To achieve definite and correct evidences against the suspect for Cyber Stalking cyber crime by examining the emails sent to the targeted person with forensic mail analysis and investigation.
The primary aim of the stalkers behind sending obnoxious emails is harassing people online through Internet wherein the victim is subjected to a barrage of life threatening and other niggling email messages. This type of cyber crime is known as 'Cyber Stalking'.
The individual, a known face in the international business world, reported against the unidentified delinquent who has had been sending him odious mails. The report was registered in the nearby police station. He demanded identification of the culprit and further action within a limited time period. The case was registered against the offender who was sending him unsocial, hateful messages and thereafter investigation started.
Detailed information about the cyber crime case that had been brought into action by means of adverse use of Internet as well as physical molestation and abuse is mentioned here.
To identify and investigate the unknown assailants in a restricted time frame and within limited monetary assistance, the police contacted the digital forensics investigators agency. Such a step was taken to get assistance in determining the source of emails so that some clue of stalkers (cyber criminals) might be achieved and thereby convicted in the court of law. Following actions had been executed to initiate the proceedings of investigation
The challenges that have been presented to the investigating experts are as follows:
With all the details of the case known and also well acquainted with the challenges, the forensics investigators planned out a precise way to achieve successful and apt end result. It was decided that an economical forensic email analysis tool be used to get pertinent result in less time so that the guilty be punished by the court of law as soon as possible and the victimized person might be relieved from the clutches of criminals.
With MailXaminer having been chosen as the email analysis tool, the strategies employed to investigate within provided criteria are as follows:
The chief aim was to track the IP addresses from which emails were received and then determine the sender's physical address.
The Internet Protocol addresses of the received mails were tracked by MailXaminer that finally assisted the investigators to trace the cyber criminals. When probed by the police the suspect accepted the committed crime. Then a case was registered by the police by claiming charges against the responsible, under the Internet Technology Act. After all hearings, the court of law founded the suspect guilty and declared prosecution against the accountable. The convicted is currently facing charges for making wrong use of Internet and shall remain in confinement for five years.
Comment by Client: "The continuous and non-stop dedication that the police and investigation agency showed in solving the case cannot be described in words. I really appreciate them for their superb work that helped me get rid-off, from the clutches of cyber criminals that had made my life a hell."
Comment by Investigating Agency: "The case did involve some hurdles in reaching its final objective. But with the combined efforts of the client, police and digital forensics investigation tool that we utilized, transformed the hard work into success."