Technology Crime

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 13764 Experts worldwide ranked by ideXlab platform

Andy Jones - One of the best experts on this subject based on the ideXlab platform.

  • high Technology Crime investigator s handbook establishing and managing a high Technology Crime prevention program
    2006
    Co-Authors: Gerald L. Kovacich, Andy Jones
    Abstract:

    SECTION I Introduction to the High Technology Crimes Environment Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants SECTION II High-Technology Incidents and Crime Investigations Chapter 5. Investigating High Technology Crimes Chapter 6. Responding to High-Technology Incidents and Crimes Chapter 7. The Collection of Evidence Chapter 8. Interviews and Interrogations Chapter 9. An Introduction to Computer Forensics Chapter 10. Establishing and Managing a Computer Forensics Laboratory Chapter 11. High Technology Crimes: Case Summaries SECTION III Overview of the High Technology Crimes Investigations Profession and Unit Chapter 12. The Global Enterprise Corporation (GEC) Model Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans Chapter 15. High Technology Anti-Crimes Investigations Program and Organization Chapter 16. High Technology Crimes Investigations Functions Chapter 17. Sources, Networking and Liaison Chapter 18. High Technology Crime Investigations Unit Metrics Management System Chapter 19. Outsourcing High-Technology Investigations Pros and Cons SECTION IV - High Technology Crime Investigation Challenges of the 21st Century Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations Chapter 23. The Future of the High Technology Crimes Investigator Profession Chapter 24. Developing a Career as a High Technology Crimes Investigator Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator Chapter 26. Becoming a High Technology Consultant Chapter 27. Conclusions and Final Thoughts

  • High-Technology Crime Investigation Program and Organization
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to describe and discuss the establishment and management of the organization chartered with the responsibility to lead the high-Technology Crime prevention effort for GEC (a fictitious corporation), including describing the organization, structuring the organization, and detailing the job descriptions of the personnel to be hired to fill the positions within the high-Technology Crime prevention organization. Establishing an effective and efficient high-Technology Crime investigative unit and Crime prevention program requires a detailed analysis and integration of all the information that has been learned. Determining the need for a high-Technology Crime investigative subordinate unit requires detailed analysis of company environment, budget, and an understanding of how to apply resource allocation techniques successfully to the high-Technology Crime investigative and Crime prevention functions. After the need for a high-Technology Crime prevention subordinate organization is determined, then the high-Technology Crime investigator must determine what functions must be performed and in what priority.

  • High-Technology Crime Investigative Functions
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to describe and discuss the major high-Technology Crime investigative functions that are to be performed by the high-Technology Crime investigation unit and to describe the flow of processes that can be used to establish the baseline in performing the functions. When determining what functions are to be performed by the high-Technology Crime investigative unit, it is important to go back to the charter of duties and responsibilities assigned to the unit. Based on that charter, specific functions can be identified. In this way, the drivers for each high-Technology investigative function are tied directly to the charter of duties and responsibilities, which has been approved by the CSO and other necessary layers of management.

  • Developing a Career as a High-Technology Crime Investigator
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to provide the high-Technology Crime investigator with a career development plan outline to be used in developing a career as a high-Technology Crime investigator. People who wish to develop a career as a high-Technology Crime investigator will have a range of backgrounds. Some will have a law enforcement background, some will come from the military, some will be from the information and communications Technology arena, and others will be straight from education or from some other profession. As a result, information on how to develop one's career as a high-Technology Crime investigator will be given in the form of generic advice and suggestions throughout this chapter.

  • High-Technology Crime Miscreants: Profiles, Motives, and Philosophies
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter discusses miscreants and their motives, profiles, and philosophies. It provides an overview of these individuals and groups so that the investigator will have a basic understanding of them as they conduct their high-Technology Crime investigations. A brief history of high-Technology Crime and its associated miscreants is provided. To commit a high-Technology Crime and/or violation of regulations or corporate policies, three requirements must be met: motive, rationalization, and opportunity. According to the Association of Certified Fraud Examiners and members of the criminology profession, these three requirements are the same regardless of the Crime to be perpetrated.

Gerald Kovacich - One of the best experts on this subject based on the ideXlab platform.

  • High-Technology Crime Investigation Program and Organization
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to describe and discuss the establishment and management of the organization chartered with the responsibility to lead the high-Technology Crime prevention effort for GEC (a fictitious corporation), including describing the organization, structuring the organization, and detailing the job descriptions of the personnel to be hired to fill the positions within the high-Technology Crime prevention organization. Establishing an effective and efficient high-Technology Crime investigative unit and Crime prevention program requires a detailed analysis and integration of all the information that has been learned. Determining the need for a high-Technology Crime investigative subordinate unit requires detailed analysis of company environment, budget, and an understanding of how to apply resource allocation techniques successfully to the high-Technology Crime investigative and Crime prevention functions. After the need for a high-Technology Crime prevention subordinate organization is determined, then the high-Technology Crime investigator must determine what functions must be performed and in what priority.

  • High-Technology Crime Investigative Functions
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to describe and discuss the major high-Technology Crime investigative functions that are to be performed by the high-Technology Crime investigation unit and to describe the flow of processes that can be used to establish the baseline in performing the functions. When determining what functions are to be performed by the high-Technology Crime investigative unit, it is important to go back to the charter of duties and responsibilities assigned to the unit. Based on that charter, specific functions can be identified. In this way, the drivers for each high-Technology investigative function are tied directly to the charter of duties and responsibilities, which has been approved by the CSO and other necessary layers of management.

  • Developing a Career as a High-Technology Crime Investigator
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to provide the high-Technology Crime investigator with a career development plan outline to be used in developing a career as a high-Technology Crime investigator. People who wish to develop a career as a high-Technology Crime investigator will have a range of backgrounds. Some will have a law enforcement background, some will come from the military, some will be from the information and communications Technology arena, and others will be straight from education or from some other profession. As a result, information on how to develop one's career as a high-Technology Crime investigator will be given in the form of generic advice and suggestions throughout this chapter.

  • High-Technology Crime Miscreants: Profiles, Motives, and Philosophies
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter discusses miscreants and their motives, profiles, and philosophies. It provides an overview of these individuals and groups so that the investigator will have a basic understanding of them as they conduct their high-Technology Crime investigations. A brief history of high-Technology Crime and its associated miscreants is provided. To commit a high-Technology Crime and/or violation of regulations or corporate policies, three requirements must be met: motive, rationalization, and opportunity. According to the Association of Certified Fraud Examiners and members of the criminology profession, these three requirements are the same regardless of the Crime to be perpetrated.

  • The High-Technology Crime Investigation Unit's Strategic, Tactical, and Annual Plans
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald Kovacich, Andy Jones
    Abstract:

    This chapter aims to establish the plans for the high-Technology Crime prevention organization that provides the GEC (a fictitious corporation) security department's strategic, tactical, and annual plans, as well as those of GEC overall. These plans will set the direction for GEC's high-Technology Crime prevention program (HTCPP), and their integration will indicate that the HTCPP is an integral part of both the GEC security department and GEC itself. When developing the high-Technology Crime prevention strategic plan, the high-Technology Crime investigator manager must ensure that the following basic high-Technology Crime prevention principles are included, either specifically or in principle (because it is part of the high-Technology Crime prevention strategy): 1. Minimize the probability of a high-Technology Crime; 2. Conduct professional, effective, efficient, and discreet inquiries or investigations if allegations of high-Technology Crimes are reported; 3. Report the investigative findings to management (including an analysis of each investigation), coordinate the results with other security functions, and make recommendations to minimize the probability of recurrence.

Gerald L. Kovacich - One of the best experts on this subject based on the ideXlab platform.

