Central communication point for IEEE 802.11 wireless networks.
Address Resolution Protocol (ARP)
A protocol in the TCP/IP suite that is used dynamically to associate network layer IP addresses with data-link layer MAC addresses.
Ad hocNetwork
Networks established when Bluetooth-enabled (or similar) devices come into proximity.
Anger Excitation (a.k.a. Sadistic) Behaviors
These include behaviors that evidence offender sexual gratification from victim pain and suffering. The primary motivation for the behavior is sexual, however the sexual expression for the offender is manifested in physical aggression, or torture behavior, toward the victim.
Anger Retaliatory (a.k.a. Anger or Displaced) Behaviors
These include offender behaviors that are expressions of rage, either towards a specific person, group, institution, or a symbol of either. The primary motivation for the behavior is the perception that one has been wronged or injured somehow.
Application
Software that performs a specific function or gives individuals access to Internet/network services.
Application Layer
Provides the interface between people and networks, allowing us to exchange e-mail, view Web pages, and utilize many other network services.
Asynchronous Transfer Mode (ATM)
A connection-oriented network technology that provides gigabit-per-second throughput. This high-performance network technology can transport high-quality video, voice, and data.
Attached Resource Computer Network (ARCNET)
One of the earliest local area networking technologies initially developed by Datapoint Corporation in 1977. Uses 93-ohm RG62 coaxial cable to connect computers. Early versions enabled computers to communicate at 2.5 Mbps. A newer, more versatile version called ARCNET Plus, supports 20 Mbps throughput.
Behavioral Evidence
Any type of forensic evidence that is representative or suggestive of behavior.
Behavioral Evidence Analysis
The process of examining forensic evidence, victimology, and crime scene characteristics for behavioral convergences before rendering a deductive criminal profile.
Behavior-Motivational Typology
A motivational typology that infers the motivation (i.e. Anger-retaliatory, Assertive, Reassurance, Sadistic, Profit, and Precautionary) of behavior from the convergence of other concurrent behaviors. Single behaviors can be described by more than one motivational category, as they are by no means exclusive of each other.
Broad Targeting
Any fire or an explosive that is designed to inflict damage in a wide reaching fashion. In cases involving broad targeting, there may be an intended target near the point of origin, but it may also be designed to reach beyond that primary target for other victims in the environment.
Buffer Overflow
Cleverly crafted input to a program that intentionally provides more data than the program is designed to expect, causing the program to execute commands on the system. Computer intruders use buffer flows to gain unauthorized access to servers or escalate their privileges on a system that they have already broken into.
Bulletin Board System (BBS)
An application that can run on a personal computer enabling people to connect to the computer using a modem and participate in discussions, exchange e-mail, and transfer files. These are not part of the Internet.
Collateral Victims
Those victims that an offender causes to suffer loss, harm, injury, or death (usually by virtue of proximity), in the pursuit of another victim.
Computer Cracker
Individuals who break into computers much like safe crackers break into safes. They find weak points and exploit them using specialized tools and techniques.
Computer Crime
As defined in Federal and State Statutes. Includes theft of computer services; unauthorized access to protected computers; software piracy and the alteration or theft of electronically stored information; extortion committed with the assistance of computers; obtaining unauthorized access to records from banks, credit card issuers or customer reporting agencies; traffic in stolen passwords and transmission of destructive viruses or commands.
Corpus Delicti
Literally interpreted as meaning the "body of the crime" - refers to those essential facts that show a crime has taken place.
Crime Reconstruction
The determination of the actions surrounding the commission of a crime. This may be done by using the statements of witnesses, the confession of the suspect, the statement of the living victim, or by the examination and interpretation of the physical evidence. Some refer to this process as crime scene reconstruction, however the scene is not being put back together in a rebuilding process, it is only the actions that are being reconstructed.
Crime Scene
A location where a criminal act has taken place.
Crime Scene Characteristics
The discrete physical and behavioral features of a crime scene.
Crime Scene Type
The nature of the relationship between offender behavior and the crime scene in the context of an entire criminal event (i.e. point of contact, primary scene, secondary scene, intermediate scene, or disposal site).
Cybercrime
Any offense where the modus operandi or signature involves the use of a computer network in any way.
Cyberspace
William Gibson coined this term in his 1984 novel Neuromancer. It refers to the connections and conceptual locations created using computer networks. It has become synonymous with the Internet in everyday usage.
Cyberstalking
The use of computer networks for stalking and harassment behaviors. Many offenders combine their online activities with more traditional forms of stalking and harassment such as telephoning the victim and going to the victim's home.
Cybertrail
Any convergence of digital evidence that is left behind by a victim or an offender. Used to infer behavioral patterns.