High-Technology Crime Investigator's Handbook - 2nd Edition - ISBN: 9780750679299, 9780080468204

High-Technology Crime Investigator's Handbook

2nd Edition

Establishing and Managing a High-Technology Crime Prevention Program

Authors: Gerald Kovacich William C. Boni
Paperback ISBN: 9780750679299
eBook ISBN: 9780080468204
Imprint: Butterworth-Heinemann
Published Date: 25th August 2006
Page Count: 470
Tax/VAT will be calculated at check-out
63.95
38.99
48.95
59.95
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

  • Praise for the First Edition
  • First Edition Foreword
  • Second Edition Foreword
  • Preface
  • Acknowledgments
  • About the Authors
  • Part I: Introduction to the High-Technology Crime Environment
    • Introduction
    • Chapter 1: What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats
      • Publisher Summary
      • INTRODUCTION
      • THE GLOBALIZATION OF THE MARKETPLACE
      • HIGH TECHNOLOGY IS RAPIDLY CHANGING THE WORLD
      • THE THREE BASIC STEPS OF COMPUTER OPERATIONS
      • HIGH-TECHNOLOGY THREATS
      • CASE EXAMPLE: DON’T RUSH TO JUDGE
      • OTHER AREAS OF INTEREST
      • SUMMARY
    • Chapter 2: High-Technology Crime Miscreants: Profiles, Motives, and Philosophies
      • Publisher Summary
      • INTRODUCTION
      • A BRIEF HISTORY OF HIGH-TECHNOLOGY CRIME AND ITS ASSOCIATED MISCREANTS
      • REQUIREMENTS TO COMMIT A HIGH-TECHNOLOGY CRIME
      • AN EXAMPLE OF A CORPORATE EMPLOYEE AND THE “CRIME TRIAD”
      • INSIDER THREATS
      • OUTSIDER THREATS
      • WHO ARE THE HIGH-TECHNOLOGY MISCREANTS AND OTHERS ON THE INTERNET?
      • HACKERS, CRACKERS, AND PHREAKERS, OH MY!
      • PROFILE OF THE HIGH-TECHNOLOGY AND INTERNET FRAUDSTERS
      • HIGH-TECHNOLOGY TERRORISTS
      • WHY USE TERRORIST METHODS?
      • WHAT IS A TERRORIST ACT?
      • RESULTS OF TERRORIST ACTIONS
      • TERRORIST TECHNOLOGY THREAT ENVIRONMENT
      • HIGH-TECHNOLOGY ECONOMIC AND INDUSTRIAL ESPIONAGE ON THE INTERNET—NETSPIONAGE
      • INDUSTRIAL AND ECONOMIC ESPIONAGE DEFINED
      • TRY CATCHING THESE MISCREANTS!
      • PROPRIETARY ECONOMIC INFORMATION
      • ECONOMIC ESPIONAGE VULNERABILITIES
      • INFORMATION WARRIORS AND CYBER WARRIORS
      • SOPHISTICATED DRUG DEALER USE OF HIGH TECHNOLOGY
      • SUMMARY
    • Chapter 3: The Basic Techniques Used by High-Technology Crime Miscreants
      • Publisher Summary
      • INTRODUCTION
      • INTERNAL AND EXTERNAL ATTACKS
      • HIGH-TECHNOLOGY MISCREANTS’ BASIC APPROACH TO ATTACKING NETWORKS*
      • BASIC USE OF PHYSICAL AND HUMAN INTELLIGENCE COLLECTION METHODS: THEFT AND SOCIAL ENGINEERING
      • OTHER COMPUTER-RELATED TECHNIQUES USED BY BOTH INSIDERS AND OUTSIDERS
      • SYSTEM MANIPULATION
      • USING THE GII, INTERNET, AND NII TO SEARCH FOR TOOLS
      • ATTACK TOOLS FOUND ON THE INTERNET AND USED PRIMARILY TO ATTACK INTERNET-CONNECTED TARGETS
      • SOME ADDITIONAL COMMON METHODS OF INTERNET ATTACK
      • OTHER METHODS, TOOLS, AND TECHNIQUES
      • EXAMPLE OF HACKER NAIVETÉ
      • ELECTRONIC MAIL
      • CELLULAR TELEPHONES: CLONING AND OTHER FRAUDS
      • THREATS, VULNERABILITIES, AND RISKS
      • CLIP-ON FRAUD
      • INFORMATION OF INVESTIGATIVE INTERESTS
      • COLORED BOXES AND TELECOMMUNICATIONS FRAUD
      • PBX ATTACKS
      • CASE EXAMPLE: AN ONLINE COMPUTER IS ALWAYS UNDER ATTACK
      • SUMMARY
    • Chapter 4: The Basic Information Systems Security Techniques Used to Defend Against High-Technology Crime Miscreants
      • Publisher Summary
      • INTRODUCTION
      • BASIC INFOSEC CONCEPTS
      • INFOSEC PROCESSES OR FUNCTIONS
      • THE INFORMATION SYSTEMS SECURITY OFFICER (ISSO)
      • INFOSEC AND ISSO GOALS AND OBJECTIVES
      • RISK MANAGEMENT
      • OTHER ASPECTS OF AN INFOSEC PROGRAM
      • INFOSEC ORGANIZATION
      • PREVENTIVE CELLULAR PHONE FRAUD MEASURES
      • SECURITY REQUIREMENTS FOR VOICE MESSAGING OPERATIONS
      • PBX PROTECTION
      • E-MAIL PROTECTION
      • NEW MISCREANT TECHNIQUES BRINGS NEW DEFENSIVE METHODS
      • PROTECTING SEMICONDUCTORS—MICROCARVING
      • SUMMARY
  • Part II: Introduction to High-Technology Crime Incidents and Crime Investigations
    • Introduction
    • Chapter 5: Investigating High-Technology Crimes
      • Publisher Summary
      • INTRODUCTION
      • SIGNIFICANCE OF COMPUTERS IN CRIME AND INVESTIGATIONS
      • VIOLATIONS OF ORGANIZATION POLICIES
      • SEARCHING A COMPUTER: WARRANTS AND POLICY ISSUES
