Radar Flashlight, 54
Radar-based through-the-wall surveillance system, 54
RADIUS authentication server, 459, 469
RAM slack, 205
Random Access Memory contents, 472–3
Reconstruction:
categories, 120–2
functional analysis, 122, 124–5
investigative, 240–9
process, sex offenders on the Internet, unknown offender, 585
relational analysis, 122–4
temporal analysis, 122
types of, 240
Record entry headers, 340
Recover, 302
Recovery of preserved sources of digital evidence, 109
Reduction of evidence, 110
Registry, 276–7
files (hives), 276
Regmon, 287
Regsnap, 286
Regulation Investigatory Power Act 2000 (RIPA), (UK), 85, 239
Relational analysis, 243–4
Remnants of network file sharing, 285
Remote storage locations locating, 285
Removable media, 354
Reno v. American Civil Liberties Union et al., 46
Reporting:
digital evidence, 249–51
investigative process, 112
investigative reconstruction process, 135
Request For Comment (RFC) documents, 479, 508
Research, 2–3, 27, 31, 176
Research in Motion (RIM) Blackberry, 350
Resplendent Registrar, 276
Retaliatory behaviors, 158
Reverse social engineering, 523–4
Riggs, Robert, 63–4
Risk assessment, 127–8
Riva, Ronald, 566
Romero, Richard, 379
Root access, 147, 524
Root director, 258
Root directory's incode, 292
Rootkits, 225, 524
ROT 13, 206
Routers, 362–3, 393, 423, 447, 672
Royal Canadian Mounted Police, 4
RSA, 208
Rules of evidence, 167, 171, 179
Run Length Limited (RLL), 200
Russian Password Crackers, 270