  • high Technology Crime investigator s handbook establishing and managing a high Technology Crime prevention program
    2006
    Co-Authors: Gerald L. Kovacich, Andy Jones
    Abstract:

    SECTION I Introduction to the High Technology Crimes Environment Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants SECTION II High-Technology Incidents and Crime Investigations Chapter 5. Investigating High Technology Crimes Chapter 6. Responding to High-Technology Incidents and Crimes Chapter 7. The Collection of Evidence Chapter 8. Interviews and Interrogations Chapter 9. An Introduction to Computer Forensics Chapter 10. Establishing and Managing a Computer Forensics Laboratory Chapter 11. High Technology Crimes: Case Summaries SECTION III Overview of the High Technology Crimes Investigations Profession and Unit Chapter 12. The Global Enterprise Corporation (GEC) Model Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans Chapter 15. High Technology Anti-Crimes Investigations Program and Organization Chapter 16. High Technology Crimes Investigations Functions Chapter 17. Sources, Networking and Liaison Chapter 18. High Technology Crime Investigations Unit Metrics Management System Chapter 19. Outsourcing High-Technology Investigations Pros and Cons SECTION IV - High Technology Crime Investigation Challenges of the 21st Century Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations Chapter 23. The Future of the High Technology Crimes Investigator Profession Chapter 24. Developing a Career as a High Technology Crimes Investigator Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator Chapter 26. Becoming a High Technology Consultant Chapter 27. Conclusions and Final Thoughts

  • Conclusions and Final Thoughts
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter provides some final thoughts on the topic of high-Technology Crime investigations and the profession of the high-Technology Crime investigator. The profession of the high-Technology Crime investigator is still very much in its infancy. The challenges of high-Technology Crime investigators are many. Among the topics they must know and understand, or understand the limitations of their knowledge include people, relevant laws and regulations, high-Technology devices, and investigative techniques. Not all people are made of the stuff required to be a successful high-Technology Crime investigator. Many people, for example, do not like confrontation. Being a high-Technology Crime investigator means that one will probably be involved in many confrontations. How one handles them affects his or her ability to get the job done. As a high-Technology Crime investigator, conflict is unavoidable.

  • The Global Enterprise Corporation
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    Publisher Summary This chapter describes a fictional company in which the high-Technology Crime investigative manager will establish and manage a high-Technology Crime investigative unit. This approach provides the reader with a practical baseline model on which to build a corporate high-Technology Crime prevention program (HTCPP) as part of a corporate asset protection program. Most corporations set their goals and objectives in planning documents such as strategic, tactical, and annual business plans. These plans are key documents for the high-Technology Crime investigator to use to determine the corporation's future directions. These plans are also key documents that the high-Technology Crime investigator may be able to use to determine what is expected from the high-Technology Crime investigator and the HTCPP. The plans should also be used as the basis for writing service and support high-Technology Crime prevention plans, as separate documents or as sections that are integrated into the identified security and/or corporate planning documents.

  • High Technology Crimes: case summaries
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter aims to provide a range of summaries of high-Technology Crimes and related issues that illustrate the types of incidents that may be encountered under the general grouping of high-Technology Crimes. In addition, the information provided will give the high-Technology Crime investigator a basic understanding of the high-Technology working environment and will provide a sense of the many challenges that face high-Technology Crime investigators in both the public and private sectors.

  • The Collection of Evidence
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter looks at the issues that need to be addressed in the collection of digital evidence relating to an incident. It looks primarily at the seizing of evidence from a PC that is related to a suspect, because this is one of the more probable scenarios in a high-Technology Crime investigation, regardless of whether the PC is a personal home computer, a laptop, or one used by an employee within the organization. Later in the chapter the issue of recovering evidence stored on networks is addressed. The process used to collect evidence legally varies from country to country; however, assuming that the country has a mature legal process that protects the rights of its citizens, then a high-Technology Crime investigator must follow certain investigative steps. These steps may include such things as determining the probable cause for a search, obtaining a search warrant, and the like.

Andrew Jones - One of the best experts on this subject based on the ideXlab platform.

