TTT Flashcards

1
Q

Define the term open source

A

Publicly accessible, anyone can view it and distribute as they see fit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Web browsers and search engines.

A

A browser is a piece of software that retrieves and displays web pages; a search engine is a website that helps people find web pages from other websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe a filter bubble

A

A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a meta search

A

A metasearch engine is an online information retrieval tool that uses the data of a web search engine to produce its own results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe a search engine

A

A search engine is a software program that helps people find the information they are looking for online using keywords or phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a safe search engine

A

SafeSearch is a Google search engine feature that automatically filters unsafe, offensive, and inappropriate results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the world wide Web

A

refers to all the public websites or pages that users can access on their local computers and other devices through the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the layers of the world wide Web

A

Surface Web, Deep Web and Darknet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define how HTML coding is converted

A

An HTML converter is a software program that, in simple terms, converts a basic text file into HTML code. HTML is the universally accepted standard language in which Web pages are written. Documents with formats such as .doc, .docx and .txt are often created to be posted on the Internet, and the HTML converter aids in this process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define web crawling (Spiders)

A

is an Internet bot that systematically browses the World Wide Web and that is typically operated by search engines for the purpose of Web indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of osint

A

A massive and growing information resource

• Cost effective against other forms of intelligence

Quickly deployed & can gather live information as it occurs

Can reduce the need to deploy other collection assets

• Has less risk than other collection options

• Allows a wide audience for the distribution of products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Disadvtages of OSINT?

A

• A massive and growing information resource

• Accuracy of information – False News

• Credibility of sources – Bias, motive,
• Security of collection activity – Risks & Threats

• Legal constraints on certain online activities – RIPA, HR Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Physical Domain?

A

• It’s the physical infrastructure that supports the internet

• The hardware and linkage that is spread across the world

• The physical storage that hosts the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Virtual Domain?

A

The software that allows the interaction on the internet

• The virtual environment that stores data

• The user interface we see when we use the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Cognitive Domain?

A

• Where interaction and connectivity happen between users

• The publishing of material to cause impact or effect

• The ability to reach every single person

• The ability to influence opinion and emotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Internet?

A

International Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do we connect to the internet?

A

• IP Address (Internet Protocol) – your connection to the internet

18
Q

ISP – Internet Service provider – your service provider

A

This can be used to identify your location, area, country, device

19
Q

What is the World Wide Web?

A

Information space for data

• Navigate available resources and data on internet

• Access through Web pages, search engines and browsers

20
Q

The main domains can be split down into the following categories:

A

.com - Commercial
.org - Organisation
.net - Network
.int - International organisation
.edu - US higher education
.gov - Government
.mil - US Military
.UK - Uk Domain

21
Q

What is surface Web

A

Surface web

The Surface Web is the part of the Internet that is accessible through mainstream web browsers such as Google or Bing. Typically, sites within this layer of the Internet are designed to be listed on mainstream search engines that are intended to be found easily by the casual web user. Much of the information on the Surface Web is common knowledge that is not sensitive.

22
Q

What is the deep web

A

Deep web

The Deep Web is the part of the Internet that is not listed/indexed by the main search engines. The reason for this is that the technology used in Deep Web publishing platforms such as Facebook, Twitter and LinkedIn is not designed to be read and understood by the technology that drives search engines such as Google. Deep Websites are not designed to be hidden by the publisher; thethe contents just cannot be read by conventional search engines. The website contents will generally be accessed through a portal or integral search facility

23
Q

What is dark Web

A

Dark web

The Dark Web is the collective World Wide Web content that exists only in darknets, networks which overlay the public Internet and require specific software, configurations or authorization to access. It forms part of the Deep Web, the part of the Web not indexed by search engines. It is linked to crime, terrorism and other nefarious activity. It is not an area you would conduct taskings without specialist training

24
Q

What is a Web Browser?