      • OPERATIONS PLAN
      • THE SEARCH PROCEDURES
      • A HIGH-TECHNOLOGY CRIME SCENE
      • SUMMARY
    • Chapter 6: Responding to High-Technology Incidents and Crimes
      • Publisher Summary
      • INTRODUCTION
      • PREINCIDENT PREPARATIONS
      • RESPONSIBILITIES AND DUTIES
      • TRAINING
      • THE INCIDENT HANDLING PLAN
      • IDENTIFICATION OF AN ATTACK
      • CONTAINMENT
      • ESCALATION
      • BRIEFINGS BEFORE THE INVESTIGATION STARTS
      • EQUIPMENT AND TOOLS
      • DEFINE AND DOCUMENT THE CASE
      • SECURING THE SCENE OF THE INCIDENT
      • THE FIRST RESPONDER
      • THE INVESTIGATIVE PROCESS
      • SUMMARY
    • Chapter 7: The Collection of Evidence
      • Publisher Summary
      • INTRODUCTION
      • HOW DO YOU GO ABOUT SEIZING THE EVIDENCE?
      • THE LAW
      • THE FIRST RESPONDER
      • HEALTH AND SAFETY
      • A GUIDE TO SEIZING EVIDENCE
      • PROCEDURES FOR SEIZING A STANDALONE COMPUTER
      • PROCEDURES FOR COLLECTING EVIDENCE FROM A NETWORK
      • OTHER ELECTRONIC DEVICES THAT MAY CONTAIN RELEVANT INFORMATION
      • SUMMARY
    • Chapter 8: Interviews and Interrogations
      • Publisher Summary
      • INTRODUCTION
      • WHO, HOW, WHERE, WHEN, WHY, WHAT
      • DEALING WITH VICTIMS
      • DEALING WITH WITNESSES
      • PERSONAL DESCRIPTIONS
      • DEALING WITH SUSPECTS
      • CASE STUDY: COMPELLING SUSPECTS TO PROVIDE ACCESS INFORMATION
      • SUMMARY
      • APPENDIX 8-1 INVESTIGATIVE DESCRIPTIVE AID TO ASSIST IN PERSONAL DESCRIPTIONS
    • Chapter 9: An Introduction to Computer Forensics
      • Publisher Summary
      • INTRODUCTION
      • THE STAGES THAT MAKE UP THE FORENSIC PROCESS
      • WHO WILL DIRECT THE COMPUTER FORENSICS EFFORTS?
      • GUIDELINES
      • STRATEGY FOR AN INVESTIGATION
      • PROCEDURE FOR A FORENSIC INVESTIGATION
      • PURPOSE OF THE INVESTIGATION
      • BUSINESS DECISIONS
      • THE FULL INVESTIGATION
      • THE CHASE
      • RESTORATION
      • THE ANALYSIS
      • EXAMINATION OF PDAS
      • EXAMINATION OF MOBILE PHONES
      • EXAMINATION OF FLASH MEMORY MEDIA
      • CASE STUDY 1
      • CASE STUDY 2
      • SUMMARY
    • Chapter 10: Establishing and Managing a Computer Forensics Laboratory
      • Publisher Summary
      • INTRODUCTION
      • ESTABLISHING THE LABORATORY
      • COMPUTER FORENSICS LABORATORY MANAGEMENT AND STAFF
      • COMPUTER FORENSICS LABORATORY: PHYSICAL SIZE
      • AN EXAMPLE OF A COMPUTER FORENSICS LABORATORY
      • WHO WILL BE YOUR CUSTOMERS?
      • CASE PRIORITY
      • ALLOCATION OF DUTIES
      • STAFF TRAINING AND EXPERIENCE
      • STAFF AND LABORATORY PRODUCTIVITY
      • PROCEDURES FOR QUALITY REVIEW
      • EQUIPMENT TESTING
      • STANDARDS
      • POLICY ON OUTSOURCING
      • POLICY ON USE OF EXTERNAL EXPERTS
      • COUNSELING
      • EQUIPMENT AND SOFTWARE
      • INFORMATION RESOURCES
      • HEALTH AND SAFETY
      • DATA RETENTION POLICY
      • REPORTING OF FINDINGS
      • COMMUNICATIONS
      • SUMMARY
    • Chapter 11: High-Technology Crimes: Case Summaries
      • Publisher Summary
      • INTRODUCTION
      • THE DRINKORDIE GROUP
      • OLDIE BUT GOODIE HACKER CASE
      • MILITARY HACKER FREED ON BAIL
      • WORM STRIKES DOWN WINDOWS 2000 SYSTEMS
      • FBI AGENTS BUST “BOTMASTER”: LOS ANGELES, CALIFORNIA (REUTERS)
      • RESEARCHERS SNOOP ON KEYBOARD SOUNDS
      • SPAMMERS FACE JAIL IN NIGERIA
      • STOLEN UC-BERKELEY LAPTOP RECOVERED
      • THREE JAILED IN GLOBAL EBAY SCAM
      • BLOGGERS LEARN THE PRICE OF TELLING TOO MUCH
      • TWENTY ARRESTED IN CRACKDOWN ON INTERNET PHARMACIES
      • ALLEGED HACKER IS MICROSOFT EMPLOYEE
      • ANTIIDENTITY THEFT FREEZE GAINING MOMENTUM
      • E-MAIL RECEIVED BY ONE OF THE AUTHORS
      • BARRED NO MORE
      • PERSON USING AN ALIAS AND REPRESENTING A FICTITIOUS ISP INSTALLED SIX TOLL-FREE 800 NUMBERS FOR A TELEMARKETING COMPANY
      • A NETWORK SECURITY OPERATIONS CENTER RECEIVED A CATASTROPHIC OUTAGE NOTIFICATION FROM THEIR NETWORK MANAGEMENT CENTER INDICATING A FIBER OUTAGE HAD OCCURRED
      • TELECOMMUNICATIONS CABLES VULNERABLE TO TERRORISTS’ ATTACKS
      • SO YOUR EMPLOYER “LOST” YOUR INFORMATION
      • CALIFORNIA TO BAN HUNTING OVER INTERNET
      • E-MAIL RECEIVED BY ONE OF THE AUTHORS
      • NINE OF ISRAEL’S TOP BUSINESS EXECUTIVES AND 11 HEADS OF 3 LEADING INQUIRY COMPANIES—INCLUDING MODIIN EZRAHI— ARE IN CUSTODY SUSPECTED OF COMPLICITY IN A MASSIVE COMPUTERIZED COMMERCIAL ESPIONAGE CONSPIRACY
