1st Edition

Internet Searches for Vetting, Investigations, and Open-Source Intelligence Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

By Edward J. Appel Copyright 2011
    320 Pages 5 B/W Illustrations
    by CRC Press

    In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.

    Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities.

    Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

    Behavior and Technology
    The Internet’s Potential for Investigators and Intelligence Officers
    People, Places, Organizations, and Topics
    A Practitioner’s Perspective
    The Search
    Internet Posts and the People They Profile
    Finding the Needles
    The Need for Speed
    What We Can’t Do Without
    Notes

    Social and Technological Change
    Internet Use Growth
    Evolution of Internet Uses
    Physical World, Virtual Activities
    Connection and Disconnection
    Notes

    Use and Abuse—Crime on the Internet
    By the Numbers?
    Online Venues
    Digital Delinquency
    “Free” Intellectual Property
    Insider
    Notes

    Implications for the Enterprise
    The New User: Someone You Would Trust?
    Employer Liability
    Vetting, Monitoring, and Accountability
    The Evolving Personnel Security Model
    Notes

    Legal and Policy Context
    Liability, Privacy, and Management Issues
    Liability for Service Providers for Employers
    Accountability for Employees
    Notes

    Laws
    Constitutional Rights
    Federal and State Statutes
    Federal Rules of Evidence and Computer Records
    International Treaties and Standards
    Notes

    Litigation
    Internet Search Litigation
    Anonymity
    Expectation of Privacy
    Due Process
    Libel/Defamation
    Invasion of Privacy Torts
    Sanctions for Public Postings
    Internet Privacy for the Twenty-First Century
    Notes

    International and Domestic Principles
    U.S. and International Privacy Principles
    Guidelines
    Notice and Consent
    Government Standards
    Parallel Guidance: Internet Research Ethics
    Notes

    Professional Standards and the Internet
    ASIS Standards
    National Association of Professional Background Screeners (NAPBS)
    Association of Internet Researchers (AoIR)
    Librarians
    Inside and Outside the Workplace
    Reputational Risk, Public Affairs
    Bottom Line
    Notes

    The Insider Threat
    Benevolent Big Brother
    Notes

    Framework for Internet Searching
    Internet Vetting and Open-Source Intelligence Policy
    Legal and Ethical Limitations
    Policy
    Information Assets Protection
    Notes

    Tools, Techniques, and Training
    Training Analysts
    Open-Source Intelligence Process
    Quality Control
    Notes

    Proper Procedures for Internet Searching
    Criteria
    Security
    Standard Methodology
    Notes

    Internet Search Methodology
    Preparation and Planning
    The Library
    Scope Notes
    Notes

    Search Techniques
    Internet Content
    The Browser
    The Search Engine
    Metasearch Engines
    Finding Search Engines
    Search Terms
    Social and Commercial Searching
    Social Networking Sites
    E-Commerce Sites
    Directories
    Blogs
    Chat
    Notes

    Finding Sources
    U.S. Government
    State, County, and Local Governments
    Other Government-Related Sources
    Business-Related Sources
    News
    Web 2.0
    Looking Up Subscribers
    Email
    Notes

    Automation of Searching
    Why Automate Searching?
    Enterprise Search Middleware
    Best-in-Class Desktop Tool
    Investigative Search Tool Requirements
    A Homegrown Solution
    Reducing Analytical Time Using Automation
    Caching and Data Mining
    The Human Interface in Internet Investigations
    Notes

    Internet Intelligence Reporting
    Records
    Content
    Analyst’s Comments
    Organization and Formatting
    Source Citations
    Attribution
    Verification
    Notes

    Illicit Web Sites and Illegal Behavior Online
    Cybercrime
    Child Pornography and Internet Porn
    Unauthorized Use of Computer Systems
    Contraband Digital Assets
    Information (Cyber) Warfare
    Notes

    Model Internet Investigative Standards
    Enterprise Strategy
    Model Internet Search Guidelines
    Authorized Internet Search Personnel
    Definitions to Consider
    Notes

    A Model Internet Investigation Policy
    Key Considerations
    Higher-Risk Candidates
    Application Procedures and Forms
    Legal Issues
    Confidentiality
    Ethics in Investigations
    Disciplinary Action
    Model Forms for Candidates
    Notes

    A Model Internet Posting Policy
    Notes

    Internet Intelligence Issues
    Privacy
    Smoking Guns
    Completeness of Internet Searching
    Adjudication
    Conclusion
    Notes

    Bibliography

    Index

    Biography

    Edward J. (Ed) Appel, Sr., is owner-principal of iNameCheck, a boutique private investigative, consulting, and training firm. He is a retired FBI special agent and executive, specializing in counterintelligence and terrorism, and served as the director of counterintelligence and security programs at the National Security Council and the White House.  

    I was excited to hear CRC Press was releasing Internet Searches for Vetting, Investigations, and Open-Source Intelligence, by Edward J. Appel, a retired FBI agent. His company has done work for me so I knew the quality of his work and assumed his book would be at the same level as his investigative efforts. I wasn't disappointed. … Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites and search terms. I found the chapters Automation of Searching and Internet Intelligence Reporting to be the most enlightening. … delivers with content and is an easy read. It met my criteria for a successful investigations book … .
    —Larry Zilliox, in the PISA Newsletter, April 2011

    "The author gives a sober assessment of the challenges faced by any person engaged in Internet investigations and intelligence gathering but does not present an overly bleak picture. I highly recommend this work for private security professionals."
    —Rich Petraits in Security Management, December 2011