Muutke küpsiste eelistusi

E-raamat: Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques [Taylor & Francis e-raamat]

(Robert J. Girod Consulting, LLC, Fort Wayne, Indiana, USA)
  • Formaat: 564 pages
  • Ilmumisaeg: 30-Sep-2020
  • Kirjastus: Routledge
  • ISBN-13: 9780429256158
  • Taylor & Francis e-raamat
  • Hind: 189,26 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 270,37 €
  • Säästad 30%
  • Formaat: 564 pages
  • Ilmumisaeg: 30-Sep-2020
  • Kirjastus: Routledge
  • ISBN-13: 9780429256158
Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert agent for the government or an identity thief and con man, the methods, practices, tactics, and techniques are often the same and sometimes learned from the same sources. Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques reveals how intelligence officers and investigators conduct their tradecraft. Youll learn how to plan an operation, how to build an identity and cover story for deep cover operations, and how to detect those who have created false identities for illegal purposes. Youll also get insight into the technical aspects of intelligence (the INTs), counterintelligence, and criminal investigations, and legal considerations for conducting intelligence investigations.





Topics include:



















A discussion of black bag operational planning





HUMINT (human intelligence)the gathering of information from human sources





DAME (defenses against methods of entry), forced entry into buildings, safes and combination locks, and automobile locks





PSYOPS (psychological operations) and the use of social networks





ELINT (electronic intelligence) and SIGINT (signals intelligence)electronic interception of intelligence, bugs, wiretaps, and other communications interceptions





EMINT (emanations intelligence), which concerns the emanation of data, signals, or other intelligence from C4I systems





