E-Mail Forensics

Total Page:16

File Type:pdf, Size:1020Kb

E-Mail Forensics E-mail Forensics www.paraben.com &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". What is a local storage archive? Local storage archives are any archive that has independent archive format from a mail server. Examples of these types of archives include: .PST, .MBX, .DBX, etc. &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Basic Rules & Expectations for Local Archives 1. Search for the appropriate mail archives and associated data storage. &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Program Storage Specifics Index or Table of Contents MailboxMailbox Mail Messages &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Program Storage Specifics Index or Table of Contents Stores: •Main Status MailboxMailbox •Unread •Read •Forwarded •Redirected •Flagged •Deleted &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Common Local Storage Archives The Bat! FoxMail Index: *.tbi Index: *.ind Messages: *.tbb (E-mail Examiner doesn't use this index file) Messages: *.box The Bat! < v1.42 Index: *.tbx Outlook Express v5/6 Messages: *.msb Index+Messages: *.dbx or *.MailDB Forte Agent MS Outlook Index: *.idx Index+Messages: *.pst (by default messages Messages: *.dat are stored in encrypted format) Pegasus Index: *.pmi Messages: *.pmm &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Outlook Express v4.x Index: *.idx Common Messages: *.mbx Eudora Local Index: *.toc Messages: *.mbx Storage Poco Index: *.idx Archives Messages: *.mbx Netscape v6.x and 7.x, and Mozilla Cont. Index: *.msf Messages: *. Netscape < v6.x Index: *.snm (E-mail Examiner doesn't use this index file) Messages: *. (no extension) &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Email Reference Cards &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Basic Rules & Expectations for Local Archives 1. Search for the appropriate mail archives and associated data storage. 2. Process all items with complete structure of: -Header -Body -Attachment to compute verification through hash value &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". E-mail Headers Typically Contain: •Sender E-mail Address •Receiver E-mail Address •Subject •Time of Creation •Delivery stamps •Message Author •CC-Carbon Copy •BCC &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". E-mail Headers-Text Attachments MIME-Version: 1.0 From: Cpt Picard <[email protected]> To: Beverly Crusher <[email protected]> Subject:: Pain in my neck Content-Type: multipart/mixed; boundary=boundarystring— boundarystring Content-Type: text/plain I seem to have this reoccurring pain in my neck. Please see attachment for more details. Regards, Jean Luc Content-Type: text/plain Content-Disposition: attachment; filename=“neck.txt” It aches in the morning when I wake up for about 20 minutes and also whenever Worf is around. --boundarystring-- &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". E-mail Headers-Binary Attachments MIME-Version: 1.0 From: Cpt Picard <[email protected]> To: Beverly Crusher <[email protected]> Subject:: Pictures of my neck in zip file Content-Type: multipart/mixed; boundary=boundarystring --boundarystring Content-Type: text/plain Attached is the file neck.zip, which has been base64 encoded. --boundarystring Content-Type: application/octet-stream; name=“neck.zip” Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=“neck.zip” H52QLID6AJFBALJHLIHKOLNS80JOPSNLJKNLFDLSHFLSHDLFSHLKDNC8 09SAOIHN3OFNSA80HLDBJSUF93HFSLBNCOISAY890EY0AHFLNC739HFO EBOASHOFHSODIY8930… OAIHOFIDHF8920DFNSOFNDOSGU03UQAFLASNFDLIU03WQJFOSIFH03I9 AHFDALHFNB= --boundarystring-- &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Basic Rules & Expectations for Local Archives 1. Search for the appropriate mail archives and associated data storage. 2. Process all items with complete structure of: -Header -Body -Attachment to compute verification through hash value 3. Watch for virus issues &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Outlook File Size • Outlook Pre 2003 – Maximum archive size is 2 GB • Outlook 2003 – Maximum archive Size is 20 GB &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". E-mail Forensics Server Storage Archives &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". What is a server storage archive? Server storage archives are any archive that has mixed storage for all of the clients that exist on a server. Examples of these types of archives include: MS Exchange (.EDB), Lotus Notes (.NSF), GroupWise (.DB), etc. &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". MS Exchange PUB.EDB • Public Information Store – contains Public Folders – Public Folders contain information shared amongst the different users. MS Exchange PRIV.EDB • Private Information Store – contains the mailboxes for the server – keeps information private from other users. &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". MS Exchange PRIV.EDB • Priv.edb: A rich-text database file containing message headers, message text, and standard attachments. MS Exchange PRIV.STM • Priv.stm: A streaming internet content file containing audio, video and other media that are formatted as streams of Multipurpose Internet Mail Extensions (MIME) data. &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Lotus Notes *.NSF • Valuable Evidence: –Messages – Attachments – PIM Oriented Data &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". ENCRYPTION &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Novell GroupWise Post Office Post Office Directory Structure Composed of directories which contain: – Post Office Database (wphost.db) • Admin info required to allow users to exchange messages (list of post offices and associated users) – Message Store • User databases (userxxx.db) • Message databases (msgnn.db) • Attachments directory &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". E-mail to other devices &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". Case Examples &NBJM'PSFOTJDT@#SFBLJOH"SDIJW ". &NBJM'PSFOTJDT@#SFBLJOH"SDIJW "..
