Page 1 of 1

Issue N.01 Debrief Solutions

South America Map

https://storage.tally.so/f127e211-a112-4874-96bf-2e79173652e1/southamerica_labeled_p.png

Cyber Packet

Steganography: Hiding secret messages within ordinary files, like embedding a hidden message inside an image.


Advanced Persistent Threat (APT): A long-term, targeted cyberattack where an intruder secretly stays in a network to steal sensitive data.


Vishing: A type of scam where attackers use phone calls to trick people into revealing personal information.


Zero-Day Exploit: A cyberattack that happens immediately after a software vulnerability is discovered, before a fix is available.


Deepfake: Artificial media where someone's likeness is replaced with another's, often used to deceive or manipulate.


Credential Stuffing: A cyberattack where stolen usernames and passwords are used to access multiple accounts through automated login attempts.


Fileless Malware: Malicious software that operates in a computer's memory without leaving traces on the hard drive, making it hard to detect.


Tailgating: A security breach where an unauthorized person gains entry to a restricted area by following someone who has access.


SIM Swapping: A fraud technique where attackers take control of your phone number to access personal accounts.


Quishing: A phishing attack that uses QR codes to direct victims to malicious websites or downloads.

Cryptic Corner: Anagram

United States ↔ Statue sends it

The United Kingdom ↔ Duke in the kingdom

South America ↔ A cashier to sum

North America ↔ Romantic heron

European Union ↔ A pure one union

Middle East ↔ Set amid led

African continent ↔ Ancient fan tonic

Asia Pacific ↔ A pacific is a

Antarctica ↔ A cat in a cart

Caribbean Sea ↔ A crab in case be

Scandinavian Peninsula ↔ A naval panic in sadness

Mediterranean Sea ↔ A serene, timid arena

Indian Subcontinent ↔ An indistinct bounteous

Pacific Ocean ↔ A specific con

Image Pursuit

Liancourt Rocks: The tiny islets called Dokdo in South Korea and Takeshima in Japan.

OSINT Tradecraft: Flight & Ship Tracking

Activity 1: Flight Tracking Hints: Use Flightradar24 (https://www.flightradar24.com/), FlightAware (https://www.flightaware.com/), or ADS-B Exchange (https://www.adsbexchange.com/) to find real-time flight tracking data. Answers (Example): - Use Flightradar24 to search for the tail number. - Checked historical data for recent flights associated with this aircraft using ADS-B Exchange. - Verified altitude, speed, and deviation patterns through the flight log and live tracking maps. Activity 2: Ship Tracking Hints: Use MarineTraffic (https://www.marinetraffic.com/) or VesselFinder (https://www.vesselfinder.com/) to locate and track the vessel. Answers (Example): - Last Port of Call: Port of Qingdao - Current Speed & Heading: 9 knots, heading northwest - AIS Activity: The vessel’s AIS signal disappeared for 8 hours near the Yellow Sea, a known hotspot for illicit smuggling activities. - Suspicious Behavior: The vessel slowed down for an extended period near an uninhabited island before resuming course.
How the Answers Were Found: - Used MarineTraffic to search for ZHONG GU CHENG DU using the IMO number. - Analyzed movement history and identified the last port of call. - Checked speed, heading, and anomalies in the route using past and live AIS data. - Verified missing AIS signal by looking at timestamps and tracking gaps on historical data. Activity 3: Correlation Analysis Cross-reference flight and ship tracking data to identify potential links between entities (e.g., flights landing near ports with vessel arrivals). Analyze whether a specific aircraft and vessel have been in close proximity within the last 48 hours. What could this imply about possible illicit activities?
Answer (Example): - A private jet landed at Brisbane International Airport on the same day that ZHONG GU CHENG DU docked at the Port of Brisbane, suggesting a potential connection between high-value cargo movement and business dealings.
How the Answer Was Found: - Used both flight tracking and ship tracking tools to compare timestamps and locations. - Verified airport arrival records and ship docking logs. - Identified anomalies by correlating changes in flight paths with ship activity patterns.

Around the World

Across:

5. name for the U.S. program that developed the atomic bomb - Manhattan Project

11. the UK's MI6 was officially named - Secret Intelligence Service

12. obtained from the study of foreign instrumentation signals - FISINT

14. intelligence officer who recruits, trains, and handles agents - Case Officer

19. name for the failed U.S. invasion of Cuba in 1961- Bay of Pigs

20. tiny dots of microfilm - Microdot

22. the scandal led to President Nixon's resignation - Watergate

Down:

1. tradecraft used to pass items or information between two individuals via a secret location - Dead Drop

2. activities aimed at protecting an organization or country from espionage, sabotage - Counterintelligence

3. collected from signal activities - SIGINT

4. where the U.S. National Security Agency (NSA) was founded - Fort Meade

6. gathered from human sources - HUMINT

7. codebreaking center during WWII - Bletchley Park

8. Israeli intelligence agency known for covert operations - Mossad

9. obtained from social media or other available sources - PAI

10. British Intelligence's deception plan to mislead the Germans about the Allied invasion target of Sicily during WWII - Operation Mincemeat

13. collected from satellite and aerial imagery - GEOINT

15. the Berlin Wall fell, marking the end of the - Cold War

16. Name of the Soviet Union launched the first artificial satellite, initiating the Space Race - Sputnik I

17. intelligence agency succeeding the KGB - FSB

18. the U.S. act that was enacted following the 9/11 attacks -  Patriot

21. involving the analysis of financial transactions - FININT

Never submit passwords through Tally forms.
Report malicious form