Why is email important? - Science behind US lawyer case


In recent news e-mails are increasing more and more, it is at the center of the current US lawyer's shooting incident, there are just reasons. A lot of communication flows by e-mail. This will be an efficient form of memos and other intercourse. E - mail is almost instantaneous, costs little, and mostly replaced paper notes. Since e-mails could be shredded or burned while the e-mail was leaving a trail even though they were deleted, the route of inquiries that the investigators previously could not use Offers. In addition, unlike paper, email itself reveals who, when, where, where it sent it, and who received it. Senator Patrick Leahy said (Michael Abramowitz on April 14, 2007 GOP admits that Rob's e-mail four years are missing) "You can not erase e-mails today, they can not delete e-mail ... they have passed too many servers, there are those e-mails -" Generally three types of e-mails are mainly There is one e-mail client program that includes Microsoft Outlook Express, Mozilla Thunderbird, Macintosh Mail, and Netscape Mail The second type is a generic Microsoft Outlook program that is a completely different program from the same company's Outlook Express The third is commonly known as Web mail or Internet mail.

E-mail client programs mostly store data in text format. In other words, people save words that are easy to understand as being different from hidden computer languages. In general, individual e-mails (such as "In" or "Sent" mailboxes) within a single mailbox are all stored together as a single file.

When mail is deleted, it is truncated from the mailbox file, but at that point the data is not actually deleted from the computer. Each file has an index entry like the table of contents. When the entire mailbox is deleted, some of the entries in the file index are deleted, but the actual body of the file does not disappear from the computer. The area on the hard disk of the computer holding the file is marked as reusable, but the contents of the file may not be overwritten.

Computer forensics experts can search the computer's superficially unused portion for text that might have been part of an email. Experts can look for names, phrases, places, or actions that may be listed in the email. E-mail contains internal data that shows where it was and where it was.

For example, I just sent a 17-word message titled "Where is this mail?" To my wife. She replied, "Darling, certainly you," Where did this mail come from? "Love, your grammatically correct wife - 15 words reply But when you look under the ones displayed on the screen, you can see that there are actually 246 e-mails included, from where Did you come?

Additional information includes my beloved America Online (AOL) email address, her computer's IP address ("IP" stands for Internet protocol - every computer connected to the network has an IP address) There are three email addresses, three or four mail server names, four date / time stamps, and AOL ads at the end.

By transferring or copying the e-mail, you can see more information, especially the e-mail address of others who copied or forwarded the message.

By examining the IP address and investigating it a little more, you can know the physical location of the computer with the specified IP address. I was able to know who is involved in the communication story and where I am.

In the survey, the judge looked at multiple e-mail addresses indicating that these other people may be involved and judged that the original party was not approaching with all the requested information If other, e-mail address to be checked. Later, the great fishing exploration may officially be approved and may begin in full swing.

Therefore, I read such a heading published on ThinkProgress' s website on April 12, 2007. The White House claims that RNC's e-mail was originally archived, but only one staff had an account. At the press conference, Vice President Dick White House said Vice President Dana Perino said that only a handful of White House staff had an e-mail address of the RNC (Republican National Committee). The White House may have had to admit more than it might have faced inevitable discoveries 50 Senior staff (from Employee's e-mail may be missing, said the White House - Los Angeles Times April 12, 2007) had such an e-mail address of RNC. This is almost always 10 digits.

In his article Follow the e-mail Sidney Blumenthal on Salon.com said that off-shoring of White House records by RNC's e-mail is based on the RNC domain gwb43.com (George W. Bush, the 43rd President), but the White House started earlier this month I sent mails submitted to the House of Representatives and the Senate Committee on Monday, Congress was a kind of slip. " This is exactly like information that computer forensics experts need to help with the process of electronic discovery. In my own electronic discovery work, I found over 500,000 unexpected references on one computer.

Investigators are now able to search computers with laptops or blackberries used by staff at RNC, the White House, hosting both computers, these organizations. Search will search for "gwb 43", which is more likely to generate more e-mail addresses and e-mail, regardless of whether it has been deleted or not.

I mentioned three types of e-mail at the beginning of this article, but only talked about the most promising things to display deleted data. The second type is

Represented by Microsoft Outlook. Depending on the configuration of the mail server, Outlook stores all the data in one encrypted file on the user's computer, on the mail server, or both. All mailboxes are in the same encrypted file. Computer forensics specialists have tools to allow decoding of this file in a way that can return much or all of deleted e - mails. There may be a backup of the user's mail on the mail server.

Web mail stored with mail on a remote server (such as AOL's large mail server farm) is stored little or not on the user's computer. Here, the user is essentially watching the web page displaying the mail. Such a mail server is very dynamic, so deleted e-mails may be overwritten in minutes. Blumenthal is a system in which such information Follow the e-mail As a result, instead of the White House system many aides are moving to Internet e-mail. "Yahoo!, it's a baby," Bushy says.

On the other hand, such e-mail content may be difficult to find once deleted, but the log of access to the e-mail account may be kept for quite a while and may be useful to some extent for investigation not.

In conclusion, unlike paper documents, e-mails are likely to be broadcast widely by chance. Also, unlike paper, copying may be present elsewhere if shredding is done. In the paraphrase of Senator Leahy, electronic data may be near immortality. Another difference is that e-mail contains data that shows who got it, where, where. The current American attorney scandal not only has the advantage that e-mail is a valuable tool for communication but also provides some transparency to the other closed rooms of the leader (or damages depending on your view Give it)


Related Photos





Comments

Popular posts from this blog

Employment Act of Indiana State: Overview of Wage Payment Law and Wage Claims Act

Plan for disability: Control your destiny

I heard the paint house you - close the case of Jimmy Hoffa