Recommended publications
  • Download Fact Sheet
    Intella Process l Search l Filter l Produce. Simple. Fact Sheet Intella®: Smarter eDiscovery and Forensic Investigations Innovative, powerful, and simple – exactly the tools you need to conquer today’s data challenges and deliver world class results. Process. Search. Filter. Produce. Simple. Exponential Market Leading Industry’s Best Productivity Power Value & Pricing Key Features Customer Use Examples • Highly user-friendly interface and market-leading Intella has helped some of the world’s best known indexing speeds organizations to dramatically reduce the time, expense and • Insight Analysis feature lists the most notable user, personnel needed for their case loads. system and Internet artifacts, simplifying finding • A Fortune 500 retailer was able to bring e-discovery important data and improving examination time and functions in-house and save millions odue to Intella’s thoroughness of any investigation easy-to-use functionality. • Batch documents and assign to reviewers for subjective • The compliance department of a global financial coding for legal review institution conducts internal reviews of employee emails • Built-in instant messaging so co-workers can discuss and and files with surprising ease because of Intella’s low share documents within the tool during investigations resource/highly efficient architecture. • Automatic extraction of notable registry artifacts. This • A major international accounting and consulting firm can save the examiner many hours of manual artifact increased customer satisfaction by providing their
    [Show full text]
  • Free Email Software Download Best Free Email Client 2021
    free email software download Best Free Email Client 2021. This article is all about best free email clients and how they can help you be more productive. We also talk about Clean Email, an easy-to-use email cleaner compatible with virtually all major email services. But before we go over the best email clients for 2021, we believe that we should first explain what advantages email clients have over web-based interfaces of various email services. Clean Email. Take control of your mailbox. What Is an Email Client and Why Should I Use One? If you’re like most people, you probably check your email at least once every day. And if you’re someone whose work involves communication with customers, clients, and coworkers, the chances are that you deal with emails all the time. Even though we spend so much time writing, forwarding, and managing emails, we hardly ever pause for a moment and think about how we could improve our emailing experience. We use clunky web interfaces that are not meant for professional use, we accept outdated applications as if alternatives didn’t exist, and we settle for the default email apps on our mobile devices even though app stores are full of excellent third-party email apps. Broadly speaking, an email client is a computer program used to access and manage a user’s email. But when we use the term email client in this article, we only mean those email clients that can be installed on a desktop computer or a mobile device—not web-based email clients that are hosted remotely and are accessible only from a web browser.
    [Show full text]
  • Spear Phishing Targeting Ics Supply Chain – Analysis
    SPEAR PHISHING TARGETING ICS SUPPLY CHAIN – ANALYSIS January 20, 2021 MARKEL PICADO 1 Table of Contents Introduction ................................................................................................................................................... 3 Threat Analysis ............................................................................................................................................... 3 Distribution Strategy .................................................................................................................................. 4 Spear Phishing............................................................................................................................................ 5 Identity Theft ......................................................................................................................................... 5 Toolkit .................................................................................................................................................... 8 AgentTesla v3 Analysis ........................................................................................................................... 9 Attack Surface .......................................................................................................................................... 16 MITRE ATT&CK Mapping ..................................................................................................................... 17 Threat Actor Infrastructure ................................................................................................................
