Ciro Santilli
OurBigBook.com
$£
Sponsor
中国
独裁统治 China Dictatorship 新疆改造中心、六四事件、法轮功、郝海东、709大抓捕、2015巴拿马文件 邓家贵、低端人口、西藏骚乱
War
Home
Science
Scientific method
Social science
OurBigBook.com
Words: 32k
Articles: 125
Table of contents
32k
125
A Small Talent for War
War
Military technology
War
2
Concertina wire
Military technology
Electronic warfare
(EW)
Military technology
Cold War
(1947-1991)
War
Espionage
War
32k
111
Spy
Espionage
1
Jack Barsky
Spy
Counterintelligence
(Counter intelligence)
Espionage
Mole
(espionage)
Espionage
Spycraft
Espionage
1
Cutout
(espionage)
Spycraft
Five Eyes
Espionage
Intelligence Gathering
Espionage
2
Open-source intelligence
(OSINT)
Intelligence Gathering
Intelligence analysis
Intelligence Gathering
Secret service
Espionage
32k
100
Intelligence community
Secret service
32k
99
Intelligence agency
Intelligence community
84
1
GCHQ
Intelligence agency
84
United States Intelligence Community
Intelligence community
32k
96
American intelligence agency
United States Intelligence Community
32k
95
Central Intelligence Agency
(CIA)
American intelligence agency
32k
85
CIA 2010 covert communication websites
(Iran, China)
Central Intelligence Agency
31k
79
Background
CIA 2010 covert communication websites
2
Timeline of public disclosures
Background
Overview of Ciro Santilli's investigation
Background
Results
CIA 2010 covert communication websites
4
Selected screenshots
Results
USA spying on its own allies
Results
List of websites
Results
Possible HTML information leaks
Results
Methodology
CIA 2010 covert communication websites
16k
69
The Reuters websites
Methodology
Fingerprints
Methodology
288
3
HTML analysis
Fingerprints
2
Binary files
HTML analysis
HTML title element
HTML analysis
IP range search
Methodology
368
3
Hits without nearby IP hits
IP range search
1
Possible hits
Hits without nearby IP hits
Hits with nearby IP hits
IP range search
TODO
Methodology
85
4
Find missing hits in IP ranges
TODO
How did Alexa find the domains?
TODO
Non .com .net TLDs
TODO
1
Are there .org hits?
Non .com .net TLDs
Data sources
Methodology
3k
27
Reuters article
(2022-09-29)
Data sources
Wayback Machine
Data sources
469
4
Wayback Machine CDX scanning
Wayback Machine
2
Wayback Machine CDX scanning with Tor parallelization
Wayback Machine CDX scanning
JS CDX scanning
Wayback Machine CDX scanning
Wayback Machine crawl date search
Wayback Machine
viewdns.info
(2010-)
Data sources
DomainTools
Data sources
DNS Census 2013
Data sources
218
6
2013 DNS Census virtual host cleanup
DNS Census 2013
1
2013 DNS Census virtual host cleanup heuristic keyword searches
2013 DNS Census virtual host cleanup
2013 DNS census MX records
DNS Census 2013
2013 DNS census secureserver.net MX records intersection 2013 DNS Census virtual host cleanup
DNS Census 2013
2013 DNS census NS records
DNS Census 2013
2013 DNS census SOA records
DNS Census 2013
dnshistory.org
Data sources
securitytrails.com
Data sources
Common Crawl
Data sources
Internet Census 2012
Data sources
2
2012 Internet Census hostprobes
Internet Census 2012
2012 Internet Census icmp_ping
Internet Census 2012
tb0hdan/domains
Data sources
Expired domain trackers
Data sources
1
club.domain.cn
Expired domain trackers
"Mass Deface III" pastebin
(2012)
Data sources
ipinf.ru
Data sources
cqcounter
Data sources
Reverse engineering
Methodology
822
10
Communication mechanism
Reverse engineering
426
9
CGI comms
Communication mechanism
2
CGI comms variant
CGI comms
SSL certificate
CGI comms
JAR reverse engineering
Communication mechanism
JS comms
Communication mechanism
236
4
JavaScript reverse engineering
JS comms
42
3
JavaScript with SHAs
JavaScript reverse engineering
1
iraniangoals.com JavaScript reverse engineering
JavaScript with SHAs
feedsdemexicoyelmundo.com JavaScript reverse engineering
JavaScript reverse engineering
Google searches for known domains and IPs
Methodology
Breakthroughs
Methodology
666
4
Non Reuters ranges
Breakthroughs
1
secure subdomain search on 2013 DNS Census
Non Reuters ranges
Oleg Shakirov's findings
(Communicated January 15, 2024)
Breakthroughs
1
Searching for Carson
Oleg Shakirov's findings
Work log
Methodology
388
9
Wakatime redirects
Work log
IP and DNS metadata
Work log
7
iraniangoals.com
IP and DNS metadata
iraniangoalkicks.com
IP and DNS metadata
activegameinfo.com
(66.175.106.148)
IP and DNS metadata
feedsdemexicoyelmundo.com
(66.175.106.149)
IP and DNS metadata
noticiasmusica.net
(66.175.106.150)
IP and DNS metadata
atomworldnews.com
(66.175.106.155)
IP and DNS metadata
iranfootballsource.com
IP and DNS metadata
Backlinks
CIA 2010 covert communication websites
Organizational structure of the Central Intelligence Agency
Central Intelligence Agency
19
4
Directorate of the CIA
Organizational structure of the Central Intelligence Agency
17
3
Central Intelligence Agency Directorate of Science & Technology
Directorate of the CIA
Directorate of Digital Innovation
(CIA, 2015-)
Directorate of the CIA
17
Directorate of Operations
(CIA)
Directorate of the CIA
National Security Agency
(NSA)
American intelligence agency
145
8
National Security Agency employee
National Security Agency
145
7
Reality Winner
(1991-)
National Security Agency employee
71
2
Reality
(2023 film)
Reality Winner
Sources and methods
Reality Winner
71
Edward Snowden
National Security Agency employee
74
3
Snowden Snowbot
Edward Snowden
Lindsay Mills
(Snowden's wife)
Edward Snowden
18
Snowden
(film, 2016)
Edward Snowden
38
Asymmetric warfare
War
1
3
Terrorism
Asymmetric warfare
1
2
Terrorist attack
Terrorism
1
1
Boston Marathon bombing
(2013)
Terrorist attack
List of wars
War
3
World War I
(1914-1918)
List of wars
World War II
(1939-09-01 to 1945)
List of wars
Russian invasion of Ukraine
(2022)
List of wars
Ancestors
(4)
Social science
Scientific method
Science
Home