Synopses & Reviews
Information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace.
High-Technology-Crime Investigator's Handbook informs professionals of the potential risks of high-tech crimes as well as educates on the resources that are available to combat them. Each chapter is updated with the latest information and guidance, including added coverage of increasing global changes and threats, managing an international/global INFOSEC program, and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in information security, including understanding todayâs new threats, high-tech fraud and crime investigative support for law enforcement authorities, the Information System Security Officer (ISSO) and ethical conduct, and chapters on information security consulting.
This book helps the reader to set up a team and a system that will catch perpetrators and validate the evidence to be used in prosecution in civil, criminal, or legal proceedings. The book also covers computer forensic programs and how to organize an investigations department from the planning, business management, and program implementation perspective. Furthermore, unlike other, more technical books that go into code and specific operating systems, this book is a procedural manual written in an easily readable format that is geared towards todayâs busy computer security and investigative management professionals.
- Includes many real-world cases from a legal and investigative aspect to reinforce the need for a reliable procedure for criminal prosecution in the courts
- 9 new chapters presenting the latest information and resources to counter information security threats
- Photographs illustrate âcrime scenesâ and hackers systems and hardware used to perpetrate acts of computer crime
Review
"[
The High-Technology-Crime Investigator’s Handbook, Second Edition] not only provides a basic introduction into the world of high-tech crime but, more importantly for the readers, it is the only book I have found whose primary purpose is not about investigating high-tech crimes, but how to establish and manage a high-tech crimes investigative unit."
- Howard A. Schmidt, President & CEO, R & H Security Consulting LLC, Former White House Cyber Security Advisor
Review
Shows how to set up a team and a system that will obtain the necessary evidence to prosecute criminals
Synopsis
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace.
High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers
Synopsis
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace.
High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers
About the Author
Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism.Andy Jones is an experienced Military Intelligence Analyst and Information Technology Security specialist. He has had considerable experience in the analysis of Intelligence material in Strategic, Tactical and Counter-Insurgency operations and a wide range of Information systems management experience. In addition, he has considerable experience in the security of Information Technology systems, having been responsible for the implementation of Information Technology security within all areas of the British Army and in some joint service organizations. He has directed both Intelligence and Security operations and briefed the results at the highest level. He was awarded the MBE for his work during his service in Northern Ireland and has gained an Open University Bachelor of Science degree in mathematics and technology and a Masters degree in Information Security and Computer Crime from the University of Glamorgan. After completing 25 years service with the British Army’s Intelligence Corps, he moved into the area of defense research and was employed as the manager of a group of 80 research scientists and as a researcher and analyst in the area of Information Security. He has also had experience as a project manager within defense research for the security aspects of a number of large projects and has gained considerable expertise on the criminal and terrorist aspects of Information Security. He has undertaken a range of research into a number of aspects of Information warfare and the threats to information systems. 1n 2002 he co-authored a book on information warfare and is currently researching to write a book on the risks to information systems. In addition to his main work as a senior lecturer on Information Security and Computer Crime at the University of Glamorgan, he is currently also an associate lecturer for the Open University on Internet communications. His primary area of research for the last two years has been into methods for the measurement of t
A Research Group Leader at the Security Research Centre for British Telecommunications where he is conducting research into the security of information and communication systems.
Table of Contents
SECTION I – Introduction to the High Technology Crimes Environment
• Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats
• Chapter 2. The High Technology Crimes’ Miscreants, Profiles, Motives and Philosophies.
• Chapter 3. The Basic Techniques Used by High Technology Crimes’ Miscreants
• Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes’ Miscreants
SECTION II – High-Technology Incidents and Crime Investigations
• Chapter 5. Investigating High Technology Crimes
• Chapter 6. Responding to High-Technology Incidents and Crimes
• Chapter 7. The Collection of Evidence
• Chapter 8. Interviews and Interrogations
• Chapter 9. An Introduction to Computer Forensics
• Chapter 10. Establishing and Managing a Computer Forensics Laboratory
• Chapter 11. High Technology Crimes: Case Summaries
SECTION III – Overview of the High Technology Crimes Investigations Profession and Unit
• Chapter 12. The Global Enterprise Corporation (GEC) Model
• Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment
• Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans
• Chapter 15. High Technology Anti-Crimes Investigations Program and Organization
• Chapter 16. High Technology Crimes Investigations Functions
• Chapter 17. Sources, Networking and Liaison
• Chapter 18. High Technology Crime Investigations Unit Metrics Management System
• Chapter 19. Outsourcing High-Technology Investigations – Pros and Cons
SECTION IV - High Technology Crime Investigation Challenges of the 21st Century
• Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment
• Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems
• Chapter 22. Terrorism – Crime or War? Its Impact on the High Technology Incidents and Crimes’ Investigations
• Chapter 23. The Future of the High Technology Crimes Investigator Profession
• Chapter 24. Developing a Career as a High Technology Crimes Investigator
• Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator
• Chapter 26. Becoming a High Technology Consultant
• Chapter 27. Conclusions and Final Thoughts