Index
A
Access Certified Examiner (ACE)
25, 74
Access Data Corporation
36–37
Accounting systems and financial software
295
batch files, as evidence
299
business accounting software
296–297
mid-level to enterprise
297
for small business
296–297
evidence types from financial software
298–299
getting evidence
297–298
money management programs
295–296
personal money management software
296
Acquisition
12, 28–31, 37–38
duplication
29–31
hardware for
38
software for
37–38
verification
31
Adam Walsh Child Protection and Safety Act of 2006
107, 145–146, 167
language in
145–146
ADF Solutions, Inc.
37
Adobe Photoshop
282–283
Adobe Photoshop CS
183, 184f
Adobe Premier
282–283
Advanced Research Projects Agency Network (ARPANET)
301
Alpha Five
288
American College of Forensic Examiners Institute
87
American Society of Digital Forensics and E-Discovery
85–86
America Online (AOL)
7, 8, 142–143, 155
AOL Chat
8
AOL Instance Messenger
88
Analysis
12–13
Android phone
183, 242
Apple computer
13–14
Apple iPad
14, 70, 243
Apple iPhone
136
Apple Mac file format
195
Apple QuickTime
131
Apple Safari
213, 214–215
Apple’s Mobile Me
6
ASR Data, Data Acquisition and Analysis, LLC
37
Assisted GPS (AGPS)
314
Association of Chief Police Officers (ACPO)
85–86
Audio evidence, discovery of
135
common issues
135–137
audio metadata
136
audio recording devices
136
file formats and audio programs
137
tape media
136
example discovery language for
137–138
Audio recording
135
B
Backup files, of cell phone
268–269
Base transceiver station (BTS)
226–228, 227f
Basic Input Output System (BIOS)
29–30, 49
BearShare
255
installation screen
255f
showing search results
256f
Belkasoft
37
Best practices, of digital forensics
acquisition
28–31
duplication
29–31
verification
31
establishes of
25
following
26
preservation
27–28
collection
28
identification
27–28
in real situations
31–32
volatile data and live forensics
26–27
Bing Maps
317, 318f
BitPim
75
BitTorrent
8
BlackBag Technologies
38
Blackberry
19, 243
BlackLight Mac Analysis
37
Boot media
29–30
Browse Host command
259, 259f
Browser Analyzer
37
Browser metadata
180–181
Business accounting software
296–297
mid-level to enterprise
297
for small business
296–297
C
Call detail records (CDRs)
19, 163, 231–232
cell tower location example
233–234
cellular evidence, discovery issues in
163–164
and cellular system evidence
225
cellular phone system
225–228
working
229–231
as evidence of cell phone location
232–234
language example for
164–165
Carbonite
6, 116–117
Carrier, Brian
36
Carvey, Harlan
18
Case types
and examiners
70–71
general time estimates for
73t
Cell phone forensics
19, 67, 269, 270–271
Cell phones
5–6, 8, 109, 263
advanced data analytics
269–270
backup files
268–269
in discovery motion specifics
109
forensic acquisition methods for
265–268
logical acquisitions
266
manual examinations
266–268
physical acquisitions
266
fragile nature of cellular evidence
264–265
protecting cell phone evidence
265
future of cell phone forensics
270–271
Subscriber Identity Module (SIM) cards
268
media cards
268
tracking
158
Cellular evidence, discovery issues in
163–164
call detail records (CDRs)
163–164
Cellular system evidence
225
and call detail records
231–232
cell tower location example
233–234
as evidence of cell phone location
232–234
Enhanced 911 wireless location services
234
Overview
235–236
real-time cell phone tracking
237
working of
229–231
anatomy of cell phone call
230–231
Certifications
69, 73–74, 96
Certified Computer Examiner (CCE)
74, 91–92
Certified Forensic Computer Examiner (CFCE)
74, 91–92
Chain of custody
12, 44
Chat Examiner
37
Chat programs
37
Child pornography cases, discovery in
145
access to forensic evidence
148
Adam Walsh Child Protection and Safety Act of 2006
145–146
discovery process
147–149
first round of
147
second round of
147–148
Children and teens
and GPS tracking
158
Civil cases
95
common challenges in
96–97
digital evidence in
113
electronic discovery
114–115
electronic evidence, getting
118–120
rules governing, civil discovery
