About
“A popular Government, without popular
information, or the means of acquiring it, is but a Prologue to a Farce
or a Tragedy; or, perhaps both. Knowledge will forever govern ignorance:
And a people who mean to be their own Governors, must arm themselves
with the power which knowledge gives.”
- James Madison in a letter to William T. Barry, 1822
Public Intelligence is an international, collaborative research
project aimed at aggregating the collective work of independent
researchers around the globe who wish to defend the public’s right to
access information. We operate upon a single maxim: equal access to
information is a human right. We believe that limits to the average
citizen’s ability to access information have created information
asymmetries which threaten to destabilize democratic rule around the
world. Through the control of information, governments, religions,
corporations, and a select group of individuals have been able to
manipulate public perception into accepting coercive agendas which are
ultimately designed to limit the sovereignty and freedom of populations
worldwide.
This site is an attempt to compile and defend public information
using software and methods which are open source and available to the
public at large. It is our hope that by making such information
available and demonstrating the power of a public resolved to inform
itself, we may engender a more informed and proactive populace. Within
our first two years of operation, we have already received more than
twenty threats and takedown notices from government agencies and
corporations around the world for publishing documents discovered via
open source methods available to any member of the public. No
information has ever been removed or censored.
We provide documents, detailed analyses, and a host of other
open-source intelligence products from the private and public sector. We
attempt to provide information in a way that minimizes our involvement
as much as is possible. Documents are provided in a raw format,
available for download, with only excerpts and key facts accompanying
them. The information in our analyses is collected and aggregated in a
way that seeks to highlight facts that are neglected by traditional,
mainstream sources.
What has Public Intelligence done?
Since its beginnings in the summer of 2009, PI has published
thousands of documents relating to everything from computer forensics to
the war in Afghanistan. Information published on this site has been
cited in newspapers, magazines, books, television shows, scholarly
articles and reports from leading think tanks around the world.
Governments, corporations, law enforcement organizations, as well as
private citizens, use PI to research primary source material relating to
a large number of topics that affect the safety and security of their
daily operations. Here are a few brief examples of significant material
published by PI:
- Confidential Facebook Law Enforcement Subpoena Guides 2007-2010
Confidential and proprietary manuals distributed by Facebook to the U.S.
law enforcement community detailing retained user information,
including IP addresses and private messages, that is capable of being
retrieved and provided to law enforcement. Every version of the manual
from 2007-2010 is included.
- Restricted BP Azerbaijan Subsea Drilling Safety, Security, Environmental Procedure Manuals
More than fifty internal reports detailing safety and environmental
protection procedures in BP’s subsea drilling operations in Azerbaijan.
BP later demanded that the documents be removed via an outsourced Indian
company. PI later published more than fifty updated manuals for the same region.
- NATO Restricted Afghanistan Security Reports and SIGACTS Maps August-October 2010
Over a dozen classified NATO reports concerning Significant Actions
(SIGACTs) and the week-to-week security situation in the war in
Afghanistan from August to October 2010.
- Confidential United Nations Afghanistan Security Reports August-October 2010
Eleven confidential reports from the United Nations Department of Safety
and Security detailing week-to-week threats to UN operations in
Afghanistan for the period August to October 2010.
- More Than 90 Reports from Fusion Centers Around the United States
Over its nearly two years of operation, PI has published dozens of
reports and bulletins from fusion centers all around the United States,
maintaining one of the largest and most diffuse collections of such
content on the internet. Some of the reports are the only existing
public examples of products produced by certain fusion centers.
- Fusion Center Physical Locations and Contact Information
The actual physical location and contact information for nearly all of the seventy-two fusion centers around the United States.
- Director of National Intelligence Open Source Center Reports and Media Guides
More than fifty reports from the Director of National Intelligence’s
Open Source Center detailing issues, media, and leaders around the
globe. The second-largest collection of OSC documents available on the
web covering covering everything from Chinese military bloggers to Tunisian government censorship of the media.
- Complete U.S. Secret Service Network Intrusion Responder Program (NITRO) Course
Thousands of pages comprising the complete digital forensics course
taught by the U.S. Secret Service at the National Computer Forensics
Institute. Includes instructor’s guidebook, student workbooks, and
accompanying slides.
- Microsoft Windows 7/Vista Advanced Forensics Guides for Law Enforcement
A collection of guides given by Microsoft to law enforcement enabling
them to find preform advanced forensic investigations into your Windows
7/Vista system, including breaking the BitLocker encryption system.
- Federal Bureau of Prisons Counter-Terrorism Unit Inmate Spying Reports
Multiple reports from the Bureau of Prisons Counter-Terrorism Unit
detailing the surveillance of inmates convicted of crimes relating to
terrorism and housed in “Communications Management Units.” The reports
detail surveillance of legally-protected, attorney-client privileged emails, as well as monitoring of political implications related to inmates communications with outside media and scholars.
What can Public Intelligence do for you?
If you have information of importance to the public at large, we can
help you to publish this information and maintain its availability. We
have an established platform for the publication of sensitive
information that is robust and capable of maintaining public access to
information in the face of opposition from corporations and governments
around the world. No document has ever been removed from this site and
we operate a multi-jurisdictional network of servers that is designed to
inhibit attempts to censor us and the content we publish.
About This Site
This site aggregates the collective work of our researchers and makes
it available in a format which is designed to be as accessible as
possible. We endeavor to make complex information and documentation
available to a mainstream audience. Everything on this site is
accessible free of charge. All of our original content is considered to
be in the public domain and may be reproduced freely. We sometimes
utilize material which is copyrighted in the production of our content,
often without prior approval. However, this is done in a manner that is
consistent with fair use, particularly that which is protected under
Title 17, Chapter 1, § 107 and § 108 of the U.S. Code. This site
utilizes minimal advertising to ensure continued operation and does not
seek commercial advantage from the reproduction of such works.
SSL Certificate
The SSL Certificate used by this website has the following
fingerprints and serial number. Check these against the information for
the certificate displayed in your browser to ensure that you are
communicating securely with our server before submitting any material
via our upload form.
SHA1: CD:1B:62:2E:F2:1B:82:F1:BF:C5:59:BC:41:5A:FD:9E:3D:EB:15:C2
MD5: 70:06:60:AF:7C:A8:F1:EF:67:FD:96:18:6C:54:8D:26
Serial Number: 0B:C1:6F
PGP Key
To send us an encrypted message via PGP, please use the following public key.
You may also use our encrypted contact form.
No comments:
Post a Comment