      • “BLASTER” TEEN SENTENCED TO 1½ YEARS
      • INFO ON 3.9M CITIGROUP CUSTOMERS LOST
      • WORLDPAY STRUGGLES UNDER DDOS ATTACK (AGAIN)
      • DENIAL-OF-SERVICE ATTACK VICTIM SPEAKS OUT
      • NEW VIRUS USES SONY BMG SOFTWARE
      • DUMPSTER DIVING FOR IDS
      • FIVE ARRESTED OVER PHISHING FRAUD
      • GEEKFATHERS: CYBER CRIME MOBS REVEALED
      • HACKER HELPS WANNABE BIZ STUDENTS
      • HACKERS BATTER CRITICAL UK INFRASTRUCTURE
      • HACKER INFILTRATED GOVERNMENT COMPUTERS, US MILITARY INSTALLATIONS, LABORATORIES, AND NASA
      • HACKERS TAKE A CRACK AT CISCO FLAW
      • HOME PCS HARNESSED TO SOLVE GLOBAL PROBLEMS
      • INTERNET CRASHES IN PAKISTAN
      • IPOD BLAMED FOR SPIKE IN SUBWAY CRIME
      • “MEDICA IGNORED WARNINGS,” SAYS EX-EMPLOYEE
      • WEB SITE OWNER DEFIES JUDGE’S ORDERS
      • PHISHERS ADOPT SCAM TRICKS FROM VIRUS WRITERS
      • LEXISNEXIS: HACKERS ACCESSED 32,000 IDS
      • TELEPHONE SCAM
      • E-MAIL RECEIVED BY ONE OF THE AUTHORS
      • E-MAIL MESSAGE RECEIVED BY ONE OF THE AUTHORS: ANOTHER VARIATION ON THE THEME
      • TIME WARNER ALERTS STAFF TO LOST DATA FILES FOR 600,000 WORKERS
      • FEDERAL AGENTS HAVE CARRIED OUT SEARCHES IN AT LEAST TWO STATES AS PART OF THE INVESTIGATION INTO THE THEFT OF SOCIAL SECURITY NUMBERS AND OTHER PERSONAL INFORMATION FROM DATABASE GIANT LEXISNEXIS INC.
      • HACKERS TARGET ITUNES, ANTIVIRUS WARE
      • JUDGE DISMISSES SPAM CONVICTION
      • MASTERCARD SECURITY ALERT—MORE THAN 40 MILLION CREDIT CARDS MAY HAVE BEEN BREACHED; WARNING TO MEMBER BANKS ISSUED
      • SASSER AUTHOR GETS SUSPENDED TERM
      • A FEDERAL JUDGE HAS AWARDED AN INTERNET SERVICE PROVIDER MORE THAN $1 BILLION IN WHAT IS BELIEVED TO BE THE LARGEST JUDGMENT EVER AGAINST SPAMMERS
      • TEEN SENTENCED FOR “BLASTER” WORM VARIANT
      • SUMMARY
  • Part III: Introduction to Overview of the High-Technology Crime Investigation Profession and Unit
    • Introduction
    • Chapter 12: The Global Enterprise Corporation
      • Publisher Summary
      • INTRODUCTION
      • GEC BACKGROUND INFORMATION
      • KEY ELEMENTS FOR THE HIGH-TECHNOLOGY CRIME INVESTIGATOR TO CONSIDER
      • GETTING TO KNOW GEC
      • GEC’S STRATEGIC BUSINESS PLAN
      • GEC’S TACTICAL BUSINESS PLAN
      • GEC’S ANNUAL BUSINESS PLAN
      • HIGH-TECHNOLOGY CRIME PREVENTION PROGRAM PLANNING
      • SUMMARY
    • Chapter 13: Understanding the Role of the High-Technology Crime Investigator and a Crime Prevention Unit in the Business and Management Environment
      • Publisher Summary
      • INTRODUCTION
      • WHAT IS EXPECTED OF YOU?
      • GEC HIGH-TECHNOLOGY CRIME INVESTIGATOR RESPONSIBILITIES
      • GOALS AND OBJECTIVES
      • LEADERSHIP POSITION
      • PROVIDING HIGH-TECHNOLOGY CRIME PREVENTION SERVICE AND SUPPORT
      • USE TEAM CONCEPTS
      • VISION, MISSION, AND QUALITY STATEMENTS
      • HIGH-TECHNOLOGY CRIME PREVENTION PRINCIPLES
      • PROJECT AND RISK MANAGEMENT PROCESSES
      • HIGH-TECHNOLOGY CRIME PREVENTION ORGANIZATIONAL RESPONSIBILITIES
      • GEC HIGH-TECHNOLOGY CRIME INVESTIGATOR FORMAL DUTIES AND RESPONSIBILITIES
      • SUMMARY
    • Chapter 14: The High-Technology Crime Investigation Unit’s Strategic, Tactical, and Annual Plans
      • Publisher Summary
      • INTRODUCTION
      • GEC’S HIGH-TECHNOLOGY CRIME PREVENTION TACTICAL PLAN
      • GEC’S HIGH-TECHNOLOGY CRIME PREVENTION ANNUAL PLAN
      • SUMMARY
    • Chapter 15: High-Technology Crime Investigation Program and Organization
      • Publisher Summary
      • INTRODUCTION
      • HIGH-TECHNOTLOGY CRIME INVESTIGATION UNIT DRIVERS
      • HIGH-TECHNOLOGY CRIME INVESTIGATOR MANAGER THOUGHT PROCESS IN ESTABLISHING THE HTCPP AND INVESTIGATION ORGANIZATION
      • SECURITY FUNCTIONAL PROCESS SUMMARY
      • HIGH-TECHNOLOGY CRIME INVESTIGATIVE ORGANIZATION
      • DETERMINING THE NEED FOR HIGH-TECHNOLOGY CRIME INVESTIGATION SUBORDINATE ORGANIZATIONS
      • HIGH-TECHNOLOGY CRIME INVESTIGATION JOB DESCRIPTIONS FOR THE UNIT
      • RECRUITING HIGH-TECHNOLOGY CRIME PREVENTION PROFESSIONALS
      • IDENTIFYING IN-HOUSE HIGH-TECHNOLOGY CRIME INVESTIGATOR CANDIDATES
      • IDENTIFYING OUTSIDE HIGH-TECHNOLOGY CRIME INVESTIGATOR CANDIDATES
      • SUMMARY
    • Chapter 16: High-Technology Crime Investigative Functions
      • Publisher Summary
      • INTRODUCION
      • DETERMINING MAJOR HIGH-TECHNOLOGY CRIME INVESTIGATIVE FUNCTIONS
      • HIGH-TECHNOLOGY CRIME INVESTIGATION POLICY
