Easy-Recovery Pro from Ontrack, 267–8
Eavesdropping, 362, 374–5, 419, 428–30, 477, 521
E-bay, 383, 388
auctions, 503
EBCDIC, 377
eDonkey, 489
Education and training, 2, 6, 22, 26–7, 170, 594
Efnet, 486
Eggdrop, 497
Electronic Communications Privacy Act (ECPA), 51, 55–6, 171
Electronic Frontier Foundation (EFF), 45
Electronic Numerical Integrator and Computer (ENIAC), 194
Electronic property, 41
Electronic Serial Number (ESN), 369
Electronic tacking equipment, 369
E-mail, 282–6, 319, 483–7, 664
alibis, 617–19
anonymous and pseudonymous, 499–502
encapsulation, 98
forgery and tracking, 503–508
headers, interpreting, 406–8
Embedded computer systems, 13, 21
E-metals, 503
Empirical Law of Digital Evidence Collection and Preservation, 226
Encapsulation, 98, 374
EnCase, 28, 227, 256, 261, 263, 266, 269, 276, 282, 326–30, 348, 436, 550, 632
e-scripts, 267, 279
Encrypted Magic Folders, 270
Encryption, 497–501
and law enforcement, 239
overview of, 206–10
software, 238
strong, 310
weak, 310
End Of Line (EOL), 232
End-of-file (EOF) marker, 259
Enron, 10
EnScript Library, 638
Entitlement (power assertive) behavior, 159–62, 671
Equal Credit Opportunity Act, 51
Equivocal forensic analysis, 118–25, 664
potential patterns of behavior, 125
E-scripts, 328
ESN/MIN pair, 369
Establishing continuity of offense, 113
Ethereal, 29, 407, 424, 435, 437
Ethernet, 365–7, 381, 420–23, 664
10Base5, 420–24
10/100BaseT, 421
100BaseT, 421
cards, 290
frames, 422–3
versus ATM networks, 427
Eudora, 282
Europe:
cases, 85–6
child pornography, 69–72
fraud and forgery, 67–9
jurisdiction and extradition, 78
legislation, 86–7
overview of criminal offenses, 66–7
privacy, 83
search and seizure, 77–8
European Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR):
Article 8(1), 83
Article 5, 83
Article 25, 84
European Court of Justice (ECJ), 66
European Courts in Strasbourg Court of First Instance (CFI), 66
European Directive 97/46/EC, 83
European HiperaLAN2 standard, 368
European Perspective Bibliography, 85
European Union, 38
legislation, 65
Europol, 230
Evaluation of source of data, 230–7
Event Message Files, 272
Evidence:
of crime, 169, 583
dynamics and introduction of error, 133–5
in "traditional" forensic sense, 98
search and seizure, 34, 77
tape, 223
two categories, 97
Examination and analysis, 229–40
Examining live system, 528
Exchange, type of, 97
Expert assistance, 22, 252
Exploits, 521
Exposure, overview of, 496
Ext2 (Extended File System 2), (Linux), 202, 291, 301
Ext3 Linux file system, 293–96, 301
Extents overflow file, 324
Extortion committed with assistance of computers, 30
Extradition, 78–80
treaty between United Kingdom and the United States, 78
Extradition Order, 1976 (US), 78