IMINT (imagery intelligence), involving any intelligence gathered using images





Intelligence files and analytical methods











Based upon the authors training and experience over more than three decades as a law enforcement investigator and military officer, as well as research conducted as an attorney and in academia, the book provides you with an insider perspective on sensitive covert and overt operations and sources. Supplemented with roughly 140 illustrations and photos, this collection of special skills and reference materials is essential to the professional investigator and intelligence operative.
Preface xiii
Introduction xv
Author xix
About Robert J. Girod Consulting, LLC xxi
1 Black Bag Operational Planning
1(16)
Operational Planning
1(1)
Identification and New Identity: Cover Story
2(4)
Point of Entry and Exit; Ingress and Egress
6(1)
Equipment
7(1)
Biometric Security Devices
8(1)
Postoperational Actions and Debrief
9(1)
Order of Battle
10(1)
Communications in Unconventional Environments
11(6)
2 Human Intelligence
17(20)
Human Intelligence Operations
17(2)
Human Sources: Interviewing and Interrogation
19(1)
Security Clearances
20(3)
U.S. Intelligence Community
23(1)
British Security Service MI5 and Secret Intelligence Service MI6
24(1)
Linguistic Skills (Languages)
25(1)
Number of Countries with the Same Official Language
26(1)
Learning Languages Fast
26(11)
Expanding Your Vocabulary: Useful Words
34(1)
Danger Words
34(3)
3 HUMINT Surveillance and Undercover Operations
37(26)
Surveillance and Undercover Operations
37(1)
Disguise
38(4)
Vehicle Disguise
40(1)
Physical Disguise
41(1)
Long-Term Disguise
41(1)
Permanent Disguises
41(1)
Identity Theft: Protection and Exploitation
42(1)
Birth Certificates
42(1)
Social Security Numbers and Cards
43(2)
Driver's Licenses
45(1)
Military ID and Ancillary Documents
45(2)
Fingerprints
47(1)
New Passports
47(1)
Document Security Devices
48(1)
Mail, Mail Drops, and Remailing Services
48(1)
Storage Facilities and Real Estate Trusts
49(1)
Utilities, Pay-as-You-Go Phones, and Answering Services
49(1)
Internet and Internet Privacy
50(2)
E-Mail Privacy
51(1)
Education and Employment (EIN and TIN) and Doing Business
52(1)
Traveler's Checks, Money Orders, and Prepaid Credit Cards
53(1)
Credit Cards and Credit Bureaus
54(1)
Banking Privacy and Offshore Money
54(3)
Court-Ordered (Legal) Name Change
57(1)
Appendix: Indiana Name Change Statute (IC 34-28-2,
Chapter 2, "Change of Name")
58(5)
IC 34-28-2-1 Petition to Circuit Court
58(1)
IC 34-28-2-1.5 Incarcerated Persons May Not Petition for Change of Name
58(1)
IC 34-28-2-2 Filing Petition; Procedure for Change of Name of Minor
58(1)
IC 34-28-2-2.5 Contents of Petition
59(1)
IC 34-28-2-3 Notice of Petition
60(1)
IC 34-28-2-4 Proof of Publication; Time of Hearing; Notice Requirements; Determination on Petition
61(1)
IC 34-28-2-5 Court Decree as Evidence; Copy Sent to Health Department, Clerk of Circuit Court, or Board
62(1)
4 Defenses against Methods of Entry
63(16)
Basic Lock Picking
64(1)
Practice Preparation
64(4)
Lock Pick Practice
68(1)
Pin Cylinder Lock
69(1)
Warded Pad Locks
70(1)
Disc Tumbler Locks
70(2)
Pick Guns and Snap Picks
72(1)
Schlage Disc™ Tumbler Lock
73(6)
5 Forced Entry into Buildings
79(14)
Door Jimmy
79(1)
Door Shimming
79(2)
Cylinder Drill
81(1)
Cylinder Wrench
81(1)
Window Entry
81(1)
Office Equipment and Furniture
82(3)
Impressioning
85(2)
Lock Bumping
87(3)
Garage Door Openers: High-Tech Burglary
90(2)
How to Change the Frequency for a Garage Door Opener (Instructions)
91(1)
Genie Openers
91(1)
Chamberlaim, Sears, or LifeMaster Openers
91(1)
Levels of Security
92(1)
6 Safes, Combinations, and Automobile Locks
93(18)
Forced Entry
93(1)
Manipulation
94(4)
Combination Dial Lock
98(2)
Safes and Vaults
100(2)
Changing the Combination of a Dial Combination Lock
102(3)
Locking System for Automobiles
105(1)
Key Codes
106(1)
Ignition Locking Systems
106(1)
Doors and Trunks
107(1)
Pin Tumbler Locks for Autos
108(1)
Side-Bar Locks for Autos
108(2)
Wafer Tumbler Locks for Autos
110(1)
Hacking Car Keyless Entry Systems
110(1)
7 Psychological Operations and Social Networks
111(16)
Psychological Operations
111(2)
Military PYSOPs: Psychological Warfare
113(1)
Propaganda and Counterpropaganda
114(1)
Political PYSOPs
115(1)
Techniques of Harassment and Revenge: The Dirty Tricks Department
115(2)
Dirty Tricks: Nasty Pranks
117(1)
Utilities and Life's Little (Planned) Inconveniences
117(1)
Let Your Fingers Do the Walking: Yellow Pages and Telephones
118(1)
Car Tricks
119(1)
The Pervert Next Door
119(1)
Mail Misery
119(2)
Ads, Handbills, and Circulars
121(1)
Composite Photography, Audio-Video Recordings, and Plants
121(2)
Internal Disruption: The Coin-Tel-Pro Technique
123(1)
Be Aware of the Implications
124(1)
Social Media
124(1)
Privacy and Security
125(2)
8 Electronic Intelligence and Signals Intelligence: Bugs and Taps
127(26)
Bugs and Electronic Surveillance
127(1)
DTMF and ANI Decoders
127(2)
Pirate and Underground Radio
129(1)
Laser Surveillance Laser Listening
130(2)
Telephone Taps
132(1)
Internet Phone Services
133(3)
Packet Sniffing on the VOIP Data
136(2)
Packet Sniffers: Carnivore and Magic Lantern
138(1)
Field Expedient Radios
139(2)
4G Broadband Public Safety Communications
141(1)
Band 14: 700 MHz Public Safety Band
142(1)
Routers
142(2)
Routers and Wi-Fi: How to Access Router Settings
144(2)
Using Wi-Fi Technology
146(4)
Using Bluetooth Technology