      • GEC’S HIGH-TECHNOLOGY CRIME INVESTIGATION REQUIREMENTS AND POLICY DIRECTIVE (IRPD)
      • HIGH-TECHNOLOGY CRIME INVESTIGATION PROCEDURES
      • AWARENESS PROGRAM
      • PROACTIVE HIGH-TECHNOLOGY CRIME PREVENTION SURVEYS AND RISK MANAGEMENT
      • WHAT IS RISK MANAGEMENT?
      • RECOMMENDATIONS TO MANAGEMENT
      • RISK MANAGEMENT REPORTS
      • HIGH-TECHNOLOGY CRIME PREVENTION SURVEYS
      • SUMMARY
      • EXCERPTS FROM A SAMPLE SURVEY ACTIVITY LOG
    • Chapter 17: Sources, Networking, and Liaison
      • Publisher Summary
      • INTRODUCTION
      • COLLECTING INFORMATION
      • SOURCES
      • “CARDING” SOURCES
      • CLASSIFYING THE RELIABILITY OF SOURCES AND THE ACCURACY OF THEIR INFORMATION
      • NETWORKING
      • LIAISON
      • SUMMARY
    • Chapter 18: High-Technology Crime Investigation Unit Metrics Management System
      • Publisher Summary
      • INTRODUCTION
      • INVESTIGATIONS
      • INVESTIGATION CASE STUDY
      • SUMMARY
    • Chapter 19: Outsource or Proprietary?
      • Publisher Summary
      • INTRODUCTION
      • OUTSOURCING: A DEFINITION
      • THE ADVANTAGES AND DISADVANTAGES OF A PROPRIETARY HIGH-TECHNOLOGY CRIME INVESTIGATIVE UNIT
      • THE ADVANTAGES AND DISADVANTAGES OF AN OUTSOURCED HIGH-TECHNOLOGY CRIME INVESTIGATIVE UNIT
      • CANDIDATE SECURITY FUNCTIONS FOR OUTSOURCING: HIGH-TECHNOLOGY CRIME INVESTIGATION
      • SAMPLE OUTSOURCING ANALYSIS
      • PROBABILITY OF FAILURE
      • CONSEQUENCE OF FAILURE
      • FINAL OUTSOURCING DECISION
      • SUMMARY
  • Part IV: Introduction to High-Technology Crime Investigation Challenges of the 21st Century
    • Introduction
    • Chapter 20: The Future of High Technology and Its Impact on Working in a Global Information Environment
      • Publisher Summary
      • INTRODUCTION
      • MICROPROCESSORS
      • PESSIMISM VERSUS OPTIMISM
      • ELECTRICALLY CHARGED AMOEBAE?
      • HIGH-TECHNOLOGY DEVICE INTEGRATIONS AND TRENDS TOWARD THE FUTURE
      • POWER TO THE PEOPLE?
      • SUMMARY
    • Chapter 21: The Future of High-Technology Crimes, Security, and the Criminal Justice System
      • Publisher Summary
      • INTRODUCTION
      • HIGH-TECHNOLOGY SECURITY
      • INFORMATION SYSTEM SECURITY
      • CRIMINAL JUSTICE SYSTEMS
      • SUMMARY
    • Chapter 22: Terrorism—Crime or War? Its Impact on the High-Technology Crime Investigator and the Profession
      • Publisher Summary
      • INTRODUCTION
      • THE CURRENT ENVIRONMENT
      • CURRENT TERRORIST USE
      • INTELLIGENCE GATHERING
      • DIRECT ATTACKS
      • SUMMARY
    • Chapter 23: The Future of the High-Technology Crime Investigator Profession
      • Publisher Summary
      • INTRODUCTION
      • LACK OF TRAINING, MANAGEMENT SUPPORT, AND SOMETIMES EVEN INTEREST
      • HIGH-TECHNOLOGY CRIME INVESTIGATION UNITS AND LAW ENFORCEMENT
      • TRAINING
      • HIGH-TECHNOLOGY CRIME INVESTIGATIONS
      • THE BEST TOOLS TO ASSIST IN CONDUCTING HIGH-TECHNOLOGY CRIME INVESTIGATIONS
      • THE BEST TOOLS TO ASSIST IN COMMITTING HIGH-TECHNOLOGY CRIMES
      • HIGH-TECHNOLOGY CRIMES INCREASING OR DECREASING?
      • CONFIGURATIONS AND SECURITY OF LAW ENFORCEMENT SYSTEMS
      • SYSTEMS SECURE?
      • CONCLUSIONS
      • SUMMARY
    • Chapter 24: Developing a Career as a High-Technology Crime Investigator
      • Publisher Summary
      • INTRODUCTION
      • QUALIFICATIONS
      • CERTIFICATION
      • EXPERIENCE
      • KNOWLEDGE
      • RANGE OF CASES
      • TECHNOLOGIES
      • ASSOCIATIONS
      • SUMMARY
    • Chapter 25: Marketing Yourself as a Successful High-Technology Crime Investigator
      • Publisher Summary
      • INTRODUCTION
      • MARKETING SUPPORT: TRAINING, EXPERIENCE, CERTIFICATIONS, ASSOCIATIONS, AND CONTACTS
      • APPLYING FOR THE POSITION OF HIGH-TECHNOLOGY CRIME INVESTIGATOR, SUPERVISOR, OR MANAGER
      • YOUR RESUME MADE IT PAST THE INITIAL SCREENING-NEXT STEP: THE INTERVIEW
      • THE PORTFOLIO
      • SUMMARY
    • Chapter 26: So, Are You Ready to Become a High-Technology Crime Investigative Consultant?
      • Publisher Summary
      • INTRODUCTION
      • HAVE A PLAN
      • GETTING STARTED
      • QUESTIONS TO CONSIDER
      • SUMMARY
    • Chapter 27: Conclusions and Final Thoughts
      • Publisher Summary
      • INTRODUCTION
      • WHAT IS THE PROFILE OF A SUCCESSFUL HIGH-TECHNOLOGY CRIME INVESTIGATOR?
      • “LOVE IT OR LEAVE IT!”
      • HOPES FOR THE FUTURE
  • Index

