The email could have been made from a phone.
I haven’t used any thing other than my phone to send emails in years.
There is no way im going to beleive a super state with our level of mil and fed , dhs, fbi, cia and be a
” cant”
Trace thus threat in minutes.
Nope
Not buying that for second.
There is no way im going to beleive a super state with our level of mil and fed , dhs, fbi, cia tech, and
” cant”
trace this threat in minutes ?
Nope
Not buying that for second.
The email could have been made from a phone. I haven’t used any thing other than my phone to send emails in years. There is no way im going to beleive a super state with our level of mil and fed , dhs, fbi, cia and be a ” cant” Trace thus threat in minutes. Nope Not buying that for second.You shouldn't buy it because it's nonsense. Even if it was an email sent from a phone, there are all sorts of headers that are attached to it (namely mail servers that it was routed though and the connections it used) - with most email services, you'll even get the IP address that it connected to the mail server from (which would tip you off to the phone system that was used - Verizon, T-Mobile, etc.) After analyzing the email headers they'd know where that IP is and where to start looking for the perp. They know or have every tool available to know if they wanted.