No hay productos en el carrito



Internet Searches for Vetting, Investigations, and Open-Source Intelligence
Appel, E.
1ª Edición Febrero 2011
Inglés
Tapa dura
320 pags
1300 gr
null x null x null cm
ISBN 9781439827512
Editorial CRC PRESS
LIBRO IMPRESO
-5%
57,55 €54,67 €IVA incluido
55,34 €52,57 €IVA no incluido
Recíbelo en un plazo de
2 - 3 semanas
Overview
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.
Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities.
Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.
Features
- Discusses the potential that the Internet holds for professional investigators
- Offers some of the challenges, risks, and caveats to overcome in exploiting the potential of Internet searching and analysis
- Covers the legal, policy, privacy and management issues posed by Internet misbehavior and the availability of evidence
- Provides a policy and procedural framework for effective Internet searching in investigations and intelligence
- Presents numerous real-world examples illustrate the ever-changing usage of the Internet and trends and habits of individuals as well as the emerging use in investigations
- Outlines the challenges of Internet misuse facing business, government, and academia and explores strategies and options
Reviews
I was excited to hear CRC Press was releasing Internet Searches for Vetting, Investigations, and Open-Source Intelligence, by Edward J. Appel, a retired FBI agent. His company has done work for me so I knew the quality of his work and assumed his book would be at the same level as his investigative efforts. I wasn't disappointed. … Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites and search terms. I found the chapters Automation of Searching and Internet Intelligence Reporting to be the most enlightening. … delivers with content and is an easy read. It met my criteria for a successful investigations book … .
—Larry Zilliox, in the PISA Newsletter, April 2011
Table of contents
Behavior and Technology
- The Internet’s Potential for Investigators and Intelligence Officers
- People, Places, Organizations, and Topics
- A Practitioner’s Perspective
- The Search
- Internet Posts and the People They Profile
- Finding the Needles
- The Need for Speed
- What We Can’t Do Without
- Notes
- Social and Technological Change
- Internet Use Growth
- Evolution of Internet Uses
- Physical World, Virtual Activities
- Connection and Disconnection
- Notes
- Use and Abuse—Crime on the Internet
- By the Numbers?
- Online Venues
- Digital Delinquency
- “Free” Intellectual Property
- Insider
- Notes
- Implications for the Enterprise
- The New User: Someone You Would Trust?
- Employer Liability
- Vetting, Monitoring, and Accountability
- The Evolving Personnel Security Model
- Notes
- Liability, Privacy, and Management Issues
- Liability for Service Providers for Employers
- Accountability for Employees
- Notes
- Laws
- Constitutional Rights
- Federal and State Statutes
- Federal Rules of Evidence and Computer Records
- International Treaties and Standards
- Notes
- Litigation
- Internet Search Litigation
- Anonymity
- Expectation of Privacy
- Due Process
- Libel/Defamation
- Invasion of Privacy Torts
- Sanctions for Public Postings
- Internet Privacy for the Twenty-First Century
- Notes
- International and Domestic Principles
- U.S. and International Privacy Principles
- Guidelines
- Notice and Consent
- Government Standards
- Parallel Guidance: Internet Research Ethics
- Notes
- Professional Standards and the Internet
- ASIS Standards
- National Association of Professional Background Screeners (NAPBS)
- Association of Internet Researchers (AoIR)
- Librarians
- Inside and Outside the Workplace
- Reputational Risk, Public Affairs
- Bottom Line
- Notes
- The Insider Threat
- Benevolent Big Brother
- Notes
- Internet Vetting and Open-Source Intelligence Policy
- Legal and Ethical Limitations
- Policy
- Information Assets Protection
- Notes
- Tools, Techniques, and Training
- Training Analysts
- Open-Source Intelligence Process
- Quality Control
- Notes
- Proper Procedures for Internet Searching
- Criteria
- Security
- Standard Methodology
- Notes
- Internet Search Methodology
- Preparation and Planning
- The Library
- Scope Notes
- Notes
- Search Techniques
- Internet Content
- The Browser
- The Search Engine
- Metasearch Engines
- Finding Search Engines
- Search Terms
- Social and Commercial Searching
- Social Networking Sites
- E-Commerce Sites
- Directories
- Blogs
- Chat
- Notes
- Finding Sources
- U.S. Government
- State, County, and Local Governments
- Other Government-Related Sources
- Business-Related Sources
- News
- Web 2.0
- Looking Up Subscribers
- Notes
- Automation of Searching
- Why Automate Searching?
- Enterprise Search Middleware
- Best-in-Class Desktop Tool
- Investigative Search Tool Requirements
- A Homegrown Solution
- Reducing Analytical Time Using Automation
- Caching and Data Mining
- The Human Interface in Internet Investigations
- Notes
- Internet Intelligence Reporting
- Records
- Content
- Analyst’s Comments
- Organization and Formatting
- Source Citations
- Attribution
- Verification
- Notes
- Illicit Web Sites and Illegal Behavior Online
- Cybercrime
- Child Pornography and Internet Porn
- Unauthorized Use of Computer Systems
- Contraband Digital Assets
- Information (Cyber) Warfare
- Notes
- Model Internet Investigative Standards
- Enterprise Strategy
- Model Internet Search Guidelines
- Authorized Internet Search Personnel
- Definitions to Consider
- Notes
- A Model Internet Investigation Policy
- Key Considerations
- Higher-Risk Candidates
- Application Procedures and Forms
- Legal Issues
- Confidentiality
- Ethics in Investigations
- Disciplinary Action
- Model Forms for Candidates
- Notes
- A Model Internet Posting Policy
- Notes
- Internet Intelligence Issues
- Privacy
- Smoking Guns
- Completeness of Internet Searching
- Adjudication
- Conclusion
- Notes
- Bibliography
- Index
Legal and Policy Context
Framework for Internet Searching
© 2025 Axón Librería S.L.
2.149.0