| < Day Day Up > |
|
E*Trade, 405
E-911 (enhanced 911) intiative, 471–72
E-911 service Phase I directive, 482
E-911 service Phase II directive, 482
E-911 services, 482
EarthLink, 398
Eastern European organized crime groups, 520
eBay Inc., 239, 335, 405, 520
E-Bombs (Electromagnetic bombs), 427–29, 430
Echelon, 387, 412, 547
e-commerce investigations, 40, 148
economic crimes, 637
economic espionage, 260
EDS, 247
eEye, 593
EFF Web site, 333
Egghead.com Inc, 522
Egyptian Ikhwan al-Muslimoon (Muslim Brotherhood), 328
Egyptian Islamic Jihad, 369
e-hippies, 332, 407
electric power disruption technology, 357–58
electric power system vulnerabilities, 510–11
electrohypnomentalophone, 547–48
Electro-Magnetic Pulse (EMP), 357, 427–28
Electronic Communication Privacy Act (ECPA, 607
electronic evidence discovery action agenda, 188–89
electronic evidence discovery conclusions, 187–88
Electronic Frontier Foundation (EFF), 331–32
electronic immune system, 510
electronic jamming, 442
electronic paper trails, 123, 185, 412–13
Electronic Privacy Information Center (EPIC), 412, 527
electronic privacy laws, 148, 175
electronic serial numbers (ESNs), 539
Electronic Support Measures (ESM), 431
e-mail wiretaps, 451–52
emergency guidelines, 147–48
emergency operating mode, 475–76
emergency service, 10
Emitter Locating Systems (ELS), 431
Employee Provisioning System, 594–95
Employer Safeguard Programs, 5–6
EnCase™, 138, 158, 609
encrypted copies, 173, 176
encryption frailties, 563–64
enemy identification, 519
Energy and Justice Departments, 342
Energy Department, 343
Energy Secretary Bill Richardson, 364
eNet Secure, 67
English 1968 Act, 25
English Civil Evidence Act, 25
enhanced signal strength (ESS) method, 481
EnRole Version, 4.0, 594
En Route Mission Planning and Rehearsal System (EMPRS), 297
Enterasys Network, 585–87
Enterasys Networks Dragon Sensor™, 60, 585–87
Entercept Security Technologies, 585
enterprise-class back-up solution, 100
ethical challenges of IW
1997 Defense Science Board’s threat analysis report, 515
armed attacks, 514–15
Article 41, 514
Cuban missile crisis, 513
enemy identification, 519
espionage, 48, 261, 289, 515, 618
hacker’s ethic, 573
internal computer modification, 515
Internet security firm 2XS Ltd, 355
Israeli Internet Underground, 354–55
IW response techniques, 517–18
jus ad bellum, 5113
jus in bello, 514
low-intensity conflict, 306, 515
nation-state, 513, 515
operations other than war (OOTW, 513
SecurityFocus.com, 76, 355, 543
SODA project, 354
Entrust Technologies, 247
Environmental Protection Agency, 342
eProvision Day One, 594
erasable programmable read-only memory (EPROMs), 19
erased files, 45, 85, 151–52, 185
Eric Drexler, 461
escrowed encryption, 411
espionage, 48, 261, 289, 298, 359, 515, 618
Ethernet, 100, 439
Ethernet-based networks, 611
ETH Zurich, 559
Eudora, 452
Eugene E. Habiger, 364
European Parliament President Nicole Fontaine, 547
European Telecommunications Standards Institute (ETSI), 483
European Union privacy directive, 528–29
event reconstruction, 27, 133
evidence capture, 68–69
evidence collection and data seizure action agenda, 140–41
evidence collection and data seizure conclusions, 140
evidence examination, 138–39
evidence linking, 203
evidence preservation
/V (data verification), 146
bit stream back-up, 35, 82, 145–46, 148, 150
Chuck Guzis, 145
Cyclic Redundancy Codes (CRCs), 145
data duplication, 7
digital crime scene, 143–46
DOS DISKCOPY, 146
Federal Law Enforcement Training Center, 145, 192
IMDUMP, 145
log preservation, 611
Michael White, 145
mirror image back-ups, 35–36
MS DOS Version 6.22, 146
Paul Mace Software, 145
SafeBack software, 35–37, 138, 145–46, 609
SnapBack, 145–46
Sydex, 145
Trojan Horse Programs, 37, 82, 240, 440–41, 584
unaltered data, 128
useable formats, 211
evidence processing methodology, 35, 81–82, 590–91
evidence processing steps, 146–47
evidence service options, 10
evidence transportation, 138, 149, 158
evidential material procedures
.cab files, 166
.ocx files, 166
32-bit .exe files (PE files), 166
active content, 166
ActiveX controls, 166
Authenticode, 165–67
Certification Authority (CA), 167
Class 3 Digital ID, 166
client application security warning, 170
content integrity, 165, 168
content source, 165, 168
cryptographic digest, 168
digital certificate (See Digital IDs™)
Digital IDs™, 167–68
Digital IMAGE Verification and Authentication protocol, 164
digital signatures, 132, 155, 165, 167–68
DiskSearch Pro, 590
Exchange, 166
Internet Explorer, 166
Java™, 166
Law Enforcement Suite, 590
NetProwler, 590
New Technologies, 590
Outlook Express, 166, 373, 452
Outlook, 166, 373, 452,
PKCS #10 signature standards, 168
PKCS #7 signature standards, 168
public key cryptography, 167–68, 195
public/private key pair, 167–69
publisher identity, 166
second channels, 164
security warning screens, 169–70
SIGNCODE.EXE utility, 168
software accountability, 165
Software Developer Digital ID, 168–69
Symantec, 247, 585, 590
VeriSign(r) root Private Key, 168
VeriSign’s Digital IDs™, 165–66, 169
Win32 applications, 168
WinVerifyTrust API, 168
X.509 v3 certificates, 168
evidentiary value, 185
EvilPing, 353
examination of data media, 19
Excel, 44, 211, 214–15, 489, 491–92 (MS)
Excel 2000 documents, 489, 491–92
Exchange, 166
exchange private session keys, 195
Executive IW-D Oversight Office, 311
Executive Office of the President, 310
Executive Order, 110–11, 510
Exigent International Inc., 433–34
Exodus, 66–67
Exodus Communications, 66–67, 398
expert witness services, 6–8
Expert Witness Testimony on Electronic Evidence course, 80
Explorer, 530
export rules, 363
| < Day Day Up > |
|