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • RS-2500 Dual WAN Security VPN Gateway
    RS-2500 Dual WAN Security VPN Gateway Web VPN / SSL VPN Server IPSec / PPTP VPN Server Application Blocking for IM, P2P, Webmail, Video/Audio, Game, Tunnel and Remote Control applications Content Blocking for URL, Scripts, Download and Upload Bandwidth Management for user or application Authentication for Internet access Policy-based firewall Web VPN/ IPSec VPN PPTP VPN Application Content SSL VPN Server Server Blocking Filtering Dual WAN Policy Bandwidth User Multiple Load Based Management Authentication Subnet Balance Firewall Fully VPN Solution The AirLive RS-2500 is the new generation of all-in-one Dual WAN Security VPN Gateway. You can choose to create the high security IPSec VPN tunnel between offices, or the fast and easy configured PPTP VPN between office and home user. Now AirLive RS-2500 features with Web VPN (SSL VPN), user can easily create the high security IPSec VPN via web browser between office and anywhere. SSL VPN Server IPSec VPN Server SOHO Router VPN Internet VPN VPN Internet VPN LAN LAN LAN LAN PPTP VPN Server IPSec VPN Trunk 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan RS-2500 Internet Internet Primary VPN Backup VPN PC1 PC2 RS-2500 SSL VPN Server IPSec VPN Server SOHO Router VPN Internet VPN VPN Internet VPN LAN LAN LAN LAN PPTP VPN Server IPSec VPN Trunk RS-2500 Internet Internet Primary VPN Backup VPN PC1 PC2 RS-2500 Web VPN (SSL VPN) The AirLive RS-2500 features Windows based Web VPN (SSL VPN) function, and the remote user only needs to open browser then he can establish the high security of IPSec VPN tunnel between AirLive RS-2500 and the client PC or laptop.
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • Intella User Manual Version 2.0.0
    Intella User Manual Version 2.0.0 Contact To learn more about Intella™, please contact us using the contact information below, or contact an Intella Channel Partner. Vound Office Phone +1 888-291-7201 Email [email protected] Postal Address PO Box 308 Evergreen, Colorado 80437 U.S.A. Sales Contacts http://www.vound-software.com/partners We will be pleased to provide additional information concerning Intella and schedule a demonstration at your convenience. To become an Intella reseller, please contact us! For user and technical support please visit our website: http://www.vound-software.com Page 2 | Intella™ User Manual | © 2016 Vound Vound Colorado (“Vound”). Mention of third-party products is for © 2016 Vound. All rights reserved. informational purposes only and constitutes neither an endorsement nor a The information in this User Manual is recommendation. Vound assumes no subject to change without notice. Every responsibility regarding the performance or effort has been made to ensure that the use of these products. Under the copyright information in this manual is accurate. laws, this manual may not be copied, in Vound is not responsible for printing or whole or in part, without the written clerical errors. consent of Vound. VOUND PROVIDES THIS DOCUMENT “AS IS” Your rights to the software are governed by WITHOUT WARRANTY OF ANY KIND, the accompanying software license EITHER EXPRESS OR IMPLIED AND SHALL agreement. The Vound logo is a trademark NOT BE LIABLE FOR TECHNICAL OR of Vound. Use of the Vound logo for EDITORIAL ERRORS OR OMISSIONS commercial purposes without the prior CONTAINED HEREIN; NOR FOR INCIDENTAL written consent of Vound may constitute OR CONSEQUENTIAL DAMAGES RESULTING trademark infringement and unfair FROM THE FURNISHING, PERFORMANCE, competition in violation of federal and OR USE OF THIS MATERIAL.
    [Show full text]
  • Intella™ User Manual
    Intella™ User Manual Intella™ evidence made visible Vound, LLC email investigation and eDiscovery software Version 1.5 Contact To learn more about Intella™ please contact your nearest Vound representative listed below or an Intella Channel Partner. USA, Canada, Latin America Natasha Lockhart [email protected] nlockhart09 (Skype) +1 801-704-9140 +1 801-367-2169 (mobile) Europe, the Middle East, Africa Tom Balance [email protected] tballance (Skype) +1 720-746-0408 +1 303-919-0709 (mobile) Asia-Pacific Region Peter Mercer [email protected] We will be pleased to provide additional information concerning Intella and schedule a demonstration at your convenience. To become an Intella reseller, please contact us! For user and technical support please visit our website: www.vound-software.com. Vound Mention of third-party products is © 2011 Vound, LLC. All rights for informational purposes only and reserved. constitutes neither an endorsement nor a recommendation. Vound The information in this User Manual assumes no responsibility with is subject to change without notice. regard to the performance or use of Every effort has been made to these products. Under the ensure that the information in this copyright laws, this manual may not manual is accurate. Vound, LLC is be copied, in whole or in part, not responsible for printing or without the written consent of clerical errors. Vound, LLC. VOUND, LLC PROVIDES THIS Your rights to the software are DOCUMENT “AS IS” WITHOUT governed by the accompanying WARRANTY OF ANY KIND, software license agreement. The EITHER EXPRESS OR IMPLIED Vound logo is a trademark of AND SHALL NOT BE LIABLE FOR Vound, LLC.
    [Show full text]
  • Review, Email Clients with Source Code Editing
    Review, Email Clients with Source Code Editing By Micheline Johnson Updated 2013-12-05 Why is source code editing desirable? It enables the addition of variable indenting and hanging indents, tables, images, charts, videos etc. the replacement of <p> tags with <div> tags, if para spacing is not required. Wikipedia lists most email clients. Of these, the free Windows or cross-platform GUI email clients are included in the Appendix. Of these, the current mainstream desktop GUI email clients include: 1. Outlook, overkill for most purposes, and is not free. 2. Outlook Express, not available for Windows 7 3. Windows Live Mail 4. Mozilla Thunderbird, does not natively support HTML editing or tables. 5. Eudora v7.1, runs on Microsoft Windows XP/2000 (http://www.eudora.com/download/). It has problems with Windows 7, see http://mcaf.ee/cxsw8 . It runs on Windows XP, and does not appear to support editing HTML source code, or tables. 6. Eureka Email. It is very difficult to uninstall, see http://mcaf.ee/1q0ka , so I did not test it. 7. Pegasus Mail. Pegasus v4.63 allows the insertion of a table and the editing of the number of rows or columns of that table; but it does not support editing of HTML source code. It supports hanging indents to increments of one tab spacing, which is very crude. 8. DreamMail 9. FoxMail 10. SeaMonkey. http://www.seamonkey-project.org/. Allows inserting of tables. Appears to allow insertion of HTML code, but does not allow viewing of the entire HTML source code. 11. Netscape Messenger used to have an HTML editor.
    [Show full text]
  • Chapter Iii Internal & External Analysis
    CHAPTER III INTERNAL & EXTERNAL ANALYSIS 3.1 Vision & Mission Vision To be the most respected Internet Company. Earn the respect of consumers by listening, satisfying and exceeding their needs and expectations. Earn the respect of employees by continuously improving our corporate reputation so that Tencent is a company employees are proud to work for. Earn the respect within the industry by promotion the healthy development of the Inernet industry and win-win collaboration with partners. Earn the respect of society by actively assuming corporate responsibility and contributing to community development. Mission To enhance people’s quality of life through Internet services. Treat the Internet like electricity: a reliable service that makes life easier and more enjoyable. Address the diverse need of different regions and consumers by offering differentiated products and services Build a healthy and win-win Internet ecology based on open collaboration with partners. 12 3.2 PEST Analysis PEST, as an analysis framework of macro-environmental factors, which can be considered as macro-environmental factors and its usefulness line in the assumption that the success of a particular organization or management solution cannot be understood without having the information relevant to the specific business environment (Buchanan and Gibb, 1998). 3.2.1 Political factors As a majority of Tencent’s operations are located in China, therefore its results of operations, financial condition and prospects are subject to regulatory developments in China. The China’s Internet and telecommunications industries are highly regulated. Regulations issued or implemented by the State Council, MIIT, MOC, GAPP and other relevant government authorities cover many aspects of its telecommunications and Internet information services, including entry into the telecommunications industry, the scope of permissible business activities, licenses and permits for various business activities and foreign investment.
