 |
The
Spyware TSCM Manual
Computer Spyware Technical Surveillance Countermeasures
By Robert Pac,
CSTSCM Expert
A Guide For Detecting hardware And Software Computer Monitoring
Spyware Devises. A New Generation And Booming Countermeasures Service
8 1/2 X 11, 102
Pages
Perform Bound, Forms And Aids
Hardcopy $28.00 eBook $18.00 |
Conventional TSCM and countermeasures
training has traditionally consisted of sweeping rooms and phone lines
for bugs and wiretaps. However, with the boom in digital and computer
technology, the methods of how eavesdropping, bugging and wiretapping
is occurring has changed. This is your golden opportunity to add the lucrative
and booming service of digital detection of computer snooping to your
investigative and countermeasures services. The covert installation of
Spyware on one's computer is huge and the demand to detect and kill this
new form of bugging is huge. Not only that, there are very few services
around with the technical know-how to offer this type of service. The
field is now wide opened and booming!
Huge And Booming Market!
There are now more computers in the world then there are people. Each
and every one of these computers and the people that own them are a potential
client since everyone is or should be concerned about computer bugging,
monitoring and eavesdropping. The market for this service is wide-opened
and there are just not enough trained people to handle the client case
assignments. This little specialization could cause a huge explosion in
your investigative services.
|
•
Introduction
• The Spyware Threat
• What is Spyware
• Warning Signs That Spyware In Installed On A Computer
• Spyware Classifications
• Software Monitoring Surveillance Spyware
• Hardware Keystroke Loggers
• How Computer Monitoring Surveillance Spyware Is Installed
• How Software Surveillance Spyware Works
• Real Case Examples Of Spyware Installations
• Preliminary Computer Investigation Steps
• Client Contract Information Worksheet/Form
• Who Has The Right To Consent To A Search
• Authorization To Search Computer for Unauthorized Spyware
Monitoring
• Common Spyware Detection Methods And Misconceptions
• Basic Security Concepts
• Incident Response
• Evidence Collection Procedures
• Computer Spyware Technical Surveillance Countermeasures
• How Software Keystroke Loggers Work
• How Anti-Monitoring Programs Work To Detect Spyware
• Spyware Detection Program Reviews
• The Anti-Spyware Countermeasures Toolkit
• Anti-Spyware Program Vulnerabilities
• When Anti-Spyware Itself Contains Or is Spyware
• Spyware Detection Checklist
• Creating A System Restore Point
• Booting In Safe Mode
• Showing Hidden Files
• SpyCop- What Is Is And How To use It!
• Snoopfree Privacy Shield-What It Is And How To Use It!
• Mac Times
• Software Default Hotkey Combinations
• Firewalls And ZoneAlarm Guide And Tips
• Firewall Vulnerabilities
• Process Explorer Tricks
• The Filemon Tricks
• Spyware Software Signatures
• Is It Spyware? How To Determine If What You Find Is Spyware/Snoopware!
• Hardware Keystroke Logger Countermeasures
• Hardware Default Hotkey Combination Tricks And Techniques
• Computer Spyware Technical Surveillance Countermeasures
Inspection Reports
• Disinformation Exposing The Spy And Computer Snooper
• Federal Laws And Regulations Relating To Spyware And Email
Interceptions
• State Laws And Regulations Relating To Spyware And Email
Interceptions
• You The Investigator
• Post Incident Recovery
• Program Installation Prevention
• Resources And Aids
• Log Of Events Form
• Evidence Chain Of Custody Form
|
This in depth manual, Computer
Spyware Technical Surveillance Countermeasures; hands you the technical
know-how, forms and step-by-step procedures needed to perform countermeasures
services on computers. You are handed step-by-step techniques on how to
detect and kill computer bugging, tapping and eavesdropping along with
the forms you can copy and use and the tools to obtain (many of them are
free) so you can become an expert and start performing this lucrative
and booming service in your area. There is nothing else like this on the
market and this is a brand new investigative goldmine you can get into
right now! A huge opportunity is now knocking on your door! It's now up
to you to open that door and start down the road to vastly increasing
your case assignment load in this new area of booming specialization by
ordering this training material today! We know you will be delighted that
you did this.
The
Spyware TSCM Manual
Computer Spyware Technical Surveillance Countermeasures
A Guide For Detecting hardware And Software Computer Monitoring Spyware
Devises.
A New Generation And Booming Countermeasures Service
By Robert Pac, CSTSCM Expert
8 1/2 X 11, 102 Pages, Perform Bound, Forms And Aids $28.00
The
Spyware TSCM Manual Hardcopy

The Spyware TSCM Manual eBook $18.00
Order as an ebook and we will email you a temporary
link to download it in a PDF File.
How
To Order:
TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!
[Order
The Book Online]
Other
Ways To Order:
Order by phone @ 512-719-3595
Order by fax @ 512-719-3594
(Click
Here For Fax-in Form Your Can Print Out )
Order by mail @
Thomas Investigative Publications, Inc.
P O Box 82148, Austin Texas, 78708
(Click
Here For Mail-in Form You Can Print Out )
Insured
UPS shipping: $8.00
RETURN
TO eBOOK MENU
REVIEW
OTHER COUNTERMEASURES TRAINING MATERIAL
REVIEW
OTHER INVESTIGATIVE COMPUTER RELATED TRAINING MATERIAL
REVIEW
COUNTERMEASURES GEAR
REVIEW
SOFTWARE PROGRAMS
RETURN TO MAIN BOOK MENU
Copyright: 2010, Thomas Investigative Publications, Inc.
All Rights reserved.
|