Index_P

 < Day Day Up > 



P

Pacific Command, 281

packet data, 476–77

packet sniffers, 448

Page Files, 49

PAGEFILE.SYS, 49

paging mode, 476

Palestine Information Center, 328

Palestine site, 328

Palestinian Hamas site, 262

Palestinian Islamic Jihad’s command and control system, 325

Palestinian supporters, 350, 352, 418

paper documents, 185–86

paper trail, 123, 185, 412–13

Partition Magic™, 153

passwords, 299, 388, 396

past event reconstruction action agenda, 216–17

past event reconstruction conclusions, 216

Paul Fromm, 330

Paul Mace Software, 145

PBX equipment, 67

PC PhoneHome, 47

Penet re-mailer, 581, 583

pen register devices, 450

Pentagon, 268, 288, 295, 330, 346, 371

Pentaguard, 573

Penthouse, 347

people monitoring, 469

People’s Liberation Army, 360

People’s Liberation Daily, 344

People’s Republic of China, 363

percentsystemroot percent\system32 \configdirectory, 611

personal handy phone systems (PHS), 475–76

personal identification numbers (PINs), 539

personal identifiers, 533

personal locator system (PLS), 474–75

Peter Zhou, 470–71

PGP, 559

Philadelphia’s Third Circuit Court of Appeals, 596

Philip Zimmermann, 565

phone home, 490

PhonePrint, 539–40

Phrack, 525

PHS phone handset, 481

PHS service areas, 481

physical level searches, 622–24

picture files, 489

piezoelectric ceramics, 457–58

Pilot Network Services, 65

ping ip command, 74

PKCS #10 signature standards, 168

PKCS #7 signature standards, 168

PKZIP files, 44

plaintext, 557

plaintiffs’ lawyers, 184

Plan Version 1.0 “An Invitation to a Dialog”, 527

PLO, 325, 360–61

pluralistic America, 254, 256–57

Point-In-Time (PIT) recovery, 113

PointShare Corp., 546

Policy Enforcement Group, 399

polymer forms, 463

POP3 (110), 592

port attacks, 592–93

ports, 53, 230, 592–593

postage-stamp-sized chipset (Star II), 480

PowerPoint 2000 documents, 489, 491–92

PowerPoint files, 211

Practical Guide to Aryan Revolution, David Myat, 330

prerevolutionary Russian terrorists, 315

President Clinton, 248, 272, 295, 336–37, 572

President George W. Bush, 251–52, 272, 287

Presidential Commission, 510

President Reagan, 310, 337

previewing crime scene media, 621–22

Pricewaterhouse Coopers, 247–48

Prime Minister Yitzhak Rabin, 301, 312

privacy advocates, 265

privacy agreements, 403–04

Privacy Foundation, 450–51, 488–89, 491, 546

privacy issues

128-bit Secure Sockets Layer (Web encryption), 545–46

1984, George Orwell, 547

alumni registries, 531

America Online, 526, 531

American Management Association, 546

analog phones, 538–40

Anonymizer, 530

Army’s National Ground Intelligence Center research contract, 548

AuthenTec Inc., 536

authentication, 540–41

Beth Israel Deaconess Medical Center, 545

BioFusion, 548

Boston Consulting Group’s privacy survey, 530

brain prints, 547

brain-mapping, 548–49

brain-mimicking software, 548

Buck Rogers, 547

call counting, 540–41

CareGroup Healthcare System, 545

CDB Infotek, 531

cellular handsets distribution, 542

Cellular One, 535

cellular service providers, 535–36

Cellular Telecommunications Industry Association (CTIA), 472538

CIA, 546

cloned phones, 540

code-division multiple-access (CDMA), 478, 538

commercial reference services, 531

consumer privacy, 530

Cookie Crusher, 531

Cookie Pal, 531

CookieMaster, 531

Corsair Communications Inc., 539–40

credit system’s personal identification, 533

cryptography, 168, 335, 565

Defense Advanced Research Projects Agency research contract, 548

Delaware State Police, 531

digital penetration, 538

digital phones, 538–39

Dow Chemical, 546

drivers’ license rolls, 531

Echelon, 387, 412, 547

electrohypnomentalophone, 547–48

Electronic Communication Privacy Act (ECPA, 607

Electronic Privacy Information Center (EPIC), 412, 527

electronic serial numbers (ESNs), 539

