Internet Searches for Vetting, Investigations, and Open-Source Intelligence: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition, 1st Edition (Paperback) book cover

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition, 1st Edition

By Edward J. Appel

CRC Press

320 pages | 5 B/W Illus.

Purchasing Options:$ = USD
Paperback: 9781138112230
pub: 2017-05-31
$82.95
x
eBook (VitalSource) : 9780429246296
pub: 2017-05-31
from $39.98


FREE Standard Shipping!

Description

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities.

Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

Reviews

I was excited to hear CRC Press was releasing Internet Searches for Vetting, Investigations, and Open-Source Intelligence, by Edward J. Appel, a retired FBI agent. His company has done work for me so I knew the quality of his work and assumed his book would be at the same level as his investigative efforts. I wasn't disappointed. … Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites and search terms. I found the chapters Automation of Searching and Internet Intelligence Reporting to be the most enlightening. … delivers with content and is an easy read. It met my criteria for a successful investigations book … .

—Larry Zilliox, in the PISA Newsletter, April 2011

"The author gives a sober assessment of the challenges faced by any person engaged in Internet investigations and intelligence gathering but does not present an overly bleak picture. I highly recommend this work for private security professionals."

—Rich Petraits in Security Management, December 2011

Table of Contents

Behavior and Technology

The Internet’s Potential for Investigators and Intelligence Officers

People, Places, Organizations, and Topics

A Practitioner’s Perspective

The Search

Internet Posts and the People They Profile

Finding the Needles

The Need for Speed

What We Can’t Do Without

Notes

Social and Technological Change

Internet Use Growth

Evolution of Internet Uses

Physical World, Virtual Activities

Connection and Disconnection

Notes

Use and Abuse—Crime on the Internet

By the Numbers?

Online Venues

Digital Delinquency

“Free” Intellectual Property

Insider

Notes

Implications for the Enterprise

The New User: Someone You Would Trust?

Employer Liability

Vetting, Monitoring, and Accountability

The Evolving Personnel Security Model

Notes

Legal and Policy Context

Liability, Privacy, and Management Issues

Liability for Service Providers for Employers

Accountability for Employees

Notes

Laws

Constitutional Rights

Federal and State Statutes

Federal Rules of Evidence and Computer Records

International Treaties and Standards

Notes

Litigation

Internet Search Litigation

Anonymity

Expectation of Privacy

Due Process

Libel/Defamation

Invasion of Privacy Torts

Sanctions for Public Postings

Internet Privacy for the Twenty-First Century

Notes

International and Domestic Principles

U.S. and International Privacy Principles

Guidelines

Notice and Consent

Government Standards

Parallel Guidance: Internet Research Ethics

Notes

Professional Standards and the Internet

ASIS Standards

National Association of Professional Background Screeners (NAPBS)

Association of Internet Researchers (AoIR)

Librarians

Inside and Outside the Workplace

Reputational Risk, Public Affairs

Bottom Line

Notes

The Insider Threat

Benevolent Big Brother

Notes

Framework for Internet Searching

Internet Vetting and Open-Source Intelligence Policy

Legal and Ethical Limitations

Policy

Information Assets Protection

Notes

Tools, Techniques, and Training

Training Analysts

Open-Source Intelligence Process

Quality Control

Notes

Proper Procedures for Internet Searching

Criteria

Security

Standard Methodology

Notes

Internet Search Methodology

Preparation and Planning

The Library

Scope Notes

Notes

Search Techniques

Internet Content

The Browser

The Search Engine

Metasearch Engines

Finding Search Engines

Search Terms

Social and Commercial Searching

Social Networking Sites

E-Commerce Sites

Directories

Blogs

Chat

Notes

Finding Sources

U.S. Government

State, County, and Local Governments

Other Government-Related Sources

Business-Related Sources

News

Web 2.0

Looking Up Subscribers

Email

Notes

Automation of Searching

Why Automate Searching?

Enterprise Search Middleware

Best-in-Class Desktop Tool

Investigative Search Tool Requirements

A Homegrown Solution

Reducing Analytical Time Using Automation

Caching and Data Mining

The Human Interface in Internet Investigations

Notes

Internet Intelligence Reporting

Records

Content

Analyst’s Comments

Organization and Formatting

Source Citations

Attribution

Verification

Notes

Illicit Web Sites and Illegal Behavior Online

Cybercrime

Child Pornography and Internet Porn

Unauthorized Use of Computer Systems

Contraband Digital Assets

Information (Cyber) Warfare

Notes

Model Internet Investigative Standards

Enterprise Strategy

Model Internet Search Guidelines

Authorized Internet Search Personnel

Definitions to Consider

Notes

A Model Internet Investigation Policy

Key Considerations

Higher-Risk Candidates

Application Procedures and Forms

Legal Issues

Confidentiality

Ethics in Investigations

Disciplinary Action

Model Forms for Candidates

Notes

A Model Internet Posting Policy

Notes

Internet Intelligence Issues

Privacy

Smoking Guns

Completeness of Internet Searching

Adjudication

Conclusion

Notes

Bibliography

Index

About the Author

Edward J. (Ed) Appel, Sr., is owner-principal of iNameCheck, a boutique private investigative, consulting, and training firm. He is a retired FBI special agent and executive, specializing in counterintelligence and terrorism, and served as the director of counterintelligence and security programs at the National Security Council and the White House.

Subject Categories

BISAC Subject Codes/Headings:
BUS030000
BUSINESS & ECONOMICS / Human Resources & Personnel Management
BUS041000
BUSINESS & ECONOMICS / Management
COM053000
COMPUTERS / Security / General
HIS027000
HISTORY / Military / General
LAW041000
LAW / Forensic Science