Internet Searches for Vetting, Investigations, and Open-Source Intelligence

Book description

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities.

Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Introduction (1/2)
  6. Introduction (2/2)
  7. Chapter 1 - The Internet’s Potential for Investigators and Intelligence Officers (1/4)
  8. Chapter 1 - The Internet’s Potential for Investigators and Intelligence Officers (2/4)
  9. Chapter 1 - The Internet’s Potential for Investigators and Intelligence Officers (3/4)
  10. Chapter 1 - The Internet’s Potential for Investigators and Intelligence Officers (4/4)
  11. Chapter 2 - Social and Technological Change (1/3)
  12. Chapter 2 - Social and Technological Change (2/3)
  13. Chapter 2 - Social and Technological Change (3/3)
  14. Chapter 3 - Use and Abuse—Crime on the Internet (1/2)
  15. Chapter 3 - Use and Abuse—Crime on the Internet (2/2)
  16. Chapter 4 - Implications for the Enterprise (1/3)
  17. Chapter 4 - Implications for the Enterprise (2/3)
  18. Chapter 4 - Implications for the Enterprise (3/3)
  19. Chapter 5 - Liability, Privacy, and Management Issues (1/2)
  20. Chapter 5 - Liability, Privacy, and Management Issues (2/2)
  21. Chapter 6 - Laws (1/3)
  22. Chapter 6 - Laws (2/3)
  23. Chapter 6 - Laws (3/3)
  24. Chapter 7 - Litigation (1/4)
  25. Chapter 7 - Litigation (2/4)
  26. Chapter 7 - Litigation (3/4)
  27. Chapter 7 - Litigation (4/4)
  28. Chapter 8 - International and Domestic Principles (1/3)
  29. Chapter 8 - International and Domestic Principles (2/3)
  30. Chapter 8 - International and Domestic Principles (3/3)
  31. Chapter 9 - Professional Standards and the Internet (1/3)
  32. Chapter 9 - Professional Standards and the Internet (2/3)
  33. Chapter 9 - Professional Standards and the Internet (3/3)
  34. Chapter 10 - The Insider Threat (1/2)
  35. Chapter 10 - The Insider Threat (2/2)
  36. Chapter 11 - Internet Vetting and Open-Source Intelligence Policy (1/2)
  37. Chapter 11 - Internet Vetting and Open-Source Intelligence Policy (2/2)
  38. Chapter 12 - Tools, Techniques, and Training (1/3)
  39. Chapter 12 - Tools, Techniques, and Training (2/3)
  40. Chapter 12 - Tools, Techniques, and Training (3/3)
  41. Chapter 13 - Proper Procedures for Internet Searching (1/2)
  42. Chapter 13 - Proper Procedures for Internet Searching (2/2)
  43. Chapter 14 - Preparation and Planning (1/2)
  44. Chapter 14 - Preparation and Planning (2/2)
  45. Chapter 15 - Search Techniques (1/5)
  46. Chapter 15 - Search Techniques (2/5)
  47. Chapter 15 - Search Techniques (3/5)
  48. Chapter 15 - Search Techniques (4/5)
  49. Chapter 15 - Search Techniques (5/5)
  50. Chapter 16 - Finding Sources (1/4)
  51. Chapter 16 - Finding Sources (2/4)
  52. Chapter 16 - Finding Sources (3/4)
  53. Chapter 16 - Finding Sources (4/4)
  54. Chapter 17 - Automation of Searching (1/3)
  55. Chapter 17 - Automation of Searching (2/3)
  56. Chapter 17 - Automation of Searching (3/3)
  57. Chapter 18 - Internet Intelligence Reporting (1/3)
  58. Chapter 18 - Internet Intelligence Reporting (2/3)
  59. Chapter 18 - Internet Intelligence Reporting (3/3)
  60. Chapter 19 - Illicit Web Sites and Illegal Behavior Online (1/3)
  61. Chapter 19 - Illicit Web Sites and Illegal Behavior Online (2/3)
  62. Chapter 19 - Illicit Web Sites and Illegal Behavior Online (3/3)
  63. Chapter 20 - Model Internet Investigative Standards (1/2)
  64. Chapter 20 - Model Internet Investigative Standards (2/2)
  65. Chapter 21 - A Model Internet Investigation Policy (1/2)
  66. Chapter 21 - A Model Internet Investigation Policy (2/2)
  67. Chapter 22 - A Model Internet Posting Policy
  68. Chapter 23 - Internet Intelligence Issues (1/2)
  69. Chapter 23 - Internet Intelligence Issues (2/2)
  70. Bibliography
  71. Back Cover

Product information

  • Title: Internet Searches for Vetting, Investigations, and Open-Source Intelligence
  • Author(s): Edward J. Appel
  • Release date: January 2011
  • Publisher(s): CRC Press
  • ISBN: 9781439827529