A

A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web

25
Q

Ask the trainees to name the most common web browsers

A

Google Chrome

•Safari

•FireFox

•Opera

•Microsoft Edge

•Internet Explorer

•Bing

•Yahoo

26
Q

What is HTML

A

Hyper-Text Markup Language – is a computer language designed to allow website creation

27
Q

Explain the User Interface

A

The User interface will depend on the web browser used at the time as each of the web browsers interprets the coded data into their own interface

28
Q

Define the different web browser layouts

A

This can be demonstrated by loading a number of web browsers into differing tabs and comparing the results.

29
Q

What information is passed by Web Browsers when you conduct your online open source research

A

• IP Address
• Browser type & version
• OS & version
• Device type
• Geo location
• Installed fonts
• Plug ins
• Cookies
• Search history
• Mouse clicks
• Downloads
• Logons & passwords

30
Q

What does a Search Engine Algorithm identify during its spider crawl

A

Location of search terms
• Frequency of search terms
• Proximity of search terms
• Links popularity ranking on the site it crawls

31
Q

Define Filtering

A

Filtering your results
• IP Address of the user
• Search history of the user
• Provides refined results
• Defined by Search Engine not user

32
Q

Define Meta Search engines

A

• Aggregator of different search engines
• Extends search coverage for better results to investigate
• Will define specific data
• Limited to simple searching
• Yippy/Dogpile/Excite/………..etc
• Cluuz

33
Q

Examples of Security Breaches on OPUS

A

Logging into civil service account and searching for jobs
· Access a Gambling site
· Log-In to their personal Sky account
· Search for OSINT and SOCMINT courses
· Attempting to download Software
· Accessing a website for a localrestaurant and trying to download
PPT

7 / 10
· the menu as well as getting contact information
· Looking at available hotels in St Mawgan for a 2 week holiday
· Searching Job Sites for Intelligence Analyst jobs
Attempt to attach a USB device (Fuji Camera) to the system
· Watching music videos on YouTube.
· Applying for passport.
· Applying for a Chinese visa on the government site.

34
Q

What is a threat Actor?

A

3rd parties that may be interested in understanding more about the searches, and information gathered as part of an OSINT capability.

35
Q

What / who is a threat Actor?

A

Nation State defence and intelligence
Aggregated commercial monitoring
Criminal organisation
Webmasters and communication service providers
Hacktivist groups
Journalists
Other actors that should be considered in more depth are: organised crime,
other military organisations,
insider threat actors (both intentional and un-intentional).

36
Q

What is Attribution (in an OS habitate)?

A

The ability to attribute a connection, search activity, browsing habits and online activity to a designated individual, device, organisation or location.

37
Q

How can browsing activities be associated to a given user/organisation?

A

Browsing patterns
Thematic analysis
Analysis of proper nouns in search terms
Lawful intercept of communications infrastructure (state actor)
Internet browser.
Internet access points of presence (IP address).
Personally identifiable information

38
Q

What is the risk of attributing an Osint gathering activity to the MoD?

A

Ascertain Defence interests
Reconstruct RFI/IRs
Identify sources
Disrupt sources
Plant misinformation
Identify Defence OSINT networks
Cyber operations against Defence OSINT infrastructure

39
Q

Explain the attribution controls

A

• Level 1 Overt (activity attributable to MOD):
SyOps/Policy
Generic research which does not reveal sensitive Defence IRsUse of trusted sites including subscription services

• Level 2 Covert (Low Attribution):
SyOps/Policy
Technical measures
Operator tradecraft

40
Q

Identify mapping resources

A

Google maps
Wikimapia
Bing maps
Yandex mapping

41
Q

Utilise mapping resources

A

Mapping/Satellite changeover
• Search facility
• Streetview utility
• Images from the local area, including a link to the location it was taken
• Nearby location points
• GPS Coordinates
• Lat & Long Coordinates
• Navigation utility between locations and points
• Measure distance
• OS Mapping

42
Q

• Why is a MoD policy required?

A

Guidance, Protection, Control