“We have, and will continue to, investigate the source of this anonymous email............
With today’s technology, why can they NOT detect the source of the threating email?
“With todays technology, why can they NOT detect the source of the threating email?”
Of course they can. If they truly want to.