High-Technology Crime Investigator's Handbook: Establishing and Managing a High-Technology Crime Prevention Program
()
About this ebook
- Provides an understanding of the global information environment and its threats
- Explains how to establish a high-technology crime investigations unit and prevention program
- Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers
Gerald L. Kovacich
Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.
Read more from Gerald L. Kovacich
The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program Rating: 0 out of 5 stars0 ratingsFighting Fraud: How to Establish and Manage an Anti-Fraud Program Rating: 0 out of 5 stars0 ratingsMergers and Acquisitions Security: Corporate Restructuring and Security Management Rating: 0 out of 5 stars0 ratingsRamblings of an Old Man Rating: 0 out of 5 stars0 ratingsSecurity Metrics Management: Measuring the Effectiveness and Efficiency of a Security Program Rating: 0 out of 5 stars0 ratingsThe Book of Waking Dreams: Stories of the Dream Man Rating: 0 out of 5 stars0 ratingsPoems of Life: Thoughts of Human Experiences Rating: 0 out of 5 stars0 ratingsThe Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program Rating: 0 out of 5 stars0 ratingsEssence of Her: Collected Poems Rating: 0 out of 5 stars0 ratingsThe Corporate Security Professional's Handbook on Terrorism Rating: 0 out of 5 stars0 ratings
Related to High-Technology Crime Investigator's Handbook
Related ebooks
Unified Communications Forensics: Anatomy of Common UC Attacks Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility Rating: 3 out of 5 stars3/5Cyber Crime and Cyber Terrorism Investigator's Handbook Rating: 4 out of 5 stars4/5Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet Rating: 4 out of 5 stars4/5Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Rating: 3 out of 5 stars3/5Deep Web for Journalists: Comms, Counter-Surveillance, Search Rating: 5 out of 5 stars5/5Digital Forensics Basics: A Practical Guide Using Windows OS Rating: 0 out of 5 stars0 ratingsComputer Forensics: A Pocket Guide Rating: 4 out of 5 stars4/5Industry of Anonymity: Inside the Business of Cybercrime Rating: 2 out of 5 stars2/5Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Rating: 0 out of 5 stars0 ratingsMobile Security: A Pocket Guide Rating: 0 out of 5 stars0 ratingsImplementing Digital Forensic Readiness: From Reactive to Proactive Process Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsHow to Defeat Advanced Malware: New Tools for Protection and Forensics Rating: 0 out of 5 stars0 ratingsAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsDigital Forensics: Threatscape and Best Practices Rating: 0 out of 5 stars0 ratingsThe Process of Investigation: Concepts and Strategies for Investigators in the Private Sector Rating: 5 out of 5 stars5/5Becoming a Private Investigator Rating: 2 out of 5 stars2/5Interviews and Interrogations: Butterworth's Library of Investigation Rating: 3 out of 5 stars3/5Python Passive Network Mapping: P2NMAP Rating: 4 out of 5 stars4/5Scene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Home Invasioin Rating: 4 out of 5 stars4/5Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments Rating: 4 out of 5 stars4/5Investigator and Fraud Fighter Guidebook: Operation War Stories Rating: 0 out of 5 stars0 ratingsPlacing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Rating: 0 out of 5 stars0 ratingsInvestigations and the Art of the Interview Rating: 0 out of 5 stars0 ratingsOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingsDigital Forensics Framework A Complete Guide Rating: 0 out of 5 stars0 ratingsInvestigations: 150 Things You Should Know Rating: 5 out of 5 stars5/5
Crime & Violence For You
Gavin de Becker’s The Gift of Fear Survival Signals That Protect Us From Violence | Summary Rating: 4 out of 5 stars4/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5Evidence of Love: A True Story of Passion and Death in the Suburbs Rating: 4 out of 5 stars4/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Dreamland: The True Tale of America's Opiate Epidemic Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5Bloodbath Nation Rating: 3 out of 5 stars3/5Batman and Psychology: A Dark and Stormy Knight (2nd Edition) Rating: 0 out of 5 stars0 ratingsSlenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Man from the Train: The Solving of a Century-Old Serial Killer Mystery Rating: 4 out of 5 stars4/5No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us Rating: 5 out of 5 stars5/5Chasing the Scream: The Inspiration for the Feature Film "The United States vs. Billie Holiday" Rating: 4 out of 5 stars4/5The Devil You Know: Encounters in Forensic Psychiatry Rating: 4 out of 5 stars4/5Death Row, Texas: Inside the Execution Chamber Rating: 4 out of 5 stars4/5They Thought They Were Free: The Germans, 1933–45 Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5Regarding the Pain of Others Rating: 4 out of 5 stars4/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5And The Mountains Echoed Rating: 2 out of 5 stars2/5No Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5Manson: The Life and Times of Charles Manson Rating: 4 out of 5 stars4/5Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence Rating: 3 out of 5 stars3/5Murder at McDonald's: The Killers Next Door Rating: 4 out of 5 stars4/5The New Jim Crow Study Guide and Call to Action Rating: 5 out of 5 stars5/5The Least of Us: True Tales of America and Hope in the Time of Fentanyl and Meth Rating: 4 out of 5 stars4/5The Enigma of Ted Bundy: The Questions and Controversies Surrounding America's Most Infamous Serial Killer Rating: 5 out of 5 stars5/5Worse Than Slavery Rating: 4 out of 5 stars4/5Dying for Daddy: The True Story of a Family's Worst Nightmare Rating: 4 out of 5 stars4/5The Violent Abuse of Women: In 17th and 18th Century Britain Rating: 4 out of 5 stars4/5
Reviews for High-Technology Crime Investigator's Handbook
0 ratings0 reviews
Book preview
High-Technology Crime Investigator's Handbook - Gerald L. Kovacich
Goethe
Part I
Introduction to the High-Technology Crime Environment
Outline
Introduction
Chapter 1: What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats
Chapter 2: High-Technology Crime Miscreants: Profiles, Motives, and Philosophies
Chapter 3: The Basic Techniques Used by High-Technology Crime Miscreants
Chapter 4: The Basic Information Systems Security Techniques Used to Defend Against High-Technology Crime Miscreants
Introduction to the High-Technology Crime Environment
This is the new high-technology crime investigators’ crime scene.
