T 5.77 Unauthorised monitoring of emails

Normally, emails are transmitted in clear text. In the absence of cryptographic protection, the emails can be monitored in an unauthorised manner or even changed unnoticed on all IT systems used for data transmission. When transmitting emails via the internet, a very large number of IT systems may be involved without previously knowing the exact route of transmission. The route of transmission depends on the utilisation and availability of the gateways and parts of the network. An email from one part of the city to another may even be transmitted via another country.

Incoming emails may also be accessed using the mailbox operated with the mail server of the recipient. It contains all received emails; depending on the configuration not only the unread emails, but an archive with all messages received in the past months. At least the system administrator of the mail server can access these. In some cases, copies of outgoing mails are saved on the mail server as well. However, the user mail program saves these copies to the computer of the sender in many cases.

Examples: