As in the above example, the header may have the data structure:
http://phishreporter.phishmessage.com/3918d3df-94ea-459f-af17-084474c0a801/email? expr=hh:mm:ss:UTC, where “3918d3df-94ea-459f-af17-084474c0a801” is an example identifier and a value associated with the variable name “expr” in a name-value pair (NVP) indicates an expiration time.
In some embodiments, the header may contain additional information, and have the data structure:
http://phishreporter.phishmessage.com/3918d3df-94ea-459f-af17-084474c0a801/email?c1=<integer>&c2=<integer>&v=<version>&b=<build>&t=<token>&s=<client code>&a=armor&expr=hh:mm:ss:UTC, where each NVP indicates a variable name and a variable value separated by an equal sign, additional NVPs separated by ampersands. Any or all of these example fields could be modified or removed and other fields could be added.
The header can include a unique or a substantially unique identifier generated by the system for tracking purposes. In some embodiments, the identifier can be an alphanumeric code. The header may also include, as part of identifier information or separately, an identification of the user for whom the simulated phishing message was generated. This may provide attribution back to the user who reported the suspicious message and support reputation management, as described in more detail below.
An example header may be encoded or encrypted, as described in further detail below, and appear as: