Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Forensic Email Evidence Analysis, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Email based communication has become the most used medium for corporate on the internet. It is being used in exchanging messages, sharing documents and managing transactions through computers, mobile phones and all kinds of electronic gadgets. In the case of company X, detecting a fraudulent email amongst a pile of 35,000 is no mean task. To be able to gather sufficient evidence that is admissible in court, a diverse team of experts is needed. Given that in this particular case the kind of evidence being searched for is not definite and could be in any format or even encrypted to mean something vastly different; the team should consist of specialized professionals with deep expertise in their various fields.
A very competent IT expert (Rick) with very good programming skills is needed for data extraction, decryption and analysis. To go through a list of 35,000 emails, it is absolutely critical to authenticate the data: point out inconsistencies, ensure that all data has been available and most importantly confirm that no data has been omitted. The next step for the IT person is then to put the data in an analyzable format for extensive and thorough analysis. A documentation expert (John) will come in handy in sifting through the vast emails conversations and attachments. With 35,000 emails to analyze, it is important to establish a trend and flow of information between different parties so as to be able to identify suspicious areas. Archiving and documenting the evidence is also important when it comes to consistent evidence presentation. A legal professional (Troy) is also needed in this team to help in determining, what is admissible evidence that can stand in a court of law while at the same time guiding the team in working within legal parameters. A lawyer will also double as the team leader given that this is lawsuit and the focus is to establish infringement of intellectual property. To convince a jury and a judge, it is important to paint the picture to them very clearly in a simple and easy way. To present potentially complex and convoluted evidence in a palatable manner, there is need for a person with excellent presentation skills (Sara). Formatting this massive information to be understood by a jury is essential for the evidence to be admissible.
To sift through 35,000 emails; identify which particular emails are subject of interest and most importantly point out the sender and the incriminating emails, we will employ several standard email forensic techniques. Email systems usually consist of various hardware and software components on both the senders and receivers side. An email itself consists of several parts that are transmitted via the internet through various protocols. Working with various forensic techniques, we will be able to identify: actual senders and recipients of emails, the actual time when the email was sent, detailed email records and senders intent.
To start, we will conduct a thorough header analysis of all the 35,000 emails. This will help us identify the senders and trace email paths. However, since it is possible that email paths and sender identities could be hidden; we will perform extensive correlation analysis to identify inconsistencies and identify the real senders. We will also deploy bait tactics in cases where we feel the real IPs have been masked. This will help in establishing which emails were sent via proxies which is in itself a red flag for suspicious activity. Server investigation will also be conducted where we will gather: email logs, identify email sources and content and trace which particular computers sent which messages. If we suspect some information has been deleted from the servers we’ll conduct network equipment analysis to extract logs from routers, firewalls and switches to confirm and countercheck server logs.
All this will enable us to identify suspicious activity narrowing down from 35000 emails to just several hundred within two weeks. Based on IPs and particular computer identification we’ll narrow down the several hundred emails to just one particular trail of email exchange. At this stage, to decipher encrypted conversations we’ll use available decryption tools to show the actual conversation. This can be used as evidence in a court of law.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee