Email Spoofing & Cyber Investigation: A Legal Perspective
As a cyber lawyer, I have been closely following the case involving Hrithik and Kangana. There appear to be several loopholes that raise questions about whether the investigation has been thorough enough.
Without taking sides, it is possible that either both parties are victims of an email spoofing scam or only one of them is. Email spoofing is a common cyber offence where emails are sent from someone else’s address without actually hacking their account.
Advanced tools allow cyber criminals to send emails appearing to originate from a legitimate email ID. The only reliable way to detect such activity is through IP address tracking and email header analysis.
Understanding Email Spoofing
For example, if someone owns an email ID like abc@gmail.com, a cyber criminal can send emails appearing from that ID without accessing the account. This can be traced through forensic analysis.
Possible Scenarios
It is possible that both individuals are victims of a third party using spoofing techniques. Alternatively, one party may have spoofed the other’s email. In either case, cyber forensic investigation can determine the truth.
Need for Proper Investigation
In such cases, all digital devices including phones, laptops, and tablets should be seized and analyzed. These devices are mirrored, and forensic analysis is conducted on the mirrored data.
Role of Service Providers
Internet Service Providers and telecom companies maintain log files, which act as a blueprint of online activity. These logs help verify whether messages were actually sent.
Digital Evidence Examination
Even multimedia content like private videos can be examined for authenticity using forensic tools, including identifying the device used to record them.
Legal Implications
If a third party is responsible, they may be charged under offences like Cyber Personation, Unauthorized Access, and Hacking under the IT Act. If either party is involved, the same laws apply to them.
Unfortunately, public focus has largely been on the alleged relationship between the individuals rather than the technical aspects of cybercrime investigation, which can provide clear answers.
It is important to note that service providers retain data only for a limited time. Delays in investigation can result in loss of crucial evidence.