Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Internet Searches for Vetting, Investigations, and Open-Source Intelligence - Edward J. Appel

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

(Autor)

Buch | Hardcover
320 Seiten
2011
Crc Press Inc (Verlag)
978-1-4398-2751-2 (ISBN)
CHF 95,95 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Addressing legal, policy, privacy, and management issues, this book provides a procedural framework for effective Internet searching in investigations and intelligence. It describes the proper use of Internet vetting, investigations, and open-source intelligence.
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.


Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities.


Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

iNameCheck LLC, Bethany Beach, Delaware, USA

Behavior and Technology
The Internet’s Potential for Investigators and Intelligence Officers
People, Places, Organizations, and Topics
A Practitioner’s Perspective
The Search
Internet Posts and the People They Profile
Finding the Needles
The Need for Speed
What We Can’t Do Without
Notes

Social and Technological Change
Internet Use Growth
Evolution of Internet Uses
Physical World, Virtual Activities
Connection and Disconnection
Notes

Use and Abuse—Crime on the Internet
By the Numbers?
Online Venues
Digital Delinquency
“Free” Intellectual Property
Insider
Notes

Implications for the Enterprise
The New User: Someone You Would Trust?
Employer Liability
Vetting, Monitoring, and Accountability
The Evolving Personnel Security Model
Notes

Legal and Policy Context
Liability, Privacy, and Management Issues
Liability for Service Providers for Employers
Accountability for Employees
Notes

Laws
Constitutional Rights
Federal and State Statutes
Federal Rules of Evidence and Computer Records
International Treaties and Standards
Notes

Litigation
Internet Search Litigation
Anonymity
Expectation of Privacy
Due Process
Libel/Defamation
Invasion of Privacy Torts
Sanctions for Public Postings
Internet Privacy for the Twenty-First Century
Notes

International and Domestic Principles
U.S. and International Privacy Principles
Guidelines
Notice and Consent
Government Standards
Parallel Guidance: Internet Research Ethics
Notes

Professional Standards and the Internet
ASIS Standards
National Association of Professional Background Screeners (NAPBS)
Association of Internet Researchers (AoIR)
Librarians
Inside and Outside the Workplace
Reputational Risk, Public Affairs
Bottom Line
Notes

The Insider Threat
Benevolent Big Brother
Notes

Framework for Internet Searching
Internet Vetting and Open-Source Intelligence Policy
Legal and Ethical Limitations
Policy
Information Assets Protection
Notes

Tools, Techniques, and Training
Training Analysts
Open-Source Intelligence Process
Quality Control
Notes

Proper Procedures for Internet Searching
Criteria
Security
Standard Methodology
Notes

Internet Search Methodology
Preparation and Planning
The Library
Scope Notes
Notes

Search Techniques
Internet Content
The Browser
The Search Engine
Metasearch Engines
Finding Search Engines
Search Terms
Social and Commercial Searching
Social Networking Sites
E-Commerce Sites
Directories
Blogs
Chat
Notes

Finding Sources
U.S. Government
State, County, and Local Governments
Other Government-Related Sources
Business-Related Sources
News
Web 2.0
Looking Up Subscribers
Email
Notes

Automation of Searching
Why Automate Searching?
Enterprise Search Middleware
Best-in-Class Desktop Tool
Investigative Search Tool Requirements
A Homegrown Solution
Reducing Analytical Time Using Automation
Caching and Data Mining
The Human Interface in Internet Investigations
Notes

Internet Intelligence Reporting
Records
Content
Analyst’s Comments
Organization and Formatting
Source Citations
Attribution
Verification
Notes

Illicit Web Sites and Illegal Behavior Online
Cybercrime
Child Pornography and Internet Porn
Unauthorized Use of Computer Systems
Contraband Digital Assets
Information (Cyber) Warfare
Notes

Model Internet Investigative Standards
Enterprise Strategy
Model Internet Search Guidelines
Authorized Internet Search Personnel
Definitions to Consider
Notes

A Model Internet Investigation Policy
Key Considerations
Higher-Risk Candidates
Application Procedures and Forms
Legal Issues
Confidentiality
Ethics in Investigations
Disciplinary Action
Model Forms for Candidates
Notes

A Model Internet Posting Policy
Notes

Internet Intelligence Issues
Privacy
Smoking Guns
Completeness of Internet Searching
Adjudication
Conclusion
Notes

Bibliography


Index

Erscheint lt. Verlag 18.1.2011
Zusatzinfo 5 Illustrations, black and white
Verlagsort Bosa Roca
Sprache englisch
Maße 156 x 234 mm
Gewicht 628 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Wirtschaft Betriebswirtschaft / Management Personalwesen
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 1-4398-2751-6 / 1439827516
ISBN-13 978-1-4398-2751-2 / 9781439827512
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20