APNIC

Asia Pacific Network Information Centre (www.apnic.net)

Regional internet registry for the Asia Pacific region administering IP addresses for the Asia Pacific.

 

Bit

Portmanteau of ‘binary digit’

The basic unit of information in computing and digital communications.

 

Bluetooth

A wireless technology standard used for exchanging data between devices (fixed or mobile) over short distances using a short-range wireless connection.

 

Blu-ray disc

Often referred to as ‘Blu-ray’ is a digital optical disc data storage medium designed to supersede the DVD format. It is mainly used for video and video games.

 

Browser

web browser

A software application for accessing information on the internet. Browsers are used on a range of devices. It is not the same thing as a search engine, which is just a website that provides links to other websites. E.g. Google Chrome, Safari, Firefox, Microsoft Edge.

 

CCTV

Closed Circuit Television

 

CD

Compact Disc

 

Central Authority

An agency or organisation designated to facilitate the implementation and operation of an international treaty in public and private international law. In international cooperation for transnational criminal law matters, it is the national body responsible for making, receiving and executing requests for mutual legal assistance and extradition, or transmitting such requests to another Central Authority for execution.

 

Cloud

Cloud storage

Cloud computing

Cloud storage is a model of computer data storage where the digital data is stored in pools (a pool is a collection of resources kept ready to use) and said to be ‘on the cloud’. Physical storage can be across multiple servers, which are typically owned and managed by a hosting company. Cloud storage providers are responsible for keeping the data available and accessible, and the physical environment secure.

Cloud computing is the on-demand availability of computer system resources (i.e. cloud storage and computing power) without direct active management by the user.

 

computer network

A group of computers that use a set of common communication protocols (such as IP) over digital interconnections for the purpose of sharing resources located on, or provided by, network notes. The nodes can be classified by many means and are identified by hostnames and network addresses.

Computer networks can support many applications and services such as access to the world wide web, digital video and audio, shared use of application and storage servers and use of email and instant messaging applications.

 

cookie

Small files stored on a user’s computer by a web browser while browsing a website. Cookies were designed for websites to remember useful information such as items chosen in an online store, or previously entered names, passwords and payment card numbers.

 

CSAM

Child Sexual Abuse Material

 

CSP

Communication Service Provider

A type of service provider that transports information electronically and encompasses public and private companies in the telecommunications, internet, cable, satellite and managed services businesses.

 

cybercrime

Refers to any crime that involves a computer and a network. The computer may have been used in the commission of the crime, or it may be the target of the crime.

 

data

Any sequence of one or more symbols and requires interpretation to become information. Can be singular, plural or a mass noun.

 

data storage device

storage device

Any device for storing information or data (e.g. CD, DVD, USB).

database

An organised collection of data that be accessed in many ways, but generally stored and accessed electronically.

 

digital forensics

A branch of forensic science related to the recovery and investigation of material found in computer systems, digital devices and other storage media with the aim of admissibility in court. Originally referred to as ‘computer forensics’ it has expanded to encompass investigation of all devices capable of storing digital data.

 

domain name

DNS

A domain name is an identification string that defines an area within the internet and serve to identify internet resources (i.e. computers, networks, services) with a text label that is easier to memorise than the numbers used in internet protocols. Domain names are formed by the rules and procedures of the Domain Name System (DNS).

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It is sometimes compared to being a type of phonebook for the internet.

 

dongle

A small piece of computer hardware that connects to a port on another device to provide additional functionality.

Originally ‘dongle’ referred to software protection dongles, but now is used more broadly to mean any small hardware that plugs into a computer.

 

DoS

DDoS

A Denial of Service (DoS) attack is a cyber-attack where perpetrator seeks to make a machine or network resource unavailable to intended users by disrupting services of a host connected to the Internet

A Distributed Denial of Service (DDoS) attack is a large-scale DoS attack where the perpetrator uses more than one unique IP address or machines and incoming traffic floods the victim from many different sources.

 

DVD

Digital Video Disc

 

electronic evidence

Is any information generated, stored or transmitted using electronic devices that may be relied upon in court. To guarantee that the evidence is accepted in court, it is necessary to obtain the information following processes using specialised personnel and operating within an adequate legal framework.

 

encryption

The process of encoding information.

 

GPS

Global Positioning System

 

hard drive

A device used for storing large amounts of data

 

hardware

Physical components making up a computer system (e.g. keyboard, monitor, mouse)

 

host

hosting provider

A hosting provider or internet/web hosting service is a service that allows individuals or organisations to make (or host) their website available via the world wide web. Hosts are companies that provide space on a server owned for use by clients as well as providing internet connectivity.

 

HTML

Hypertext Markup Language

HTML is used for writing documents for web servers.

 

HTTP

Hypertext Transfer Protocol (or HTTPs is Secure HTTP)

HTTP is a protocol with the necessary agility and velocity to distribute and handle multimedia information systems over the Internet.

 

IANA

Internet Assigned Numbers Authority

Entity that oversees global IP address allocation, autonomous system number allocation etc. IANA is part of the Internet Corporation for Assigned Names and Numbers (ICANN).

