Index

Note: Page numbers followed by f indicate figures and t indicate tables.

A

Active personality theory 3
Al-Qaeda type terror groups 126, 127
Amerithrax 125–126
Amn al-Mujahid 127
Ansar al Mujahideen 124
Anti-forensics 79
digital tools and approaches 94–96
traditional forensics 94
Asrar al-Dardashah 127
Association of Chief Police Officers (ACPO) 75, 97

B

Balkan Investigative Reporting Network (BIRN) 213
Basic Input Output System (BIOS) 81
BIOS parameter block (BPB) 82
Blackhole exploit kit 235, 236f
Botnets 161
advantages 255
Agobot 232
Blackhole exploit kit 235, 236f
Conficker 232
criminal business model 237, 237f
DDOS 250, 251–252
definition 231
diffusion 231
DNS features 253, 253f
Eurograbber  See (Eurograbber attack)
hidden services  ...

Get Cyber Crime and Cyber Terrorism Investigator's Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.