Law Enforcement
Crime Scene Investigations
Digital Forensics
Chapter 14+15
Tech & Society
100

FBI and NW3C partnership giving internet fraud victims a mechanism to report suspicious online activity

What is IC3 (Internet Crime Complaint Center)

100

Rather than the power button (which purges RAM), pull the cord from here to shut down a running computer at a crime scene

The rear of the computer

100

Mathematical fingerprint calculated from every bit in a data set; used to prove digital evidence was never altered

MD5 hash

100

Unlike Type I technical crimes (malware/viruses), these cause repeated social-psychological harm: stalking, harassment, predation

Type II crimes

100

In August 2017, NSW Police surpassed this U.S. agency's Facebook page to become the world's most-followed police account

What is NYPD?

200

Title 18, Section 1030 — federal statute CCIPS uses to prosecute computer crimes

Computer Fraud and Abuse Act

200

RF-shielding bag used to block wireless signals and prevent remote wiping of a mobile device at a crime scene

Faraday bag

200

Unlike a logical copy, this image type captures every bit including deleted files, swap files, and slack space

Bit-stream (physical) image

200

Firewall technique providing 100% immunity to remote attacks through complete physical separation — no network connection

Air gap

200

Term that defines the action of posting rival gang's emoji upside-down

What is cyberbanging?

300

City where the first Regional Computer Forensics Laboratory was established in 1999

San Diego, California

300

Must be issued immediately to ISPs in internet investigations — no warrant needed, but logs may purge within 24 hours

Preservation letters

300

DoD standard used to wipe target storage media clean before loading a forensic image

DoD 5220.22

300

Encryption using two mathematically related keys — one freely shared, one kept secret

Asymmetric (public-key) encryption

300

Sandhu & Fussey's (2021) term for officers who use discretion to trust, ignore, or subvert algorithmic predictions

"Cyborg" decision-makers

400

FTC centralized database of identity theft and fraud complaints used by thousands of global agencies

What is Consumer Sentinel?

400

OSI model layer containing IP addresses — key for tracing suspects online

Layer 3 — Network layer

400

Federal rule under which an authenticated digital image qualifies as "best evidence" in court

Federal Rule 1001(3)

400

Single barrier between internal network and the Internet

What is perimeter firewall?

400

Fifth and final theme in the Tech Watch chain: Labelling → Surveillance → Segregation → Exclusion → ___

What is violence

500

Joint DOJ/FBI initiative (1998) facilitating info exchange among academia, business, and the FBI to protect critical infrastructure

What is InfraGard?

500

The ability of a specific person to obtain sole or collaborative access and hold the right to alter, delete, suppress, or exclude others from data

What is the "Power of Disposal"

500

The unused portion of a storage cluster after a file ends — may retain remnants of previously stored data

What is Slack Space?

500

Organization providing the forecasting methodology cited throughout Chapter 15

Society of Police Futurists International (PFI)

500

2020 Maryland appellate case in which a drug conviction was overturned because a flame emoji's meaning was too ambiguous

Johnson v. State

M
e
n
u