114
time is essence
115
What, Who, How, Where, and Who approach
115–118
discovery motions
95–98
example trial questions
43
Civil order, for expedited discovery
119f
Classes of forensic tool
36–38
availability
36
function
36–38
law enforcement only (LEO)
36
Client-side timeline evidence
304–306
Commercial software
36
Commodore PET
13–14
CompuServe
8
Computer Analysis and Response Team (CART) program
14
Computer and pad tracking
158–159
Computer Certified Examiner (CCE)
25
Computer experts
59–61
digital evidence, investigation of
64–66
and digital forensic experts
difference between
63–64
legal expertise comparisons
64t
technical expertise comparisons
63t
Computer file system time stamps
208
Computer forensics
3, 14–15, 18–23
cell phone forensics
19
digital audio forensics
22
digital camera forensics
21
digital video and photo forensics
21
game console forensics
22–23
GPS forensics
19–20
incident response
18
media device forensics
20
multiplayer game forensics
22
social media forensics
20–21
tools
36
Computer Forensics Certified Examiner (CFCE)
25
Computer forensics examiner
15, 61
Computer Forensics Tool Testing program (CFTT)
35
Computer hardware maintenance
60
Computer history
13–14
Computers and storage media, discovery of
123, 242
expedited discovery and temporary restraining order, example of
125–127
expedited discovery simple order, example of
124–125
search agreement simple consent, example of
123–124
Computer support person
60–61
Computer time artifacts (MAC Times)
207
bottom line
211
computer file system time stamps
208
created, modified, accessed
209–211
forensic analysis of timeline, fundamental issues in
208–209
Consent order
language example
110
Content evidence
306–307
Contraband discovery, language regarding
146
Contraband images
191–192
save
223
Coordinated Universal Time (UTC)
209, 310
Court preparation
72, 81–82
Court testimony without verification, dangers of
176
Created time stamp
209–210
Criminal cases
42, 69, 95, 107
building motion
108–111
discovery motion specifics
108–111
common challenges in
96
discovery motions in
95–98
example trial questions
48
sources
107–108
paper discovery
108
search warrant returns
107–108
D
DAC Easy
295
Data analytics, of advanced cell phone
269–270
Databases
287
backups
292
corrupted/damaged databases
292
data as evidence
292–293
database files as evidence
291–292
database management system
288–289
in everyday life
287–288
formats
291
modern databases
289–290
recovery
292
Data de-duplication, in e-discovery
176
Data destruction, evidence of
204–205
physical destruction
204–205
Data errors
316
Data recovery
45
Data-wiping software
204
Daubert test
67–68
.DBX file
242
Death penalty case
315
Defense items
108
in discovery motion specifics
108
Deleted data
195
data destruction, evidence of
204–205
physical destruction
204–205
file recovery
199–204
advanced method
201–204
simple method
200–201
hard drive data storage
195–199
structure
197–199
Digital audio forensics
22
Digital audio recorders
5
Digital camera forensics
21
Digital cameras
5, 9
Digital detective
37, 180–181
Digital evidence
4–5
in civil cases
113
electronic discovery
114–115
getting
118–120
rules governing
114
time is essence
115–118
consent order, language for
110
creation of
5–9
in criminal cases
107
building motion
108–111
discovery motion specifics
108–111
paper discovery
108
search warrant returns
107–108
sources
107–108
investigation of
64–66
storage
5–9
Digital forensics
11–13
computer forensics
18–23
cell phone forensics
19
digital audio forensics
22
digital camera forensics
21
digital video and photo forensics
21
game console forensics
22–23
GPS forensics
19–20
incident response
18
media device forensics
20
multiplayer game forensics
22
social media forensics
20–21
tools
36
definition of
3
subdisciplines
17
Digital Forensics Certification Board
85–86
Digital Forensics Certified Practitioner (DFCP)
91–92
Digital video and photo forensics
21
Discovery motions
95–98
common challenges
in civil cases
95, 96–97
in criminal cases
95, 96