European Parliament President Nicole Fontaine, 547

European Union privacy directive, 528–29

Fair Credit Reporting Act, 529, 531

Falun Dafa, 566

Federal Intrusion Detection Network (FIDNet), 295, 412, 527

Federal Trade Commission (FTC) workshop, 530–31

filtering programs, 532

FingerLoc fingerprint sensor, 536–37

fingerprinting, 536–37, 539–41, 611

fraud (Title 18, Section 1029, of the U.S. Code), 539

fraud-fighting technology, 540

hacked patient files, 542–53

Health Insurance Portability and Accountability Act (HIPAA), 543–45

Hong Kong’s privacy commissioner, 529

Human Rights Watch, 565

identification/information fraud Title 18, Section 1028 of the U.S. Code, 541

identity fraud, 532–35

Information America, 531

Internet Explorer, 530

IW civilian casualties action agenda, 550–51

IW civilian casualties conclusions, 548–49

John Norseen, 547–49

junk e-mail, 530–31

L. L. Bean, 528–29

Latin America, 302, 542

Le Monde, 547

Lexis-Nexis, 531

Lockheed Martin, 444, 547–48

Lockheed Martin’s Intelligent Systems Division research contract, 548

magnetic resonance imaging (MRI) machine, 548

medical ID cards, 542–53

medical privacy rules, 544

Microsoft, 526, 529

mobile identity numbers ((MINs), 539

MOMR Inc, 545–46

National Plan for Information Systems Protection, 295, 527

Nazism, 529

Netscape Navigator, 530

news archives, 531

on-line databases, 531

Open Profiling Standard (OPS), 530

personal identification numbers (PINs), 539

personal identifiers, 533

Philip Zimmermann, 565

PhonePrint, 539–40

Plan Version 1.0 “An Invitation to a Dialog”, 527

PointShare Corp., 546

privacy codes: United States Code at Title 18, section 2701, 607–08

Privacy Foundation, 450–51, 488–89, 491, 546

privacy provision: Title 18 USC 2703(f), 607–08

professional directories, 531

property tax records, 531

prosecution of fraud and deception, 532

protection, 527

research-and-development plan, 548

résumé banks, 531

Robert Bork, 528

Sabre Group, 528

scanners, 538–39

SecurityFocus.com, 76, 355, 543

self-regulation concept, 529

sniffer software, 543

Spam, 530–32

spy-free workplaces, 546–47

subscription fraud, 536

subsidy loss, 542

Switchboard, 531

synthetic reality, 547

The National Aeronautics and Space Administration research contract, 548

The New York Times Co, 546

time-division multiple-access TDMA, 538

Trans Union, 535

TRW Inc., 340

U.S. Department of Health and Human Services (HHS), 544–45

U.S. Secret Service, 539, 595

U.S. Senate Judiciary Subcommittee, 527

U.S.’s First Amendment, 529

University of Washington Medical Center, 542–53

violations, 526–27

workplace surveillance, 546–47

WorldPages, 531

Xerox, 546

Yankee Group, 538

privacy laws, 155–56, 175

privacy-oriented Open Profiling Standard (OPS), 530

privacy provision: Title 18 USC 2703(f), 607–08

privacy seal of approval, 405

privacy standards, 525

private detectives, 408–09

Private Idaho, 414

private key algorithms, 195

Proctor & Gamble, 199

professional directories, 531

program features and benefits, 44

program-language source code, 264

pro-Israeli hackers, 352

proper computer shutdown, 609

property tax records, 531

prosecution of fraud and deception, 532

Pro Tech Monitoring Inc., 484

proving of business books, 17

proving of documents, 17

provisioning software, 594

Prudential Insurance Co. Sales Practices Litigation, 169 F.R.D., 598 [D.N.J. 1997]) retention policies, 224–25

ps -aux, 609

ps -ef, 609

pseudonymous remailers, 414

PSINet, 398

psychological operations (PSYOPS), 240–41, 248–49

public key cryptography, 167–68, 195

public key encryption (PGP), 561–65

public/private key pair, 167–69

public safety answering point (PSAP), 482

publisher identity, 166

Purity Wholesale Grocers, 595



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net