  • Conclusions and Final Thoughts
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter provides some final thoughts on the topic of high-Technology Crime investigations and the profession of the high-Technology Crime investigator. The profession of the high-Technology Crime investigator is still very much in its infancy. The challenges of high-Technology Crime investigators are many. Among the topics they must know and understand, or understand the limitations of their knowledge include people, relevant laws and regulations, high-Technology devices, and investigative techniques. Not all people are made of the stuff required to be a successful high-Technology Crime investigator. Many people, for example, do not like confrontation. Being a high-Technology Crime investigator means that one will probably be involved in many confrontations. How one handles them affects his or her ability to get the job done. As a high-Technology Crime investigator, conflict is unavoidable.

  • The Global Enterprise Corporation
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    Publisher Summary This chapter describes a fictional company in which the high-Technology Crime investigative manager will establish and manage a high-Technology Crime investigative unit. This approach provides the reader with a practical baseline model on which to build a corporate high-Technology Crime prevention program (HTCPP) as part of a corporate asset protection program. Most corporations set their goals and objectives in planning documents such as strategic, tactical, and annual business plans. These plans are key documents for the high-Technology Crime investigator to use to determine the corporation's future directions. These plans are also key documents that the high-Technology Crime investigator may be able to use to determine what is expected from the high-Technology Crime investigator and the HTCPP. The plans should also be used as the basis for writing service and support high-Technology Crime prevention plans, as separate documents or as sections that are integrated into the identified security and/or corporate planning documents.

  • High Technology Crimes: case summaries
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter aims to provide a range of summaries of high-Technology Crimes and related issues that illustrate the types of incidents that may be encountered under the general grouping of high-Technology Crimes. In addition, the information provided will give the high-Technology Crime investigator a basic understanding of the high-Technology working environment and will provide a sense of the many challenges that face high-Technology Crime investigators in both the public and private sectors.

  • The Collection of Evidence
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter looks at the issues that need to be addressed in the collection of digital evidence relating to an incident. It looks primarily at the seizing of evidence from a PC that is related to a suspect, because this is one of the more probable scenarios in a high-Technology Crime investigation, regardless of whether the PC is a personal home computer, a laptop, or one used by an employee within the organization. Later in the chapter the issue of recovering evidence stored on networks is addressed. The process used to collect evidence legally varies from country to country; however, assuming that the country has a mature legal process that protects the rights of its citizens, then a high-Technology Crime investigator must follow certain investigative steps. These steps may include such things as determining the probable cause for a search, obtaining a search warrant, and the like.

  • Responding to High-Technology Incidents and Crimes
    High-Technology Crime Investigator's Handbook, 2006
    Co-Authors: Gerald L. Kovacich, Andrew Jones
    Abstract:

    This chapter looks at the considerations that a corporation and the high-Technology Crime investigator must address prior to an incident if they are to be successful in responding to high-Technology Crimes. It also looks at the actions that need to be taken immediately after an incident is detected. The ability to respond to high-Technology incidents and Crimes in an effective and efficient manner requires preparation. The preparations and related activities for investigating high-Technology Crimes fall into three areas: actions that are taken before the incident, investigation activities, and post-incident activities.

Larry E. Coutorie - One of the best experts on this subject based on the ideXlab platform.

  • The future of high-Technology Crime: A parallel Delphi study
    Journal of Criminal Justice, 1995
    Co-Authors: Larry E. Coutorie
    Abstract:

    Abstract This study attempts to forecast the future nature of high-Technology Crime. High Technology can be defined as a form of sophisticated electronic device — computer, cellular telephone, and other digital communication — that is in common use today. Criminal activity involving these devices now usually takes the form of manipulating the device to aid in the performance of some criminal activity, such as using cellular telephones in drug deals to thwart government intervention or a computer program to achieve a theft of money or data. Technology changes at an astounding rate while law enforcement techniques, which traditionally are reactionary, do not.