Assume that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report. The required tools should also be included.