Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

Author:   Edward J. Appel
Publisher:   Taylor & Francis Inc
Edition:   2nd edition
ISBN:  

9781482238853


Pages:   322
Publication Date:   12 November 2014
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $284.00 Quantity:  
Add to Cart

Share |

Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition


Add your own review!

Overview

Full Product Details

Author:   Edward J. Appel
Publisher:   Taylor & Francis Inc
Imprint:   CRC Press Inc
Edition:   2nd edition
Dimensions:   Width: 15.60cm , Height: 2.50cm , Length: 23.40cm
Weight:   0.612kg
ISBN:  

9781482238853


ISBN 10:   1482238853
Pages:   322
Publication Date:   12 November 2014
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Tertiary & Higher Education
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Behavior and Technology. The Internet’s Potential for Investigators and Intelligence Officers. Behavior Online. Use and Abuse: Crime and Misbehavior Online. Internet Search Studies. Implications for the Enterprise. Legal and Policy Context. Liability, Privacy, and Management Issues. Laws. Litigation. International and Domestic Principles. Professional Standards and the Internet. The Insider Threat. Framework for Internet Searching. Internet Vetting and Open-Source. Intelligence Policy. Tools, Techniques, and Training. Proper Procedures for Internet Searching. Introduction. Internet Search Methodology. Preparation and Planning. Search Techniques. Finding Sources. Automation of Searching. Internet Intelligence Reporting. Illicit Websites and Illegal Behavior Online. Model Cybervetting Investigative Guidelines. A Model Internet Investigation Policy. A Model Internet Posting Policy. Internet Intelligence Issues. Index.

Reviews

[Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence] offers solid resources, original research, and recent case law, so even seasoned investigators will gain useful nuggets of knowledge. Heavy annotation and comprehensive indexing make this book highly searchable, providing not just a good initial read but also a go-to reference. -Drew Neckar, ASIS Healthcare Security Council


"""[Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence] offers solid resources, original research, and recent case law, so even seasoned investigators will gain useful nuggets of knowledge. Heavy annotation and comprehensive indexing make this book highly searchable, providing not just a good initial read but also a go-to reference.""-Drew Neckar, ASIS Healthcare Security Council"


[Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence] offers solid resources, original research, and recent case law, so even seasoned investigators will gain useful nuggets of knowledge. Heavy annotation and comprehensive indexing make this book highly searchable, providing not just a good initial read but also a go-to reference. - Drew Neckar, ASIS Healthcare Security Council


Author Information

Edward J. (Ed) Appel, Sr., is owner-principal of iNameCheck, a boutique private investigative, consulting, and training firm. He is a retired FBI special agent and executive, specializing in counterintelligence and terrorism, and served as the director of counterintelligence and security programs at the National Security Council and the White House. Appel has written numerous government-sponsored classified and unclassified counterintelligence and counterterrorism studies, lectures, and papers. Ed is a graduate of Georgetown University, the Defense Language Institute, and the National Cryptologic School, and taught at the FBI Academy and as visiting lecturer at such institutions as Carnegie-Mellon, MIT Lincoln Labs, Georgetown University, and Johns Hopkins University.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List