Identify and discuss at least three (3) ways how email can be used to commit and/or cover up a crime. Include how forensics analysis can be used to uncover this evidence.
Submit your proofread initial post of at least 300 words. Include at least one library or web reference (as well as your text and/or supplemental material provided) that is presented in proper APA format that supports your post.
Discussion Objectives: Recover graphic files. Explore tasks in investigating e-mail crimes and violations. Explain how to locate and recover graphics files. Describe how to identify unknown file formats. Locate hidden evidence through steganography. Examine tasks in investigating e-mail crimes and violations. Discover some available e-mail computer forensics tools.