Amazon.com description: Product Description
: This book is about investigating information-based crimes in the twenty-first century. Information-based crimes against persons involve the theft, compromise, misuse, or manipulation of personal data or knowledge assets. Such crimes include identity theft, social engineering, the theft of personal information storage areas or repositories, and the theft of physical information assets such as papers, manuscripts, or rare books. Other assets that can become targets include financial documents and transactions, e-mails, diaries, calendars, spreadsheets, and other personal information, such as medical records. Investigators will learn from this text how to evaluate the victimology in a case. How did the victim's information fall prey to attack? Why was this victim chosen? In each type of attack, suggestions are made for completing a vulnerability analysis on the victim's assets to determine the methods used in the suspect's attack. Once an M.O. (method of operation) becomes established for an UNSUB (unknown suspect), the text presents ideas on narrowing the universe of suspects and in linking them to the offense. The book also offers investigative checklists for probing into information-based crimes against persons. In addition, the narrative strives to take a psychological methodology in investigating these cases. By reading the strategies provided in this book, private investigators and law enforcement will be armed for dealing with today's "foxes" that threaten our interconnected, global information community.