Reseña del libro "Sinister Emails: Thirty-Two Tactics for Tormenting (en Inglés)"
A few years ago, I was tagging along with my wife at an affluent estate sale in Wilsonville, Oregon. While she was rummaging around in their garage, I happened to stumble upon a shoebox full of old cell phones in their driveway. When I asked the elderly woman who owned the house how much she wanted for the phones, she replied, "You can have the entire box for $50 because I don't know anything about cellular vices. I also don't know if any of them work or if they need the Wi-Fis. After my late husband disappeared, I found an open safe in the closet just behind his custom shoe rack. Somehow, I never knew that safe was there. Anyway, that's where I found those old vices." After purchasing the shoebox full of phones, I drove home and checked to see if each device worked. One particular phone, a Blackberry, still contained files on the Micro SIM card. Upon extracting these files onto my Airbook, I found a zip file labeled SE_32_TFT. Upon opening the folder, I discovered 32 images that looked like someone printed off a series of emails, made edits, and scanned each as a TIFF file. I can only assume, but it's possible they did all of this so that no record would be found on their email server. I'm unsure of the origin of these emails or the dates when these emails were captured because that information has been crossed out. For years, I've hesitated to share these emails with anyone due to their sinister nature and the fact that the thirty-two tactics could be used for evil. However, I believe there is nothing hidden that won't be disclosed, and no secret won't be brought out into the light. The following pages contain each email.