He didn’t send the emails, but they came from his computer
Computer forensic analysis can range in scope depending on the case. We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations. As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common. The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation. I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]