Spoofing email is a common occurrence these days. Have you received a spoofed email? Briefly, describe the email and how did you notice it was not legit? Anything else that was odd concerning the spoofed email?
The author speaks of several laws & regulations concerning email investigations. Choose one of the laws and discuss the law/regulation. What is it? What does it cover? How does it relate to digital forensics? Please, comment on two other classmates’ posts in order to receive full credit