| Preface |
|
xiii | |
| Introduction |
|
xv | |
| Author |
|
xix | |
| About Robert J. Girod Consulting, LLC |
|
xxi | |
|
1 Black Bag Operational Planning |
|
|
1 | (16) |
|
|
|
1 | (1) |
|
Identification and New Identity: Cover Story |
|
|
2 | (4) |
|
Point of Entry and Exit; Ingress and Egress |
|
|
6 | (1) |
|
|
|
7 | (1) |
|
Biometric Security Devices |
|
|
8 | (1) |
|
Postoperational Actions and Debrief |
|
|
9 | (1) |
|
|
|
10 | (1) |
|
Communications in Unconventional Environments |
|
|
11 | (6) |
|
|
|
17 | (20) |
|
Human Intelligence Operations |
|
|
17 | (2) |
|
Human Sources: Interviewing and Interrogation |
|
|
19 | (1) |
|
|
|
20 | (3) |
|
U.S. Intelligence Community |
|
|
23 | (1) |
|
British Security Service MI5 and Secret Intelligence Service MI6 |
|
|
24 | (1) |
|
Linguistic Skills (Languages) |
|
|
25 | (1) |
|
Number of Countries with the Same Official Language |
|
|
26 | (1) |
|
|
|
26 | (11) |
|
Expanding Your Vocabulary: Useful Words |
|
|
34 | (1) |
|
|
|
34 | (3) |
|
3 HUMINT Surveillance and Undercover Operations |
|
|
37 | (26) |
|
Surveillance and Undercover Operations |
|
|
37 | (1) |
|
|
|
38 | (4) |
|
|
|
40 | (1) |
|
|
|
41 | (1) |
|
|
|
41 | (1) |
|
|
|
41 | (1) |
|
Identity Theft: Protection and Exploitation |
|
|
42 | (1) |
|
|
|
42 | (1) |
|
Social Security Numbers and Cards |
|
|
43 | (2) |
|
|
|
45 | (1) |
|
Military ID and Ancillary Documents |
|
|
45 | (2) |
|
|
|
47 | (1) |
|
|
|
47 | (1) |
|
Document Security Devices |
|
|
48 | (1) |
|
Mail, Mail Drops, and Remailing Services |
|
|
48 | (1) |
|
Storage Facilities and Real Estate Trusts |
|
|
49 | (1) |
|
Utilities, Pay-as-You-Go Phones, and Answering Services |
|
|
49 | (1) |
|
Internet and Internet Privacy |
|
|
50 | (2) |
|
|
|
51 | (1) |
|
Education and Employment (EIN and TIN) and Doing Business |
|
|
52 | (1) |
|
Traveler's Checks, Money Orders, and Prepaid Credit Cards |
|
|
53 | (1) |
|
Credit Cards and Credit Bureaus |
|
|
54 | (1) |
|
Banking Privacy and Offshore Money |
|
|
54 | (3) |
|
Court-Ordered (Legal) Name Change |
|
|
57 | (1) |
|
Appendix: Indiana Name Change Statute (IC 34-28-2, Chapter 2, "Change of Name") |
|
|
58 | (5) |
|
IC 34-28-2-1 Petition to Circuit Court |
|
|
58 | (1) |
|
IC 34-28-2-1.5 Incarcerated Persons May Not Petition for Change of Name |
|
|
58 | (1) |
|
IC 34-28-2-2 Filing Petition; Procedure for Change of Name of Minor |
|
|
58 | (1) |
|
IC 34-28-2-2.5 Contents of Petition |
|
|
59 | (1) |
|
IC 34-28-2-3 Notice of Petition |
|
|
60 | (1) |
|
IC 34-28-2-4 Proof of Publication; Time of Hearing; Notice Requirements; Determination on Petition |
|
|
61 | (1) |
|
IC 34-28-2-5 Court Decree as Evidence; Copy Sent to Health Department, Clerk of Circuit Court, or Board |
|
|
62 | (1) |
|
4 Defenses against Methods of Entry |
|
|
63 | (16) |
|
|
|
64 | (1) |
|
|
|
64 | (4) |
|
|
|
68 | (1) |
|
|
|
69 | (1) |
|
|
|
70 | (1) |
|
|
|
70 | (2) |
|
|
|
72 | (1) |
|
Schlage Disc™ Tumbler Lock |
|
|
73 | (6) |
|
5 Forced Entry into Buildings |
|
|
79 | (14) |
|
|
|
79 | (1) |
|
|
|
79 | (2) |
|
|
|
81 | (1) |
|
|
|
81 | (1) |
|
|
|
81 | (1) |
|
Office Equipment and Furniture |
|
|
82 | (3) |
|
|
|
85 | (2) |
|
|
|
87 | (3) |
|
Garage Door Openers: High-Tech Burglary |
|
|
90 | (2) |
|
How to Change the Frequency for a Garage Door Opener (Instructions) |
|
|
91 | (1) |
|
|
|
91 | (1) |
|
Chamberlaim, Sears, or LifeMaster Openers |
|
|
91 | (1) |
|
|
|
92 | (1) |
|
6 Safes, Combinations, and Automobile Locks |
|
|
93 | (18) |
|
|
|
93 | (1) |
|
|
|
94 | (4) |
|
|
|
98 | (2) |
|
|
|
100 | (2) |
|
