Preview

Summary: An Email Forensic Case

Powerful Essays
Open Document
Open Document
1160 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary: An Email Forensic Case
An Email Forensic Case
Daniel W. Cavero
American Public University System

Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in
…show more content…
On the non-technological side there are more methods involved, such as dumpster diving, mail theft, social engineering, shoulder surfing, and stealing personal items. It is hard for a digital forensics team to find the suspect in any of those cases, since most of the evidence would not be found on an electronic device. The technological methods are the ones that will be explored more. They would include the following: credit/debit card theft, skimming, pretexting, man-in-the-middle-attack, phishing schemes, vishing, search engine phishing, SMishing, malware based phishing, phishing through spam, and spear …show more content…
Usually this will include email header information which includes the following fields: From, Date, Message ID, and In-Reply To. (Vacca) In this case if investigators go to Microsoft Outlook 2010, they can select File and then Info. Once the Info tab is selected, they can go to properties and see the headers. The internet headers will provide investigators with the IP of the sender, the email server, the date and time, the message ID, and content-type. Finally, investigators want to revise their documentation to make sure they have documented all of our findings from start to finish. Any consultations with the investigators’ legal partners are beneficial too, especially if they want their evidence to be admissible in

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    the results of each. FTP is a protocol that is used extensively in business and social…

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nvq Plevel 3 Playwork

    • 2609 Words
    • 11 Pages

    5.1 Explain why it is important to have positive relationships with adults in the play environment…

    • 2609 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    After it has been determined that an email crime has been committed involving an email, the first step is to access the victims computer and recover the evidence. Using the victims email client, you must find and copy any potential evidence. It is important to copy, print, or forward the email to another email address as a backup. After an email messages is copied, you will then need to find the email header, after the email header is found, open the email header and copy and paste…

    • 1122 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Morton, Heather "Identity Thieves: Let 's Catch Them If We Can." State Legislatures (2004). Academic Search Premier. EBSCO. Web. 21 Sept.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identity theft is an important crime in society today and it needs to be heavily enforced and prosecuted. According to Transunion.com, As of 2015, 9.9 million Americans are victims of identity theft, with an incident happening on average every 19 seconds. This proves just how important of a crime identity theft is and that it should be better protected and have harsher consequences. The legal definition of identity theft according to Dakota Family Bank and Foundations of Computer Society is “the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.” Identity theft is in relation to the crime of stealing as if someone is committing Identity Theft, then they are taking the name of someone…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    criminology unit 4

    • 593 Words
    • 3 Pages

    Identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested. Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity theft victim to convince law enforcement authorities that they are not the individual who committed the crime.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Throughout the years, identity theft has become extremely prevalent and has affected many people. It’s important for everyone to know why identity theft began and the importance of it. There are many causes of identity theft that lead to negative effects. Identity theft is a serious problem that should not be taken lightly. Many people have gotten their wallet stolen or their purse and this is very common. Often times, people put their information on the internet when they do not know exactly who this information is going to. There are thousands of people out there who are out to get your money and/or identity. The things we frequently wonder are why these people take all our information and money. We do not fully understand the causes of…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Criminal Justice

    • 668 Words
    • 3 Pages

    Cybercrime has become a major issue in the United States today. One of the major issues is identity theft. Criminals are taken citizen’s identities and start living as if they are really these individuals. The distressing part about identity theft is that the victim suffers from these types of crimes for years to come. In this paper, I will identify the diverse major global crimes and criminal issues that have a global impact on national and international justice systems and processes. I will compare and contrast the various international criminal justice systems and how these major international crimes and criminal issues will and have been addressed and things that need to change in the criminal justice field to help global crime become more thriving. We have to stick together in this field to make sure that we stay one-step ahead of the criminals so that we that citizen can feel more safe and secure while on the electronic devices.…

    • 668 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Criminal Justice Trends

    • 1468 Words
    • 6 Pages

    Identity theft is an issue that has grown out of proportion in the twentieth century. Police are faced with jurisdictional and even the technological problems. They should be able to deal with this problem,…

    • 1468 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Identity Theft Effect

    • 3103 Words
    • 13 Pages

    A major growing problem within the United States is identity theft. Identity theft is the stealing and use of someone's personal information used primarily for monetary gain. I will elaborate on how identity theft occurs and I will describe what criminals can do with the information they obtain. I will also explain some of the prevention plans that companies have put into place to protect themselves and discuss how individuals can protect themselves as well. The Federal Trade Commission estimates that ten million Americans were victims of identity theft in 2002. 27.3 million Americans have been victims of some form of identity theft from 1998 to 2003. In 2004, merchandise…

    • 3103 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    "About Identity Theft - Deter. Detect. Defend. Avoid ID Theft." Federal Trade Commission. Web. 25 May 2011. .…

    • 2587 Words
    • 11 Pages
    Good Essays