A&M Records v. Napster, 59
Abduction, 22
Abilene, 360
Access Control Lists (ACLs), 260
Access Data, 270
Distributed Network Attack (DNA) application, 270
Access point (AP), 367, 661
Accidental data loss, 328
Accusation or incident alert, 103–4
ACK (Acknowledgement) bit, 450
Acorn computers, 195
Acquisition over network, 539
Ad hoc network, 364, 661, 667
Ada, A., 191
Addressing schemes, 426, 441
Address Resolution Protocol see ARP
Admissibility of digital evidence, 170–2
Adobe Acrobat, 491
encrypted, 270
Advance in communications technology use in criminal activity, 150
Advanced Query Options, 446
Advanced Research Projects Agency (ARPA), 147, 360
see also ARPANET
Advanced Run Length Limited (ARLL), 200
Advanced Technology Attachment (ATA) drives, 200
Affidavit for warrant, 388
AIX, 289
Alibi:
investigating an, 618
location as, 622
times as, 620
Allwhois, 493
Altavista, 491, 493
Amateur Action, 44
American Civil Liberties Union (ACLU), 45, 47
American copyright law, 57
American Oil Co. v. Valenti, 175
American Society of Crime Laboratory directors (ASCLD 2003), 3, 27
AmTote, 372
Analysis techniques, 111–12
assessment (content and context), 111
experimentation, 111
fusion and correlation, 111
validation, 111
Anawave's WebSnake, 491
Anger:
excitation (sadistic) behaviors, 163–4, 665
retaliatory (anger or displaced) behaviors, 159, 162–3, 665
Anonymizer.com, 497
Anonymous Cash, 503
"antiforensic" tools, 525
Anti-static environment, 223
AntiVirus programs, 277
AOL, 282, 486
IM, 283, 480
Apple computers, 195
Application and system event logs, 271
Application layer, 378–9, 661
crimes, 378
Archambeau, Andrew, 160
Archie, 481
ARCNET (Attached Resource Computer Network), 365–6, 662
Areas of specialization in handling digital evidence, 1
Argus, 362, 377, 390, 423, 435, 438, 455
ARIN, 494
Armistead-Smathers, Cynthia, 601
ARP (Address Resolution Protocol), 363, 425–6, 438, 661, 664
ARP cache, 426, 431
ARPANET, 360
map of, 361
ARPwatch, 431
Arson:
and computer crime:
comparison of features in, 542
comparison of crime scene characteristics in, 543
and intrusion investigations, parallels between, 541
ASCII, 198, 261, 377
Ashcroft v. American Civil Liberties Union et al., 48
Ashcroft v. Free Speech Coalition, 572
Assessment:
reports, common format for, 136
of worth, 104–5
Association of Chief Police Officers (UK), 107, 224
Asynchronous Discussion Groups, 479
AT&T/IBM Global Network Dialer, 278
Atanasoff-Berry Computer (ABC), 194
diagram of, 194
ATM (Asynchronous Transfer Mode), 19, 365, 367, 420, 423, 661
cells, 427
switches, 427
ATMARP, 427
Atomic bomb, 148
Attach methods, different, 524
Attached Resource Computer Network see ARCNET
Attachment Unit Interface (AUI), 420
Attack Yahoo, 540
Attribution, 271
Auction fraud, 17
Audit trail, 107
Australian Crimes Act Offenses Relating to Computers, 26
Authentication of digital evidence, 171, 172–5
logs, 459
servers, 391
Authorization and preparation of digital evidence, 212–13
Automated modus operandi, 549
Automated totalisator system, 372
Automatic Number Identification (ANI), 388
logs, 101
Autopsy Forensic Browser, 267, 300, 305, 308
AutoTrack, 493
Avalanche Operation, 580
Awareness of digital evidence, increasing, 13–15
Axes to pathological criminals, 147–8