17.07.2015 Views

Best Practices for Seizing Electronic Evidence - FLETC

Best Practices for Seizing Electronic Evidence - FLETC

Best Practices for Seizing Electronic Evidence - FLETC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tracing an Internet Email● When an Internet email message is sent, the user typically controls only the recipient lines(s)(To:, Cc:, and Bcc:) and the Subject: line.● Mail software adds the rest of the header in<strong>for</strong>mation as it is processed.● Typically, only the From:, To:, Subject:, and Date: lines are displayed. The setting to view thefull or extended header in<strong>for</strong>mation is usually found in the Options or Preferences menu of the e-mail software.● The full or extended email header will contain in<strong>for</strong>mation useful in tracing the message back tothe source. Internet Protocol (IP) addresses and assigned message id numbers along with the timeand date stamps are integral in tracing the origin of a message, verifying the in<strong>for</strong>mation in theFrom: line is correct or authenticating the transmission in<strong>for</strong>mation <strong>for</strong> the message.● Header in<strong>for</strong>mation will vary depending on the type of mail system used and mail servers usedto process the messages.Email header:In this example, the From: line suggests the sender is polaris99992001@yahoo.com. The"polaris99992001" is the name of the mailbox located at the "Yahoo" mail server location. The To:line indicates the recipient is johndoe83721z@hotmail.com. The Date: line indicates the date andtime the message was submitted to a Yahoo mail server. Date and time stamps are only as reliableas the clock setting on the computers that process the message.The extended header in<strong>for</strong>mation is usually read from bottom to top. The Message ID is a uniquenumber assigned to the email as it is processed by a server and may be useful in determining if themail is a <strong>for</strong>gery by comparing the ID with logs retained by the server that issued the ID. The nextline states the message is from polaris99992001@yahoo.com. The lines beginning with Received:in the extended email header are created as the message traverses mail servers. In<strong>for</strong>mation in theReceived: lines varies depending on the mail server and software processing the message. The firstReceived: line in this example states- Received: from [12.26.159.122] byweb20808.mail.yahoo.com via HTTP and is data/time stamped. This first Received: line can bevaluable in this case to identify what computer or network was involved in transmitting the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!