Note: Page numbers followed by f indicate figures and t indicate tables.
A
Active personality theory
Al-Qaeda type terror groups
126,
127
digital tools and approaches
94–96
Association of Chief Police Officers (ACPO)
75,
97
B
Balkan Investigative Reporting Network (BIRN)
213
Basic Input Output System (BIOS)
81
BIOS parameter block (BPB)
82
network topologies and protocols
Command & Control (C&C) server
240,
241
Network Traffic Data Warehouse
251
protocols failure messages
252,
252f
British Psychological Society (BPS)
48
Business interruption insurance
221–222
C
Card-not-present (CNP) fraud
160
Centre for Information Technology Research for the Interest of Society (CITRIS)
100
child-centered actions and information flows
139–142,
140f
global digital network safety
133
government responsibilities
136
information awareness and education
135–136
legal and policy framework
134,
136
United Nations Conventions on the Rights of the Child
134–135
anti-trafficking initiatives
137
cross-border child trafficking
137
SAARC Trafficking Convention
138
UN Protocol on Trafficking
137
labor/sexual exploitation
137
push and pull factors
137
Closed circuit television (CCTV) system
45
Command & Control (C&C) server
240
Communications Assistance For Law Enforcement Act (CALEA)
180
Communications Capabilities Development Programme (CCDP)
180–181
digital anti-forensics tools and approaches
94–96
computer tools and services
93
education and training
97–99
forensics laboratory preparation and training
93–94
law enforcement officers
96–97
multi-disciplinary research centers
100
Computer Fraud and Abuse Act
20
Computer Misuse Act 1990 , ,
91
Contingent business interruption (CBI)
222
Council of Europe Convention on Cybercrime
Criminal Attempts Act 1981
91,
92
classifications and types
computer’s relationship
154
cyber-deceptions and thefts
155
passive computer crime
154
technical and societal perspective
155
internet auction fraud
160
Church of Scientology, Anonymous attacks
112–113
EUs strategic initiatives
116
financial motivations
104
people layer knowledge
102
political motivations
104
USA’s strategic initiatives
115
UK law enforcement agencies
153
Cyber-deceptions and thefts
155
Cyber harassment/bullying
159
Cyber Intelligence Sharing and Protection Act 2013 (CISPA)
180
Cyber Investigators Staircase Model (CISM)
34–35,
34f
Cyber liability (CL) insurance
changing regulatory landscape
226
contingent business interruption
222
extended business interruption
222
professional indemnity
222
energy and drinking water sectors
26–27
Internet of Things (IOT)
28
one-way encryption process
21–22
organizational aspects
23–24
user-friendly functionality
21
wireless encryption protocol (WEP)
22
UK Cyber Security Strategy
elicit tacit information
54
identity theft tactics
47
observational and ethnographic methods
53–54
privacy and confidentiality
48
questionnaires/surveys
53
scenario-based modeling
54–55
user-centered approaches
46f,
47
extra-territorial challenges
International Covenant on Civil and Political Rights
nationality/active personality theory
passive personality theory
3–4
risk assessments and impact analysis
Computer Misuse Act 1990 ,
UK Cyber Security Strategy
US Center for Strategic and International Studies
13
Domain Name System (DNS) servers
168–169
Izz ad-Din al-Qassam Cyber Fighters
168
Nagorno-Karabakh conflict
16
organization’s core operational systems
168,
169–170
organization’s information systems
169
intelligence-guided capability
170–171
Izz ad-Din al-Qassam attack
168
Tamil Tigers guerilla fighters
166–167
technological capabilities
170
D
Data Protection Act 1998
91
Defamation Act 1952 & 1996
91
Denial-of-service (DoS)
107
Department of Defense Strategy for Operating in Cybercrime
115
anti-forensics/counter forensics
79
IP address identification
72–73
anonymizing proxy relay services
73–74
Firewall and system logs
74
deleted files and folders, recovery
84
free/open source licenses
83
hard disk structure and format
80–81
keyword and phrases search
83
primary and logical partition
81
system volume information folders
87–88
VBR and BIOS parameter block
82
data carving and magic values
80
reported by third party
72
written passwords, search for
76–77
Digital Video Broadcasting-Terrestrial (DVB-T)
271–272
Distributed denial of service (DDoS) attack
225
Church of Scientology
113,
114
Syrian Electronic army
107
UK-based banks, attack
112
Domain Generation Algorithm (DGA)
243
Domain Name System (DNS) servers
168–169
E
Echelon Interception System
179
Metropolitan Police Service
Electronic control units (ECU)
25–26
Electronic Disturbance Theater (EDT)
20
two-factor authentication mechanism
244–245
European Telecommunications Standards Institute (ETSI)
260
Europol’s European Cybercrime Centre (EC3)
249
Extended business interruption (EBI)
222
F
Foreign Intelligence Surveillance Act (FISA)
179–180
Formal Concept Analysis (FCA) software
209
Freedom of Information Act 2000
92
F-Secure 2012 Threat Report
238
G
Global Islamic Media Front
127
Globally unique identifier (GUID) addressing scheme
81
Global system for mobile communication (GSM)
266
H
live and online data capture
62–63
offline (dead) data capture
63–64
Windows Prefetch files
68
I
Information and communication technology (ICT)
12
child-centered actions and information flows
139–142,
