In the years since the first edition, industrial and corporate espionage have not diminished. There has been, however, an increase in awareness about the issues. There are more graduate-level programs in business and in security that are offering courses and training on intelligence gathering in the commercial sector. Training in the protection of confidential documents and materials that forms a part of security certification programs has been updated. With the large amount of outsourcing in the technological sector overseas, information transfer and leakage continues to be a serious problem, and as long as corporations see outsourcing as a way to save money in the short term, dangers will persist. The security community will need to continue to pursue this issue politically and socially. Accordingly, the text focuses on these issues and gives the reader a real sense of how industrial spies are persistent and clever in circumventing defenses. It examines both the defensive and offensive tactics necessary to fight industrial espionage. Living with paradox should be the theme for the security professional, and the book draws wisdom from political philosophers like Machiavelli to aid in that perspective. A clear plan of action in dealing with industrial espionage in a fluid, mobile, information-rich business environment is offered. Two additional chapters cover the tradecraft of the industrial spy and the uses of data mining in gathering business intelligence. An outline is offered for planning an intelligence campaign against a target, and a sample strategic intelligence report about a business is included. In addition, there is also a glossary of terms related to industrial espionage. These additional tools should increase a security professional's awareness of the corporate spy's mindset, which is a major portion of the battle. This book will serve as a valuable resource to security professionals in law enforcement and the business sector.
The investigative experience offers many challenges in reconstructing past events and in discovering the persons, entities, and organizations involved in a crime or a civil wrong. The discussion begins with explaining the nature of cold cases and the major problems associated with these investigations. A cold case investigation progresses from the internal (the caseOCOs center), proximal (contact evidence), distal (immediate vicinity) to the limbic (the world at large) realms of information. The text stresses the importance of gathering basic identifiers about the victim, suspect, product, or object that constitutes the OC centerOCO of the case. Fifteen keys exist that act as collection points for evidence, and these keys are discussed, including the role they play in the evolution of an investigation. The following topics are featured: identifying the differences between physical evidence, traceable evidence, and information resources; the differences between the goals in criminal cases and in civil investigations; working with the medical examiner; the importance of visiting the locus or crime scene even after a considerable period of time has elapsed; the basics of computer forensics and tips on cyberprofiling; technical assistance and how to locate expert help; tools for uncovering witnesses; locating OC hiddenOCO information archives relevant to a particular case; financial evidence; managing a case; and response when using a combination of traditional and forensic techniques, which constitutes a modern synthesis of investigative methods. Despite analytical methods, it is necessary to understand when to stop an investigation. The text covers this issue and makes recommendations regarding the writing of reports on a case. The Appendix contains a Master Checklist that provides a wealth of information and expertise. This book will be a valuable resource for police investigators, private investigators, and governmental/regulatory investigators.
This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging OC shadowOCO financial domain. This includes the new world of OC smartphones, OCO prepaid cards, carding operations, and electric money laundering. The text explores the connections between stolen credit card information, the gambling sector, money laundering, and the role a subject may play in a larger criminal enterprise. A new chapter also discusses organized crimeOCOs impact on the Internet and financial transactions in cyberspace. The book also addresses the impact of portable digital devices on civil and criminal investigations and the new challenges for investigators working through this electronic labyrinth. Each chapter begins with a brief introduction and objectives and ends with a helpful summary. Significant Internet and electronic sources appear in the tables at the end of chapters, as do useful forms provided for gathering, organizing, and analyzing data. New also to this edition is a glossary that defines terms introduced in the text and an appendix that provides a checklist for traditional and nontraditional asset investigations. Financial investigation is a fascinating subject that continually yields new information, and this fourth edition seeks to provide an understanding of the digital forensics and mobile digital technologies for the asset investigator's toolbox of the twenty-first century.
With the blinding speed at which the gSmartphone Ageh came upon the investigative profession, asset investigation remains putting together a puzzle from the multiple pieces: public records, online evidence, news accounts, print documents, and human sources. Emphasizing the importance of public records and the resources of the Internet, this fifth edition concentrates on research techniques. These methods make considerable use of websites, libraries, periodicals, and government documents with a constant theme of correlating data from different open sources. This new edition remains the predominant primer on how to find assets to satisfy judgments and debts, but it now also includes significant focus on the emerging underground economy and the gshadowh financial domain. The text explores the connections between stolen credit card information, the gambling sector, money laundering, and the role a subject may play in a larger criminal enterprise. The book also addresses organized crimefs impact on the Internet and financial transactions in cyberspace, as well as the impact of portable digital devices on civil and criminal investigations and the new challenges for investigators working through the electric labyrinth, including the Deep Web and the Dark Web. This edition also includes a very helpful glossary that defines terms introduced throughout the text and an appendix that provides a checklist for traditional and nontraditional asset investigations. This fifth edition seeks to provide an essential understanding of the digital forensics and mobile digital technologies as it steers private investigators, collections specialists, judgment professionals, and asset recovery specialists in undertaking legal information collection in a most challenging age.
In the years since the first edition, industrial and corporate espionage have not diminished. There has been, however, an increase in awareness about the issues. There are more graduate-level programs in business and in security that are offering courses and training on intelligence gathering in the commercial sector. Training in the protection of confidential documents and materials that forms a part of security certification programs has been updated. With the large amount of outsourcing in the technological sector overseas, information transfer and leakage continues to be a serious problem, and as long as corporations see outsourcing as a way to save money in the short term, dangers will persist. The security community will need to continue to pursue this issue politically and socially. Accordingly, the text focuses on these issues and gives the reader a real sense of how industrial spies are persistent and clever in circumventing defenses. It examines both the defensive and offensive tactics necessary to fight industrial espionage. Living with paradox should be the theme for the security professional, and the book draws wisdom from political philosophers like Machiavelli to aid in that perspective. A clear plan of action in dealing with industrial espionage in a fluid, mobile, information-rich business environment is offered. Two additional chapters cover the tradecraft of the industrial spy and the uses of data mining in gathering business intelligence. An outline is offered for planning an intelligence campaign against a target, and a sample strategic intelligence report about a business is included. In addition, there is also a glossary of terms related to industrial espionage. These additional tools should increase a security professional's awareness of the corporate spy's mindset, which is a major portion of the battle. This book will serve as a valuable resource to security professionals in law enforcement and the business sector.
This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging OC shadowOCO financial domain. This includes the new world of OC smartphones, OCO prepaid cards, carding operations, and electric money laundering. The text explores the connections between stolen credit card information, the gambling sector, money laundering, and the role a subject may play in a larger criminal enterprise. A new chapter also discusses organized crimeOCOs impact on the Internet and financial transactions in cyberspace. The book also addresses the impact of portable digital devices on civil and criminal investigations and the new challenges for investigators working through this electronic labyrinth. Each chapter begins with a brief introduction and objectives and ends with a helpful summary. Significant Internet and electronic sources appear in the tables at the end of chapters, as do useful forms provided for gathering, organizing, and analyzing data. New also to this edition is a glossary that defines terms introduced in the text and an appendix that provides a checklist for traditional and nontraditional asset investigations. Financial investigation is a fascinating subject that continually yields new information, and this fourth edition seeks to provide an understanding of the digital forensics and mobile digital technologies for the asset investigator's toolbox of the twenty-first century.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.