Key Features

  • Provides an understanding of the global information environment and its threats
  • Explains how to establish a high-technology crime investigations unit and prevention program
  • Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers

Readership

PRIMARY MARKET: The targeted audience is INFOSEC and Information Assurance managers, technicians, and investigators; computer forensic professionals and forensic consulting firms; IT technical and IT network professionals interested in specializing in Security.

SECONDARY MARKET: Business managers, corporate security professionals managers, law enforcement officers, and students enrolled in IT computer and information security classes.

Table of Contents

  • Praise for the First Edition
  • First Edition Foreword
  • Second Edition Foreword
  • Preface
  • Acknowledgments
  • About the Authors
  • Part I: Introduction to the High-Technology Crime Environment
    • Introduction
    • Chapter 1: What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats
      • Publisher Summary
      • INTRODUCTION
      • THE GLOBALIZATION OF THE MARKETPLACE
      • HIGH TECHNOLOGY IS RAPIDLY CHANGING THE WORLD
      • THE THREE BASIC STEPS OF COMPUTER OPERATIONS
      • HIGH-TECHNOLOGY THREATS
      • CASE EXAMPLE: DON’T RUSH TO JUDGE
      • OTHER AREAS OF INTEREST
      • SUMMARY
    • Chapter 2: High-Technology Crime Miscreants: Profiles, Motives, and Philosophies
      • Publisher Summary
      • INTRODUCTION
      • A BRIEF HISTORY OF HIGH-TECHNOLOGY CRIME AND ITS ASSOCIATED MISCREANTS
      • REQUIREMENTS TO COMMIT A HIGH-TECHNOLOGY CRIME
      • AN EXAMPLE OF A CORPORATE EMPLOYEE AND THE “CRIME TRIAD”
      • INSIDER THREATS
      • OUTSIDER THREATS
      • WHO ARE THE HIGH-TECHNOLOGY MISCREANTS AND OTHERS ON THE INTERNET?
      • HACKERS, CRACKERS, AND PHREAKERS, OH MY!
      • PROFILE OF THE HIGH-TECHNOLOGY AND INTERNET FRAUDSTERS
      • HIGH-TECHNOLOGY TERRORISTS
      • WHY USE TERRORIST METHODS?
      • WHAT IS A TERRORIST ACT?
      • RESULTS OF TERRORIST ACTIONS
      • TERRORIST TECHNOLOGY THREAT ENVIRONMENT
      • HIGH-TECHNOLOGY ECONOMIC AND INDUSTRIAL ESPIONAGE ON THE INTERNET—NETSPIONAGE
      • INDUSTRIAL AND ECONOMIC ESPIONAGE DEFINED
      • TRY CATCHING THESE MISCREANTS!
      • PROPRIETARY ECONOMIC INFORMATION
      • ECONOMIC ESPIONAGE VULNERABILITIES
      • INFORMATION WARRIORS AND CYBER WARRIORS
      • SOPHISTICATED DRUG DEALER USE OF HIGH TECHNOLOGY
      • SUMMARY
    • Chapter 3: The Basic Techniques Used by High-Technology Crime Miscreants
      • Publisher Summary
      • INTRODUCTION
      • INTERNAL AND EXTERNAL ATTACKS
      • HIGH-TECHNOLOGY MISCREANTS’ BASIC APPROACH TO ATTACKING NETWORKS*
      • BASIC USE OF PHYSICAL AND HUMAN INTELLIGENCE COLLECTION METHODS: THEFT AND SOCIAL ENGINEERING
      • OTHER COMPUTER-RELATED TECHNIQUES USED BY BOTH INSIDERS AND OUTSIDERS
      • SYSTEM MANIPULATION
      • USING THE GII, INTERNET, AND NII TO SEARCH FOR TOOLS
      • ATTACK TOOLS FOUND ON THE INTERNET AND USED PRIMARILY TO ATTACK INTERNET-CONNECTED TARGETS
      • SOME ADDITIONAL COMMON METHODS OF INTERNET ATTACK
      • OTHER METHODS, TOOLS, AND TECHNIQUES
      • EXAMPLE OF HACKER NAIVETÉ
      • ELECTRONIC MAIL
      • CELLULAR TELEPHONES: CLONING AND OTHER FRAUDS
      • THREATS, VULNERABILITIES, AND RISKS
      • CLIP-ON FRAUD
      • INFORMATION OF INVESTIGATIVE INTERESTS
      • COLORED BOXES AND TELECOMMUNICATIONS FRAUD
      • PBX ATTACKS
      • CASE EXAMPLE: AN ONLINE COMPUTER IS ALWAYS UNDER ATTACK
      • SUMMARY
    • Chapter 4: The Basic Information Systems Security Techniques Used to Defend Against High-Technology Crime Miscreants
      • Publisher Summary
      • INTRODUCTION
      • BASIC INFOSEC CONCEPTS
      • INFOSEC PROCESSES OR FUNCTIONS
      • THE INFORMATION SYSTEMS SECURITY OFFICER (ISSO)
      • INFOSEC AND ISSO GOALS AND OBJECTIVES
      • RISK MANAGEMENT
      • OTHER ASPECTS OF AN INFOSEC PROGRAM
      • INFOSEC ORGANIZATION
      • PREVENTIVE CELLULAR PHONE FRAUD MEASURES
      • SECURITY REQUIREMENTS FOR VOICE MESSAGING OPERATIONS
      • PBX PROTECTION
      • E-MAIL PROTECTION
      • NEW MISCREANT TECHNIQUES BRINGS NEW DEFENSIVE METHODS
      • PROTECTING SEMICONDUCTORS—MICROCARVING
      • SUMMARY
  • Part II: Introduction to High-Technology Crime Incidents and Crime Investigations
    • Introduction
    • Chapter 5: Investigating High-Technology Crimes
      • Publisher Summary
      • INTRODUCTION
      • SIGNIFICANCE OF COMPUTERS IN CRIME AND INVESTIGATIONS
      • VIOLATIONS OF ORGANIZATION POLICIES
      • SEARCHING A COMPUTER: WARRANTS AND POLICY ISSUES
      • OPERATIONS PLAN
      • THE SEARCH PROCEDURES
      • A HIGH-TECHNOLOGY CRIME SCENE
      • SUMMARY
    • Chapter 6: Responding to High-Technology Incidents and Crimes