140f
government responsibilities
136
information awareness and education
135–136
legal and policy framework
134,
136
safety on global digital network
133
United Nations Conventions on the Rights of the Child
134–135
digital red light/speed trap camera
26
energy and drinking water sectors
26–27
Internet of Things (IOT)
28
one-way encryption process
21–22
organizational aspects
23–24
user-friendly functionality
21
wireless encryption protocol (WEP)
22
mobile communication technologies
133
privacy and private information
133
International Association of Chiefs of Police (IACP)
199
International Centre for Missing & Exploited Children (ICMEC)
138
International Covenant on Civil and Political Rights
government responsibilities and legal framework
135–136
information awareness and education
135–136
online social network services
124–125
radicalization process
125
Internet auction fraud
160
Internet Games-based electronic money
128
Internet of Things (IOT)
28
Internet Protocol (IP) address
72–73
anonymizing proxy relay services
73–74
Firewall and system logs
74
Internet Relay Chat (IRC)
73–74
Intrusion Detection Systems (IDS)
74
Israeli-Palestinian conflict
167
Izz ad-Din al-Qassam Cyber Fighters
168
J
Jihadi Social Network website
125
L
Law enforcement agency (LEA)
collaborative projects
197
demographics and cultures usage
204–205
minority status impacts
202
national culture impacts
202
online profiles and networks usage
205
open-source intelligence
199
service/people attitudes
202
social networking sites
197
users’ identity online
198
virtual social worlds
197
Life-Style Routine Activity Theory (LRAT)
154
Logical block addressing (LBA)
81
Low level format (LLF)
80–81
M
Master boot record (MBR)
82
Missing Child Alert (MCA) program
Child Trafficking in South East Asia
anti-trafficking initiatives
137
child-centered actions and information flows
139–142,
140f
cross-border child trafficking
137
data model, coded typologies
138
government and nongovernment agencies, support for
136
labor/sexual exploitation
137
objectivity, consistency and credibility
138–139
push and pull factors
137
security challenges and vulnerabilities in
141–142,
142f
trafficking, definition
137,
138
Most recently used (MRUs) lists
85–86
Multicast Ad-hoc on-demand Distance Vector Routing Protocol (MAODV)
271
Multi-technology communication mobile IP gateway (MIPGATE)
267–269
N
Nagorno-Karabakh conflict
16
National Coordinator of Terrorist Investigations
40
National Cyber Security Programme (NCSP)
91
Natural Language Processing (NLP) technique
206–207
Near Field Communication (NFC)
25
Network Attached Storage (NAS )
131
Network Traffic Data Warehouse
251
O
Obscene Publications Act 1959 & 1964
91
On Demand Multicast Routing Protocol (ODMRP)
271
Operation High Roller
111,
117
Organization for Economic Co-operation and Development (OECD)
136
P
Packet Data Optimized (PDO)
260
Passive personality theory
3–4
Pay-Per-Install (PPI) service
238
Peer-to-Peer (P2P) network
241
Personal computer (PC)
22
Police and Criminal Evidence Act (PACE)
99
decision making processes
32–34
innovative approaches
37–38
Police National Legal Database (PNLD)
Police Reform and Social Responsibility Act 2011
Professional indemnity (PI) insurance
222
Programmable Logic Controller (PLC)
23
Proposal for a Directive in the law enforcement sector (PDPI)
186
Proposal for a new General Data Protection Regulation
186,
188
Proposal for a new General Data Protection Regulation (PGDPR)
186
Protecting Children From Internet Pornographers Act 2011
180
Protection from Harassment Act 1997
92
Protection of Children Act 1978
91
Proxy relay services
73–74
Public Protection and Disaster Relief (PPDR)
communication network architecture landscape
263–265
Direct Mode Operation (DMO)
260–261
Inter-System Interface (ISI)
260–261
re-engineer commercial networks
262
security and safety threats
259–260
Terminal Equipment Interface (TEI)
260–261
transmission control protocol (TCP)
269
R
Regulation of Investigatory Powers Act 2000
76–77
Russian Business Network (RBN)
20
S
Scanning, Analysis, Response and Assessment (SARA) model
35–36,
36f
Senior Investigating Officers (SIO)
32
Sentiment analysis technique
206–207
crime prevention data collection
182
data and data sharing
177
European data protection framework
186–189
private sector tools and resources
183
public and the private, social control
178–183
Strategic Policing Requirement (SPR)
7–8
Supervisory Control And Data Acquisition (SCADA)
23
Symantec Intelligence Report (2013)
158
Syrian Electronic Army (SEA)
167
amateur geo-Politian’s
106
pro-regime hacker group
106
Saudi Arabian government website
109
website and online profiles
106
System volume information folders
87–88
T
Tamil Tigers guerilla fighters
166–167
Tel Aviv Stock Exchange website
166–167
Telecommunications Act 1984
91
Terrorist Finance Tracking System (EU TFTS)
128–130
The onion router (TOR) Hidden Services
130
Third-party cyber liability
224
Total Information Awareness (TIA)
179
Trafficking in Human Beings (THB)
211–213
Transmission control protocol (TCP)
269
U
UK Cyber Security Strategy
United Nations Conventions on the Rights of the Child (UNCRC)
134
UN Protocol on Trafficking
137
V
Volume boot record (VBR)
82
W
Wireless encryption protocol (WEP)
22
X
X1 Social Discovery software
182
Z