FBI and NW3C partnership giving internet fraud victims a mechanism to report suspicious online activity
What is IC3 (Internet Crime Complaint Center)
Rather than the power button (which purges RAM), pull the cord from here to shut down a running computer at a crime scene
The rear of the computer
Mathematical fingerprint calculated from every bit in a data set; used to prove digital evidence was never altered
MD5 hash
Unlike Type I technical crimes (malware/viruses), these cause repeated social-psychological harm: stalking, harassment, predation
Type II crimes
In August 2017, NSW Police surpassed this U.S. agency's Facebook page to become the world's most-followed police account
What is NYPD?
Title 18, Section 1030 — federal statute CCIPS uses to prosecute computer crimes
Computer Fraud and Abuse Act
RF-shielding bag used to block wireless signals and prevent remote wiping of a mobile device at a crime scene
Faraday bag
Unlike a logical copy, this image type captures every bit including deleted files, swap files, and slack space
Bit-stream (physical) image
Firewall technique providing 100% immunity to remote attacks through complete physical separation — no network connection
Air gap
Term that defines the action of posting rival gang's emoji upside-down
What is cyberbanging?
City where the first Regional Computer Forensics Laboratory was established in 1999
San Diego, California
Must be issued immediately to ISPs in internet investigations — no warrant needed, but logs may purge within 24 hours
Preservation letters
DoD standard used to wipe target storage media clean before loading a forensic image
DoD 5220.22
Encryption using two mathematically related keys — one freely shared, one kept secret
Asymmetric (public-key) encryption
Sandhu & Fussey's (2021) term for officers who use discretion to trust, ignore, or subvert algorithmic predictions
"Cyborg" decision-makers
FTC centralized database of identity theft and fraud complaints used by thousands of global agencies
What is Consumer Sentinel?
OSI model layer containing IP addresses — key for tracing suspects online
Layer 3 — Network layer
Federal rule under which an authenticated digital image qualifies as "best evidence" in court
Federal Rule 1001(3)
Single barrier between internal network and the Internet
What is perimeter firewall?
Fifth and final theme in the Tech Watch chain: Labelling → Surveillance → Segregation → Exclusion → ___
What is violence
Joint DOJ/FBI initiative (1998) facilitating info exchange among academia, business, and the FBI to protect critical infrastructure
What is InfraGard?
The ability of a specific person to obtain sole or collaborative access and hold the right to alter, delete, suppress, or exclude others from data
What is the "Power of Disposal"
The unused portion of a storage cluster after a file ends — may retain remnants of previously stored data
What is Slack Space?
Organization providing the forecasting methodology cited throughout Chapter 15
Society of Police Futurists International (PFI)
2020 Maryland appellate case in which a drug conviction was overturned because a flame emoji's meaning was too ambiguous
Johnson v. State