TACACS authentication server, 459
Tamai, Billy, 159
Tapping, 420, 428
TAR file, 234
Target, 32–4, 664
Targeting:
concept of broad versus narrow, 545
TASK, 300
TCP (Transport Control Protocol), 363, 372, 442, 664
connection management, 451
stream, 362
TCP/IP (Transport Control Protocol/Internet Protocol), 362, 422, 664
abuses of, 452–3
network traffic, class characteristics, 404
related data, 472
related digital evidence, 457–8
Tcpdump, 29, 408, 428–9, 433–5
TCT, 300, 312
Technology:
and criminal law:
European perspective, 65
US perspective, 41–62
and law, 41
jurisdiction, 42–5
and modus operandi, 150–8
Technophobia, 149
Telecommunications Act of 1996, 46
Telephone:
companies, 37
traditional systems, 12
Teleport, 491
Telnet, 283, 363–4, 409, 468, 486
Talkers, 486
Temporal analysis, 244–7
Temporal aspects of evidence, 121
Terrorist:
activities, 14
information awareness, 56
Teso Burneye, 525
The Coroner's Toolkit (TCT), 299, 538
Theft:
of assets, 149
of computer services, 30
of electronically stored information alteration or, 30
Thomases' BBS, 44
Three-phase approach, 391
Threshold assessments
fictitious, 136–45
and full investigative reports, 135
Time Division Multiple Access (TDMA), 369–70
Timeline and relational reconstructions, conceptual view of, 122
Timestamp logs, 511
Tivoli Storage Manager, 393
Token passing, 365
Toolkit, distinctive features of, 552
Total Information Awareness, 56
Townsend, Pete, 580
Traceroute, 447–8
Tracks, 200
Traffic in stolen passwords, 30
Translators, 371
Transport layers, 373, 443, 445, 673
digital evidence, 441
Domain Name System (DNS), 445
Internet Protocol and Cellular Data Networks, 443–4
IP Addresses, 444–5
TCP/IP, 442
Trash folder, 328
Travis case, 459, 479
Treaty of Amsterdam, 66
Triage, 105–6
Trin00, 540
Tripwire, 286
Trojan horse programs, 277, 498, 538
Trophy, 673
Tsutomu Shimomura's computers, 453
TULP, 29