Index
A
American computer analyst,
Android
Linux-based Google phone,
115
Anti-cybersquatting Consumer Protection Act (ACPA),
100
Anti-malware software,
170,
233
Anti-spyware protection software,
221
Anti-spyware software,
185
Apple’s MobileMe (iCloud),
145,
230
Adobe PDF file/Zip file,
93
B
Bluetooth-enabled devices,
156
C
Calls recording, iphone,
67
Boston Marathon video surveillance,
166
fake surveillance device,
171
Microsoft’s Xbox Kinect system,
172
military operations, satellite,
169
Nanny Cam, home invasion caught,
164
personal computers (PCs),
161
satellite surveillance systems,
168
security surveillance systems,
163–165
video surveillance warning signs,
167
Cellebrite, UFED device,
197
Charge-coupled device (CCD),
171
Closed-circuit television (CCTV),
166
Communications Assistance for Law Enforcement Act (1994),
141
Crimes
Cyber-bullying,
Cyber intelligence analyst,
19
Cyber security engineer,
19
D
legal and ethical concerns,
198–214
Data exploitation concerns,
190
Data loss prevention (DLP),
183
by using identify finder,
188
Data transmissions,
46,
47
Department of Defense (DoD),
Department of Homeland Security (DHS),
Department of Justice,
130
Apple’s MobileMe (iCloud),
145
vs. application installation,
150
fleet location tracking,
152
pinpointing location,
154
radio-frequency identification (RFID),
148,
149
for reconnaissance today,
147
advanced data capture and analysis,
198
mobile device forensics,
197
stochastic forensics,
198
Digital landscape
viewing,
Digital mobile phone,
113
Digital reconnaissance, ,
landscape,
threat of,
Digital spying,
by American government,
art of,
history of,
legal concepts of,
camera,
mitigate and defend,
threat of,
Digital video recorder (DVR) system,
166
network-level protocols,
51
Drones,
E
Electronic Communications Privacy Act (ECPA, 1986), ,
136,
137
Electronic tracking device,
138
capturing data in transit,
192
Espionage,
F
Federal Bureau of Investigation (FBI),
163
typical host-based firewall,
189
G
Global positioning system (GPS)
H
“Hardening” of systems, guidelines to,
221
general reconnaissance,
222
Host-based intrusion detection (HIDS) software,
186
I
information, physical theft of,
220
Edward Snowden’s passport,
49
e-mails/texts, receiving,
225
online reconnaissance,
54
Apple’s location services,
62
data searching with Google,
56
data threat (metadata),
62
Microsoft tracking protection list,
57
scanning/sniffing/mapping,
59
physical reconnaissance,
63
BackTrack’s social engineering toolkit,
65
iphone, calls recording,
67
legal/ethical concerns,
67–84
searching online databases,
53
social engineering and trickery,
223
Whois search, conducting,
54
Infringing domain name (IDN),
101
Intelligence collection,
Internet protocol (IP),
127
Intrusion detection system (IDS),
186
Intrusion prevention system (IPS),
186
J
K
Kali Linux distribution,
224
L
Law enforcement professionals
police, agents, and detectives,
20
Linux-based Google Android phones,
115
Location-based service (LBS),
113,
149
Location Privacy Protection Act of 2012,
130,
131
M
global positioning system,
127
location-based services,
125,
126
subscriber identity module (SIM) card,
127
Man in the Middle (MITM) attacks,
61
Microsoft-based encryption method,
192
Microsoft Windows Firewall,
188
Military surveillance,
10
Mobile phones technology,
125
hiding, applications,
124
jailbreaking and prepping,
121
legal and ethical concerns,
130
MSpy
installing/configuring,
122
turning, on location services,
123
Mobile technology, threat,
installing/configuring,
122
N
National Security Agency (NSA), ,
46
Snowden, Edward Joseph,
New York City Police Department (NYPD),
133
O
Orwell, George,
P
Packet-level analysis,
66
Penetration Testers,
18,
52
Personal computers (PCs),
161,
221
Phones, data transmission by,
66
Private investigator (PI),
14,
20
Protection methods
mitigation techniques,
219
R
Radio-frequency identification (RFID),
148
Remote administration tool (RAT),
170
Removable media
S
Security drone,
Smartphones
SMTP, network-level protocols,
51
troubleshoot problems,
193
SNMP, network-level protocols,
51
Snowden, Edward Joseph, ,
bypass security biometrics,
227
information gathering,
88
bugging and recording,
95
social engineering toolkit (SET),
92
legal/ethical concerns,
99–111
protected/unprotected networks,
87
Social engineering toolkit (SET),
224
to generate payload,
93,
95
Spy camera/cell phone CN-SPY008,
171
banking and finance sector,
15
cyber intelligence analyst,
19
cyber security engineer,
19
importance of,
National Security Agency (NSA),
newspaper headlines, activity,
11
portable storage devices,
16
private investigation,
20
Snowden, Edward Joseph,
social media concerns,
15
Stored Communications Act (SCA),
136
Subscriber identity module (SIM) card,
96,
127
T
Terrorism,
Threat, digital reconnaissance,
Tracking
Traffic cameras,
Transmission control protocol (TCP),
127,
147
U
Universal serial bus (USB)
V
W
Windows BitLocker encryption,
192
Wireless networks,
61,
135
X
Y
Yahoo map, tracking with latitude,
128