 

INTERPOL

International Criminal Police Organization

 

IP address

Internet Protocol address

IP Addresses are the fundamental type of source of information available on the internet showing where data packages are to be delivered. IP addresses are expressed as a chain of numbers separated by decimal points and are used to represent and identify a computer on the internet.

IPv4: e.g. 192.168.1.252

IPv6: e.g. 2001:0db8:85a3:0042:0000:8a2e:0372:4688

 

ISP

Internet Service Provider

Is an organisation that provides access to the internet, can be community or privately owned, and non-profit or for profit. E.g. Solomon Telekom, Vodafone, Digicel, TPG.

 

LAN

Local Area Network

 

letters rogatory

A formal letter of request from a court to a foreign court for some type of judicial assistance (e.g. collecting evidence, interviewing witnesses).

 

log

Register of determined events generated by the operating system or application for a period of time

 

MA

MLA

mutual assistance or mutual legal assistance

The process countries use to obtain government-to-government assistance in criminal investigations and prosecutions.

 

MAC address

Media Access Control address

A unique identifier specific to the network card inside a computer XX-XX-XX-XX-XX-XX (X represents digits or letters A to F). Also referred to as the hardware address or Ethernet address.

 

MACMA

Mutual Assistance Criminal Matters Act

 

malware

Portmanteau of malicious software. A program with the objective to cause damage to computers, systems or networks and users.

 

MAR

mutual assistance request

 

memory card

Devices used to store digital information, often used in digital cameras, mobile phones, laptop computers etc.

 

metadata

Information about data. There are many types of metadata which can be used to summarise basic information about data which can make it easier to track or work with specific data.

E.g. metadata can provide information about how and when a file was created, received, accessed and modified and by whom.

E.g. digital image can include metadata that describes how large picture is, colour depth, image resolution, when image created.

 

MLAT

mutual legal assistance treaty

An agreement between two or more countries for the purpose of gathering and exchanging information to enforce public or criminal laws.

 

modem

Portmanteau of modulator demodulator

Hardware device that allows a computer or another device (i.e. router, switch) to connect to the internet. It ‘modulates; an analogue signal from a telephone or cable wire to a digital data that a computer can recognise, and vice versa. Modems are often classified by the maximum amount of data they can send in a given unit of time (e.g. bit/s).

The first modems were ‘dial-up’ meaning they have to dial a phone number to connect to an ISP. Modern modems are typically DSL (digital subscriber line) or cable modems, considered to be broadband devices.

 

NCMEC

National Centre for Missing and Exploited Children

 

P2P

Peer-to-Peer

Peer-to-Peer (P2P) computing or networking is a distributed application that partitions tasks between peers where peers are equal. P2P protocol uses the internet for the interchange and download of files. Clients using P2P networks do not have fixed IP addresses and servers will only have a listing of clients and file searches.

 

pharming

Is a type of cyberattack where a ‘pharmer’ redirects a website’s traffic to another site that is under their control. Pharming ca be done by changing the hosts file on a victim’s computer, or by exploiting a vulnerability in DNS server software.

 

phishing

Is the fraudulent attempt to obtain sensitive information or data (i.e. username, password, credit card details). Phishing techniques often involve fake emails (email spoofing), text or instant messaging that direct users to enter personal information on a fake website that looks legitimate.

 

PILON

Pacific Island Law Offices’ Network

 

proxy

In computer networking, a proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers.

 

PTCN

Pacific Transnational Crime Network

 

router

Is a networking device that determines the next network point that a packet should be forwarded towards its destination. Routers essentially direct internet traffic.

 

server

A piece of computer hardware or software that provides functionality for other programs or devices (referred to as ‘clients’).

 

service provider

Broad term to encompass a provider of services that transports information electronically. For example, internet service provider, email provider, news provider (press), entertainment provider (music, movies), search, online shopping site.

 

social media

Are interactive computer-mediated technologies or tools that allow people or companies to create, share or exchange information, ideas, pictures, and/or videos in virtual communities and networks.E.g. Facebook, TikTok, YouTube

 

software

Computer software or software is a program designed to perform specific tasks (e.g. word processing, accounting, network management, website development etc). It is essentially instructions that tell the computer how to work.

 

UNODC

United Nations Office on Drugs and Crime

 

URL

Uniform Resource Locator

A chain of characters which is assigned a unique address to each of the documents of the World Wide Web.

USB

Universal Serial Bus

A standard that defines the protocols for communication, connection and power supply for devices that are connected to computers.

 

virus

A computer virus is a type of computer program what replicates itself by modifying other computer programs and inserting its own code. When it replicates those areas are said to be ‘infected’.

 

VoIP

Voice over Internet Protocol

A method and group of technologies for the delivery of voice communications and multimedia sessions over IP networks. It is also called IP telephony.

 

VPN

Virtual private network

Extends a private network across a public network and enables users to send and receive data across other networks as if their computing devices were directly connected to the private network. Encryption is common to a VPN connection.

WLAN networks

Wireless Local Area Network

Links two or more devices using some wireless distribution method and usually providing a connection to access the wider internet.

 

www

World Wide Web

Is the universe of network-accessible information (ie. all resources and users on the internet that are using HTTP).