The Spyware TSCM Manual
Computer Spyware Technical Surveillance Countermeasures

By Robert Pac, CSTSCM Expert

A Guide For Detecting hardware And Software Computer Monitoring Spyware Devises. A New Generation And Booming Countermeasures Service

8 1/2 X 11, 102 Pages
Perform Bound, Forms And Aids
Hardcopy $28.00 eBook $18.00

Conventional TSCM and countermeasures training has traditionally consisted of sweeping rooms and phone lines for bugs and wiretaps. However, with the boom in digital and computer technology, the methods of how eavesdropping, bugging and wiretapping is occurring has changed. This is your golden opportunity to add the lucrative and booming service of digital detection of computer snooping to your investigative and countermeasures services. The covert installation of Spyware on one's computer is huge and the demand to detect and kill this new form of bugging is huge. Not only that, there are very few services around with the technical know-how to offer this type of service. The field is now wide opened and booming!

Huge And Booming Market!
There are now more computers in the world then there are people. Each and every one of these computers and the people that own them are a potential client since everyone is or should be concerned about computer bugging, monitoring and eavesdropping. The market for this service is wide-opened and there are just not enough trained people to handle the client case assignments. This little specialization could cause a huge explosion in your investigative services.

• Introduction
• The Spyware Threat
• What is Spyware
• Warning Signs That Spyware In Installed On A Computer
• Spyware Classifications
• Software Monitoring Surveillance Spyware
• Hardware Keystroke Loggers
• How Computer Monitoring Surveillance Spyware Is Installed
• How Software Surveillance Spyware Works
• Real Case Examples Of Spyware Installations
• Preliminary Computer Investigation Steps
• Client Contract Information Worksheet/Form
• Who Has The Right To Consent To A Search
• Authorization To Search Computer for Unauthorized Spyware Monitoring
• Common Spyware Detection Methods And Misconceptions
• Basic Security Concepts
• Incident Response
• Evidence Collection Procedures
• Computer Spyware Technical Surveillance Countermeasures
• How Software Keystroke Loggers Work
• How Anti-Monitoring Programs Work To Detect Spyware
• Spyware Detection Program Reviews
• The Anti-Spyware Countermeasures Toolkit
• Anti-Spyware Program Vulnerabilities
• When Anti-Spyware Itself Contains Or is Spyware
• Spyware Detection Checklist
• Creating A System Restore Point
• Booting In Safe Mode
• Showing Hidden Files
• SpyCop- What Is Is And How To use It!
• Snoopfree Privacy Shield-What It Is And How To Use It!
• Mac Times
• Software Default Hotkey Combinations
• Firewalls And ZoneAlarm Guide And Tips
• Firewall Vulnerabilities
• Process Explorer Tricks
• The Filemon Tricks
• Spyware Software Signatures
• Is It Spyware? How To Determine If What You Find Is Spyware/Snoopware!
• Hardware Keystroke Logger Countermeasures
• Hardware Default Hotkey Combination Tricks And Techniques
• Computer Spyware Technical Surveillance Countermeasures Inspection Reports
• Disinformation Exposing The Spy And Computer Snooper
• Federal Laws And Regulations Relating To Spyware And Email Interceptions
• State Laws And Regulations Relating To Spyware And Email Interceptions
• You The Investigator
• Post Incident Recovery
• Program Installation Prevention
• Resources And Aids
• Log Of Events Form
• Evidence Chain Of Custody Form

This in depth manual, Computer Spyware Technical Surveillance Countermeasures; hands you the technical know-how, forms and step-by-step procedures needed to perform countermeasures services on computers. You are handed step-by-step techniques on how to detect and kill computer bugging, tapping and eavesdropping along with the forms you can copy and use and the tools to obtain (many of them are free) so you can become an expert and start performing this lucrative and booming service in your area. There is nothing else like this on the market and this is a brand new investigative goldmine you can get into right now! A huge opportunity is now knocking on your door! It's now up to you to open that door and start down the road to vastly increasing your case assignment load in this new area of booming specialization by ordering this training material today! We know you will be delighted that you did this.

The Spyware TSCM Manual
Computer Spyware Technical Surveillance Countermeasures
A Guide For Detecting hardware And Software Computer Monitoring Spyware Devises.
A New Generation And Booming Countermeasures Service
By Robert Pac, CSTSCM Expert
8 1/2 X 11, 102 Pages, Perform Bound, Forms And Aids $28.00

The Spyware TSCM Manual Hardcopy



The Spyware TSCM Manual eBook $18.00
Order as an ebook and we will email you a temporary
link to download it in a PDF File.

How To Order:
TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!

[Order The Book Online]

Other Ways To Order:
Order by phone @ 512-719-3595
Order by fax @ 512-719-3594

(Click Here For Fax-in Form Your Can Print Out )

Order by mail @
Thomas Investigative Publications, Inc.
P O Box 82148, Austin Texas, 78708

(Click Here For Mail-in Form You Can Print Out )

Insured UPS shipping: $8.00

RETURN TO eBOOK MENU


REVIEW OTHER COUNTERMEASURES TRAINING MATERIAL

REVIEW OTHER INVESTIGATIVE COMPUTER RELATED TRAINING MATERIAL

REVIEW COUNTERMEASURES GEAR

REVIEW SOFTWARE PROGRAMS

RETURN TO MAIN BOOK MENU
 
Copyright: 2010, Thomas Investigative Publications, Inc.
All Rights reserved.