cm jain sir (ccc) 02 December 2011
Democratic Indian (n/a) 02 December 2011
Just an IP address is not a conclusive proof.
IP addresses can be spoofed.
Emails can be spoofed.
Email headers can be spoofed.
Computers can be infected or hijacked to send out emails or other kind of traffick from it.
IP Spoofing:
1) https://en.wikipedia.org/wiki/IP_address_spoofing
2) https://www.computerworld.com/s/article/9001021/The_top_five_ways_to_prevent_IP_spoofing
3) https://www.symantec.com/connect/articles/ip-spoofing-introduction
4) https://searchsecurity.techtarget.com/definition/IP-spoofing
Email spoofing:
1) https://searchsecurity.techtarget.com/definition/email-spoofing
2) https://www.cyber-crime-defense.com/Email_Spoofing.html
Computer hijacking:
1) https://www.dslreports.com/faq/8428
Contact some lawyer who is also familier with the above concepts and cyber law. Try to get copy of that email along with its complete headers and get it examined by someone who understands the email protocols, TCP/IP protocols and their loopholes, and computer hijacking, hacking, security etc.
Shonee Kapoor (Legal Evangelist - TRIPAKSHA) 02 December 2011
Correct, let the police complete investigations.
Also was it a Wi-Fi connection?
Kumar Doab (FIN) 02 December 2011
@ Democratic Indian
Thanks for sharing it in the forum. This shall help many.
kartikeya (lawyer/cyber law consultant/cyber crime investigator) 03 December 2011
If Ip address is belongs to your friend he is in trouble. there are some ways to investigate this case further. some basic details like time of receiving mail and log details of the net connection will be useful in this case. IP address can be spoofed by some technique but still there are some ways to solve this case.
kartikeya (lawyer/cyber law consultant/cyber crime investigator) 03 December 2011
@ jai matadi... same photon device
cm jain sir (ccc) 03 December 2011
please give your contact info and mob no. so that any help required can be taken from expert like you.
Democratic Indian (n/a) 04 December 2011
Also was it a Wi-Fi connection?
Yes it is very easy to piggyback on open and unencrypted wireless LAN connections. WEP encryption is also easily crackable.
Even if Wi-Fi router has strong encryption or the router is Non Wi-Fi, there are many loopholes to hack into many routers and send IP traffic through it. Following are easy ways to hack into most routers and take over control:
2) https://www.skullbox.net/linksys.php
3) www.gohacking.com/2010/06/how-to-hack-an-ethernet-adsl-router.html
4) https://corz.org/comms/hardware/router/bt.voyager.205_router.how-to.php
Therefore a clever cyber lawyer who understands the intricate details about cyber security and cyber forensics should be able to find lot of holes in the case of prosecution to defend his client. Besides these there are many loopholes that can create enough doubt above and beyond "reasonable doubt".