Fair Credit Reporting Act, 51
Fair Use, 58–60
Falcon, 189
Falsification, 578
Family Educational Rights & Privacy Act, 51
FAT (file allocation table) file systems, 203, 257, 300
two main forms of data recovery in, 264
FAT 12, 257
FAT 16, 202, 257, 323
FAT32, 202, 257, 323
FBI's National Center for the Analysis of Violent Crime (NCAVC), 157
FCC v. Pacifica Foundation, 47
FDDI (Fiber Distributed Data Interface), 365–7, 423, 664
Federal Cable Communications Policy Act, 52
Federal Law Enforcement Center (FLETC), 26
Federal Right to Financial Privacy Act of 1978, 52
Federal Rule of Criminal Procedure 41 [b], 37
Federal Rules of Evidence 901, 173
File:
classification tools, 231
Filter Manager, 641
formats, 231
headers and footers, 267
lists, 633
slack, 205, 634
File carving:
tools, 267
with Unix, 306–10
with Windows, 267
File systems, 257–9
activity reconstructed, 286
and location of data, 202–205
traces, 272, 311–16
Filemon, 287
Fileserver, 487
Filtering/Reduction of data, 229
FIN or RST bits, 451
Finisar, 429
FIRE, 256, 290
Firewalls, 363, 392
Firewire, 200, 290
First responders in electronic crime scene investigation, 108
First Digital Forensics Research Work Shop, 3
Flagler Dog Track, incident at the, 25
FLASH, 339, 342–53
FlashBack, 350
FlashPro, 343
Florida Computer Crimes Act, 25, 32
Flow-cat, 451
Foremost, 306
Forensic analysis:
equivocal, 118–25, 664
basic goals of, 118
of Macintosh Systems, 323
of Windows Systems, 255
Forensic computer analysis, 31
Forensic entomology, 20
Forensic psychiatrists, 594
Forensic science, 21, 31
applying to computers, 211
applying to networks, 383
concepts, 6, 251
and digital evidence, 20
disciplines, certification, 3
equivocal, 116–23, 664
principles and techniques from, 212
recognition of evidence, 102, 107
reconstruction of crime, 115, 117, 122–5, 135, 408–12, 540–54
TCP/IP evidence, 457–4
victimology, 125–9, 587–91, 669
Forensic Toolkit (FTK), 28, 239, 266, 282, 306, 436, 628
on Windows, 263
Forgery, 67–8
e-mail, 177, 469, 503–508, 612, 621
Usenet, 508–603
Fourth Amendment to the US Constitution, 42, 52, 54, 171
Fport, 531
Fragmented files, recovering, 265
Fraud, 25–6, 30, 67–9
bank, 79
Free Speech Coalition v. Ashcroft, 50
FreeBSD, 289, 428
Freenet, 502, 517
Frequency Division Multiple Access (FDMA), 369
Frequency Modulation (FM), 200
Froistad, Larry, 179, 378, 478–9, 518
Frost, 502
Fruits of crime:
hardware as, 35
information as, 37
Fserve, 487
FTP, 283, 408, 481
servers, 404
Functional analysis, 241–3
Functional reconstruction of system, 285