specifics
108–111
cell phones
109
Discovery motions (Continued)computer and related items
109
defense items
108
forensic copy format
108
GPS devices
109
inventory
108
not forensically imaged
109
portable services
109
requesting supplemental documents
109
Discovery process, in child pornography cases
147–149
first round of
147
second round of
147–148
Document metadata
181–183, 185
Domain Name Server (DNS)
152
Drive-duplication products
38
Drive Prophet
37
Dropbox
6
Duplication
29–31
forensic method for
29–30
nonforensic method for
30–31
E
E-discovery, for de-duplication
hash value in
176
Education, of experts
74–75, 97
E-fense
38
Electronic Communications Privacy Act (ECPA)
114
Electronic data
4, 37
E-mail
6–7, 239
as evidence
239–240
storage and access
240–243
server-based storage
240–243
user-based e-mail storage
241–243
web mail
243
E-mail detective
37
Email Examiner and Network Email Examiner
37
Employees, in GPS tracking
158
EnCase
35, 37, 75, 200, 223
EnCase Certified Examiner (EnCE)
25, 74
EnCase forensic software
37, 200, 201f, 210, 217f
Enhanced 911 (E911) wireless location services
234, 235–236
Epoch Time Format
209
Evidence
collection by third/opposing party
78–81
recovery from cell phones
271
Examiners
85
ethics
87–88
examinations
approach to
88–89
impact on
87
experience
86–87
standards
85–86
training
86–87
Expectation from expert
77
beginning
78–81
court preparation
81–82
examination
81
expert advice
82
general expectations
77–78
Expedited discovery
civil order for
119f
simple order for
124–125
and temporary restraining order
125–127
Expert
45, 55, 67–69, 95
advice
82
certifications
73–74
computer experts and digital forensic experts
59–61
difference between
63–64
legal expertise comparisons
64t
technical expertise comparisons
63t
expectations from
77
beginning
78–81
court preparation
81–82
examination
81
expert advice
82
general expectations
77–78
experience
97
funding in indigent cases
167
extraordinary expenses, justifying
167–169
sample ex parte motion for
169–170
hiring, reasons for
41–42
cost factor
41, 42
evidence, examination and interpretation of
42
type of case
42
hiring, time for
42
interviewing
68
locating and selecting
69–73
evidence, types of
70
prequalification process
71–72
reasonable fee
72–73
selection criteria, establishing
70
type of case
70–71
problematic
91
appearance matters
92–93
attitude
92
aversion
93
big problems
93
bull factor
92
verifiable experience and criminal records
91–92
qualifying as
95
certifications
96
in court
98
education
97
experience
97
Federal Rules of Evidence
96
resume/curriculum vitae
96
sample qualification questions
98
training
97
right” tools
75–76
training, education, and experience
74–75
Expert witness testimony
68
Extraordinary expenses, justifying
167–169
F
Facebook
4, 7–8, 20–21, 88, 140–141, 245, 250, 264
Facebook Chat
8
Faraday bag
265, 265f
FAT
195
FAT32
195, 197, 200
FBI
14
Computer Analysis and Response Team (CART) program
14
Magnetic Media Program
14
Regional Computer Forensic Labs (RCFLs)
14
Federal Rules of Civil Procedure (FRCP)
114
Rule 26
114
Rule 29
114
Rule 34
114
Rule 45
114
Federal Rules of Evidence
96
Rule 702 expert witnesses
68, 96
File carving
201–204, 202f
File deletion
45
File deletion claim
193
File existence, determining
176
FileMaker
288, 292
File-sharing networks, investigating
258–261
File-sharing program, using
255–257
File signature
46
File slack space
197
Files recovery, methods for
46, 199–204
File system metadata
180
File-wiping software
61, 62
Floppy disks
5–6
Footer
46
Forensic accountant
296
Forensic acquisition methods for cell phones
265–268
logical acquisitions
266
manual examinations
266–268
physical acquisitions
266
Forensically sound tool
34–35
definable
34
predictable
34–35
repeatable
35
verifiable
35
Forensic analysis of timeline, fundamental issues in
208–209
Forensic copy format
108
in discovery motion specifics
108
Forensic evidence, access to
148
Forensic IM Analyzer
37
Forensic Replicator
37
Forensics, definition of
3
Forensic software suites
