IBM Professional Office System (PROFS), 17
Icat, 302
ICQ, 487–9, 669
IDEA, 207
Identification of digital evidence, 106–8, 216
of hardware, 216
Identification Number (MIN), 369
Incident/crime scene protocols, 105–6
Independent component doctrine, 222
Index entries, 260
"index.dat" files, 279, 319
index.db, 316
Individual characteristics, 97, 235
Individuation of evidence, 627
inetinfo.exe, 530
Information, 34
as contraband or fruits of crime, 37
as evidence, 37, 478
as an instrumentality, 37
search and seizure, 34
InfraRed port, 353
Initial interviews and fact checking, 104
Innocence Project, 96
Inode table, 292
Inset Systems, Inc. v. Instruction Set, Inc., 43–4
Instant Messaging (IM), 283, 408, 480, 488–9
Institute of Electrical and Electronic Engineers (IEEE), 365, 367, 664
Instrumentality or information as evidence, 477
INT13h functions, 256
Integrated Disk Electronics (IDE) drivers, 200, 227
Integrity of potential evidence, physical and digital, 108
Intel Corporation, 402, 664
Intel-based computers, 198–9
Intellectual property theft, 179
Intelligent Computer Solutions, 227
Interactive Services Association, 45
International Journal of Digital Evidence, 3
International Organization of Computer Evidence (IOCE), 3, 11
Internet, 12, 483, 667
cafes, 495
dial-up logs, 459
dial-up services, 278
peer support for offenders, 563
perceived anonymity for offenders, 563
as port of entry in United States, 9
related data, 479
role in criminal investigations, 477–9
services, legitimate versus criminal uses, 479–87
technologies and types of criminal activities, 153–7
traces, 278–85, 316–21, 331–4
using as an investigative tool, 489–93
as window to the world of sexual abuse, 564–9
Internet Account Manager, 278–5
Internet Authentication Server (IAS), 459
Internet Control Message Protocol (ICMP), 363
Internet Crimes Against Children Program, 568
Internet Explorer, 279–80, 319
Internet Information Server (IIS), 403, 413, 530
Web servers, 404
Internet News, 281
InternetCash, 503
Internet-in-the-Sky access, 370
Intruder, examining computer of, 553–4
Intrusions, 63
case examples, 525–6, 529
detection system, 94, 102, 106, 122, 386, 390, 394
signature-based, 404–5, 409
investigating, 525–40
legislation, 25
methods, 524
unauthorized access, 72
Investigative methodology, 101–113
Investigative process, 91
effectiveness of, 93
Investigative reconstruction with digital evidence, 115, 117, 408–16, 540–4
Investigative tools, evolution of, 28–30
Invisible Web, The see Online databases
IP (Internet Protocol), 372, 442, 664
address, 363, 422, 457
static versus dynamic assignment, 455
routing, 446–8
spoofing, 524
attack case, 452–63
IRC (Internet Relay Chat) networks, 18, 376, 480, 486, 661
bots, 497–501
bounce (BNC), 472
eggdrop, 525
chat session, 396
Command Cosmos, 513
Finger command, 513
searching and tracking on, 511–16
Who command, 513
Whois command, 513
IRCnet, 486
Ireland, 77
Data Protection Act, 1992, 85
Criminal Evidence Act, 1992, 180
Criminal Justice (Theft and Fraud Offences) Act, 68
Electronic Commerce Act, 2000, 68
Extradition Act, 1965, 78
Iridium, 370
ISP (Internet Service Provider), 10, 37, 283, 661
Isof utility, 537
Istat command, 300