      • Publisher Summary
      • INTRODUCTION
      • PREINCIDENT PREPARATIONS
      • RESPONSIBILITIES AND DUTIES
      • TRAINING
      • THE INCIDENT HANDLING PLAN
      • IDENTIFICATION OF AN ATTACK
      • CONTAINMENT
      • ESCALATION
      • BRIEFINGS BEFORE THE INVESTIGATION STARTS
      • EQUIPMENT AND TOOLS
      • DEFINE AND DOCUMENT THE CASE
      • SECURING THE SCENE OF THE INCIDENT
      • THE FIRST RESPONDER
      • THE INVESTIGATIVE PROCESS
      • SUMMARY
    • Chapter 7: The Collection of Evidence
      • Publisher Summary
      • INTRODUCTION
      • HOW DO YOU GO ABOUT SEIZING THE EVIDENCE?
      • THE LAW
      • THE FIRST RESPONDER
      • HEALTH AND SAFETY
      • A GUIDE TO SEIZING EVIDENCE
      • PROCEDURES FOR SEIZING A STANDALONE COMPUTER
      • PROCEDURES FOR COLLECTING EVIDENCE FROM A NETWORK
      • OTHER ELECTRONIC DEVICES THAT MAY CONTAIN RELEVANT INFORMATION
      • SUMMARY
    • Chapter 8: Interviews and Interrogations
      • Publisher Summary
      • INTRODUCTION
      • WHO, HOW, WHERE, WHEN, WHY, WHAT
      • DEALING WITH VICTIMS
      • DEALING WITH WITNESSES
      • PERSONAL DESCRIPTIONS
      • DEALING WITH SUSPECTS
      • CASE STUDY: COMPELLING SUSPECTS TO PROVIDE ACCESS INFORMATION
      • SUMMARY
      • APPENDIX 8-1 INVESTIGATIVE DESCRIPTIVE AID TO ASSIST IN PERSONAL DESCRIPTIONS
    • Chapter 9: An Introduction to Computer Forensics
      • Publisher Summary
      • INTRODUCTION
      • THE STAGES THAT MAKE UP THE FORENSIC PROCESS
      • WHO WILL DIRECT THE COMPUTER FORENSICS EFFORTS?
      • GUIDELINES
      • STRATEGY FOR AN INVESTIGATION
      • PROCEDURE FOR A FORENSIC INVESTIGATION
      • PURPOSE OF THE INVESTIGATION
      • BUSINESS DECISIONS
      • THE FULL INVESTIGATION
      • THE CHASE
      • RESTORATION
      • THE ANALYSIS
      • EXAMINATION OF PDAS
      • EXAMINATION OF MOBILE PHONES
      • EXAMINATION OF FLASH MEMORY MEDIA
      • CASE STUDY 1
      • CASE STUDY 2
      • SUMMARY
    • Chapter 10: Establishing and Managing a Computer Forensics Laboratory
      • Publisher Summary
      • INTRODUCTION
      • ESTABLISHING THE LABORATORY
      • COMPUTER FORENSICS LABORATORY MANAGEMENT AND STAFF
      • COMPUTER FORENSICS LABORATORY: PHYSICAL SIZE
      • AN EXAMPLE OF A COMPUTER FORENSICS LABORATORY
      • WHO WILL BE YOUR CUSTOMERS?
      • CASE PRIORITY
      • ALLOCATION OF DUTIES
      • STAFF TRAINING AND EXPERIENCE
      • STAFF AND LABORATORY PRODUCTIVITY
      • PROCEDURES FOR QUALITY REVIEW
      • EQUIPMENT TESTING
      • STANDARDS
      • POLICY ON OUTSOURCING
      • POLICY ON USE OF EXTERNAL EXPERTS
      • COUNSELING
      • EQUIPMENT AND SOFTWARE
      • INFORMATION RESOURCES
      • HEALTH AND SAFETY
      • DATA RETENTION POLICY
      • REPORTING OF FINDINGS
      • COMMUNICATIONS
      • SUMMARY
    • Chapter 11: High-Technology Crimes: Case Summaries
      • Publisher Summary
      • INTRODUCTION
      • THE DRINKORDIE GROUP
      • OLDIE BUT GOODIE HACKER CASE
      • MILITARY HACKER FREED ON BAIL
      • WORM STRIKES DOWN WINDOWS 2000 SYSTEMS
      • FBI AGENTS BUST “BOTMASTER”: LOS ANGELES, CALIFORNIA (REUTERS)
      • RESEARCHERS SNOOP ON KEYBOARD SOUNDS
      • SPAMMERS FACE JAIL IN NIGERIA
      • STOLEN UC-BERKELEY LAPTOP RECOVERED
      • THREE JAILED IN GLOBAL EBAY SCAM
      • BLOGGERS LEARN THE PRICE OF TELLING TOO MUCH
      • TWENTY ARRESTED IN CRACKDOWN ON INTERNET PHARMACIES
      • ALLEGED HACKER IS MICROSOFT EMPLOYEE
      • ANTIIDENTITY THEFT FREEZE GAINING MOMENTUM
      • E-MAIL RECEIVED BY ONE OF THE AUTHORS
      • BARRED NO MORE
      • PERSON USING AN ALIAS AND REPRESENTING A FICTITIOUS ISP INSTALLED SIX TOLL-FREE 800 NUMBERS FOR A TELEMARKETING COMPANY
      • A NETWORK SECURITY OPERATIONS CENTER RECEIVED A CATASTROPHIC OUTAGE NOTIFICATION FROM THEIR NETWORK MANAGEMENT CENTER INDICATING A FIBER OUTAGE HAD OCCURRED
      • TELECOMMUNICATIONS CABLES VULNERABLE TO TERRORISTS’ ATTACKS
      • SO YOUR EMPLOYER “LOST” YOUR INFORMATION
      • CALIFORNIA TO BAN HUNTING OVER INTERNET
      • E-MAIL RECEIVED BY ONE OF THE AUTHORS
      • NINE OF ISRAEL’S TOP BUSINESS EXECUTIVES AND 11 HEADS OF 3 LEADING INQUIRY COMPANIES—INCLUDING MODIIN EZRAHI— ARE IN CUSTODY SUSPECTED OF COMPLICITY IN A MASSIVE COMPUTERIZED COMMERCIAL ESPIONAGE CONSPIRACY
      • “BLASTER” TEEN SENTENCED TO 1½ YEARS
      • INFO ON 3.9M CITIGROUP CUSTOMERS LOST
      • WORLDPAY STRUGGLES UNDER DDOS ATTACK (AGAIN)
      • DENIAL-OF-SERVICE ATTACK VICTIM SPEAKS OUT
      • NEW VIRUS USES SONY BMG SOFTWARE
      • DUMPSTER DIVING FOR IDS
      • FIVE ARRESTED OVER PHISHING FRAUD
      • GEEKFATHERS: CYBER CRIME MOBS REVEALED
      • HACKER HELPS WANNABE BIZ STUDENTS
      • HACKERS BATTER CRITICAL UK INFRASTRUCTURE