The objective of this section is to provide professional high-technology crime investigators, managers, and supervisors, in either the business or government agency sectors, a basic understanding of the high-technology environment in which we live, work, and play. For high-technology crime investigators to establish and manage a high-technology investigative unit and to conduct high-technology crime investigations successfully, they must have a basic understanding of the topics discussed in Chapters 1 through 4.
In Chapter 1 we provide an overview of high-technology-related threats on a global scale. This is a new chapter, but it incorporates the discussion of basic computer systems (sometimes called information systems) from the first edition, which is an absolute necessity if the high-technology crime investigator is to be successful in establishing and managing a high-technology anticrime unit, to manage and supervise high-technology crime investigators, and to conduct high-technology crime investigations.
Chapter 2 was placed here based on feedback from some of our readers. In it we discuss what knowledge the investigator should have as a basic understanding of these miscreants, their motives, profiles, and philosophies. This chapter provides an overview of these individuals and groups.
Chapter 3 provides the high-technology crime investigator a nontechnical overview of some of the basic methods high-technology miscreants use to conduct their criminal deeds.
Chapter 4 closes this section by providing an overview of the basic high-technology protection philosophies, methods, and processes that are used to protect the valuable assets of the global information environment’s businesses and government agencies.
1
What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats
Publisher Summary
This chapter provides an overview of high-technology-related threats on a global scale. It discusses basic computer systems, sometimes called information systems, which is an absolute necessity if a high-technology crime investigator is to be successful in establishing and managing a high-technology anticrime unit, to manage and supervise successfully high-technology crime investigators, as well as to conduct high-technology crime investigations. Although the discussion of high-technology crimes and establishing and managing a high-technology crime unit is focused primarily on the corporation, it is also generally applicable to government agencies, nonprofit businesses, and the like.
In this chapter we provide an overview of high-technology-related threats on a global scale. This is a new chapter, but it incorporates the first edition’s discussion of basic computer systems, sometimes called information systems, which is an absolute necessity if the high-technology crime investigator is to be successful in establishing and managing a high-technology anticrime unit, to manage and supervise successfully high-technology crime investigators, as well as to conduct high-technology crime investigations. Although our discussion of high-technology crimes and establishing and managing a high-technology crime unit is focused primarily on the corporation, it is also generally applicable to government agencies, nonprofit businesses, and the like.
INTRODUCTION
The world continues to change and does so more rapidly than ever before. These rapid changes are driven by technology—high technology—based on the microprocessor, which is the engine for all high-technology devices. These devices are known as computer systems, networked systems, information systems, knowledge-based systems, and so forth.
For our purposes, let’s just keep it simple and call computers, whether they be networked or standalone and regardless of their use or configuration (e.g., PDA, cell phone, notebook, networked or nonnetworked desktop), all high technology.
Although our discussion of high-technology crimes and establishing and managing a high-technology crime unit focuses primarily on corporations, the text of this book is generally applicable to goverment agencies, nonprofit businesses, and the like.
We will assume that the high-technology crime investigator has at least a basic understanding of computers and how they operate. This is necessary because the crime scenes encountered by the high-technology crime investigator will be high-technology based, as are the victim’s
high-technology devices. (If you need more information about how computers work, a basic intro to computers
textbook will suffice; however the more one knows of high technology, the better. Much of this information was addressed in the first edition of this book and is not repeated here because we believe that, by now, you should be familiar with computers and their basic operation and know the difference between a bit, byte, RAM, ROM, TCP/IP, and so forth.)
THE GLOBALIZATION OF THE MARKETPLACE
Unless you have lived in isolation for the past several years, by now you have heard the term globalization. Some have grown to detest the use of the term as much as they have paradigm shift, which has also often been overused in the corporate world. However, the term globalization does convey a vision of an environment, one that most of us live in today. This single word helps us visualize what has gradually been taking place in the business world throughout the centuries and, more important, during the 5 years since we published the first edition to this book. By globalization of the marketplace, we mean that the world is now one big marketplace in which the businesses of the world buy, sell, and trade everything and anything.
