Objectivity, 116
Obscenity, 45–50
Obscene Publications Act, 1959, 66
Offenders:
action, inaction and reaction, 133
choice of weapon, 132
modus operandi, 116, 129, 588
behavior purposes, 150
computer and Internet technologies, 147
motive, computer and Internet technologies, 147
using network to approach and control a victim, 132
and victim relationships, 127
Online:
anonymity and self-protection, 495–503
currency, 503
databases, 493–4
dating sites, 561
investigations, dangers of, 496
sexual offenders, 415, 572
concealment techniques, 573–4
investigating, 574–9
Ontrack, Easy-Recovery Pro, 267
Open computer systems, 12, 21
OPEN Firmware, 197
Open System Interconnection (OSI):
ASN.1, 377
layers, simplified depiction of, 373
Open System Interconnection reference model, 372–3
application layer, 378–9
network and transport layers, 375–3
physical and data-link layers, 373–4
presentation layer, 377
session layer, 376–7
synopsis of, 379
OpenBoot PROM (OBP) firmware, 197
OpenBSD, 289, 428
Operating System (OS)
finger-prints, 406
Logs, 464
Operation Long Arm, 26
Opportunistic behavior of offenders, 157
Orchid Club, 171
Organization and search of evidence, 108
Organizationally Unique Identifier (OUI), 424
Origination information for calls, 388
Other Known Files, 641
Outlook Express, 282
Overwritten data, 205