This document discusses email forensics and investigating email crimes. It provides information on email client/server architecture, protected accounts, and challenges like faking and spoofing emails. The document outlines steps for email investigations including obtaining emails, recovering deleted emails, and copying email messages. It describes email headers and the important information they contain, such as the sender/recipient, dates, and IP addresses. The document provides guidance on viewing email headers in different email programs and examining them for details that can aid investigations.