of truth in radio was burst in 1938 with the broadcast that came to be known as, “The War of the Worlds.”  A 22-year old actor, Orson Welles, conducted a radio broadcast meant to be science fiction entertainment, but, it was delivered like a real newscast.  Millions of people heard Welles’ “report,” and actually thought the Earth was under alien invasion!  Even though Welles’ intent was entertainment, the public’s reliance on radio allowed them to be duped into thinking they were under alien attack.  If you heard it on the radio, it has to be true, right?

     Fast forward this to the internet age, but, with public overreliance on web-based content instead of radio, it has once again allowed agents-of-manipulation to blur the lines between fact and fiction.  An unchecked social media was/is the perfect place to sow disinformation and blur-the-lines.  In simple terms, with the veneer stripped back, it is slick, subtle lying; which isn’t very “social” by most people’s standards.  This is evident in all the stories about “fake news” and the Information Warfare conducted during the 2016 Presidential Election.  But, make no mistake, the blurring of fact and fiction seen in the past two years has nothing to do with entertainment, nor is it strictly one-upmanship between competing web-based information sources.

     Duping the public with disinformation during the age of radio, or today’s internet, is not just information warfare; the root of the matter goes much deeper.  So, it is true; history does repeat itself, but, why?

     Web-based information distortion in some cases is an act-of-war; much like the information subterfuge undertaken by both sides in World War II.  Let’s call it what it really is, a term that does not mince words…Espionage.  It may not be a shooting war, but, it is warfare, nonetheless.  The circumstances behind public communication in wartime England may have had its Fascist & Communists intriguers who angered government authorities and were carefully watched.  The moment they crossed-the-line from just stirring things up, to proof of subversion, they were going to jail for espionage, at the least.

How Does This Relate to the RNSK?

     The foregoing discussion bothers me…it bothers me a LOT.  We can all agree that fiction is entertaining, but, not when we are looking for, and expecting to find the facts.  But, even when we successfully cull-out fictional information, facts may still not be the facts.  What someone says or writes may not be pure fiction, or manipulated fake news, but, what about intentional or unintentional co-mingling of fact and opinion?  Any purveyor of information, regardless of media type, if they want to be seen as a viable source of factual information, they must exercise overt care in identifying when something is an expressed opinion, versus a confirmed fact.  Whether a purveyor of opinion is honestly expressing just their opinion, it can and does, influence other people’s thinking and opinions.  Expressing an opinion that is co-mingled with fact, is a disservice to the consumer, at best; at worst, it intends to convince someone how to think and act.

     When it comes to writing and publishing the RNSK, the intent is to avoid the foregoing communication/information problems by the guidelines previously mentioned, to wit:

  • Reliable, well researched and factual;
  • Written with minimal opinions, speculation, or someone’s Ouija board;
  • Relative and timely, but, not a cyclical news source; RNSK has no competition-driven publishing deadlines.

     So, if you have an interest in rounding-out your national security knowledge in today’s kinetic environment, and want the confidence of knowing the content is based on the foregoing parameters in a defined set of Focus Areas, and has been written with an eye toward the values imbued by America’s Founding Fathers, then The Report on National Security Kinetics™  is what you need…Welcome!

     This is enough for now; the introduction has been done.  Rather than trying to include an actual content article buried at the bottom of this premiere edition, where it likely would get lost, we will begin publishing informational content in the next edition.  In the beginning, RNSK will be published bi-weekly.  If a published article is prepared by a correspondent other than the editor, their name/credentials will appear at the end of it.  Unless otherwise noted, all other content is by the editor & chief correspondent.

Ciao,

Steve Miller
Editor
The Report on National Security Kinetics™
Seattle, WA. USA
http://www.millermgmtsys.com

Standard
Foreign Policy Research & Analysis, Intelligence Collection, Analysis & Estimates, Terrorism Information

What are the best open source global intelligence databases?

Let me share some tips with you that I’ve picked-up along the way that helps me do what I do, and am sought after for Global Intelligence Research & Analysis (GIRA). I’ll apologize in advance if I share something you already know, or are aware of. Since I do not know you, nor your current level of knowledge, I am not going to make any assumptions.

