Once the ISP has been identified, it can be contacted to identify the
owner of the computer in question.
1. “The FBI Strategic Plan, 2004–2009.Available: http://www.fbi.gov/
2. “FBI Laboratory Services. Available: http://www.fbi.gov/hq/
3. Kenneth J. Morrison, “The Impact of Digital Forensics on FBI
Criminal Investigations, presented at the Connecticut chapter
of the Information Systems Security Association, November
9, 2004.
4. “FBI New Haven, Connecticut Division—About Us. Available:
5. “FBI New Haven, Connecticut Division—New Haven Division.
Available: http://newhaven.fbi.gov/new_haven.htm.
6. Personal communication with a Supervisory Special Agent, FBI
New Haven, January 22, 2005.
7. FBI National Press Office, Washington, D.C., June 30, 2004, “Con-
necticut Computer Crimes Task Force.Available: http://www.fbi.gov/
8. Imperva Application Defense Center,“Directory Traversal. Avail-
able: http://www.imperva.com/application_defense_center/glos-
9. At the time of this writing, is registered to Loral
CyberStar in Rockville, Maryland. In 2002, Loral CyberStar estab-
lished satellite IP service operations in Equinix’s Internet Business
Exchange centers. See Equinix Press Release, “Loral CyberStar
Teams with Equinix to Enhance Delivery of Satellite IP Network
Services to Global Enterprises, February 20, 2002. Available:
182 Case 6 FBI New Haven Field Office—CART
38190_CH06_FINAL_.qxd 3/25/06 8:43 AM Page 182

Get Information Security: Contemporary Cases now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.