Chapter 11: E-mail and Social Media Investigations

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

For digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes.

True

2
New cards

Investigating crimes or policy violations involving e-mail is different than investigating other types of computer abuse and crimes.

False

3
New cards

E-mail programs either save e-mail messages on the client computer or leave them on the server.

True

4
New cards

All e-mail servers use databases that store multiple users' e-mails.

False

5
New cards

Like UNIX e-mail servers, Exchange maintains logs to track e-mail communication.

True

6
New cards

E-mail messages are distributed from a central server to many connected client computers, a configuration called ____.

client/server architecture

7
New cards

In an e-mail address, everything after the ____ symbol represents the domain name.

@

8
New cards

With many ____ e-mail programs, you can copy an e-mail message by dragging the message to a storage medium, such as a folder or drive.

GUI

9
New cards

After you open e-mail headers, copy and paste them into a text document so that you can read them with a text editor, such as Windows ____.

Notepad+

10
New cards

To retrieve e-mail headers in Microsoft Outlook, double-click the e-mail message, and then click File, ____. The "Internet headers" text box at the bottom of the dialog box contains the message header.

Properties

11
New cards

Some popular Web-based e-mail service providers are Gmail, ____, Outlook Online, and Yahoo!

Zoho

12
New cards

____ trains people to listen to voice recordings to determine who's speaking or read e-mail and other writings known to be by a certain person and determine whether that person wrote the e-mail or letter in question.

Forensic linguistics

13
New cards

To view Gmail Web e-mail headers open the e-mail, click the down arrow next to the Reply circular arrow, and click ____.

Show original

14
New cards

To view e-mail headers on Yahoo! click the ____ list arrow, and click View Raw Message.

More

15
New cards

In Microsoft Outlook, you can save sent, drafted, deleted, and received e-mails in a file with a file extension of ____.

.pst

16
New cards

____ is a way to verify the names of domains a message is flowing through.

www.dkim.org

17
New cards

____ allocates space for a log file on the server, and then starts overwriting from the beginning when logging reaches the end of the time frame or the specified log size.

Circular logging

18
New cards

The files that provide helpful information to an e-mail investigation are log files and ____ files.

configuration

19
New cards

____ contains configuration information for Sendmail, helping the investigator to determine where the log files reside.

/etc/sendmail.cf

20
New cards

Typically, UNIX installations are set to store logs in the ____ directory.

/var/log

21
New cards

Exchange logs information about changes to its data in a(n) ____ log.

transaction

22
New cards

In Exchange, to prevent loss of data from the last backup, a ____ file or marker is inserted in the transaction log to mark the last point at which the database was written to disk.

checkpoint

23
New cards

In Microsoft Exchange, a(n) ____ file is responsible for messages formatted with MAPI.

.edb

24
New cards

Some e-mail systems store messages in flat plaintext files, known as a(n) ____ format.

mbox

25
New cards

In Facebook the ____ info simply tells you the last time a person logged on.

basic subscriber

26
New cards

Describe how e-mail account names are created on an intranet environment.

In most cases, an intranet e-mail system is specific to a company, used only by its employees, and regulated by its business practices, which usually include strict security and acceptable use policies. For example, network users can't create their own e-mail accounts, and usernames tend to follow some type of naming convention that the e-mail administrator determines. For example, for John Smith at Some Company, jsmith is the username followed by the company's domain name, somecompany.com, to create the e-mail address jsmith@somecompany.com.

27
New cards

Describe the process of examining e-mail messages when you have access to the victim's computer and when this access is not possible.

After you have determined that a crime has been committed involving e-mail, access the victim's computer or mobile device to recover the evidence on it. Using the victim's e-mail client, find and copy any potential evidence. It might be necessary to log on to the e-mail service and access any protected or encrypted files or folders. If you can't actually sit down at the victim's computer, you might have to guide the victim on the phone to open and print a copy of an offending message, including the header. The header contains unique identifying numbers, such as the IP address of the server that sent the message. This information helps you trace the e-mail to the suspect.

28
New cards

What are the steps for copying an e-mail message in Outlook or Outlook Express?

1. Insert a USB drive into a USB port.
2. Open File Explorer, navigate to the USB drive
3. Start Outlook
4. click the folder containing the message you want to copy.
5. Resize the Outlook window
6. Drag the message from the Outlook window to the USB drive icon in File Explorer.
7. Click the File tab, and then click Print to open the Print pane. After printing the e-mail so that you have a copy to include in your final report, exit Outlook.

29
New cards

What is forensic linguistics?

Forensic linguistics - training people to listen to voice recordings to determine who's speaking or read e-mail and other writings known to be by a certain person and determine whether that person wrote the e-mail or letter

30
New cards

What kind of information can you find in an e-mail header?

The sender/reciver, Date and time, the subject line, and information about the route the e-mail took through e-mail servers, and IP address.

31
New cards

Explain how to handle attachments during an e-mail investigation.

An attachment can be any type of file, from a program to a picture. If a message includes an attachment, investigate it as a supporting piece of evidence. If you're working with the victim, the attachment is usually still attached to the e-mail. If you're investigating a suspect's computer, remember to work with the copied version. On a suspect's computer or forensic image, search for the attached file with a forensics tool or the OS's Search or Find feature to determine whether the file was saved and still exists on the drive.​If you're investigating an e-mail attachment with an unfamiliar file extension, such as .mdf, you can search the Internet to find out what program creates a file of this type.

32
New cards

Why are network router logs important during an e-mail investigation?

Network administrators maintain logs of the inbound and outbound traffic routers handle. Routers have rules to allow or deny traffic based on source or destination IP address. In most cases, a router is set up to track all traffic flowing through its ports. Using these logs, you can determine the path a transmitted e-mail has taken. The network administrator who manages routers can supply the log files you need. Review the router logs to find the victim's (recipient's) e-mail, and look for the unique ID number

33
New cards

What kind of information is normally included in e-mail logs?

E-mail logs generally identify the e-mail messages an account received, the IP address from which they were sent, the time and date the e-mail server received them, the time and date the client computer accessed the e-mail, the e-mail contents, system-specific information, and any other information the e-mail administrator wants to track.

34
New cards

Provide a brief description of Microsoft Exchange Server.

Microsoft e-mail server software. Exchange uses an Exchange database and is based on the Microsoft Extensible Storage Engine (ESE), which uses several files in different combinations to provide e-mail service. The files most useful to an investigation are .edb database files, checkpoint files, and temporary files.

35
New cards

Briefly explain forensic tools for social media investigations.

Software for social media forensics is being developed, but not many tools are available. A number of social media tools that were free or inexpensive have now been incorporated into forensics suites, such as FTK Social Analyzer, or offer only 14-day to 30-day trials. In addition, there are many questions about how the information these tools gather can be used in court or in arbitration. Investigators often run into the problem of finding information unrelated to a case, and sometimes they must stop to get another warrant or subpoena, such as investigating a claim of fraud and finding evidence of corporate espionage. Using social media forensics software might also require getting the permission of people whose information is being examined.

36
New cards

A privacy law in the United States

Electronic Communications Privacy Act (ECPA)

37
New cards

Text editor for macOS

TextEdit

38
New cards

Text editor used with Windows

Notepad+

39
New cards

Unique to each message an e-mail server transmits

ESMTP number

40
New cards

Facebook extended subscriber info profile

Neoprint

41
New cards

Used to conduct business, brag about criminal activities, raise money, and have class discussions

OSNs

42
New cards

Where language and the law intersect

Forensics linguistic

43
New cards

A registry Web site

www.arin.net

44
New cards

Attempt to get personal information by luring readers with false promises

Phishing e-mails

45
New cards

A Microsoft system that enables different e-mail applications to work together

Messaging Application Programming Interface (MAPI)

46
New cards

Forensic linguistics encompasses civil cases, criminal cases, cyberterrorism cases, and other legal proceedings.

True

47
New cards

E-mail crimes and violations rarely depend on the city, state, and country in which the e-mail originated.

False

48
New cards

Evidence artifacts vary depending on the social media channel and the device.

True

49
New cards

A challenge with using social media data in court is authenticating the author and the information.

True

50
New cards

You can send and receive e-mail in two environments: via the Internet or an intranet (an internal network).

True