Advanced Criminal Investigations and Intelligence Operations

Home > Nonfiction > Advanced Criminal Investigations and Intelligence Operations > Page 71
Advanced Criminal Investigations and Intelligence Operations Page 71

by Unknown


  • Zambia: English

  • Zimbabwe

  • English

  • Shona

  • Ndebele

  Partially Recognized States

  • Abkhazia

  • Abkhazian (statewide; official)

  • Russian (statewide; official)

  • Kosovo

  • Albanian (territory wide)

  • Serbian (territory wide)

  • English (territory wide, during the NATO occupation of the terri-

  tory on behalf of the UN)

  • Turkish (territory wide, upon request)

  • South Ossetia

  • Ossetian (statewide; official)

  • Russian (statewide; official)

  • Georgian (in Georgian-speaking areas)

  References

  Anonymous (1978). Technique of safe & vault manipulation. Cornville, AZ: Desert Publications.

  BrainyQuote.com, “Bill Gates Quotes.” Available at http://www.brainyquote.com/

  quotes/authors/b/bill_gates.html. Retrieved June 5, 2013.

  BrainyQuote.com, “Carl Sagan Quotes” Available at http://www.brainyquote.com/

  quotes/authors/c/carl_sagan.html. Retrieved June 5, 2013.

  BrainyQuote.com, “Stephen Hawking Quotes.” Available at http://www.brainyquote.

  com/quotes/authors/s/stephen_hawking.html. Retrieved June 5, 2013.

  BrainyQuote.com, “Steve Jobs Quotes.” Available at http://www.brainyquote.com/

  quotes/authors/s/steve_jobs.html. Retrieved June 5, 2013.

  U.S. Army Field Manual FM 30-17 Counterintelligence Operations (1972) (Not Classified)

  U.S. Army Field Manual FM 31-20 Special Forces Operational Techniques (1971) (Not Classified)

  Foster, R. E. (2005). Police technology. Upper Saddle River, NJ: Pearson Prentice Hal .

  Girod, R. J. ( 2009). Infamous Murders and Mysteries: Cold Case Files and Who-Done-Its.

  iUniverse. ISBN 978-0-595-63183-4.

  Hough, H. (1991). Satel ite surveil ance. Port Townsend, WA: Loompanics Unlimited.

  Memorandum from FBI to Senate select Committee, January 13, 1976.

  Morris, J. (1982). Crime analysis charting: An introduction to visual investigative analysis.

  Orangevale, CA: Palmer Publishing.

  Russel , J. L., III. (1979). Involuntary repossession or in the steal of the night. Boulder, CO: Paladin Press.

  Schmidt, E. & Cohen, J. (2013). The new digital age: Reshaping the future of people, nations, and business. New York: Alfred A. Knopf.

  Select Committee to Study Governmental Operations, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans, April 23, 1976.

  527

  FORENSICS AND CRIMINAL JUSTICE

  Girod

  Adva

  A

  nce

  dva

  d

  Adva

  A

  nce

  dva

  d Criminal In

  l I v

  n es

  v tiga

  es

  ti

  tiga on

  o s

  n

  and I

  a

  n

  nd I t

  n e

  t l

  e lige

  lig nce O

  e

  per

  e ati

  a on

  o s

  n

  Criminal In

  l I v

  n es

  v tiga

  es

  ti

  tiga on

  o s

  n

  Tradecraft Methods, Practices, Tactics, and Techniques

  and

  a

  Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is A

  In

  I t

  n e

  t l

  e lige

  lig nce O

  e

  per

  e ati

  a on

  o s

  n

  a covert agent for the government or an identity thief and con man, the methods, practices, dva

  tactics, and techniques are often the same and sometimes learned from the same sources.

  a

  reveals how intelligence officers and investigators conduct their tradecraft. You’ll learn how to nd I nce

  Tradecraft Methods,

  plan an operation, how to build an identity and cover story for deep cover operations, and how to detect those who have created false identities for illegal purposes. You’ll also get insight into Practices, Tactics, and Techniques

  the technical aspects of intelligence (the INTs), counterintelligence, and criminal investigations, n d C

  and legal considerations for conducting intelligence investigations.

  tel

  Topics include

  lig rimina

  • A discussion of black bag operational planning

  e

  • HUMINT (human intelligence)—the gathering of information from human sources nce O

  • DAME (defenses against methods of entry), forced entry into buildings, l I

  safes and combination locks, and automobile locks

  • PSYOPS (psychological operations) and the use of social networks

  p n

  e v

  • ELINT (electronic intelligence) and SIGINT (signals intelligence)—electronic interception r es

  of intelligence, bugs, wiretaps, and other communications interceptions

  ati tiga

  • EMINT (emanations intelligence), which concerns the emanation of data, signals, o

  or other intelligence from C4I systems

  n ti

  • IMINT (imagery intelligence), involving any intelligence gathered using images s o

  • Intelligence files and analytical methods

  ns

  Based upon the author’s training and experience over more than three decades as a law enforcement investigator and military officer, as well as research conducted as an attorney and in academia, the book provides you with an insider perspective on sensitive covert and overt operations and sources. Supplemented with roughly 140 il ustrations and photos, this collection of special skil s and reference materials is essential to the professional investigator and intelligence operative.

  K22681

  Dr Robert J. Girod, JD, PhD

  6000 Broken Sound Parkway, NW

  Suite 300, Boca Raton, FL 33487

  711 Third Avenue

  New York, NY 10017

  an informa business

  2 Park Square, Milton Park

  w w w . c r c p r e s s . c o m

  Abingdon, Oxon OX14 4RN, UK

  w w w . c r c p r e s s . c o m

  Document Outline

  Front Cover

  Contents

  Preface

  Introduction

  Author

  About Robert J. Girod Consulting, LLC

  Chapter 1: Black Bag Operational Planning

  Chapter 2: Human Intelligence

  Chapter 3: HUMINT Surveillance and Undercover Operations

  Chapter 4: Defenses against Methods of Entry

  Chapter 5: Forced Entry into Buildings

  Chapter 6: Safes, Combinations, and Automobile Locks

  Chapter 7: Psychological Operations and Social Networks

  Chapter 8: Electronic Intelligence and Signals Intelligence : Bugs and Taps

  Chapter 9: Emanations Intelligence

  Chapter 10: Imagery Intelligence

  Chapter 11: Internet and Database Open Sources

  Chapter 12: Intelligence Files and Analytical Investigative Methods

  Chapter 13: Intelligence, Surveillance, and Misappropriation Law

  Chapter 14: Computer Forensics : Sea
rches, Evidence, and Notice

  Chapter 15: Computer Forensics : Discovery and Spoliation

  Appendix A: Electronic Surveillance Law

  Appendix B: Computer Crime and Privacy Laws

  Appendix C: Government Data Privacy Laws

  Appendix D: Consumer and Credit Data Privacy Laws

  Appendix E: Lists of Most Common Languages

  References

  Back Cover

 

 

 


‹ Prev