Search by Category: Keywords:
Browse by Category

INVESTIGATING INFORMATION-BASED CRIMES: A Guide for Investigators on Crimes Against Persons Related to the Theft or Manipulation of Information Assets

Home » Books/DVD's » Victimology » 9780398088712

INVESTIGATING INFORMATION-BASED CRIMES: A Guide for Investigators on Crimes Against Persons Related to the Theft or Manipulation of Information Assets

This book is about investigating information based crimes, such as identity theft, social engineering, theft of personal information storage areas or repositories, and the theft of physical information assets such as papers, manuscripts, or rare books.

By Ronald Mendell,

ISBN: 9780398088712

Retail price: $34.95   $32.95

Quantity:   

This book is about investigating information-based crimes in the twenty-first century. Information-based crimes against persons involve the theft, compromise, misuse, or manipulation of personal data or knowledge assets. Such crimes include identity theft, social engineering, the theft of personal information storage areas or repositories, and the theft of physical information assets such as papers, manuscripts, or rare books. Other assets that can become targets include financial documents and transactions, e-mails, diaries, calendars, spreadsheets, and other personal information, such as medical records.

Investigators will learn from this text how to evaluate the victimology in a case. How did the victim’s information fall prey to attack? Why was this victim chosen? In each type of attack, suggestions are made for completing a vulnerability analysis on the victim's assets to determine the methods used in the suspect’s attack. Once an M.O. (method of operation) becomes established for an UNSUB (unknown suspect), the text presents ideas on narrowing the universe of suspects and in linking them to the offense.

The book also offers investigative checklists for probing into information-based crimes against persons. In addition, the narrative strives to take a psychological methodology in investigating these cases. By reading the strategies provided in this book, private investigators and law enforcement will be armed for dealing with today’s “foxes” that threaten our interconnected, global information community.

TABLE OF CONTENTS

Preface

 

INTRODUCTION

Nature of Information-based Crimes

Crimes against People

Disinformation

Misuse of Electronic Surveillance

Crimes against Persons’ Information Assets

Identity Theft

Via Social Engineering

Theft of Personal Information Repositories

Misuse of Online Information and Metadata Attacks

Thefts of Physical Information Assets

 

Chapter

1. IDENTITY THEFT

Main Points of Vulnerability

Doing a Vulnerability Analysis and Social Networking Investigations

Identifying Likely Suspects

Building Evidence Links

Investigative Checklist

 

2. SOCIAL ENGINEERING

Leakage vs. Social Penetration

Building a Trail to the Compromised Asset

Analyzing the Entry Points: Locating Information about

People and Related Businesses

Linking Suspects to the Compromise

Investigative Checklist

 

3. DISINFORMATION

Documenting the Campaign’s Extent and the Target’s Infosphere

Social Networking

The Profiling of Suspects

Developing Linkage to Evidence

Investigative Checklist

 

4. DIGITAL EVIDENCE AND DIGITAL REPOSITORIES

Repositories in the Cloud and Information Stores

Storage in Digital Computers

Network Servers and Storage and Digital Forensics

Mobile Devices and Digital Forensics

Role of Repositories in Information-based Crime

 

5. THE THEFT OF PERSONAL INFORMATION

REPOSITORIES

Unauthorized Copying

Physical Theft

Investigative Checklist

 

6. MISUSE OF ONLINE INFORMATION

Not Always Illegal Per Se

Publicly Available Information Provides a Foothold for Crimes

Developing a Victim’s Information Footprint: Google

Hacking, Web Application Attacks, Social Networking

Digital Identity Planning

Documenting a Suspect’s Use of Publicly Available

Information: Histories, Assets, Financial Data

Investigative Checklist

 

7. MISUSE OF ELECTRONIC SURVEILLANCE

Interviewing the Client or Victim

Tracking of Individuals and Vehicles

Other Methods of Tracking: Metadata on Images and in

Documents, and Analyzing Online Data

Gaining Access Illegally to Video Surveillance

Illegal Interception of Digital Communications

Investigative Checklist

 

8. THEFT OF PHYSICAL INFORMATION ASSETS

Rare Books and Manuscripts

Documents and Personal Papers

Sensitive Business Documents

Conducting a Vulnerability Analysis

Identifying Suspects

Investigative Checklist

 

9. PSYCHOLOGICAL DIMENSIONS

Profiling

Interrogation

Perception Issues

Intelligence Gathering

Summary

 

10. THE FUTURE OF INFORMATION-BASED CRIMES

The Diary Begins

The Undercurrent

The Diary Continues

Thinking About Your Computer

Trends and Observations on the Digital Future

 

Appendix A: Checklist for Interviewing Victims

Appendix B: Security Checklist

Appendix C: Investigative Checklists

Glossary

Bibliography

Index

Published:  2013

Paper

Pages:  226

 

 

 

 

Reviews