Category: Research

Intelligence Log – Last 24 Hours

Structured summary of selected security-relevant events from open-source reporting in the previous 24 hours. ⚡ Critical Infrastructure UKRAINE ENERGY & FUEL TARGETING Russia strikes Ukrainian energy infrastructure and oil refinery Ukrainian authorities reported one of the largest recent barrages of drones and missiles across multiple regions over the weekend, killing at least seven people and […]

DECEMBER SIGNIFICANT DATES

MONTH-LONG ⚫ Black DecemberAnarchist symbolic-action period; historically associated with vandalism and property damage. EARLY DECEMBER December 1 December 2 December 6 December 7 – Pearl Harbor Remembrance Day MID-DECEMBER December 8 December 9 December 10 December 11 December 13 December 14–22 – Hanukkah December 18 December 19 December 20–21 LATE DECEMBER & HOLIDAY PERIOD December […]

✔ Comprehensive Digital Newspaper Archives (with Links)

1. Major, Broad-Scope Archives These provide extremely large historical collections. Newspapers.com https://www.newspapers.com NewspaperArchive https://newspaperarchive.com Google News Archive (Free) https://news.google.com/newspapers Chronicling America – Library of Congress (Free) https://chroniclingamerica.loc.gov ProQuest Historical Newspapers (subscription) https://www.proquest.com/products-services/pq-hist-news.html LexisNexis / Nexis Uni (subscription) https://www.lexisnexis.com Factiva (Dow Jones) (subscription) https://professional.dowjones.com/factiva 2. International & Foreign Archives Essential for tracing foreign-press reporting on U.S. […]

Foreign Entities Facilitating and Financing Illegal and Harmful Demonstrations in the United States

Executive Summary This research investigates foreign state‑linked efforts to finance or facilitate protest activity in the United States, particularly demonstrations that become illegal or harmful. Using open‑source intelligence (OSINT) methods, the investigation draws on government releases, reputable news reporting and academic analyses. Evidence shows that Russian, Iranian and Chinese networks have exploited social divisions by […]