Changing the Combination of a Dial Combination Lock |
|
|
102 | (3) |
|
Locking System for Automobiles |
|
|
105 | (1) |
|
|
|
106 | (1) |
|
|
|
106 | (1) |
|
|
|
107 | (1) |
|
Pin Tumbler Locks for Autos |
|
|
108 | (1) |
|
|
|
108 | (2) |
|
Wafer Tumbler Locks for Autos |
|
|
110 | (1) |
|
Hacking Car Keyless Entry Systems |
|
|
110 | (1) |
|
7 Psychological Operations and Social Networks |
|
|
111 | (16) |
|
|
|
111 | (2) |
|
Military PYSOPs: Psychological Warfare |
|
|
113 | (1) |
|
Propaganda and Counterpropaganda |
|
|
114 | (1) |
|
|
|
115 | (1) |
|
Techniques of Harassment and Revenge: The Dirty Tricks Department |
|
|
115 | (2) |
|
Dirty Tricks: Nasty Pranks |
|
|
117 | (1) |
|
Utilities and Life's Little (Planned) Inconveniences |
|
|
117 | (1) |
|
Let Your Fingers Do the Walking: Yellow Pages and Telephones |
|
|
118 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (2) |
|
Ads, Handbills, and Circulars |
|
|
121 | (1) |
|
Composite Photography, Audio-Video Recordings, and Plants |
|
|
121 | (2) |
|
Internal Disruption: The Coin-Tel-Pro Technique |
|
|
123 | (1) |
|
Be Aware of the Implications |
|
|
124 | (1) |
|
|
|
124 | (1) |
|
|
|
125 | (2) |
|
8 Electronic Intelligence and Signals Intelligence: Bugs and Taps |
|
|
127 | (26) |
|
Bugs and Electronic Surveillance |
|
|
127 | (1) |
|
|
|
127 | (2) |
|
Pirate and Underground Radio |
|
|
129 | (1) |
|
Laser Surveillance Laser Listening |
|
|
130 | (2) |
|
|
|
132 | (1) |
|
|
|
133 | (3) |
|
Packet Sniffing on the VOIP Data |
|
|
136 | (2) |
|
Packet Sniffers: Carnivore and Magic Lantern |
|
|
138 | (1) |
|
|
|
139 | (2) |
|
4G Broadband Public Safety Communications |
|
|
141 | (1) |
|
Band 14: 700 MHz Public Safety Band |
|
|
142 | (1) |
|
|
|
142 | (2) |
|
Routers and Wi-Fi: How to Access Router Settings |
|
|
144 | (2) |
|
|
|
146 | (4) |
|
Using Bluetooth Technology |
|
|
150 | (3) |
|
9 Emanations Intelligence |
|
|
153 | (20) |
|
|
|
153 | (1) |
|
Measurement and Signature Intelligence |
|
|
154 | (1) |
|
Things That Are Vulnerable to Hacking |
|
|
155 | (1) |
|
Computer Anonymity, Privacy, and Security |
|
|
155 | (2) |
|
Cell Phone Baseband Hacking |
|
|
157 | (1) |
|
Cell Phone Data Retrieval |
|
|
158 | (1) |
|
IMSI Catchers and Cell-Site Simulators: The StingRay |
|
|
159 | (1) |
|
|
|
160 | (3) |
|
Barcode Scanners and Magnetic Stripe Reader/Programmer |
|
|
163 | (2) |
|
Magstripe Forgery and Skimming |
|
|
165 | (2) |
|
|
|
167 | (1) |
|
|
|
167 | (1) |
|
Remote Electromagnetic Sensors |
|
|
168 | (3) |
|
Explosives Trace Detectors (Vapor Detectors) |
|
|
171 | (2) |
|
|
|
173 | (12) |
|
|
|
173 | (5) |
|
|
|
178 | (1) |
|
Mapping and Geographical Data |
|
|
179 | (2) |
|
Processing and Consuming Imagery Intelligence |
|
|
181 | (1) |
|
Surveillance Target Acquisition and Night Observation |
|
|
182 | (1) |
|
|
|
182 | (1) |
|
|
|
183 | (1) |
|
|
|
184 | (1) |
|
11 Internet and Database Open Sources |
|
|
185 | (14) |
|
|
|
185 | (1) |
|
Intelligence Research Sources |
|
|
185 | (1) |
|
Database Sources of Information |
|
|
186 | (1) |
|
Fact Checking Intellectual Property and Plagiarism |
|
|
186 | (1) |
|
Social Security Numbers and Vital Records |
|
|
187 | (1) |
|
Driver's License and License Plate Information |
|
|
188 | (1) |
|
Criminal History Checks and Court Records |
|
|
188 | (1) |
|
Tracking Sources and Stolen Property |
|
|
189 | (1) |
|
|
|
190 | (1) |
|
|
|
190 | (1) |
|
Military and Genealogical Sources |
|
|
191 | (1) |
|
Sources of Telephone Information: Names, Addresses, and Phone Numbers |
|
|
191 | (1) |
|
Internet Address Information |
|
|
192 | (1) |
|
