Notifications
Clear all

Tampered email

4 Posts
4 Users
0 Reactions
402 Views
(@qatar)
New Member
Joined: 15 years ago
Posts: 3
Topic starter  

I was in the midle of losing my job. I sent an email to my supervisor reiterating the accountibility for the decision (as she told me). I aslo asked her to send it to her boss. She did send it but took out the accountability piece (and added words to make it readable). These words were portrayed as my own even though she changed them.

I found out about it and have asked for an investigation. My institution is avoiding my request because of the political ramifications. I have reviewed comments about the email where my supervisor claims that she did not make the change.

Question How can I procede with this. Technically, what can I do to bolster the evidence or strengthen an investigation.

Question She did this to act to my detriment. But what do we call it legally? I mean, is this illegal at all?

I know its a bit out of the forensics area but I'm desperate,


   
Quote
(@forensicakb)
Reputable Member
Joined: 16 years ago
Posts: 316
 

You shouldn't be the one handling your own case.

If money is the issue look for someone to help on the arm, if you have some funds, retain an expert before you step all over the evidence which may help your case.

I seem to remember a member from here in your area of the World.


   
ReplyQuote
chrisdavies
(@chrisdavies)
Trusted Member
Joined: 16 years ago
Posts: 55
 

Your sent items and her inbox!!

The email in sent item will be different from the message in her outbox


   
ReplyQuote
(@douglasbrush)
Prominent Member
Joined: 16 years ago
Posts: 812
 

Well few things. Depends on Qatar's laws on if you have a valid claim to pursue and investigation and you would need some form of legal representation. There are the issues with local and national rules on civil procedure and whether you can even be allowed to gain access to systems. That all being said you could do forensic images of your system, others and even the server or back-ups (this is a technical and legal set of issues itself depending the environment and where hosted). Your first step is to preserve. Then to extract and present information in a verifiable state. So there is a large forensic element that can come into play to be used for authenticating your claim but there is also the legality of what you wish to accomplish that would require legal counsel fluent in the rules and laws of your country, state or municipality.


   
ReplyQuote
Share: