Index_I


I

IBM Professional Office System (PROFS), 17

Icat, 302

ICQ, 487–9, 669

IDEA, 207

Identification of digital evidence, 106–8, 216

of hardware, 216

Identification Number (MIN), 369

Incident/crime scene protocols, 105–6

Independent component doctrine, 222

Index entries, 260

"index.dat" files, 279, 319

index.db, 316

Individual characteristics, 97, 235

Individuation of evidence, 627

inetinfo.exe, 530

Information, 34

as contraband or fruits of crime, 37

as evidence, 37, 478

as an instrumentality, 37

search and seizure, 34

InfraRed port, 353

Initial interviews and fact checking, 104

Innocence Project, 96

Inode table, 292

Inset Systems, Inc. v. Instruction Set, Inc., 43–4

Instant Messaging (IM), 283, 408, 480, 488–9

Institute of Electrical and Electronic Engineers (IEEE), 365, 367, 664

Instrumentality or information as evidence, 477

INT13h functions, 256

Integrated Disk Electronics (IDE) drivers, 200, 227

Integrity of potential evidence, physical and digital, 108

Intel Corporation, 402, 664

Intel-based computers, 198–9

Intellectual property theft, 179

Intelligent Computer Solutions, 227

Interactive Services Association, 45

International Journal of Digital Evidence, 3

International Organization of Computer Evidence (IOCE), 3, 11

Internet, 12, 483, 667

cafes, 495

dial-up logs, 459

dial-up services, 278

peer support for offenders, 563

perceived anonymity for offenders, 563

as port of entry in United States, 9

related data, 479

role in criminal investigations, 477–9

services, legitimate versus criminal uses, 479–87

technologies and types of criminal activities, 153–7

traces, 278–85, 316–21, 331–4

using as an investigative tool, 489–93

as window to the world of sexual abuse, 564–9

Internet Account Manager, 278–5

Internet Authentication Server (IAS), 459

Internet Control Message Protocol (ICMP), 363

Internet Crimes Against Children Program, 568

Internet Explorer, 279–80, 319

Internet Information Server (IIS), 403, 413, 530

Web servers, 404

Internet News, 281

InternetCash, 503

Internet-in-the-Sky access, 370

Intruder, examining computer of, 553–4

Intrusions, 63

case examples, 525–6, 529

detection system, 94, 102, 106, 122, 386, 390, 394

signature-based, 404–5, 409

investigating, 525–40

legislation, 25

methods, 524

unauthorized access, 72

Investigative methodology, 101–113

Investigative process, 91

effectiveness of, 93

Investigative reconstruction with digital evidence, 115, 117, 408–16, 540–4

Investigative tools, evolution of, 28–30

Invisible Web, The see Online databases

IP (Internet Protocol), 372, 442, 664

address, 363, 422, 457

static versus dynamic assignment, 455

routing, 446–8

spoofing, 524

attack case, 452–63

IRC (Internet Relay Chat) networks, 18, 376, 480, 486, 661

bots, 497–501

bounce (BNC), 472

eggdrop, 525

chat session, 396

Command Cosmos, 513

Finger command, 513

searching and tracking on, 511–16

Who command, 513

Whois command, 513

IRCnet, 486

Ireland, 77

Data Protection Act, 1992, 85

Criminal Evidence Act, 1992, 180

Criminal Justice (Theft and Fraud Offences) Act, 68

Electronic Commerce Act, 2000, 68

Extradition Act, 1965, 78

Iridium, 370

ISP (Internet Service Provider), 10, 37, 283, 661

Isof utility, 537

Istat command, 300




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net