Maps, Aerial and Satellite Photos, and Weather |
|
|
192 | (1) |
|
|
|
193 | (1) |
|
Education and Degree Checks |
|
|
193 | (1) |
|
|
|
194 | (1) |
|
Background Investigations Online |
|
|
194 | (1) |
|
|
|
194 | (1) |
|
Internet Intelligence and Spyware |
|
|
195 | (3) |
|
Net Spying and Web Surveillance |
|
|
198 | (1) |
|
12 Intelligence Files and Analytical Investigative Methods |
|
|
199 | (16) |
|
|
|
199 | (5) |
|
|
|
199 | (1) |
|
|
|
199 | (1) |
|
|
|
200 | (1) |
|
|
|
201 | (1) |
|
Dissemination and Feedback |
|
|
202 | (2) |
|
|
|
204 | (1) |
|
|
|
205 | (7) |
|
Analytical Investigative Methods |
|
|
205 | (1) |
|
Visual Investigative Analysis |
|
|
206 | (6) |
|
|
|
212 | (1) |
|
|
|
212 | (3) |
|
13 Intelligence, Surveillance, and Misappropriation Law |
|
|
215 | (20) |
|
Overview of International and Military Law |
|
|
215 | (3) |
|
|
|
218 | (1) |
|
Surveillance, Satellites, and Civil Liberties |
|
|
219 | (4) |
|
|
|
223 | (3) |
|
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
Emerging Technology and Intelligence |
|
|
226 | (2) |
|
Strengths, Weaknesses, Opportunities, and Threats |
|
|
228 | (1) |
|
Misappropriation from Computers |
|
|
229 | (6) |
|
14 Computer Forensics: Searches, Evidence, and Notice |
|
|
235 | (8) |
|
|
|
235 | (2) |
|
Supreme Court Established Search Protocol |
|
|
237 | (4) |
|
|
|
241 | (2) |
|
15 Computer Forensics: Discovery and Spoliation |
|
|
243 | (20) |
|
|
|
243 | (9) |
|
|
|
252 | (7) |
|
Ethics, Standards of Conduct, and Sanctions |
|
|
259 | (4) |
|
Appendix A Electronic Surveillance Law |
|
|
263 | (72) |
|
Wire and Electronic Communications Intercept and Interception of Oral Communications (18 U.S.C. 2510--2521) |
|
|
263 | (29) |
|
Stored Wire and Electronic Communications and Transactional Records Access (18 U.S.C. §§ 2701--2712) |
|
|
292 | (4) |
|
The Pen Register and Trap and Trace Act (18 U.S.C. §§ 3121--3127) |
|
|
296 | (7) |
|
Communications Assistance Law Enforcement Act of 1994 (47 U.S.C. 1001--1021) |
|
|
303 | (24) |
|
Foreign Intelligence Surveillance Act (50 U.S.C. 1861) |
|
|
327 | (8) |
|
Appendix B Computer Crime and Privacy Laws |
|
|
335 | (26) |
|
|
|
335 | (7) |
|
Computer Fraud and Abuse Act (18 U.S.C. 1030) |
|
|
342 | (7) |
|
Children's Online Privacy Act (15 U.S.C. §§ 6501--6506) |
|
|
349 | (12) |
|
Appendix C Government Data Privacy Laws |
|
|
361 | (16) |
|
E-Government Act (44 U.S.C. § 101) |
|
|
361 | (3) |
|
Federal Information Security Management Act (44 U.S.C. § 3541) |
|
|
364 | (13) |
|
Appendix D Consumer and Credit Data Privacy Laws |
|
|
377 | (112) |
|
Freedom of Information Act (FOI A) (5 U.S.C. § 552) |
|
|
377 | (17) |
|
Privacy Act of 1974 (5 U.S.C. § 552a: As Amended) |
|
|
394 | (21) |
|
Privacy Protection Act of 1980 (42 U.S.C. 2000aa) |
|
|
415 | (6) |
|
Employee Polygraph Protection Act (EPPA) (29 U.S.C. 2001--2009) |
|
|
421 | (9) |
|
Fair Credit Reporting Act (15 U.S.C. 1681) |
|
|
430 | (22) |
|
Federal Trade Commission Act of 1914 (15 U.S.C. §§ 41--51) |
|
|
452 | (2) |
|
Health Insurance Portability and Accountability Act (HIPAA) |
|
|
454 | (1) |
|
Jencks Act (18 U.S.C. 3500) |
|
|
454 | (2) |
|
Law Enforcement Officer Safety Act of 2004 (18 U.S.C. 926B and 926C) |
|
|
456 | (4) |
|
28 C.F.R. Part 23: Criminal Intelligence Systems Operating Policies |
|
|
460 | (29) |
|
Appendix E List of Most Common Languages |
|
|
489 | (38) |
|
List of Official Languages by Language and Area Spoken |
|
|
489 | (20) |
|
List of Languages by State and Language Spoken |
|
|
509 | (18) |
| References |
|
527 | (2) |
| Index |
|
529 | |