Index
A
AccessData
Forensic Tool Kit (FTK),
38,
39
Amazon (Amazon Web Services),
165
American Academy of Forensic Sciences (AAFS),
11
Digital & Multimedia Sciences of,
11
American Society for Testing and Materials (ASTM),
12,
44
American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB),
11,
164
accreditation process,
43
ASCLD/LAB-International Supplemental Requirements,
43
international program,
43
Anti-forensics techniques,
83
breaking passwords or cryptanalysis,
90
Anti-static material bags,
54
AOL Instant Messenger (AIM),
20,
125
Authentication Center (AuC),
147
B
Base Station Controller (BSC),
147
Bind, Torture, Kill (BTK) investigation,
3
Bits, bytes, and numbering schemes,
15
Blowfish Encryption Algorithm,
93
C
Call Detail Records (CDRs),
151
Campus Area Networks (CANs),
135
acquisition, physical and logical,
154
Call Detail Records (CDRs),
151
forensic tools for collecting,
155
Subscriber Identity Modules (SIMs),
154
operating system (OS) of,
149
Central Processing Unit (CPU),
20
Check-out and check-in process,
33
Client/server network,
134
Client-side technology,
120
forensically clean drive,
56
forensic image formats for,
57
forensic and legal perspectives,
165,
166
Infrastructure as a Service (IaaS),
22
Platform as a Service (PaaS),
22
Software as a Service (SaaS),
22
Cloud Service Providers (CSPs),
165
Code Division Multiple Access (CDMA),
148
Communications Assistance to Law Enforcement Act (CALEA),
107
Computer Forensic Tool Testing,
12
Computer Forensic Tool Testing Project (CFTT),
38
Computer Security Incident Handling Guide,
139
Computing “environments,”,
21
party’s legal ability to provide,
109
technician’s ability to provide,
109
Consent-to-search form,
108
Content.IE5 directories,
130
documenting crime scene,
51
live acquisition concerns,
58
preserving evidence in RAM,
59
protection of cell phones,
50
Crypto-Gram Newsletter (Bruce Schneier),
93
Cryptographic hashing algorithm,
61
Cyclical redundancy check (CRC),
136
D
Daubert v. Merrell Dow Pharmaceuticals, Inc.,
116,
164
Device Configuration Overlays (DCOs),
24
Digital dependence, growth of,
1
administrative matters,
5
Scientific Working Group on,
10
Digital forensics,
2,
163
9/11 attack, investigation using,
5
Bind, Torture, Kill (BTK) investigation using,
3
in the context of a criminal investigation,
3
organizations, contributions of,
10
registry keys and log files, significance of,
10
Securities and Exchange Commission (SEC), administrative investigation of,
6
standards and controls,
163
Digital forensics practitioner, role in judicial system,
12
Digital Forensics With Open Source Tools (Cory Altheide and Harlan Carvey),
41
Digital forensic tools,
37
AccessData’s Forensic Tool Kit (FTK),
38,
39
Graphical User Interface (GUI)-based forensic tools,
42
hardware write-blocking device (HWB),
38
software products,
40,
42
Direct Client Connection (DCC),
126
Distributed Denial of Service (DDoS),
137
Document and Media Exploitation (DOMEX),
5
Domain Name Server (DNS),
120
Drive-wiping utilities,
96
Duty to preserve evidence,
114
E
E.I. du Pont de Nemours v. Kolon Industries,
58
Elcomsoft’s System Recovery tool,
91
Electronically stored information (“ESI”),
113,
114
Electronic Communications Privacy Act (ECPA),
107
Electronic discovery (eDiscovery),
4,
57,
113
Electronic Serial Numbers (ESNs),
148
Encrypting File System (EFS),
89
full disk encryption (FDE),
88
Evidence Eliminator software,
96,
97
check-out and check-in process,
33
policies and procedures,
34
quality assurance (QA),
34
Examiner’s final report,
36
Exigent circumstances,
109
Exploiting a command,
138
F
Federal Rules of Civil Procedure,
4
Fidelity National Information Services Inc. (FIS),
133
File Allocation Table (FAT),
23
File headers and footers,
66
File signature analysis,
17
File translation layer,
168
Five root-level keys,
68,
69
Flash-based hard drives,
20
Florida Department of Law Enforcement (FDLE),
164
Foley, Tracey Lee Ann,
95
accreditation and certification,
43,
44
case submission forms,
36
examiner’s final report,
36
tool validation process,
35
Forensic science, definition of,
2
Forensic Science Education Programs Accreditation Commission (FEPAC),
11
Forensic Toolkit (FTK
®),
41,
63,
69
Fourth Amendment of the U.S. Constitution,
106
Electronic Communications Privacy Act (ECPA),
107
particularity mandated by,
111
reasonable expectation of privacy,
106,
109,
110
G
Global Area Networks (GANs),
135
Global positioning systems (GPS),
157
Global System for Mobile Communication (GSM),
148,
149
Griffith, Jason “Blu,”,
158
Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness, A (Fred Smith and Rebecca Bace),
117
H
Hardware write-blocking device (HWB),
38
Harlan Carvey’s RegRipper,
125
Hibernation file (hiberfile.sys),
66
Hierarchical File System (HFS+),
23
Home Location Register (HLR),
147
Host Protected Areas (HPAs),
24
Hypertext Markup Language (HTML) document,
120
Hypertext Transfer Protocol (HTTP),
119
I
Identity Spoofing (IP Spoofing),
137
Incriminating document,
67
Infrastructure as a Service (IaaS),
22,
165
Inner workings of a computer,
15
allocated and unallocated space,
24
bits, bytes, and numbering schemes,