One of the things I have determined over the years about GIRA is simply this: There are two types of people doing GIRA…the professionals who are really good at it, and then everybody else. How can you tell if someone has the intrinsic “stuff” to be really good at GIRA? I like illustrating things using metaphors and examples; so, here’s one on being a GIRA expert. Have you ever heard of the social science concept called “Abraham Maslow’s Hierarchy of Needs?” Maslow theorized that human behavior can be categorized based on one of five need levels, and the level someone is on currently, can go up or down on a real-time basis in the blink-of-an-eye. The five levels are:

  1. Physiological Needs. These are the things to sustain human life. Breathing oxygen is as basic as it can get.
  2. Security Needs. Shelter, clothing, avoiding immediate danger.
  3. Socialization Needs. The human trait to interact with other humans.
  4. Recognition, Achievement Needs. Human desire to advance, self-worth, be seen by others as adding value.
  5. Self-Actualization Needs. Ever wonder why someone will voluntarily jump out of a perfectly good airplane to use a parachute? Why does a NASCAR racing driver want to drive a 3,000+ lb car at 200 mph while he’s literally bumper-to-bumper and door-to-door – only inches apart – from three or four other cars? Why did Air Force pilot, Chuck Yeager, want to fly an airplane to break the sound barrier in 1947? These are examples of people self-actualizing; doing something because there is a burning desire inside them that is so important, it defies understanding by most people…except for the few others with the same unfulfilled need.

If you want to be a really good GIRA expert, your desire must derive from Maslow’s 5th level. A good example of a self-actualizing GIRA expert is me…how important is it to me to self-actualize GIRA? Well, I am writing about it right now on Christmas Day. Not too many people will see this as being a burning need, so much so, I need to do it on Christmas. The GIRA tips and techniques I will describe are only useful if you put them to work…you gotta, wanna know.

Tips on Open Source Intelligence Research & Analysis

  1. Establish your personal knowledge baseline. My four kids are all grown and on their own. When they were in grade school they frequently asked me, “Dad, what do we have to do to be smart?” My answer was: “Read anything and everything you can get your hands on.” When I said anything and everything, I told the kids that meant if they were just waiting in the grocery store checkout line, read the ingredients on the box of cookies in your basket! You have to be a voracious reader. The reason it is so critical to have an ultra-high level personal knowledge baseline is simply because when you start to get serious about GIRA, you are not going to have the time to focus on a topic to produce a GIRA product of integrity quick enough to do someone any good if you have to go school yourself, first. Sometimes you have that luxury; but, if someone is paying you money for your intellectual product, you can’t take too much time to produce it. People and/or companies requesting GIRA from you, view time & money in the same context. This being said, having an evolving, expanding knowledge baseline in general, and a certain topic, in specific, allows you to monitor global happenings within the topic area and quickly spot something that’s not part of your baseline knowledge and determine whether it’s something significant enough to dig further.
  2. Determining if your generic personal knowledge baseline is adequate. About 15 years ago when I decided to start dabbling in GIRA for-hire, I knew already that my ability to find, absorb & analyze data for myself, or for the seminars & college classes I taught, or the magazine articles I wrote, or my management duties, was adequate. But, I wondered what I could do to compare my knowledge against a recognized base of global knowledge? I don’t know if you’ve ever sat for any type of professionally recognized credentialing exam, like the CPA (certified public accountant), or the Bar exam to be an attorney, or the exam to become a licensed U.S. Customs Broker, etc. These are some of the toughest exams anywhere. For the level of knowledge needed on a global scale, I decided to apply for candidacy to become a Foreign Service Officer in the U.S. Diplomatic Corps. Before the State Dept will even interview, you have to pass the FSO exam. These days the FSO jobs are highly sought after, which makes the candidacy process very competitive. For anyone without 10-15 yrs of experience that’s useful in the Diplomatic Corps, the younger, entry-level candidates won’t get too far in the application process unless they at least have a Masters Degree. So, when you sit for the FSO exam, if you are not extremely well versed in a broad range of global topics, you won’t pass. I’ve taken numerous professional credential exams before; the FSO exam is/was the toughest I’ve ever taken…but, I passed. That was good enough for me, and I didn’t pursue FSO idea further. It intrigued me, but at 50 back then, I decided I’d to let the idea go. You don’t need to go this far to see if your knowledge measures up; but, you get my drift…you have to really know your stuff.
  3. Where to find GIRA primary source material. There’s two types of GIRA, Static Data R&A, and Dynamic, Emergent Data R&A. SDRA is generally the history-based side of GIRA. SDRA can be at either a macro or micro level. Sources for this type of analysis are not difficult to find because the SDRA report you generate is not meant to give actively changing, ongoing emergent R&A. Don’t get me wrong; SDRA reports are not supposed to contain just stale (i.e.; mostly past tense that’s not changing anymore) information, unless the requester has asked specifically for a mostly historical report. SDRAs I’ve done for corporations, like an inquiry about a country’s climate for a new business venture, need a mix of historical data, and anything relevant to the current business climate. If you were writing an SDRA report on Indonesia and during your R&A an airliner crashes on takeoff from Jakarta’s international airport, it’s not likely to impact report, and it would be too early to include it until the impact to your report, if any is understood. On the flip side, reporting intelligence information that’s in the DEDRA category requires primary source material that is extremely time sensitive. This is when your ability to identify information sources beyond the typical is really important. There are many sources that can cover static (historical) and dynamic (emergent) information. Remember: regardless what kind of data a source has available on the internet, it didn’t get there for free…it’s being paid for somehow. Some of the primary sources I list below are those you cannot access for free. One thing about GIRA…are you looking to prepare a macro report or a micro one? What I’ve listed below is not everything I use, just the ones I’ve used reliably from time-to-time (some a lot more than others). I have other sources I’ll use to fine tune my info and double check my facts. I pick-up new sources all of the time.

