Abstract

This research aims to contribute to forensic counteractive measures that can identify and track the people who use e-mail for diploma mills. The authors had adopted e-mail forensic process to acquire, extract, analyse, and interpret data. The scope of this research included the empirical analysis from the experimental e-mails' headers using forensic tools and manual approach based on the request for comments (RFCs) as the primary guidelines. The study found that the commercial tool extracted headers less often than the free alternatives. E-mail sent from desktops provided the computer name and ISP of the sender. However, typical and anonymous e-mails can only trace back to the original mail servers. Although tools could provide investigators with ease and convenience, data acquisition and validation need to be done manually. This research is not the ad hoc mechanism, but it can be implemented in other criminal investigations or related endeavours.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.