      • HACKER INFILTRATED GOVERNMENT COMPUTERS, US MILITARY INSTALLATIONS, LABORATORIES, AND NASA
      • HACKERS TAKE A CRACK AT CISCO FLAW
      • HOME PCS HARNESSED TO SOLVE GLOBAL PROBLEMS
      • INTERNET CRASHES IN PAKISTAN
      • IPOD BLAMED FOR SPIKE IN SUBWAY CRIME
      • “MEDICA IGNORED WARNINGS,” SAYS EX-EMPLOYEE
      • WEB SITE OWNER DEFIES JUDGE’S ORDERS
      • PHISHERS ADOPT SCAM TRICKS FROM VIRUS WRITERS
      • LEXISNEXIS: HACKERS ACCESSED 32,000 IDS
      • TELEPHONE SCAM
      • E-MAIL RECEIVED BY ONE OF THE AUTHORS
      • E-MAIL MESSAGE RECEIVED BY ONE OF THE AUTHORS: ANOTHER VARIATION ON THE THEME
      • TIME WARNER ALERTS STAFF TO LOST DATA FILES FOR 600,000 WORKERS
      • FEDERAL AGENTS HAVE CARRIED OUT SEARCHES IN AT LEAST TWO STATES AS PART OF THE INVESTIGATION INTO THE THEFT OF SOCIAL SECURITY NUMBERS AND OTHER PERSONAL INFORMATION FROM DATABASE GIANT LEXISNEXIS INC.
      • HACKERS TARGET ITUNES, ANTIVIRUS WARE
      • JUDGE DISMISSES SPAM CONVICTION
      • MASTERCARD SECURITY ALERT—MORE THAN 40 MILLION CREDIT CARDS MAY HAVE BEEN BREACHED; WARNING TO MEMBER BANKS ISSUED
      • SASSER AUTHOR GETS SUSPENDED TERM
      • A FEDERAL JUDGE HAS AWARDED AN INTERNET SERVICE PROVIDER MORE THAN $1 BILLION IN WHAT IS BELIEVED TO BE THE LARGEST JUDGMENT EVER AGAINST SPAMMERS
      • TEEN SENTENCED FOR “BLASTER” WORM VARIANT
      • SUMMARY
  • Part III: Introduction to Overview of the High-Technology Crime Investigation Profession and Unit
    • Introduction
    • Chapter 12: The Global Enterprise Corporation
      • Publisher Summary
      • INTRODUCTION
      • GEC BACKGROUND INFORMATION
      • KEY ELEMENTS FOR THE HIGH-TECHNOLOGY CRIME INVESTIGATOR TO CONSIDER
      • GETTING TO KNOW GEC
      • GEC’S STRATEGIC BUSINESS PLAN
      • GEC’S TACTICAL BUSINESS PLAN
      • GEC’S ANNUAL BUSINESS PLAN
      • HIGH-TECHNOLOGY CRIME PREVENTION PROGRAM PLANNING
      • SUMMARY
    • Chapter 13: Understanding the Role of the High-Technology Crime Investigator and a Crime Prevention Unit in the Business and Management Environment
      • Publisher Summary
      • INTRODUCTION
      • WHAT IS EXPECTED OF YOU?
      • GEC HIGH-TECHNOLOGY CRIME INVESTIGATOR RESPONSIBILITIES
      • GOALS AND OBJECTIVES
      • LEADERSHIP POSITION
      • PROVIDING HIGH-TECHNOLOGY CRIME PREVENTION SERVICE AND SUPPORT
      • USE TEAM CONCEPTS
      • VISION, MISSION, AND QUALITY STATEMENTS
      • HIGH-TECHNOLOGY CRIME PREVENTION PRINCIPLES
      • PROJECT AND RISK MANAGEMENT PROCESSES
      • HIGH-TECHNOLOGY CRIME PREVENTION ORGANIZATIONAL RESPONSIBILITIES
      • GEC HIGH-TECHNOLOGY CRIME INVESTIGATOR FORMAL DUTIES AND RESPONSIBILITIES
      • SUMMARY
    • Chapter 14: The High-Technology Crime Investigation Unit’s Strategic, Tactical, and Annual Plans
      • Publisher Summary
      • INTRODUCTION
      • GEC’S HIGH-TECHNOLOGY CRIME PREVENTION TACTICAL PLAN
      • GEC’S HIGH-TECHNOLOGY CRIME PREVENTION ANNUAL PLAN
      • SUMMARY
    • Chapter 15: High-Technology Crime Investigation Program and Organization
      • Publisher Summary
      • INTRODUCTION
      • HIGH-TECHNOTLOGY CRIME INVESTIGATION UNIT DRIVERS
      • HIGH-TECHNOLOGY CRIME INVESTIGATOR MANAGER THOUGHT PROCESS IN ESTABLISHING THE HTCPP AND INVESTIGATION ORGANIZATION
      • SECURITY FUNCTIONAL PROCESS SUMMARY
      • HIGH-TECHNOLOGY CRIME INVESTIGATIVE ORGANIZATION
      • DETERMINING THE NEED FOR HIGH-TECHNOLOGY CRIME INVESTIGATION SUBORDINATE ORGANIZATIONS
      • HIGH-TECHNOLOGY CRIME INVESTIGATION JOB DESCRIPTIONS FOR THE UNIT
      • RECRUITING HIGH-TECHNOLOGY CRIME PREVENTION PROFESSIONALS
      • IDENTIFYING IN-HOUSE HIGH-TECHNOLOGY CRIME INVESTIGATOR CANDIDATES
      • IDENTIFYING OUTSIDE HIGH-TECHNOLOGY CRIME INVESTIGATOR CANDIDATES
      • SUMMARY
    • Chapter 16: High-Technology Crime Investigative Functions
      • Publisher Summary
      • INTRODUCION
      • DETERMINING MAJOR HIGH-TECHNOLOGY CRIME INVESTIGATIVE FUNCTIONS
      • HIGH-TECHNOLOGY CRIME INVESTIGATION POLICY
      • GEC’S HIGH-TECHNOLOGY CRIME INVESTIGATION REQUIREMENTS AND POLICY DIRECTIVE (IRPD)
      • HIGH-TECHNOLOGY CRIME INVESTIGATION PROCEDURES
      • AWARENESS PROGRAM
      • PROACTIVE HIGH-TECHNOLOGY CRIME PREVENTION SURVEYS AND RISK MANAGEMENT
      • WHAT IS RISK MANAGEMENT?
      • RECOMMENDATIONS TO MANAGEMENT
      • RISK MANAGEMENT REPORTS
      • HIGH-TECHNOLOGY CRIME PREVENTION SURVEYS
      • SUMMARY
      • EXCERPTS FROM A SAMPLE SURVEY ACTIVITY LOG
    • Chapter 17: Sources, Networking, and Liaison
      • Publisher Summary
      • INTRODUCTION
      • COLLECTING INFORMATION
      • SOURCES
      • “CARDING” SOURCES
      • CLASSIFYING THE RELIABILITY OF SOURCES AND THE ACCURACY OF THEIR INFORMATION
      • NETWORKING
      • LIAISON
      • SUMMARY