Lastly, GIRA is not an expertise you can just learn out of a textbook. My methods, sources and thoughts expressed here, work for me, and there may be 100 people out there that disagrees. So be it. Everyone can choose their own path that makes them happy and/or financially successful. What you do with all of this info I’ve provided is now up to you! Note: Due to the dozens and dozens of sources I listed, I did not take the time to add-in all of the hyperlinks…gotta leave ya with something to do!

Best of luck!

Air Force E-publishing

USAF Air University

Air Power Australia

American Special Operations

AVIALOGS

Aviation Week & Space Technology

Baseops.net Flight Planning, Aviation Weather & Military Discounts

Bibliography of the Vietnam War

Black Vault

Boeing Acronyms And Definitions

Currency Converter

Defense Department

Defense One

Defense Technical Information Center

Demand Media Studios

Designation-Systems.Net

Federal Aviation Administration

Federation of American Scientists –

Global Digital Media Network

Guide to Military Equipment and Civil Aviation

International Rescue Committee (IRC)

Joe Baugher's Military Aircraft Index

Joint Electronic Library, Joint Concepts

Mach One Manuals

Mine Action Group

MIT Security Studies Program (SSP)

Myinforms World News

National Security Archive

National Security Council

National Security Internet Archive

NATO

OECD

Pacific War Online Encyclopedia

RadioReference.com

SearchMil.com

SIPRI

Spyflight

The Library of Congress.

Time Zone Map

U.S. Military – CNN.com

World Health Organization

United Nations International Childrens’ Fund (UNICEF)

United Nations High Commission for Refugees

United Nations Educational, Scientific and Cultural Organization

United Nations Development Programme

United Nations Peacekeeping Operations

The World Bank

International Labor Organization

World Food Programme

Center for Intelligence and Security Studies

Center for Strategic and International Studies

RAND Corp Research Services and Public Policy Analysis

SmartBrief | Industry E-mail Newsletters for Professionals

Sanctions Programs and Country Information

American History [ushistory.org]

DoDBuzz

Global Security

Department of Homeland Security

Heritage Foundation

National Security Network

Military.com

U.S. State Dept.

Stratfor

Office of the Director of National Intelligence

The National Counterintelligence Executive

The National Counterterrorism Center

Bureau of Intelligence and Research

National Technical Information Service

Office of Terrorism and Financial Intelligence

ProQuest

Federal Research Division of Library of Congress

U.S. Army Foreign Military Studies Office

Defense Intelligence Agency

NATO Open Source Intelligence Handbook

OSINT Deep Web Search for user names and e-mail addresses

NATO OSINT Reader

Open Source Solutions

Janes.com

Digital Globe – High Resolution Global Imagery

Foreign Policy.com

U.S. Dept of Commerce

Steve Miller, Copyright (c) 2006, 2012, 2015, 2018

Standard