Abusive Calls And SMS

 

📝 Case Study Report: Abusive/Threatening Calls Investigation

📌 Case Summary

  • Victim: Sangeeta, a working professional

  • Nature of Complaint: Receiving repeated abusive calls from an unidentified number

  • Reporting Trigger: Encouraged by her friend Supriya to file a complaint

  • Investigating Officer’s Objective: To trace the perpetrator, analyze digital evidence, and file appropriate charges

🕵️ Step-by-Step Investigative Procedure

StepActionObjective
1Interview complainantGather firsthand details of calls and context
2Classify case typeConfirm it falls under "Abusive Call" category
3Request CDRSend 92 CrPC notice to service provider’s Nodal Officer
4Validate CDRConfirm correct number; request resend if mismatched
5Convert & analyzeChange file format to CSV/XLS for Excel-based analysis
6Format numeric fieldsModify IMEI, IMSI, and phone numbers for 15-digit clarity
7Geolocation mappingUse Cell ID data to extract location (lat/lon, address)
8Analyze call patternsIdentify frequency, duration, caller identity, location
9Correlate with SDR/CAFCross-verify user identities and records
10Interpret hexadecimal SMS logsUse ASCII converters; seek company KYC via 91 CrPC
11Legal reportingComplete charge sheet with IT Act & IPC sections

📊 Sample CDR Insights (Excerpt)

  • High frequency calls from one Maharashtra-based number

  • Repeated call durations between 20–90 seconds

  • SMS sent using hexadecimal-coded sender IDs, possibly automated platforms

⚖️ Legal Framework Applied

  • IPC 354D: Stalking via electronic communication

  • IPC 506: Criminal intimidation

  • IPC 509: Intent to insult modesty of a woman

  • IT Act Sections (as amended): For misuse of telecom and digital platforms

🔍 Conclusion

  • Perpetrator: Deepak, a colleague of Sangeeta, previously rejected by her

  • Motive: Revenge, after discovering her number on a matrimonial site through premium access

  • Outcome: Sufficient evidence extracted through CDR, SDR, and digital trace for legal action

🔐 Preventive Measures

  • Avoid sharing personal contact on public digital platforms

  • Use caller identification and blocking apps

  • Report unusual behavior early to authorities

  • Platforms should implement stricter privacy filters for premium users

Comments

Popular posts from this blog

🕵️‍♀️ Tracing the Invisible: How OSINT Helped Track a Missing Student