LCI Learning

Share on Facebook

Share on Twitter

Share on LinkedIn

Share on Email

Share More

cm jain sir (ccc)     02 December 2011

Ip address in email for threatening

A threatening email was received by a professor. He found out the IP address of sender and complaint to cyber police. The cyber police of that place had registered an FIR. The noted IP address is of my freind personal computer but not the email id. He or any of the relatives are nowhere connected or linked with that professor, Distance also 500km away. How it is possible.

Ld expert kindly enlighten on this issue since FIR is lodged and police is harrassing him.



Learning

 8 Replies

Democratic Indian (n/a)     02 December 2011

Just an IP address is not a conclusive proof.

IP addresses can be spoofed.

Emails can be spoofed.

Email headers can be spoofed.

Computers can be infected or hijacked to send out emails or other kind of traffick from it.

IP Spoofing:

1) https://en.wikipedia.org/wiki/IP_address_spoofing

2) https://www.computerworld.com/s/article/9001021/The_top_five_ways_to_prevent_IP_spoofing

3) https://www.symantec.com/connect/articles/ip-spoofing-introduction

4) https://searchsecurity.techtarget.com/definition/IP-spoofing

Email spoofing:

1) https://searchsecurity.techtarget.com/definition/email-spoofing

2) https://www.cyber-crime-defense.com/Email_Spoofing.html

Computer hijacking:

1) https://www.dslreports.com/faq/8428

Contact some lawyer who is also familier with the above concepts and cyber law. Try to get copy of that email along with its complete headers and get it examined by someone who understands the email protocols, TCP/IP protocols and their loopholes, and computer hijacking, hacking, security etc.

1 Like

Shonee Kapoor (Legal Evangelist - TRIPAKSHA)     02 December 2011

Correct, let the police complete investigations.

 

Also was it a Wi-Fi connection?

 

 

Regards,
 
Shonee Kapoor
harassed.by.498a@gmail.com

Kumar Doab (FIN)     02 December 2011

@ Democratic Indian

Thanks for sharing it in the forum. This shall help many.
 


(Guest)

I HAVE A PHOTON PLUS CONNECTION WHICH I CARRY WITH ME.SOMETIME MY NEPHEW/NIECE USE THAT IN THEIR OWN DESKTOP /LAPTOP.

SO WHAT CONSTRUCT THE IP ADDRESS?THE MACHINE WHERE THE PHOTON IS INSERTED OR WILL BE SAME FOR USING THE SAME PHOTON DEVICE?

kartikeya (lawyer/cyber law consultant/cyber crime investigator)     03 December 2011

If Ip address is belongs to your friend he is in trouble. there are some ways to investigate this case further. some basic details like time of receiving mail and log details of the net connection will be useful in this case. IP address can be spoofed by some technique but still there are some ways to solve this case.

kartikeya (lawyer/cyber law consultant/cyber crime investigator)     03 December 2011

 @ jai matadi... same photon device

cm jain sir (ccc)     03 December 2011

please give your contact info and mob no. so that any help required can be taken from expert like you.

Democratic Indian (n/a)     04 December 2011

Also was it a Wi-Fi connection?

Yes it is very easy to piggyback on open and unencrypted wireless LAN connections. WEP encryption is also easily crackable.


Even if Wi-Fi router has strong encryption or the router is Non Wi-Fi, there are many loopholes to hack into many routers and send IP traffic through it. Following are easy ways to hack into most routers and take over control:


1) https://technochat.in/2010/11/how-to-hack-into-broadband-adsl-modem-router-and-get-the-broadband-user-id-and-password/


2) https://www.skullbox.net/linksys.php


3) www.gohacking.com/2010/06/how-to-hack-an-ethernet-adsl-router.html


4) https://corz.org/comms/hardware/router/bt.voyager.205_router.how-to.php


Therefore a clever cyber lawyer who understands the intricate details about cyber security and cyber forensics should be able to find lot of holes in the case of prosecution to defend his client. Besides these there are many loopholes that can create enough doubt above and beyond "reasonable doubt".

1 Like

Leave a reply

Your are not logged in . Please login to post replies

Click here to Login / Register