mercredi 18 mars 2015

England A guide to catch terrorists

England: A Guide "to catch terrorists"
British watchdog agency (GCHQ) released Wednesday on its website a guide on how to identify suspects Hacking: Million Smartphone users bugged and attacks confirmed, but no massive flight.
Terrorists British
Howanalyst can catch a terrorist?
One of the most important tasks of GCHQ is to identify and analyze the international dimensions of terrorist threats to the United Kingdom. Each operation will be different. . Click on the steps to be an example of how a potential threat could be identified, what a GCHQ intelligence analyst will find out more about it, and what the analyst will the information found in the process
Step 1: The initial lead
One of the most important tasks of GCHQ is to identify and analyze the international dimensions of terrorist threats to the United Kingdom. Each operation will be different. The first indication of a new threat could happen in a number of ways ... Someone could contact the police or MI5 to alert them to something they have seen or heard the supervision of a known extremist, existing might reveal a new set of contacts, or a new activity a foreign partner can transmit information they received from their sources.
Anjem Chaudary Bristish Islamic Preacher feels over 100 people to join Al Qaeda and the British Government do nothing about it Because He is afraid of Islam
Examplecase study
AMI6 source based abroad saw an individual (called the facilitator), known to be a member of ISIL direction (Islamic State of Iraq and Levant), passing an envelope containing Arabic manuscript pages of text to a stranger with the message it contained "information for the brothers in the UK that will cause carnage across London."
The source says that everything he knows about the stranger is that he spoke in English and Arabic. The stranger had a mobile phone - nothing extraordinary - and a tablet, which recognized source as a relatively new high-end brand modelinstructions.
Combining ISIL host, what looked like operational  and the reference to the UK are enough to MI6 to pass details of MI5 and GCHQ emergency investigation. . MI5 can not link to this step, the activity of current operations, so they GCHQ ask to see what they can learn about the facilitator abroad abroad and the possible threat
Step 2: Early detective work - that we already know
we are rarely given the full name, address and contact information for those who are behind a threat to the UK. With the knowledge that there is a potential threat, our analysts work with what little detail they have, coupled with the data available to them, to reconstruct the whole puzzle.
Over 200 British HAS joined ISIS
ongoing case study example
we do not have phone numbers and email addresses for no overseas seen at the meeting abroad, but the knowledge that there is a potential threat to the UK. Sounds like an impossible task? Not quite the case ...
Although we know nothing of the stranger, GCHQ know a little more about the facilitator; under ISIL, it is our radar. The facilitator of the monitoring team, however, have seen everything that can be connected to the encounter with the stranger.
After justifying why we need to study the data associated with the number of the host, and the recording of this justification, we can search our data. We obtain initial results: We now have the leader's phone telephone business in the days around the meeting
Even if the facilitator is known to be a member of ISIL, many contacts could be innocent. How can we focus on the telephone number that could shed light on the potential threat that we étudions3:
Step Analysis Options - phone related
After completing the first tracks we extract relevant pool of data to work with . Looking at the other fragments of information that we have, we focus on solely on the information relating to the threat, we asked to investigate.
Extremist Cleric Omar Bakri in London England
continues Example case study
we need more pieces of the puzzle to extract something useful our data. With work on the development of a draft at this stage facilitator, can we find anything about overseas abroad?
Mobile Phone from abroad has been described as "nothing special" which does not seem consistent with someone who had a top-of- range of tablet. Our analysts have considerable experience in how to behave extremists. We can use this knowledge to build and test theories about travel patterns and suspicious behavior to try to find the stranger in our data.
The type of research is needed to explore this theory is more complex than the average 'me tell who was in contact with this issue "request. We have qualified experts specialized data to process these requests.
A phone candidate is found. The pattern calls he made ​​are consistent with the way we think overseas is likely to have acted. What do we do next to prove or disprove this advanceapproach.
Step Another  -tablet linked
Returningto information from home, we seek additional information that could provide an alternative starting point for complement to investigation. Looking at the problem from all angles, we can put together the most complete picture possible.


Example case study continues
One of the few distinctive features of the stranger was outside its tablet. Is it possible to identify it?