36–37
Forensic Tool Kit (FTK)
37, 74, 75, 88
Forensic triage products
37
Free e-mail accounts
241
Free space
45
FrostWire
210, 256, 257
search results in
256f
selecting multiple files for download in
257f
Frye test
67–68
FTK Imager
37, 79
G
Game console forensics
22–23
Game subscriber information
307
General location evidence
307
GIAC Certified Forensic Analyst (GCFA)
25, 74
GIAC Certified Forensic Examiner (GCFE)
74
Global Positioning Systems (GPS)
109, 309
discovery motion specifics
109
evidence, discovery of
157
language examples
159–160
tracking evidence
157–159
evidence, interpretation of
316–318
data errors
316
map errors
316–318
evidence collection from
314–316
challenges to data collection
315
data preservation
314
service-based data collection
315
evidence types
312–314
track points and track logs
313–314
waypoints and routes
313
NAVSTAR GPS
310
overview
309–310
segments of
310, 311f
workflow
311–312
geolocation information and navigation
311
Google
7
Google Apps
6
Google Blogger service
141–142
Google Chrome
7, 213, 214–215
Google Docs
6
Google Mail
239
Google Maps
215, 317, 317f
GPS forensics
19–20
Guardian Digital Forensics
37
Guidance Software Corporation
36–37
H
Hajj, Adnan
282–283
Hard drives
43
data storage
195–199
Hardware for acquisitions
38
Hash set
176
Hash values
31, 32f, 45, 173
definition and types
173–174
in digital forensics
174–177
court testimony without verification, dangers of
176
e-discovery, data de-duplication in
176
evidence verification, impotance of
177
file existence, determining
176
in finding hidden files
175–176
Header
46
Helix
38
Hidden files finding, hash values in
175–176
High-density 3.5-inch floppy disk
6
High-speed Internet connection
214
High Technology Crime Investigators Association (HTCIA)
71, 85–86, 87
Home Location Register (HLR)
228
Hotmail
142–143
Hot Pepper Technology
37
Hyper Text Markup Language (HTML)
214–215
Hypertext Transfer Protocol (HTTP)
214
I
IBM Personal Computer
13–14
iLook
36
iLook LEO and iLookPI
37
Incident response
18
Intelligent Computer Solutions
38
Internal Revenue Service Criminal Investigation Division (IRS-CI)
36
International Associations of Criminal Investigative Specialists (IASCIS)
85–86
Internet activity, examination of
65
Internet browser caching
Internet cache clearance
218
Internet chat rooms
8
Internet cloud
5–6
Internet Crimes Against Children (ICAC) task force
14–15, 145, 258
Internet Explorer
7, 214–215
Internet history
37
cache clearance, by user
218
as evidence
218
as intent basis
218
Internet metadata
180–181
browser metadata
180–181
web page
180
Internet Relay Chat servers
8
Internet search engines
70
Internet service provider (ISP) records, discovery of
151
IP addresses
151–155
ISP step-by-step finding or
152–154
motion language
154
using ping command
152–154
in subpoena
156
web-based e-mail addresses
155–156
Internet service providers (ISPs)
241
Inventory
discovery motion specifics
108
iPhone
19, 242
backup
269
K
Kazaa
8
Knowledge areas of digital forensics
62f
L
Language
in Adam Walsh Child Protection and Safety Act of 2006
145–146
call detail records (CDRs)
163–164
for discovery of computers and storage media
123
example language for call detail records
164–165
for getting GPS device for examination
159–160
for getting GPS evidence from third party
161
for getting information from manufacturer about device
160–161
language regarding contraband discovery
146
Last Accessed Time Stamp
210–211
Law Enforcement Only (LEO)
36
Lee, Rob
18
LimeWire
8, 253, 254f
Linen
37
LinkedIn
7–8, 20–21, 245
Link files
219
as evidence
221–224
accessed by user
222
contraband image save
223
involving deleted files
223
value
221
volume serial number, of USB thumb drive
223
purpose
219–220
creation and working
219–220
Linux DD copy method
75
Linux file format
195
Live Mail
7, 239
Logicube
38
Lotus Notes
6–7
M
(M) Prohibition on reproduction of child pornography
146
MAC (modified, accessed, and created) times
207, 223
MacForensicsLab
37
MacQuisition
38
Magnetic Media Program
14
