Fair Credit Reporting Act, 51
Fair Use, 58–60
Falcon, 189
Falsification, 578
Family Educational Rights & Privacy Act, 51
FAT (file allocation table) file systems, 203, 257, 300
two main forms of data recovery in, 264
FBI's National Center for the Analysis of Violent Crime (NCAVC), 157
FCC v. Pacifica Foundation, 47
FDDI (Fiber Distributed Data Interface), 365–7, 423, 664
Federal Cable Communications Policy Act, 52
Federal Law Enforcement Center (FLETC), 26
Federal Right to Financial Privacy Act of 1978, 52
Federal Rule of Criminal Procedure 41 [b], 37
Federal Rules of Evidence 901, 173
File:
classification tools, 231
Filter Manager, 641
formats, 231
headers and footers, 267
lists, 633
File carving:
tools, 267
with Unix, 306–10
with Windows, 267
File systems, 257–9
activity reconstructed, 286
and location of data, 202–205
Filemon, 287
Fileserver, 487
Filtering/Reduction of data, 229
FIN or RST bits, 451
Finisar, 429
First responders in electronic crime scene investigation, 108
First Digital Forensics Research Work Shop, 3
Flagler Dog Track, incident at the, 25
FlashBack, 350
FlashPro, 343
Florida Computer Crimes Act, 25, 32
Flow-cat, 451
Foremost, 306
Forensic analysis:
basic goals of, 118
of Macintosh Systems, 323
of Windows Systems, 255
Forensic computer analysis, 31
Forensic entomology, 20
Forensic psychiatrists, 594
applying to computers, 211
applying to networks, 383
and digital evidence, 20
disciplines, certification, 3
principles and techniques from, 212
recognition of evidence, 102, 107
reconstruction of crime, 115, 117, 122–5, 135, 408–12, 540–54
TCP/IP evidence, 457–4
victimology, 125–9, 587–91, 669
Forensic Toolkit (FTK), 28, 239, 266, 282, 306, 436, 628
on Windows, 263
Forgery, 67–8
e-mail, 177, 469, 503–508, 612, 621
Usenet, 508–603
Fourth Amendment to the US Constitution, 42, 52, 54, 171
Fport, 531
Fragmented files, recovering, 265
bank, 79
Free Speech Coalition v. Ashcroft, 50
Frequency Division Multiple Access (FDMA), 369
Frequency Modulation (FM), 200
Froistad, Larry, 179, 378, 478–9, 518
Frost, 502
Fruits of crime:
hardware as, 35
information as, 37
Fserve, 487
servers, 404
Functional analysis, 241–3
Functional reconstruction of system, 285