Covert Operations on the Internet
This chapter introduces the reader to considerations when working covertly or undercover on the Internet. These considerations include the basic outlines for the policy, management concerns, and ethical issues. Special areas of attention, such as entrapment, identity take over, and appropriating versus assuming online identifies, Terms of Service agreements, are also discussed. Additionally, the major steps are covered to consider when developing an online undercover personas for use in investigations. The unique challenges faced with developing an undercover social media profile are also analyzed. Additionally, the importance of preventive steps and countermeasures is also noted. Finally, suggestions ...
Get Investigating Internet Crimes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.