For every working professional, it’s important to balance the demands of their income-generating, outward-facing, social persona against their irreplaceable, valuable private life.
Whether you are a rising associate or a C-level executive, separating and insulating your personal life from your public one is critically important so you can protect yourself, your loved ones, and the many non-work aspects of your life that you hold dear and precious. After all, what’s the point of working so hard on our careers if we allow the personal aspects of our life to be harmed, violated, or exploited?
Personal Privacy for Professionals provides actionable strategies and practical tactics you can employ to protect your private life immediately.
Regardless of why, how, or when it occurs, we do know for a fact that victims never expect it to happen and are often blindsided when their privacy does get violated.
We want to prevent that from happening to you.
Personal Privacy for Professionals covers both your physical world privacy and online privacy with clear, easy-to-understand directions that you can begin employing immediately. We intentionally avoid jargon or lengthy technical discussions and instead get to the guts of the matters fast.
It’s time to regain control of your privacy.
Since you are reading this description, we are going to infer that you have been thinking about privacy issues, likely your own but perhaps also that of people whom you care about.
GET LOST: Personal Privacy Strategies for Extremely Busy People provides a comprehensive framework to give you significant control over your privacy, what information you choose to share with the outside world, and what information you choose to keep secure and protected. GET LOST provides concise and actionable tactics, techniques, and procedures that you can employ right now to protect yourself.
Filled with concise, easy-to-follow instructions and helpful visuals, learn how to protect yourself from threat actors including stalkers, criminals, online harassers and trolls, as well as the highly-invasive companies and interest groups that seek to profit from your information.
There are invisible threats to our privacy that every person should be aware of, such as governments, criminals, interest groups, and a wide spectrum of for-profit industries and companies. More directly and immediately, extreme personal privacy may be fundamentally necessary to protect lives from abusive former partners, disgruntled employees, stalkers, internet trolls, or any other number of focused and determined threat actors that may seek to inflict personal harm.
NOWHERE TO HIDE: Open Source Intelligence Gathering provides practical insight into the investigative tools and open source intelligence gathering (commonly known as “OSINT”) used by law enforcement, the media, and the general public to identify individuals involved in the events of January 6, 2021, at the U.S. Capitol Building in Washington, DC.
NOWHERE TO HIDE retraces the FBI’s investigative techniques – some using cutting-edge technology and others using old fashioned, knocking-on-doors detective work – used to pursue the hundreds of thousands of leads received from the general public. NOWHERE TO HIDE is filled with real world case studies, specific resources and practical “how to” guides to equip both beginner and seasoned OSINT investigators with the right tools for their OSINT toolboxes.
This insightful volume includes 36 case studies that follow the FBI’s investigations of individual persons of interest, including the tactics, techniques, and procedures used by law enforcement, the media, and public sleuths to track down, identify, and – most importantly – verify the identities of suspected rioters. Learn how the FBI sifted through hundreds of thousands of leads, false positives, dead ends, as well as numerous unexpected leads to perform their investigations.
NOWHERE TO HIDE provides vivid context around the events of January 6, 2021, at the U.S. Capitol Building in Washington, DC, which left five people – one police officer and four protestors – dead by the end of the assault.
Effective OSINT research requires a combination of technical knowledge to find the Who, What, When, Where, and How threads of data and information as well as taking into account our unpredictable human nature that sometimes leads us to do the things we do (the Why). OSINT is both science and art. NOWEHERE TO HIDE provides practical, actionable information to help both novice and expert investigators, researchers, advocates, and journalists navigate and penetrate OSINT resources to find the information and evidence they seek.
Simply put, this book was written for You. You’re busy. This guidebook is written clearly and concisely to get to the point to help protect every person who uses a computer, mobile phone or tablet. Cyber security is not only about protecting governments or companies from spies. It’s so much more, and also so much more personal. Cyber security is about:
stopping trolls from stealing you or your loved one’s intimate photos and posting them online without your consent,
protecting your family from bullies, predators, and stalkers,
stopping thieves from draining your bank accounts or stealing your identity,
preventing companies from secretly tracking you because they want to make money off of you,
securing your home WiFi so hackers can’t steal your valuable personal information,
creating safeguards to protect your expensive physical devices and the precious data within,
stopping scammers from damaging both your home life and your career, and
much, much more that protects innocent victims from online crime.
Millions of people continue to work remotely or go to school either partially or completely to fulfill their responsibilities. The need for individuals to take proactive steps for personal cyber security is more important than ever.
This guidebook will help aware individuals like yourself make actionable steps to protect you, those you care about, and your career from cyber threats and online exploitation. Real-life case studies will bring you into the mindset of both cyber criminals and victims to help you protect what’s most important and valuable to you. Included throughout the book are screenshots and informative graphics to provide a clearer picture of instructions, websites and apps that you may consider using. The intention is to make the cyber security steps you personally take less intimidating, more transparent, and more efficient. After reading Practical Cyber Security for Extremely Busy People, you’ll know what to do and how to do it.