Close

Articles Posted in authenticity

Updated:

Authenticity

Here’s a reminder about authenticating emails based on a posting from Prof. Colin Miller at EvidenceProfBlog.  To paraphrase Prof. Miller: And, like its federal counterpart, [Mil. R. Evid.] 901(b)(4) provides that By way of illustration only, and not by way of limitation, the following are examples of authentication or identification…

Contact Us
Start Chat