{"id":549,"date":"2026-04-18T04:47:49","date_gmt":"2026-04-18T04:47:49","guid":{"rendered":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/?p=549"},"modified":"2026-04-19T14:06:30","modified_gmt":"2026-04-19T14:06:30","slug":"hrithik-kangana-email-fiasco-focus-on-cyber-law-aspects-rather-than-affair","status":"publish","type":"post","link":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/hrithik-kangana-email-fiasco-focus-on-cyber-law-aspects-rather-than-affair\/","title":{"rendered":"Hrithik- Kangana Email Fiasco- Focus on cyber law aspects rather than affair"},"content":{"rendered":"\n<main class=\"content\">\n    <section class=\"container\">\n        <div class=\"content-wrapper\">\n\n            <div class=\"text-content\">\n                <h1>Email Spoofing &#038; Cyber Investigation: A Legal Perspective<\/h1>\n\n                <p>\n                    As a cyber lawyer, I have been closely following the case involving Hrithik and Kangana. There appear to be several loopholes that raise questions about whether the investigation has been thorough enough.\n                <\/p>\n\n                <p>\n                    Without taking sides, it is possible that either both parties are victims of an <span class=\"highlight\">email spoofing scam<\/span> or only one of them is. Email spoofing is a common cyber offence where emails are sent from someone else&#8217;s address without actually hacking their account.\n                <\/p>\n\n                <p>\n                    Advanced tools allow cyber criminals to send emails appearing to originate from a legitimate email ID. The only reliable way to detect such activity is through <strong>IP address tracking<\/strong> and <strong>email header analysis<\/strong>.\n                <\/p>\n\n                <div class=\"point\">\n                    <h3>Understanding Email Spoofing<\/h3>\n                    <p>\n                        For example, if someone owns an email ID like <strong>abc@gmail.com<\/strong>, a cyber criminal can send emails appearing from that ID without accessing the account. This can be traced through forensic analysis.\n                    <\/p>\n                <\/div>\n\n                <div class=\"point\">\n                    <h3>Possible Scenarios<\/h3>\n                    <p>\n                        It is possible that both individuals are victims of a third party using spoofing techniques. Alternatively, one party may have spoofed the other&#8217;s email. In either case, cyber forensic investigation can determine the truth.\n                    <\/p>\n                <\/div>\n\n                <div class=\"point\">\n                    <h3>Need for Proper Investigation<\/h3>\n                    <p>\n                        In such cases, all digital devices including phones, laptops, and tablets should be seized and analyzed. These devices are mirrored, and forensic analysis is conducted on the mirrored data.\n                    <\/p>\n                <\/div>\n\n                <div class=\"point\">\n                    <h3>Role of Service Providers<\/h3>\n                    <p>\n                        Internet Service Providers and telecom companies maintain <strong>log files<\/strong>, which act as a blueprint of online activity. These logs help verify whether messages were actually sent.\n                    <\/p>\n                <\/div>\n\n                <div class=\"point\">\n                    <h3>Digital Evidence Examination<\/h3>\n                    <p>\n                        Even multimedia content like private videos can be examined for authenticity using forensic tools, including identifying the device used to record them.\n                    <\/p>\n                <\/div>\n\n                <div class=\"point\">\n                    <h3>Legal Implications<\/h3>\n                    <p>\n                        If a third party is responsible, they may be charged under offences like <strong>Cyber Personation<\/strong>, <strong>Unauthorized Access<\/strong>, and <strong>Hacking<\/strong> under the IT Act. If either party is involved, the same laws apply to them.\n                    <\/p>\n                <\/div>\n\n                <p>\n                    Unfortunately, public focus has largely been on the alleged relationship between the individuals rather than the technical aspects of cybercrime investigation, which can provide clear answers.\n                <\/p>\n\n                <p>\n                    It is important to note that service providers retain data only for a limited time. Delays in investigation can result in loss of crucial evidence.\n                <\/p>\n\n                <div class=\"summary\">\n                    <strong>Conclusion:<\/strong> Email spoofing is a serious and often misunderstood cybercrime. Proper forensic investigation and timely action are essential to uncover the truth and ensure justice.\n                <\/div>\n\n                <div class=\"meta\">\n                    <p><strong>Date:<\/strong> Nov 14, 2017<\/p>\n                    <p><strong>Author:<\/strong> Advocate Puneet Bhasin, Cyber Law Expert, Cyberjure Legal Consulting<\/p>\n                <\/div>\n            <\/div>\n\n            <div class=\"image-content\">\n                <img decoding=\"async\" src=\"http:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-content\/uploads\/2026\/04\/ritik.jpg\" alt=\"Cyber Law Investigation\">\n            <\/div>\n\n        <\/div>\n    <\/section>\n<\/main>\n\n<style>\n.content {\n    background-color: #f4f6f8;\n    padding: 40px 20px;\n}\n\n.container {\n    max-width: 1100px;\n    margin: auto;\n}\n\n.content-wrapper {\n    display: flex;\n    gap: 30px;\n    align-items: flex-start;\n}\n\n.text-content {\n    flex: 2;\n}\n\n.image-content {\n    flex: 1;\n}\n\n.image-content img {\n    width: 100%;\n    border-radius: 10px;\n    box-shadow: 0 4px 10px rgba(0,0,0,0.1);\n}\n\nh1 {\n    color: #2c3e50;\n    margin-bottom: 20px;\n}\n\nh3 {\n    color: #2c3e50;\n    margin-bottom: 8px;\n}\n\np {\n    line-height: 1.7;\n    color: #333;\n    margin-bottom: 12px;\n}\n\n.highlight {\n    color: #c0392b;\n    font-weight: bold;\n}\n\n.point {\n    margin-bottom: 18px;\n    padding-left: 10px;\n    border-left: 3px solid #3498db;\n}\n\n.summary {\n    margin-top: 25px;\n    padding: 15px;\n    background-color: #ecf5ff;\n    border-left: 5px solid #3498db;\n    border-radius: 5px;\n}\n\n.meta {\n    margin-top: 20px;\n    font-size: 14px;\n    color: #555;\n}\n\n\/* Responsive *\/\n@media (max-width: 768px) {\n    .content-wrapper {\n        flex-direction: column;\n    }\n\n    .image-content {\n        order: -1;\n    }\n}\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Email Spoofing &#038; Cyber Investigation: A Legal Perspective As a cyber lawyer, I have been closely following the case involving Hrithik and Kangana. There appear to be several loopholes that raise questions about whether the investigation has been thorough enough. Without taking sides, it is possible that either both parties are victims of an email [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":550,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/posts\/549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/comments?post=549"}],"version-history":[{"count":2,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/posts\/549\/revisions"}],"predecessor-version":[{"id":570,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/posts\/549\/revisions\/570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/media\/550"}],"wp:attachment":[{"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/media?parent=549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/categories?post=549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mentorinfotech.com\/project\/cyberjure\/wordpress\/wp-json\/wp\/v2\/tags?post=549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}