Globalization: the process by which social institutions become adopted on a global scale…, the process by which a business or company becomes international or starts operating at an international level.¹
The Global Competitiveness Report 2004–2005² lists the top 15 most competitive nations:
1. United States
2. Finland
3. Germany
4. Sweden
5. Switzerland
6. United Kingdom
7. Denmark
8. Japan
9. Netherlands
10. Singapore
11. Hong Kong Special Administrative Region (SAR)
12. France
13. Australia
14. Belgium
15. Canada
These rankings are probably what you may have envisioned. (See the full report for more information and for the complete rankings of the nations.) The point of all this is that the world is rapidly changing, getting smaller and connected
(Fig. 1-1). Furthermore, the more nations that become high-technology driven, the more the miscreants of the world will take advantage of this global environment to damage, steal, and destroy information and information systems of the globally dependent, high-technology-dependent corporations, small business, and the unsuspecting public.
Figure 1-1 The world to talk to the world—from any place to anywhere.
So, because high technology provides the driver and support to globalization—the world talking to the world
—the world has gone flat.
In his book The World Is Flat: A Brief History of the Twenty-First Century, Thomas L. Friedman³ provides a discussion of the ten flatteners of the world
:
1. When the walls (Berlin) came down and the windows (Microsoft) went up
2. When Netscape went public
3. Workflow software
4. Open sourcing: self-organizing collaborative communities
5. Outsourcing: Y2K
6. Offshoring: running with gazelles, eating with lions
7. Supply chaining: eating sushi in Arkansas
8. Insourcing: what the guys in funny brown shorts are really doing
9. In-forming: Google, Yahoo!, MSN Web Search
10. The steroids: digital, mobile, personal, and virtual
By viewing this list, you can get some idea about how the flattening of the business world has taken place. The days of stovepipes
(standalone entities within the corporation or within the global marketplace) in the business world are quickly ending. Businesses can no longer afford not to flatten their corporate structure and their part of the global environment if they are to compete successfully for their global market share.
Your crime scene is no longer just a stand-alone, nonnetworked desktop computer system on some corporate desk in New York City. Now, that computer is networked to the other computers of the corporation’s local area networks (LANs), wide area networks (WANs), the Internet, and from there to the world.
As a crime investigator, or even a high-technology crime investigator, you may be wondering what all this has to do with conducting investigations, even high-technology crime investigations. The answer is simple: The global business environment, with corporate computer tentacles attached to about everything and anything in the global marketplace, has become your crime scene; the world may now be your crime scene. A crime scene where, as a law enforcement officer, private investigator, or security investigator, you may lack not only jurisdiction but the global reach necessary to investigate a high-technology crime.
HIGH TECHNOLOGY IS RAPIDLY CHANGING THE WORLD
If you are involved in any activity in which high technology is used as a tool to help you accomplish your work, you will be aware of the tremendous and very rapid advances that are being made in this arena. It is something to behold.
If we look back at the 20th century, we see major high-technology inventions becoming commonplace (Fig. 1-2). Imagine what the 21st century will bring!
Figure 1-2 A brief history of 20th-century high technology.
We are in the middle of the most rapid technological advances in human history, but this is just the beginning. We are not even close to reaching the potential that high technology has to offer, nor are we able to predict its affect on all of us—both good and bad.
"In 1994, people had to call the bank to check their balances. Or inquire in person, or wait for a paper statement to arrive in the mail. Baseball box scores were found in the newspaper. Weather forecasts came over the phone from the weather bureau, or on TV. Then along came the Internet and an experimental browser called Mosaic, followed by an improved browser from Netscape.
And if you had a computer, you discovered a new way to this cool, new thing called the World Wide Web. Mosaic and Netscape were the first popular connection to what came to be called the information superhighway. According to the Pew Internet & American Life Project, less than one in five Americans were online in 1995. Today, the majority of Americans are surfing the Web, exchanging e-mail, reading bank statements and ball scores, checking the weather. Today, Pew says, two out of every three Americans spend time online."⁴
It is said that there have been more discoveries in the last 50 years than in the entire history of mankind before that time. We just have to read the papers and the trade journals to look at every profession and see what high technology is bringing to our world. New discoveries are being made in medicine, and there are expanding online and worldwide information systems; we can now hold teleconferences across the country and around the globe. A short summary of the last few centuries of high-technology advances in calculators and computers have included the following⁵:
• John Napier shows how to multiply and divide using rods or bones.
• Blaise Pascal invents adding machine.
• G. W. von Leibniz invents the adding machine with geared wheels.
• Joseph Jacquard uses card-controlled looms to weave designs into cloth.
• Charles X. Thomas introduces the commercial calculating machine.
• Charles Babbage invents the analytic engine,
foreshadowing computers.
• George Boole publishes treatise on binary algebra.
• Charles Sanders Peirce applies Boolean logic to electric circuits.
• Lord Kelvin develops the analog computer to predict