by Unknown
• Zambia: English
• Zimbabwe
• English
• Shona
• Ndebele
Partially Recognized States
• Abkhazia
• Abkhazian (statewide; official)
• Russian (statewide; official)
• Kosovo
• Albanian (territory wide)
• Serbian (territory wide)
• English (territory wide, during the NATO occupation of the terri-
tory on behalf of the UN)
• Turkish (territory wide, upon request)
• South Ossetia
• Ossetian (statewide; official)
• Russian (statewide; official)
• Georgian (in Georgian-speaking areas)
References
Anonymous (1978). Technique of safe & vault manipulation. Cornville, AZ: Desert Publications.
BrainyQuote.com, “Bill Gates Quotes.” Available at http://www.brainyquote.com/
quotes/authors/b/bill_gates.html. Retrieved June 5, 2013.
BrainyQuote.com, “Carl Sagan Quotes” Available at http://www.brainyquote.com/
quotes/authors/c/carl_sagan.html. Retrieved June 5, 2013.
BrainyQuote.com, “Stephen Hawking Quotes.” Available at http://www.brainyquote.
com/quotes/authors/s/stephen_hawking.html. Retrieved June 5, 2013.
BrainyQuote.com, “Steve Jobs Quotes.” Available at http://www.brainyquote.com/
quotes/authors/s/steve_jobs.html. Retrieved June 5, 2013.
U.S. Army Field Manual FM 30-17 Counterintelligence Operations (1972) (Not Classified)
U.S. Army Field Manual FM 31-20 Special Forces Operational Techniques (1971) (Not Classified)
Foster, R. E. (2005). Police technology. Upper Saddle River, NJ: Pearson Prentice Hal .
Girod, R. J. ( 2009). Infamous Murders and Mysteries: Cold Case Files and Who-Done-Its.
iUniverse. ISBN 978-0-595-63183-4.
Hough, H. (1991). Satel ite surveil ance. Port Townsend, WA: Loompanics Unlimited.
Memorandum from FBI to Senate select Committee, January 13, 1976.
Morris, J. (1982). Crime analysis charting: An introduction to visual investigative analysis.
Orangevale, CA: Palmer Publishing.
Russel , J. L., III. (1979). Involuntary repossession or in the steal of the night. Boulder, CO: Paladin Press.
Schmidt, E. & Cohen, J. (2013). The new digital age: Reshaping the future of people, nations, and business. New York: Alfred A. Knopf.
Select Committee to Study Governmental Operations, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans, April 23, 1976.
527
FORENSICS AND CRIMINAL JUSTICE
Girod
Adva
A
nce
dva
d
Adva
A
nce
dva
d Criminal In
l I v
n es
v tiga
es
ti
tiga on
o s
n
and I
a
n
nd I t
n e
t l
e lige
lig nce O
e
per
e ati
a on
o s
n
Criminal In
l I v
n es
v tiga
es
ti
tiga on
o s
n
Tradecraft Methods, Practices, Tactics, and Techniques
and
a
Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is A
In
I t
n e
t l
e lige
lig nce O
e
per
e ati
a on
o s
n
a covert agent for the government or an identity thief and con man, the methods, practices, dva
tactics, and techniques are often the same and sometimes learned from the same sources.
a
reveals how intelligence officers and investigators conduct their tradecraft. You’ll learn how to nd I nce
Tradecraft Methods,
plan an operation, how to build an identity and cover story for deep cover operations, and how to detect those who have created false identities for illegal purposes. You’ll also get insight into Practices, Tactics, and Techniques
the technical aspects of intelligence (the INTs), counterintelligence, and criminal investigations, n d C
and legal considerations for conducting intelligence investigations.
tel
Topics include
lig rimina
• A discussion of black bag operational planning
e
• HUMINT (human intelligence)—the gathering of information from human sources nce O
• DAME (defenses against methods of entry), forced entry into buildings, l I
safes and combination locks, and automobile locks
• PSYOPS (psychological operations) and the use of social networks
p n
e v
• ELINT (electronic intelligence) and SIGINT (signals intelligence)—electronic interception r es
of intelligence, bugs, wiretaps, and other communications interceptions
ati tiga
• EMINT (emanations intelligence), which concerns the emanation of data, signals, o
or other intelligence from C4I systems
n ti
• IMINT (imagery intelligence), involving any intelligence gathered using images s o
• Intelligence files and analytical methods
ns
Based upon the author’s training and experience over more than three decades as a law enforcement investigator and military officer, as well as research conducted as an attorney and in academia, the book provides you with an insider perspective on sensitive covert and overt operations and sources. Supplemented with roughly 140 il ustrations and photos, this collection of special skil s and reference materials is essential to the professional investigator and intelligence operative.
K22681
Dr Robert J. Girod, JD, PhD
6000 Broken Sound Parkway, NW
Suite 300, Boca Raton, FL 33487
711 Third Avenue
New York, NY 10017
an informa business
2 Park Square, Milton Park
w w w . c r c p r e s s . c o m
Abingdon, Oxon OX14 4RN, UK
w w w . c r c p r e s s . c o m
Document Outline
Front Cover
Contents
Preface
Introduction
Author
About Robert J. Girod Consulting, LLC
Chapter 1: Black Bag Operational Planning
Chapter 2: Human Intelligence
Chapter 3: HUMINT Surveillance and Undercover Operations
Chapter 4: Defenses against Methods of Entry
Chapter 5: Forced Entry into Buildings
Chapter 6: Safes, Combinations, and Automobile Locks
Chapter 7: Psychological Operations and Social Networks
Chapter 8: Electronic Intelligence and Signals Intelligence : Bugs and Taps
Chapter 9: Emanations Intelligence
Chapter 10: Imagery Intelligence
Chapter 11: Internet and Database Open Sources
Chapter 12: Intelligence Files and Analytical Investigative Methods
Chapter 13: Intelligence, Surveillance, and Misappropriation Law
Chapter 14: Computer Forensics : Sea
rches, Evidence, and Notice
Chapter 15: Computer Forensics : Discovery and Spoliation
Appendix A: Electronic Surveillance Law
Appendix B: Computer Crime and Privacy Laws
Appendix C: Government Data Privacy Laws
Appendix D: Consumer and Credit Data Privacy Laws
Appendix E: Lists of Most Common Languages
References
Back Cover