ABSTRACT

  Researching an individual‘s, firm‘s or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence.

chapter 2|14 pages

Behavior Online

chapter 4|10 pages

Internet Search Studies

chapter 5|16 pages

Implications for the Enterprise

chapter 6|8 pages

Liability, Privacy, and Management Issues

chapter 7|14 pages

Laws

chapter 8|20 pages

Litigation

chapter 9|10 pages

International and Domestic Principles

chapter 10|14 pages

Professional Standards and the Internet

chapter 11|8 pages

The Insider Threat

chapter 13|12 pages

Tools, Techniques, and Training

chapter 14|10 pages

Proper Procedures for Internet Searching

chapter 15|10 pages

Preparation and Planning

chapter 16|20 pages

Search Techniques

chapter 17|16 pages

Finding Sources

chapter 18|12 pages

Automation of Searching

chapter 19|12 pages

Internet Intelligence Reporting

chapter 20|12 pages

Illicit Websites and Illegal Behavior Online

chapter 22|8 pages

A Model Internet Investigation Policy

chapter 23|4 pages

A Model Internet Posting Policy

chapter 24|8 pages

Internet Intelligence Issues