Using additional data mining techniques we can identify the activity on the Internet that could bring to the tablet from abroad. For each query, we must provide a justification as described above.
The results show twenty-one tablets consistent with our theory. It's too many to work with. But compared to what we know about the tablet and the phone suggests that it is of particular interest. A coincidence perhaps, or evidence that the phone and the tablet suspect are connected.
We do not have no name for our unknown but we have a potential phone and tablet that fit what we know of him. All this is written in a report, check its accuracy by an experienced analyst and emitted a small number of people involved MI5 and MI6
Step 5: Dig deeper - find realworld identity
workfrom fragments Initial information we started with, we constructed theories and looked in our data to potential clients that match. We now have a small number of tracks to explore further dominate or out.
Case Study Example continues
Now we have reduced our son down to just those that match the information we have on our foreign suspect seen in the meeting abroad, we can justify taking the next step and search through the content data associated by us.


Looking at the user of the tablet, we have identified, we see indications of extremist behavior online. We also perceive that this individual has accessed an account for a particular Internet service.
Running the details of the Internet service account against the GCHQ database of known targets we find that he came in a previous investigation the user has been identified. We now have a name that could belong to our unknown.
Results
The information can be a powerful tool to meet seemingly impossible questions. The possibility of using fragmentary information to construct theories and complex queries against our metadata can refine thousands of options quickly. We can hone in on the most likely targets and when we have sufficient proof that the lead is suspect so, we have the capacity and resources to dig deeper and look at the content of advance our investigations.
Continuous Case Study Example
Although still at the stage of the theory, we now have an identity of real life as possible for our unknown abroad. We can communicate the results to date and pass the information to MI5 as a line of inquiry. There is a good chance that the foreigner is still abroad, but he could travel to the United Kingdom at any time.


From the original information provided by MI6, there was no single name and a description Summary physics, MI5 would have been unable to progress. After the investigation of GCHQ, a possible identity has been provided which is enough to leave MI5 pick up the trail. It is by no means the end of the investigation, but that's where we'll leave this example for the momentBritain.
Islamic State jihadi
They paid their trips with their family jewels
Entitled "how -this one analyst catches a terrorist ", this little five-step guide shows an example of the work of analysts GCHQ when seeking to identify a suspectBond.
The scenario begins like a James  an MI6 agent met a source, known as belonging to the Islamic State Group (EI), which states that it sent an envelope containing an unknown Arabic text and the message announcing "bloodshed in London."
This source can only say that the unknown speaks English and Arabic, he had a "banal phone" and "tablet-art".
Starts then all one based work "on fragmentary information" used to "establish theories and conduct complex searches by comparing them with data GCHQ.


"Therevelations will not go away, a GCHQ spokesman merely stating AFP by email that this guide" showed the culture of respect for the law that dictates the GCHQ actions.
"Monitoring
The action of GCHQ is debate in the country since the revelations of the former analyst of the American NSA Edward Snowden on the extent of their action in surveillance of telephone data.
In January, the British newspaper "The Guardian" has GCHQ also accused of spying emails journalists from the BBC, the "Guardian", the "world" of NBC's "New York Times", the "Washington Post" and "The Sun" and the Reuters news agency.
The foreign minister Philip Hammond said on Tuesday he expected to pass a new law just after the general election in May, if the Conservative Party is still in power.
This "give our agencies, clear and transparent manner, the powers they need and would ensure that our monitoring system is up to date with technological changes while meeting the concerns of our citizens," Does -he said.


Prime Minister David Cameron has repeatedly called for a strengthening of surveillance methods after jihadist attacks between 7 and 9 January in Paris, which killed 17 people.
We do not know yet if Justin Trudeau and Thomas Mulcair will be agreements with the opinion of the Government of Great Britain. What we see in these moments of great difficulty Canadian politicians dare not even think about this religious war and would rather bow down his face against the ground not to shock the terrorists living in Canada and supporting their election funds forgetting their duties to the patriots of Canada.
Justin Trudeau says simply that he is important not to ostracize Islamic terrorists Canada because they no longer meet our cases électorales.
http://www.gchq.gov.uk/what_we_do/how_does_an_analyst_catch_a_terrorist/Pages/Step-1.aspx
http://www.20min.ch/ro/news/monde/story/Un-guide--pour-attraper-les-terroristes--30949414



Aucun commentaire:

Publier un commentaire