Central communication point for IEEE 802.11 wireless networks.
A protocol in the TCP/IP suite that is used dynamically to associate network layer IP addresses with data-link layer MAC addresses.
Networks established when Bluetooth-enabled (or similar) devices come into proximity.
These include behaviors that evidence offender sexual gratification from victim pain and suffering. The primary motivation for the behavior is sexual, however the sexual expression for the offender is manifested in physical aggression, or torture behavior, toward the victim.
These include offender behaviors that are expressions of rage, either towards a specific person, group, institution, or a symbol of either. The primary motivation for the behavior is the perception that one has been wronged or injured somehow.
Software that performs a specific function or gives individuals access to Internet/network services.
Provides the interface between people and networks, allowing us to exchange e-mail, view Web pages, and utilize many other network services.
A connection-oriented network technology that provides gigabit-per-second throughput. This high-performance network technology can transport high-quality video, voice, and data.
One of the earliest local area networking technologies initially developed by Datapoint Corporation in 1977. Uses 93-ohm RG62 coaxial cable to connect computers. Early versions enabled computers to communicate at 2.5 Mbps. A newer, more versatile version called ARCNET Plus, supports 20 Mbps throughput.
Any type of forensic evidence that is representative or suggestive of behavior.
The process of examining forensic evidence, victimology, and crime scene characteristics for behavioral convergences before rendering a deductive criminal profile.
A motivational typology that infers the motivation (i.e. Anger-retaliatory, Assertive, Reassurance, Sadistic, Profit, and Precautionary) of behavior from the convergence of other concurrent behaviors. Single behaviors can be described by more than one motivational category, as they are by no means exclusive of each other.
Any fire or an explosive that is designed to inflict damage in a wide reaching fashion. In cases involving broad targeting, there may be an intended target near the point of origin, but it may also be designed to reach beyond that primary target for other victims in the environment.
Cleverly crafted input to a program that intentionally provides more data than the program is designed to expect, causing the program to execute commands on the system. Computer intruders use buffer flows to gain unauthorized access to servers or escalate their privileges on a system that they have already broken into.
An application that can run on a personal computer enabling people to connect to the computer using a modem and participate in discussions, exchange e-mail, and transfer files. These are not part of the Internet.
Those victims that an offender causes to suffer loss, harm, injury, or death (usually by virtue of proximity), in the pursuit of another victim.
Individuals who break into computers much like safe crackers break into safes. They find weak points and exploit them using specialized tools and techniques.
As defined in Federal and State Statutes. Includes theft of computer services; unauthorized access to protected computers; software piracy and the alteration or theft of electronically stored information; extortion committed with the assistance of computers; obtaining unauthorized access to records from banks, credit card issuers or customer reporting agencies; traffic in stolen passwords and transmission of destructive viruses or commands.
Literally interpreted as meaning the "body of the crime" - refers to those essential facts that show a crime has taken place.
The determination of the actions surrounding the commission of a crime. This may be done by using the statements of witnesses, the confession of the suspect, the statement of the living victim, or by the examination and interpretation of the physical evidence. Some refer to this process as crime scene reconstruction, however the scene is not being put back together in a rebuilding process, it is only the actions that are being reconstructed.
A location where a criminal act has taken place.
The discrete physical and behavioral features of a crime scene.
The nature of the relationship between offender behavior and the crime scene in the context of an entire criminal event (i.e. point of contact, primary scene, secondary scene, intermediate scene, or disposal site).
Any offense where the modus operandi or signature involves the use of a computer network in any way.
William Gibson coined this term in his 1984 novel Neuromancer. It refers to the connections and conceptual locations created using computer networks. It has become synonymous with the Internet in everyday usage.
The use of computer networks for stalking and harassment behaviors. Many offenders combine their online activities with more traditional forms of stalking and harassment such as telephoning the victim and going to the victim's home.
Any convergence of digital evidence that is left behind by a victim or an offender. Used to infer behavioral patterns.