The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
- Provides an understanding of the global information environment and its threats
- Explains how to establish a high-technology crime investigations unit and prevention program
- Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers
PRIMARY MARKET: The targeted audience is INFOSEC and Information Assurance managers, technicians, and investigators; computer forensic professionals and forensic consulting firms; IT technical and IT network professionals interested in specializing in Security.
SECONDARY MARKET: Business managers, corporate security professionals managers, law enforcement officers, and students enrolled in IT computer and information security classes.
- Praise for the First Edition
- First Edition Foreword
- Second Edition Foreword
- About the Authors
- Part I: Introduction to the High-Technology Crime Environment
- Chapter 1: What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats
- Publisher Summary
- THE GLOBALIZATION OF THE MARKETPLACE
- HIGH TECHNOLOGY IS RAPIDLY CHANGING THE WORLD
- THE THREE BASIC STEPS OF COMPUTER OPERATIONS
- HIGH-TECHNOLOGY THREATS
- CASE EXAMPLE: DON’T RUSH TO JUDGE
- OTHER AREAS OF INTEREST
- Chapter 2: High-Technology Crime Miscreants: Profiles, Motives, and Philosophies
- Publisher Summary
- A BRIEF HISTORY OF HIGH-TECHNOLOGY CRIME AND ITS ASSOCIATED MISCREANTS
- REQUIREMENTS TO COMMIT A HIGH-TECHNOLOGY CRIME
- AN EXAMPLE OF A CORPORATE EMPLOYEE AND THE “CRIME TRIAD”
- INSIDER THREATS
- OUTSIDER THREATS
- WHO ARE THE HIGH-TECHNOLOGY MISCREANTS AND OTHERS ON THE INTERNET?
- HACKERS, CRACKERS, AND PHREAKERS, OH MY!
- PROFILE OF THE HIGH-TECHNOLOGY AND INTERNET FRAUDSTERS
- HIGH-TECHNOLOGY TERRORISTS
- WHY USE TERRORIST METHODS?
- WHAT IS A TERRORIST ACT?
- RESULTS OF TERRORIST ACTIONS
- TERRORIST TECHNOLOGY THREAT ENVIRONMENT
- HIGH-TECHNOLOGY ECONOMIC AND INDUSTRIAL ESPIONAGE ON THE INTERNET—NETSPIONAGE
- INDUSTRIAL AND ECONOMIC ESPIONAGE DEFINED
- TRY CATCHING THESE MISCREANTS!
- PROPRIETARY ECONOMIC INFORMATION
- ECONOMIC ESPIONAGE VULNERABILITIES
- INFORMATION WARRIORS AND CYBER WARRIORS
- SOPHISTICATED DRUG DEALER USE OF HIGH TECHNOLOGY
- Chapter 3: The Basic Techniques Used by High-Technology
- No. of pages:
- © Butterworth-Heinemann 2006
- 25th August 2006
- eBook ISBN:
- Paperback ISBN:
Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.
Security consultant, lecturer, and author, Oak Harbor, WA, USA
Director, Information Security for Motorola Corporation. He has worked as the Director of Information Protection Practices for Amgen; as a U.S. Army counterintelligence officer; federal agent and investigator; and a security consultant for such firms as PricewaterhouseCoopers and Ernst & Young
"[The High-Technology-Crime Investigator’s Handbook, Second Edition] not only provides a basic introduction into the world of high-tech crime but, more importantly for the readers, it is the only book I have found whose primary purpose is not about investigating high-tech crimes, but how to establish and manage a high-tech crimes investigative unit." - Howard A. Schmidt, President & CEO, R & H Security Consulting LLC, Former White House Cyber Security Advisor