This is the time that KaVarri used to gain access to GeoVarri’s email, her online banking information, and her social media accounts using GeoVarri’s laptop. KaVarri requested a password change via email for GeoVarri’s Facebook account and re-logged back into it with the new password. She logged onto GeoVarri’s page with her personal laptop. GeoVarri and her parents were going para sailing for the day, so she left her cell phone on the nightstand. KaVarri erased the emails confirming the password changes on GeoVarri’s laptop. She also re-logged into Facebook with the cell phone, and erased the email notifications regarding the changes on there as well. The next thing that KaVarri did was create a new email and Facebook page in GeoVarri’s name, but dropped one “r”, to then be spelled GeoVari. KaVarri subesquetnly sent out an email, from the very similar but different email address, to all of the participants in GeoVarri’s upcoming seminar. The email’s contents informed the recipients of a schedule change for the next session. Amari joined her family on deck after their parasailing excursion. However on the way to meeting them, she conveniently tossed GeoVarri’s purse overboard, but not before removing the passport, driver’s license, and social security card. KaVarri not only stole her sister’s identification, but she now …show more content…
She also explained to the investigators that she had “lost” her purse on the cruise ship. Despite efforts made in reporting it to the officials, and performing a thorough sweep of the common areas that GeoVarri had visited that day, her purse was not recovered. This crime is considered a constitutional issue pertaining to identity theft. (Identity Theft Legislation, 2014) Investigators were able to trace the erased emails confirming the password changes. However, KaVarri neglected to empty the laptops recycle bin. Investigators were able to pinpoint the time and day that those emails were erased. GeoVarri was with her parents on the outing when the requests for the changes were made. Access was gained during the investigation to the impersonated social media account, which was traced to KaVarri’s IP address. (Lewis, 2014) Investigators confirmed that the requests were traced to GeoVarri’s IP address for the email address as well. Investigators also interviewed the participants that received the “newly scheduled” seminar announcement. They obtained copies of all correspondences, which confirmed that KaVarri impersonated GeoVarri. Each of the above mentioned items were then individually used as exhibits during the identity theft trial as