Index_S


S

Sablan, Bernadette, 65

Sabotage, 378, 468

Sadistic (anger excitation) behavior of offenders, 157

Safeback, 28, 261

SafeWeb, 497

Salgado, C., 486

Samba, 320

Satellite:

networks, 370

television encryption mechanisms, 480

Scanners, 37, 98, 176, 223

Scientific evidence, 183–4

four criteria, 183

Scientific measurements, 338

Scientific Working Group for Digital Evidence (SWGDE), 3, 27

Script command, 396

Scripting direct examination, 182

Screen photographs, 225

SCSI drives, 200, 227

Search:

engines, 491–3, 672

warrant, 213

affidavit for, 215

Search and seizure manual, 34, 172, 180, 213, 215, 224

SEARCH training program, 26

SearchEngineWatch, 492

Sebek, 524

Secondary scene, 664

Secret Service, 56

Secret!, 353

Sectors, 200

Secure CRT, 99, 283

Secure Shell (SSH), 99, 273, 283, 363, 428

Secure Socket Layer (SSL), 499

Securities and Exchange Act of 1934 (SEC 2002), 11

Securities and Exchange Commission, 11

Security Event, 377

Security Focus, 521

Seizure of digital evidence, 106–8

Sensing and diagnostic modules in vehicles, 13

Sentencing Advisory Panel (SAP) (UK), 80

September 11 terrorist attacks, 85

Server:

logs, 462–4

and ports, 448–50

Service providers, 37

Session:

hijacking, 524

layer, 664

Severity of crime, 221

Sex Offender Registries, 493

Sex offenders:

analyzing, 586–7

motivational typologies, 592

Sex Offenders Act, 1997, 80

Sex offenders on the Internet, 561, 577,

adult, 589

control over victim, 589–91

interpreting digital evidence, 577–8

investigative reconstruction, 583–93

motivation, 591

private citizens luring, 579–80

and special interest newsgroups, 572

undercover investigation, 579–80

Sex offenses:

investigation, role of computer in, 571

on the Internet

crime scene characteristics, 588–91

legal considerations, 567–70

Sexual abuse, 564

cases:

crime scene protocols and evidence handling procedures, 570

identifying and processing digital evidence, 570–4

Sexual assaults, investigating and prosecuting, 567

SHA, 219

Shoe prints, 20

Showmount:

- a, 470

on Unix, 377

Signature:

aspects, 664

behaviors, 552, 664

intrusion detection systems, 405

SilentRunner, 29, 408, 438

SIM Manager Pro, 351

Simpson, O.J., 2

Sinclair computers, 195

Single Connector Attachment (SCA 80), 228

Skill level of computer criminal, 544–1

Slack space, 269

Sleepycat Web site, 233

Sleuth Kit, 28, 263, 266–7, 300, 304, 310, 312–13, 327, 330

SLIP (Serial Line Internet Protocol), 426–3

Smart cards, 13

SMART tool, 28, 266, 302, 327

file recovery process, 303

SMTP (Simple Mail Transfer Protocol), 363, 504

forgery method, 464

Snagit, 491

SnapBack DatArrest, 261

SNEFRU, 219

Sniffers, 36, 408, 419, 427

configuration, 430

placement, 429–31

special purpose, 430

SNMP (Simple Network Management Protocol), 394

Snoop on Solaris, 428

Snort, 405

Snuffsex, 490

Social engineering, 523

Society for Electronic Access, 45

SOCL proxy, 488

Software piracy, 30

Software, 668

Solaris, 289, 293, 311, 417

workstation, 547

Sony Corporation of America v. Universal City Studios, Inc., 59

Sourcecode, 29

Sources of digital evidence, 33

identification or seizure, 628–30

PDAs related, 353–5

Souvenir, 672

SPANned port, 429

SQL databases, 350

Stalkers, 480

power of, 597

Stalking, 149, 378

see also cyberstalking

Standard Developer's Kits (SDK), 350

Standard operating procedures (SOPs), 91, 108, 526

Standard telnet, 363

Standard Working Group on Digital Evidence (SWGDE), 11

Standardization, need for, 2

Starnet Communications, 365

investigation into, 4

State tables, 469

Steve Jackson games case, 56

Stiblitz, G., 194

Storage media and data hiding, 199–201

Strace for NT, 287

Stratigraphy, 247

Strings, 297

Stumpf, Raymond, 162–3

Subdirectories, 259

Subject matter jurisdiction, 43

Subnet masks, 444

SubSeven, 277, 286, 449

Suckit, 524

Sudo, 544

Sun:

computer, 199

RISC-based computers, 198

Remote Procedure Call (RPC) system, 376

Sparc-based hardware, 290

XDR, 377

Superblock, 292

"Surface details" of potential evidence, 106

Surfsaver, 491

Swap:

files, 528

partition, 205

Sweden, 356

Switched Port Analyzer (SPAN), 429

Switches, 362, 427

Symbol, 664

SYN packet, 450

Synchronous chat networks, 480, 486, 664

Sysinternals.com, 287

System administrator, 14




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net