Internet Searches for Vetting, Investigations, and Open-Source Intelligence Review
Posted by
Pearlene McKinley
on 6/30/2012
/
Labels:
data mining,
e-reader,
ebook,
information retrieval,
intelligence,
intelligence analysis,
kindle,
kindle devices,
python,
twitter
Average Reviews:
(More customer reviews)I have been a private investigator for more than 25 years. When I started in this business computers were scarce and the Internet had not yet been commercialized. Everything was done with a pencil and telephone. I have a lot of experience so it is hard for me to find books that are useful. I buy books hoping to learn one or two new things. Edward J. Appel, a retired FBI agent is the author. His company has done work for me so I knew the quality of his work and assumed his book would be at the same level as his investigative efforts. I wasn't disappointed.
The book is 320 pages and broken into 4 sections. Appel begins with a chapter about behavior and technology which orients the investigator/analyst on the growth and use of the Internet. He discusses the usefulness of the Internet as an investigative tool and the transformations the Internet is making through social and technological advances. Along with the benefits for investigators comes the darker side of the web, and Appel examines its criminal exploitation.
The first section provides a great introduction and is geared toward corporate investigators and security personnel tasked with monitoring IT systems, vetting employees and guarding company intellectual property. In Section 2 Appel outlines legal and policy issues related to using information from the Internet in investigations. He identifies liability and privacy issues and laws addressing these concerns such as the Fair Credit Reporting Act. He also dedicates a chapter to litigation, defamation, and invasion of privacy torts.
Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites and search terms.
I found the chapters Automation of Searching and Internet Intelligence Reporting to be the most enlightening. Reducing time spent searching and analyzing information, seems like a no-brainer. But I would bet the number of investigators who have looked for automated solutions to their collection efforts is small. The Internet Intelligence Reporting section recommends the format and organization of a report as well as what to include and how to cite sources.
Internet Searches for Vetting, Investigations, and Open-Source Intelligence, like many trade publications, is on the pricey side. However it delivers with content and is an easy read. It met my criteria for a successful investigations book because I learned much more than two new things.
Click Here to see more reviews about: Internet Searches for Vetting, Investigations, and Open-Source Intelligence
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals' privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles-and emphasizing the careful and appropriate use of Internet searching within the law-the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.
0 comments:
Post a Comment