Mail Analyzer
37
Mail servers
240–241
Map errors
316–318
Marital infidelity examination
69
Massively Multiplayer Online Role Playing Games (MMORPGs)
22, 301–303
data as evidence
304–307
content evidence
306–307
game subscriber information
307
general location evidence
307
getting server-side evidence
307
timeline evidence
304–306
Media cards
5–6, 268
Media device forensics
20
Message Digest 5 (MD5) algorithm
31, 174, 174f
Metadata
179
audio metadata
136
as evidence
184
purpose of
179–180
types
180–183
document metadata
181–183, 185
file system metadata
180
Internet metadata
180–181
picture metadata
183
Micro Channel Architecture (MCA)
14
MicroSD card
268
Microsoft
7
Microsoft Access
288
Microsoft Exchange
6–7, 240–241
Microsoft Hotmail
239
Microsoft Internet Explorer
213
Microsoft Live Mail
142–143
Microsoft SQL Server
289
Microsoft Windows
14, 195
Microsoft Windows Disk Management application
196
Microsoft Word document, metadata in
182f
Microsoft’s Windows Live Skydrive
6
mIRC
8
Mitigation
41, 42b
.MLM file
242
Mobile device forensic tools
38
Mobile Switching Centers (MSC)
226, 228, 228f
Modern databases
289–290
Modified Time Stamp
210
Money management programs
295–296
Motion language
154
Motorola Android cell phone, metadata in
185f
Motorola Xoom
14, 243
Mozilla Firefox
213, 214–215
Mozy Pro
6
Mr Examiner
43
MSNBC
8
MSN Chat
8
Multiplayer game forensics
22
Multiplex systems, video collection from
130, 131f
Multi User Dungeons (MUDs)
301
Murder case
300
MySpace
4, 7–8, 20–21, 88, 245, 250
MySQL
289
N
Napster
8
National Association of Criminal Defense Lawyers
69
National Institute of Justice (NIJ)
85–86
National Institute of Justice and the Association of Chiefs of Police
25
National Institute of Standards and Technology (NIST)
35
NAVSTAR GPS
310
NetAnalysis
37, 180–181
Nintendo Wii
22
Norton Ghost
30–31
Novell’s GroupWise
6–7
.NSF format
242
NTFS file system
195, 210–211
O
Online e-mail accounts
142–143
Open source tools
36, 253
Opera
213
Operation Fairplay
14–15
Oracle
289
.OST file
242
P
P2 Commander
37, 75
Pad computers
243
Paraben Corporation
37
PDF document, metadata in
183f
Peachtree Accounting
295, 296
Peer-to-peer file sharing
8, 253
example of
254f
network evidence
258–261
investigating file-sharing networks
258–261
privacy and security issues with
257–258
working of
253–257
file-sharing program, using
255–257
sharing
255
Perlustro Corporation
37
Personal data
4
Personal money management software
295–296
Persons under supervision, in GPS tracking
158
Pets and livestock, in GPS tracking
158
Phex peer-to-peer software
258–259
after executing the Browse Host command
259f
downloading a file of interest from a single host
260f
showing SHA1 value
259f
Phone storage
242
Android phone
242
iPhones
242
Photoshop CS4 brush tools
274
Picture metadata
183
Ping command
152–154, 153f
Plain Old Telephone System (POTS)
225
PlayStation
15, 301
Point-in-time” snapshot
177
Portable services
109
Porter test
67–68
Position, Navigation, and Timing (PNT) services
310
Power On Self-Test (POST)
29–30
Prequalification process
71–72
Presentation, of findings
13
Preservation
12, 27–28
collection
28
of GPS data
314
identification
27–28
Pre-trial motions
42
Problem expert, spotting
91
appearance
92–93
attitude
92
beyond window dressings
91–93
bull factor
92
criminal records
91–92
verifiable experience
91–92
Prodigy
8
Profile Name
216
Progress
289
Pseudo-code
34
.PST file
242
Q
QuickBooks
295
QuickBooks Online
4–5
R
Radio network controllers (RNC)
226, 228, 228f
Real-time cell phone tracking
237
Reasonable fee
72–73
Recording Industry Association of America (RIAA)
258
Recycle Bin
emptying
45
and file recovery
200–201
Regional Computer Forensic Labs (RCFLs)
14
Relational Database Management System (RDBMS)
289
Resume/curriculum vitae
96
Right forensic tools
75–76
Round Table Group
70
rubber stamping”
283
Rule 702 expert witnesses
96
S
Sablevein crumbler
304–306
Safari
7
SANS Institute
18
Sarbanes-Oxley
297
Search agreement, consent to
123–124
Secure Digital card (SD card)
268, 269f
