I don't think I could begin to accurately speculate on why it was received, if it was coincidence, etc. That being said, I wanted to respond to the
topic of the thread, which I hope isn't too much of an off tangent. I apologize if it is.
If you are exceptionally concerned about someone or some software infiltrating your system here are the steps you can follow to stop this (at least
from them directly infiltrating your system, this does nothing for line tapping, IP/MAC address logging, or any other form of monitoring/tracking that
would occur outside of your physical computer)
1. Download all updates, drivers, etc that you would need if you were going to reinstall your OS.
2. Download a virtualization program, Sun's Virtual Box is open source, free, and fairly easy to set up.
3. Burn both of those to a non-rewritable CD/DVD/Bluray. Perform these three steps from a known clean computer.
4. disconnect computer from any network, including a non internet connected LAN.
5. completely format all drives, including removable media (though it may be better to just toss said removables). Here I would use a utility that
will perform complete fills/deletes of the whole drive in addition to reformat.
6. perform a clean install
7. Install your virtualization software, set up at least one virtual machine with an operating system, your safest bets being an OS that is
linux/unix/mac based.
8. Install drivers and such, including any additional software, security suite, etc in your base OS.
9. Do any online action through the VM, most likely if you get infiltrated again it will only be the VM that gets infiltrated and with a couple clicks
of a button and the span of 5 minutes it can be wiped out and recreated cleanly.
This is by no means full proof, there are no full proof security methods short of never connecting to any form of network and never using removable
media.
EDIT: The only way an unsent email draft on a non-web based email client could have been received by a potential infiltrator is if they had remote
access to your system which could be had in any number of ways, but most likely as stated by a previous poster would be some sort of trojan like a key
logger or remote access.
If it was a web based email client the most likely scenario would be, again as stated by a previous poster would be if they had gotten your password
via phishing, cracking, etc.
Another potential is that if you use wireless internet, it is remarkably easy to intercept most wireless traffic without directly infiltrating a
system. This interception is even a two way street meaning the perpetrator can send you false web pages, a faked web login screen is statistically
more viable as a way of gaining logins/passwords than phishing given the percentages of people on non/weakly encrypted/secured wireless networks.
Even if you did not send the email, but had used a web based email service to save the draft in, you are still sending that data to a server
somewhere.
On it's way to the server that message is bouncing through several random nodes before getting to the server all of which could be compromised, but
that is where speculation begins bordering on paranoia.
edit on 5-3-2011 by baphometBetty because: to directly answer OP's question, found at
EDIT tag