    [Show full text]
  • SMTP Reply Codes Reference & List
    AnswersThatWorkTM SMTP Status codes – SMTP Error Codes – SMTP Reply Codes SMTP Status Codes & SMTP Error Codes Reference There comes a time in the life of a Computer Consultant where, one day, he/she will have to deal with email server problems. It is inevitable. Sometimes these problems will be with the interfacing of the mail server with the ISP, in particular an inability to send mail. After checking the usual suspects such as lack of connection (your broadband line is dead), faulty router, firewall problems, DNS problems, or an incorrect SMTP server name (thanks to some clever ISP changing its SMTP server name without informing anyone – it happens!!), you will likely start delving a little deeper by checking if your email server reports any errors. Depending on the actual problem it is encountering, your mail server may not be able to provide detailed help on how to resolve the problem, and may instead only be able to provide you with an SMTP Status Code in your server’s log (these codes are also known as SMTP Error Codes or SMTP Reply Codes). It is just for such cases that we have produced this document (we use it too !! J ). So, use this document as a quick reference to common SMTP status codes or SMTP error codes for SMTP mail servers such as AA Mail Server, Alt-N MDaemon, ArGoSoft Mail Server, Axigen Mail Server, Barracuda Spam Firewall, CMail, CMailServer, E-Mail Anywhere, FTGate, GMS Mail, Internet Anywhere, Kerio MailServer (KMS), Lotus Notes, MailEnable, MailMax, Mailtraq, Merak Mail Server, Microsoft Exchange (Exchange Server 2003 NDR, Non-Delivery Report, error codes), Novell GroupWise, Qmail, PostCast Server, PostConf, PostFix, PowerMTA, QK SMTP Server, Rockliffe MailSite, SendMail, SurgeMail, TFS Secure Message Server, VisNetic Mail Server, WinMail, Zimbra, or any other SMTP / ESMTP standards compliant e-mail MTA.
    [Show full text]
  • (1) Qualified Institutional Buyers Under Rule 144A Or (2) Non-U.S
    IMPORTANT NOTICE THIS OFFERING IS AVAILABLE ONLY TO INVESTORS WHO ARE EITHER (1) QUALIFIED INSTITUTIONAL BUYERS UNDER RULE 144A OR (2) NON-U.S. PERSONS OUTSIDE OF THE UNITED STATES IMPORTANT: You must read the following before continuing. The following applies to the offering circular following this page (the “Offering Circular”), and you are therefore advised to read this carefully before reading, accessing or making any other use of the Offering Circular. In accessing the Offering Circular, you agree to be bound by the following terms and conditions, including any modifications to them any time you receive any information from us as a result of such access. NOTHING IN THIS ELECTRONIC TRANSMISSION CONSTITUTES AN OFFER OF SECURITIES FOR SALE IN THE UNITED STATES OR ANY OTHER JURISDICTION WHERE IT IS UNLAWFUL TO DO SO. THE SECURITIES HAVE NOT BEEN, AND WILL NOT BE, REGISTERED UNDER THE UNITED STATES SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT”), OR THE SECURITIES LAWS OF ANY STATE OF THE UNITED STATES OR OTHER JURISDICTION, AND SECURITIES IN BEARER FORM ARE SUBJECT TO U.S. TAX LAW REQUIREMENTS. THE SECURITIES MAY NOT BE OFFERED, SOLD OR (IN THE CASE OF NOTES IN BEARER FORM) DELIVERED WITHIN THE UNITED STATES, OR TO, OR FOR THE ACCOUNT OR BENEFIT OF, U.S. PERSONS (AS DEFINED IN REGULATION S UNDER THE SECURITIES ACT (“REGULATION S”)) EXCEPT PURSUANT TO AN EXEMPTION FROM, OR IN A TRANSACTION NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT AND APPLICABLE STATE OR LOCAL SECURITIES LAWS. THIS OFFERING CIRCULAR MAY NOT BE FORWARDED OR DISTRIBUTED TO ANY OTHER PERSON AND MAY NOT BE REPRODUCED IN ANY MANNER WHATSOEVER, AND IN PARTICULAR, MAY NOT BE FORWARDED TO ANY ADDRESS IN THE UNITED STATES.
    [Show full text]