{"id":560,"date":"2015-05-17T18:50:38","date_gmt":"2015-05-17T18:50:38","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=560"},"modified":"2015-05-18T01:57:47","modified_gmt":"2015-05-18T01:57:47","slug":"technology-and-intelligence-gathering","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/technology-and-intelligence-gathering\/","title":{"rendered":"Technology and Intelligence Gathering"},"content":{"rendered":"<p>Technology and Intelligence Gathering contains various files from the FBI and various agencies on intelligence gathering methods and technology.<\/p>\n<h3>Federal Bureau of Investigation Files<\/h3>\n<table>\n<tbody>\n<tr>\n<td>\n<p><strong><img decoding=\"async\" class=\" alignleft\" title=\"Malcolm X\" src=\"https:\/\/documents.theblackvault.com\/images\/fbifiles\/fbifiles.png\" alt=\"Confidence Microphones\" width=\"75\" height=\"100\" align=\"left\" border=\"1\" \/><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<strong><a href=\"https:\/\/documents.theblackvault.com\/documents\/fbifiles\/80-HQ-781ConfidenceMicrophones.pdf\">Confidence Microphones<\/a>\u00a0(FBI Release)<\/strong>\u00a0&#8211;<\/strong> [ 126 Pages, 7.00MB ]<strong>\u00a0<\/strong><\/p>\n<p><strong><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/fbifiles\/confidencemics-usaf.pdf\">Confidence Microphones<\/a>\u00a0(Air Force Release)\u00a0&#8211;<\/strong> [ 2\u00a0Pages, 0.5MB ]<strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong><strong><img decoding=\"async\" class=\" alignleft\" title=\"Malcolm X\" src=\"https:\/\/documents.theblackvault.com\/images\/fbifiles\/fbifiles.png\" alt=\"Confidence Microphones\" width=\"75\" height=\"100\" align=\"left\" border=\"1\" \/><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/fbifiles\/DIGITALEVIDENCEPOLICYGUIDE.pdf\"><strong>Digital Evidence Policy Guide<\/strong><\/a>\u00a0<\/strong><\/strong>&#8211;\u00a0[ 60\u00a0Pages, 30.25MB ]\u00a0&#8211;\u00a0The FBI\u2019s 1\/3\/2014 \u201cDigital Evidence Policy Implementation Guide\u201d was created to establish and consolidate FBI policy and procedures with regards to the proper handling, reviewing and processing of digital evidence collected in the course of FBI investigations. Redactions were made to protect personal privacy and law enforcement techniques.<\/td>\n<\/tr>\n<tr>\n<td><strong><img decoding=\"async\" class=\" alignleft\" title=\"Malcolm X\" src=\"https:\/\/documents.theblackvault.com\/images\/fbifiles\/handwritinganalysis.png\" alt=\"Handwriting Analysis\" width=\"75\" height=\"100\" align=\"left\" border=\"1\" \/><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/fbifiles\/1229171-0HandwritingAnalysis.pdf\"><strong>Handwriting Analysis<\/strong><\/a>\u00a0&#8211;<\/strong>\u00a0[ 27\u00a0Pages, 1.58MB ] &#8211; Handwriting Analysis or\u00a0Graphology is the study of handwriting. As a theory or practice for inferring a person&#8217;s character, disposition, and attitudes from their handwriting, graphology is generally considered pseudoscience. The term is sometimes incorrectly used to refer to forensic document examination.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>Department of the Navy\u00a0Files<\/h3>\n<p><strong><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/intelligence\/ADB377321-blackswanproblem.pdf\"><strong>The &#8220;Black Swan&#8221; problem in national security affairs &#8211; Briefing to the CNO&#8217;s Strategic Studies Group (16 October 2009)<\/strong><\/a>\u00a0&#8211;<\/strong>\u00a0[ 58 Pages, 6.63MB ] &#8211;\u00a0As the defense analytical community faces the 21st century, the new challenges of irregular\u00a0warfare and counterrinsurgency- not to mention climate change and the shifting sands of global\u00a0geopolitics- might demand new analytical methods, models, and tools.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology and Intelligence Gathering contains various files from the FBI and various agencies on intelligence gathering methods and technology. Federal Bureau of Investigation Files \u00a0Confidence Microphones\u00a0(FBI Release)\u00a0&#8211; [ 126 Pages, 7.00MB ]\u00a0 \u00a0Confidence Microphones\u00a0(Air Force Release)\u00a0&#8211; [ 2\u00a0Pages, 0.5MB ]\u00a0 \u00a0Digital Evidence Policy Guide\u00a0&#8211;\u00a0[ 60\u00a0Pages, 30.25MB ]\u00a0&#8211;\u00a0The FBI\u2019s 1\/3\/2014 \u201cDigital Evidence Policy Implementation Guide\u201d was<\/p>\n","protected":false},"author":1,"featured_media":561,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[33,290,3,4],"tags":[222,299,235],"class_list":{"0":"post-560","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-fbi-files-domestic-foreign-intelligence","8":"category-federal-bureau-of-investigation-fbi-collection","9":"category-history","10":"category-intelligence","11":"tag-intelligence","12":"tag-law-enforcement","13":"tag-military"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/456034813-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=560"}],"version-history":[{"count":0,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/560\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/561"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}