150(3)
9 Emanations Intelligence
153(20)
Emanations Intelligence
153(1)
Measurement and Signature Intelligence
154(1)
Things That Are Vulnerable to Hacking
155(1)
Computer Anonymity, Privacy, and Security
155(2)
Cell Phone Baseband Hacking
157(1)
Cell Phone Data Retrieval
158(1)
IMSI Catchers and Cell-Site Simulators: The StingRay
159(1)
Geotagging
160(3)
Barcode Scanners and Magnetic Stripe Reader/Programmer
163(2)
Magstripe Forgery and Skimming
165(2)
RFID
167(1)
Other Frequencies
167(1)
Remote Electromagnetic Sensors
168(3)
Explosives Trace Detectors (Vapor Detectors)
171(2)
10 Imagery Intelligence
173(12)
Night Vision Devices
173(5)
Satellite Imagery
178(1)
Mapping and Geographical Data
179(2)
Processing and Consuming Imagery Intelligence
181(1)
Surveillance Target Acquisition and Night Observation
182(1)
Pinhole Cameras
182(1)
Biometrics
183(1)
License Plate Readers
184(1)
11 Internet and Database Open Sources
185(14)
Open-Source Intelligence
185(1)
Intelligence Research Sources
185(1)
Database Sources of Information
186(1)
Fact Checking Intellectual Property and Plagiarism
186(1)
Social Security Numbers and Vital Records
187(1)
Driver's License and License Plate Information
188(1)
Criminal History Checks and Court Records
188(1)
Tracking Sources and Stolen Property
189(1)
Consumer Protection
190(1)
Credit Records
190(1)
Military and Genealogical Sources
191(1)
Sources of Telephone Information: Names, Addresses, and Phone Numbers
191(1)
Internet Address Information
192(1)
Maps, Aerial and Satellite Photos, and Weather
192(1)
Professional Licenses
193(1)
Education and Degree Checks
193(1)
Social Networks
194(1)
Background Investigations Online
194(1)
Competitive Intelligence
194(1)
Internet Intelligence and Spyware
195(3)
Net Spying and Web Surveillance
198(1)
12 Intelligence Files and Analytical Investigative Methods
199(16)
Intelligence Cycle
199(5)
Planning and Direction
199(1)
Collection
199(1)
Processing
200(1)
Analysis
201(1)
Dissemination and Feedback
202(2)
Intelligence Files
204(1)
Intelligence Analysis
205(7)
Analytical Investigative Methods
205(1)
Visual Investigative Analysis
206(6)
Financial Information
212(1)
Accounting Cycle
212(3)
13 Intelligence, Surveillance, and Misappropriation Law
215(20)
Overview of International and Military Law
215(3)
Wiretap Surveillance
218(1)
Surveillance, Satellites, and Civil Liberties
219(4)
United States Code
223(3)
Indiana
223(1)
Ohio
224(1)
Michigan
224(1)
Illinois
225(1)
Emerging Technology and Intelligence
226(2)
Strengths, Weaknesses, Opportunities, and Threats
228(1)
Misappropriation from Computers
229(6)
14 Computer Forensics: Searches, Evidence, and Notice
235(8)
Searching Computers
235(2)
Supreme Court Established Search Protocol
237(4)
Notice
241(2)
15 Computer Forensics: Discovery and Spoliation
243(20)
Discovery Issues
243(9)
Spoliation
252(7)
Ethics, Standards of Conduct, and Sanctions
259(4)
Appendix A Electronic Surveillance Law
263(72)
Wire and Electronic Communications Intercept and Interception of Oral Communications (18 U.S.C. 2510--2521)
263(29)
Stored Wire and Electronic Communications and Transactional Records Access (18 U.S.C. §§ 2701--2712)
292(4)
The Pen Register and Trap and Trace Act (18 U.S.C. §§ 3121--3127)
296(7)
Communications Assistance Law Enforcement Act of 1994 (47 U.S.C. 1001--1021)
303(24)
Foreign Intelligence Surveillance Act (50 U.S.C. 1861)
327(8)
Appendix B Computer Crime and Privacy Laws
335(26)
USA Patriot Act
335(7)
Computer Fraud and Abuse Act (18 U.S.C. 1030)
342(7)
Children's Online Privacy Act (15 U.S.C. §§ 6501--6506)
349(12)
Appendix C Government Data Privacy Laws
361(16)
E-Government Act (44 U.S.C. § 101)
361(3)
Federal Information Security Management Act (44 U.S.C. § 3541)
364(13)
Appendix D Consumer and Credit Data Privacy Laws
377(112)
Freedom of Information Act (FOI A) (5 U.S.C. § 552)
377(17)
Privacy Act of 1974 (5 U.S.C. § 552a: As Amended)
394(21)
Privacy Protection Act of 1980 (42 U.S.C. 2000aa)
415(6)
Employee Polygraph Protection Act (EPPA) (29 U.S.C. 2001--2009)
421(9)
Fair Credit Reporting Act (15 U.S.C. 1681)
430(22)
Federal Trade Commission Act of 1914 (15 U.S.C. §§ 41--51)
452(2)
Health Insurance Portability and Accountability Act (HIPAA)
454(1)
Jencks Act (18 U.S.C. 3500)
454(2)
Law Enforcement Officer Safety Act of 2004 (18 U.S.C. 926B and 926C)
456(4)
28 C.F.R. Part 23: Criminal Intelligence Systems Operating Policies
460(29)
Appendix E List of Most Common Languages
489(38)
List of Official Languages by Language and Area Spoken
489(20)
List of Languages by State and Language Spoken
509(18)
References 527(2)
Index 529
Dr. Robert Girod, Sr. is the president and CEO of Robert J. Girod Consulting, LLC, attorneys-at-law and consulting detectives/private investigators, which provides general law practice and investigative services, litigation support, and management services nationwide, including forensic accounting, computer forensics, accident reconstruction, and linguistic interviewing, translation, and interpretation. He is the author of Profiling the Criminal Mind: Behavioral Science and Criminal Investigative Analysis, Infamous Murders and Mysteries: Cold Case Files and Who-Done-Its, and Police Liability and Risk Management: Torts, Civil Rights and Employment Law. He has also authored numerous articles for various professional periodicals, such as FBI Law Enforcement Bulletin, Security Management, The Police Marksman, and Musubi.