Secure Hash Algorithm (SHA)
31
Secure Hash Algorithm 1 (SHA1)
174, 174f, 258, 259
Server-based storage
240–243
Server-side timeline evidence
306, 307
Service-based GPS collection
315
Sexual harassment case scenario
117–118
Sharing
255
peer-to-peer file sharing
253
Shipments and packages, in GPS tracking
158
Single-channel dial-up modem
214
Single purpose forensic tools
37
Slack space
199
SleuthKit
36
SMART
37
Smart for Linux
75
Social media
245
anonymity
247–249
hobby/obsession
248–249
common forms of
245
convenience versus security
247
discovery
139
Facebook example
140–141
google information
141–142
legal issues in
139–140
online e-mail accounts
142–143
records contact information, finding custodian of
140
as evidence
246, 249–250
getting information from online services
250
Social media forensics
20–21
Software expert
59–60
Software for acquisitions
37–38
Sony PlayStation
15, 22
Special boot media
29–30
Spectrograph
22
Spencer, Elliot
36
Spokeo
247
Stolen account case
298
Storage technology
5
Stored Communications Act (SCA)
114, 139–140
Subdisciplines
17
in computer forensics
18–23
cell phone forensics
19
digital audio forensics
22
digital camera forensics
21
digital video and photo forensics
21
game console forensics
22–23
GPS forensics
19–20
incident response
18
media device forensics
20
multiplayer game forensics
22
social media forensics
20–21
Subscriber Identity Module (SIM) cards
268, 269f
media cards
268
Susteen’s svProbe
269, 270f
Sybase
289
T
Tableau
38
Tandy TRS-80
13–14
Tape media
136
collecting and preserving
130
Task specific forensic tools
37
Temporary Internet Files
213
Terminate and Stay Resident (TSRs) programs
26–27
Thumbnails and the thumbnail cache
187
as evidence
191–193
thumbs.db and networked drives
190
thumbs.db cache files, creation of
189–190
Windows Vista and Windows 7, changes in
190
working mechanism
188–191
Timeline evidence
304–306
client-side timeline evidence
304–306
server-side timeline evidence
306
Tools
33
classes of
36–38
computer forensic tools
36
forensically sound
34–35
mobile device forensic tools
38
testing
35
Track logs
313–314
Track points
313
Training
for examiners
74–75
and experience
86–87
for experts
97
Transaction logs
292
Triage Examiner
37
Trial phase
52
Trial preparation
42
Triangulation
311, 312f
Trilateration
311, 312f
Twitter
4, 7–8, 20–21, 245
U
Unallocated space
45, 202f
Uniform Resource Locator (URL)
140, 152
USB thumb drive
221, 222f
User-based e-mail storage
241–243
computers
242
pad computers
243
phone storage
242
Android phone
242
iPhones
242
V
Vehicles and in GPS tracking
158
Verification
31
Verification (Continued)Time Verification
132
verification standard
173
VHS videotape
130
Video and photo evidence
273
forensic examination, critical steps in
273–275
documentation
273–274
workflow of tools, awareness of
274–275
usage in cases
275–286
authenticity of video/image, determining
282–285
contesting unqualified claims to video/image evidence
286
image/video, enhancing
279–282
Video evidence, discovery of
129
collection
132
common issues with
129–132
tape media, collecting and preserving
130
video recording devices
130–132
example discovery language for
132–133
Video/image
authenticity of, determining
282–285
Video/image evidence, contesting unqualified claims to
286
Video recording devices
130–132
Video software programs
131
Visitor location register (VLR)
228
Voom Technologies
38
W
Waypoints
313
Web caching
213
as evidence
215–218
internet history
cache clearance, by user
218
as evidence
218
as intent basis
218
workflow
214–215
Web cams
5
Web mail
243
Web page metadata
180
Weibetech
38
What, Who, How, Where, and Who approach
115–118
Whois lookup
307
Windows Accessories menu
152f
Windows Media Player
131
Windows NTFS
hard drive data storage
197
Windows shortcut files
Windows Vista and Windows
7, 190
Write-blocking
29–30
X
Xbox
22, 23, 301
X-Ways Forensics
37, 75
Y
Yahoo
7, 88
Yahoo Chat
8
Yahoo Mail
7, 142–143, 239
Z
Zulu time
209
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset