If Outlook or Outlook Express is installed on your computer, follow these steps:
\
The main piece of information you’re looking for is the originating e-mail’s domain address or an IP address.
To open and examine an e-mail header, follow these steps:
Open File Explorer and navigate to your work folder.
Double-click a .txt file containing message header text, such as Outlook header.txt. The message header opens in Notepad.
</p>
E-mail programs save messages on the client's computer or leave them on the server.
How e-mails are stored depends on the settings on the client and server.
On the client's computer, you could save all your e-mail in a separate folder for record-keeping purposes.
Most e-mail programs also include an address book of contacts, and many offer calendars, task lists, and memos.
A suspect’s address book, calendar, task list, and memos can contain valuable information that links e-mail crimes or abuse to other parties and reveal the suspect’s physical address and even involvement in other crimes.
In Web-based e-mail, messages are displayed and saved as Web pages in the browser’s cache folders.
Many Web-based e-mail providers offer instant messaging (IM) services that can save message contents in proprietary and nonproprietary file formats.
Some IM programs are configured to not save chat content unless users change the default setting, so you might need to search the suspect’s Pagefile.sys
file to find message fragments.
</p>
As part of the investigation, you need to determine an e-mail’s origin by further examining the header with one of many free Internet tools.
Tracing: Way of determining message origin.
If the point of contact isn’t listed on the Web site or the domain doesn’t have a Web site, you need to use a registry site, such as those in the following list, to determine the point of contact:
</p>
/etc/mail/sendmail.cf
, which can help you determine where log files are stored.sendmail.cf
file to find out what to do with an e-mail after it’s received./etc/syslog.conf
file includes e-mail logging instructions so that you can determine how Sendmail is set up to log e-mail events and which events are logged.syslog.conf
file’s configuration in the /etc
directory contains three pieces of information that tell you what happened to an e-mail when it was logged: the event, the priority level of concern, and the action taken when it was logged./var/mail
.master.cf
and main.cf
, in the /etc/postfix
directory, and e-mails are stored in /var/spool/postfix
.syslog.conf
file simply specifies where to save different types of e-mail log files./var/log/maillog
, which usually contains a record of Simple Mail Transfer Protocol (SMTP) communication between servers.maillog
file are important information in an e-mail investigation.maillog
file also contains information about Post Office Protocol version 3 (POP3) and Internet Message Access Protocol 4 (IMAP4) events./var/log
directory./var/log
, you can use the find or locate command to find them./home/username/mail
is created on the client computer when a user logs on for the first time and runs the e-mail program..edb
file is responsible for messages formatted with MAPI..tmp
(temporary) files to prevent loss when it’s busy converting binary data to readable text.Tracking.log
that tracks messages.As with any investigation, you need a warrant or subpoena to ask an OSN to produce its records.
There are other approaches you can take, however. If people are cooperating with your investigation, they might give you the usernames and passwords to their social media accounts.
If not, you can access only their public profile or become friends with one of their friends, which might give you limited information. For this approach, there are a few steps you need to take:
Begin with a workstation that doesn’t contain any of your personal information, or create a virtual machine with a bridged network.
Many people link their cell phone numbers to their Facebook accounts, so try looking up the suspect’s cell phone number in Facebook, which shows you the person’s username, too.
Next, you should do a Google search on this username, making sure to use your investigation workstation.
Collect as much information as possible on Google, and use it to find friends of the suspect and then attempt to friend these people.
\