    • Chapter 18: High-Technology Crime Investigation Unit Metrics Management System
      • Publisher Summary
      • INTRODUCTION
      • INVESTIGATIONS
      • INVESTIGATION CASE STUDY
      • SUMMARY
    • Chapter 19: Outsource or Proprietary?
      • Publisher Summary
      • INTRODUCTION
      • OUTSOURCING: A DEFINITION
      • THE ADVANTAGES AND DISADVANTAGES OF A PROPRIETARY HIGH-TECHNOLOGY CRIME INVESTIGATIVE UNIT
      • THE ADVANTAGES AND DISADVANTAGES OF AN OUTSOURCED HIGH-TECHNOLOGY CRIME INVESTIGATIVE UNIT
      • CANDIDATE SECURITY FUNCTIONS FOR OUTSOURCING: HIGH-TECHNOLOGY CRIME INVESTIGATION
      • SAMPLE OUTSOURCING ANALYSIS
      • PROBABILITY OF FAILURE
      • CONSEQUENCE OF FAILURE
      • FINAL OUTSOURCING DECISION
      • SUMMARY
  • Part IV: Introduction to High-Technology Crime Investigation Challenges of the 21st Century
    • Introduction
    • Chapter 20: The Future of High Technology and Its Impact on Working in a Global Information Environment
      • Publisher Summary
      • INTRODUCTION
      • MICROPROCESSORS
      • PESSIMISM VERSUS OPTIMISM
      • ELECTRICALLY CHARGED AMOEBAE?
      • HIGH-TECHNOLOGY DEVICE INTEGRATIONS AND TRENDS TOWARD THE FUTURE
      • POWER TO THE PEOPLE?
      • SUMMARY
    • Chapter 21: The Future of High-Technology Crimes, Security, and the Criminal Justice System
      • Publisher Summary
      • INTRODUCTION
      • HIGH-TECHNOLOGY SECURITY
      • INFORMATION SYSTEM SECURITY
      • CRIMINAL JUSTICE SYSTEMS
      • SUMMARY
    • Chapter 22: Terrorism—Crime or War? Its Impact on the High-Technology Crime Investigator and the Profession
      • Publisher Summary
      • INTRODUCTION
      • THE CURRENT ENVIRONMENT
      • CURRENT TERRORIST USE
      • INTELLIGENCE GATHERING
      • DIRECT ATTACKS
      • SUMMARY
    • Chapter 23: The Future of the High-Technology Crime Investigator Profession
      • Publisher Summary
      • INTRODUCTION
      • LACK OF TRAINING, MANAGEMENT SUPPORT, AND SOMETIMES EVEN INTEREST
      • HIGH-TECHNOLOGY CRIME INVESTIGATION UNITS AND LAW ENFORCEMENT
      • TRAINING
      • HIGH-TECHNOLOGY CRIME INVESTIGATIONS
      • THE BEST TOOLS TO ASSIST IN CONDUCTING HIGH-TECHNOLOGY CRIME INVESTIGATIONS
      • THE BEST TOOLS TO ASSIST IN COMMITTING HIGH-TECHNOLOGY CRIMES
      • HIGH-TECHNOLOGY CRIMES INCREASING OR DECREASING?
      • CONFIGURATIONS AND SECURITY OF LAW ENFORCEMENT SYSTEMS
      • SYSTEMS SECURE?
      • CONCLUSIONS
      • SUMMARY
    • Chapter 24: Developing a Career as a High-Technology Crime Investigator
      • Publisher Summary
      • INTRODUCTION
      • QUALIFICATIONS
      • CERTIFICATION
      • EXPERIENCE
      • KNOWLEDGE
      • RANGE OF CASES
      • TECHNOLOGIES
      • ASSOCIATIONS
      • SUMMARY
    • Chapter 25: Marketing Yourself as a Successful High-Technology Crime Investigator
      • Publisher Summary
      • INTRODUCTION
      • MARKETING SUPPORT: TRAINING, EXPERIENCE, CERTIFICATIONS, ASSOCIATIONS, AND CONTACTS
      • APPLYING FOR THE POSITION OF HIGH-TECHNOLOGY CRIME INVESTIGATOR, SUPERVISOR, OR MANAGER
      • YOUR RESUME MADE IT PAST THE INITIAL SCREENING-NEXT STEP: THE INTERVIEW
      • THE PORTFOLIO
      • SUMMARY
    • Chapter 26: So, Are You Ready to Become a High-Technology Crime Investigative Consultant?
      • Publisher Summary
      • INTRODUCTION
      • HAVE A PLAN
      • GETTING STARTED
      • QUESTIONS TO CONSIDER
      • SUMMARY
    • Chapter 27: Conclusions and Final Thoughts
      • Publisher Summary
      • INTRODUCTION
      • WHAT IS THE PROFILE OF A SUCCESSFUL HIGH-TECHNOLOGY CRIME INVESTIGATOR?
      • “LOVE IT OR LEAVE IT!”
      • HOPES FOR THE FUTURE
  • Index

Details

No. of pages:
470
Language:
English
Copyright:
© Butterworth-Heinemann 2006
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780080468204
Paperback ISBN:
9780750679299

About the Author

Gerald Kovacich

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.

Affiliations and Expertise

Security consultant, lecturer, and author, Oak Harbor, WA, USA

William C. Boni

Affiliations and Expertise

Director, Information Security for Motorola Corporation. He has worked as the Director of Information Protection Practices for Amgen; as a U.S. Army counterintelligence officer; federal agent and investigator; and a security consultant for such firms as PricewaterhouseCoopers and Ernst & Young

Reviews

"[The High-Technology-Crime Investigator’s Handbook, Second Edition] not only provides a basic introduction into the world of high-tech crime but, more importantly for the readers, it is the only book I have found whose primary purpose is not about investigating high-tech crimes, but how to establish and manage a high-tech crimes investigative unit." - Howard A. Schmidt, President & CEO, R & H Security Consulting LLC, Former White House Cyber Security Advisor