15
file extensions and file signatures,
17
Integrated Circuit Card Identifier (ICC-ID),
154
Integrated Digitally Enhanced Network (iDEN),
148,
149
International Mobile Equipment Identity (IMEI),
149
International Mobile Subscriber Identity (IMSI),
154
artifacts in the registry,
124
Domain Name Server (DNS),
120
interacting with website, forensics perspective,
120
Internet Protocol (IP) address,
120
Internet Relay Chat (IRC),
126
social networking sites,
130
Temporary Internet Files (TIF),
122
Uniform Resource Locator (URL),
119
Internet Message Access Protocol (IMAP),
127
Internet protocol (IP) connection logs,
5
Internet Relay Chat (IRC),
126
Internet Service Providers (ISPs),
136
Intrusion Detection System (IDS),
137,
139
Intrusion of privacy,
111
J
K
L
Linux Ubuntu operating system,
41
Live acquisition/collection,
58
conducting and documenting,
60
preserving evidence in RAM,
59
Local Area Network (LAN),
135
Locard’s exchange principle,
9
Lord of the Rings (LOTR) fan,
92
M
Magnetic hard drives, working of,
25
Man-in-the-Middle-Attack,
137
Message Digest 5 (MD5),
61
accessed date/time stamp,
76
created date/time stamp,
76
modified date/time stamp,
76
Metropolitan Area Networks (MANs),
135
Mobile Switching Center (MSC),
147
Multimedia Messaging Service (MMS),
148
N
National Academy of Sciences (NAS),
11
National High Tech Crime Unit (NHTCU),
138
National Initiative Cyber Security Education (NICE),
12
National Institute of Justice (NIJ),
38
National Institute of Standards and Technology (NIST),
11,
12,
38,
165
National Software References Library,
12
Netwitness Investigator,
142
Network evidence and investigations,
140
investigation challenges,
143
training and research in,
143
Networking
intrusions, response to,
139
Network intrusion detection system (NIDS),
137
Network intrusions, response to,
139
analysis of security incident,
139
containment, eradication, and recovery,
140
detecting a security incident,
139
post-incident activity,
140
responding to a security breach,
140
New Technology File System (NTFS),
23
Nodes on Gnutella requests,
121
Nonaccredited labs and evidence collection,
44
O
Omnibus Crime Control and Safe Streets Act (1968),
107
Open Handset Alliance,
150
Operating system (OS) of cell phones,
149
Organizations of note,
10
Oxygen Forensic Suite,
155
P
Paraben Corporation,
40,
155
Partially overwritten file,
25
Password Recovery Toolkit (PRTK),
90,
99
Personal Area Networks (PANs),
135
Personal Identification Number (PIN),
150,
154
Personal Unlock Key (PUK),
150,
154
Platform as a Service (PaaS),
22,
165
Post Office Protocol (POP),
127
Public Switched Telephone Network (PSTN),
148
Q
Quality assurance (QA),
34
administrative review,
34
R
Reasonable expectation of privacy,
106,
109,
110
Regional Computer Forensic Laboratory (RCFL) program,
31,
32
case examples using,
69,
71
Internet Explorer artifacts in,
124
Removable storage media,
49
Repeatability (quality assurance),
8
S
SANS Investigative Forensic Toolkit (SIFT),
41
Scientific Working Group for DN Analysis Methods (SWGDAM),
10
Scientific Working Group for Firearms and Toolmarks (SWGGUN),
10
Scientific Working Group on Digital Evidence (SWGDE),
11,
164
digital forensic certification, core competencies of,
44
of computer hardware and software,
112
notion of common areas,
108,
109
Secrets & Lies: Digital Security in a Networked World (Bruce Schneier),
93
Secure Hashing Algorithm (SHA) 1 and 2,
61
Securities and Exchange Commission (SEC),
6
Office of the Inspector General (OIG),
6
Security Account Manager (SAM),
91
Security identifier (SID),
72
Server-side technology,
120
Service Level Agreements (SLAs),
167
Short Message Service Center (SMSC),
147
Simple Mail Transfer Protocol (SMTP),
127
Social networking sites,
130
Software as a Service (SaaS),
22,
165
Solid State Drive (SSD),
20
Solid state hard drives (SSDs),
167
Spoliation of evidence,
114
Standard Operating Procedures (SOPs),
34
Steganography Analysis and Center (SARC),
94
Storage and memory of a computer,
18
volatile vs nonvolatile memory,
20
Stored Communications Act (SCA),
113,
115
Subscriber Identity Modules (SIMs),
154
“Swiss Army knife”-like capabilities,
41
T
Technical Work Groups (TWGs),
10
Tegic Communication’s T9,
151
Temporary Internet Files (TIF),
122
Thumbnail images as evidence,
78
Time Division Multiple Access (TDMA),
149
Time To Live (TTL) value,
121
Top Level Domain (TLD),
119
Tracking user’s activity
deleted data, finding,
66
most recently used lists,
78
recycle bin operation,
73
system date and time stamps,
76
thumbnail images as evidence,
78
Transmission Control Protocol/Internet Protocol (TCP/IP),
134,
135
Trusted Platform Module (TPM),
89
U
Uniform Resource Locator (URL),
119
United States Secret Service (USSS),
138
United States v. Frye,
116
United States v. Slanina,
106
Universal Forensic Extraction Device (UFED),
156
U.S. Immigration and Customs Enforcement Cybercrime Center,
91
User Identification Number (UIN),
127
V
integrity of evidence,
33
Visitor Location Register (VLR),
147
Volatile
vs nonvolatile memory,
20
W
Webroot Window Washer Eliminator,
96
Wide Area Network (WAN),
135
Y
Z
Zubalake v. USB Warburg,
114