We use a 3rd party application to log the IP address of incoming mail. We  pursue threatening communications vigorously to the fullest extent of the law. 

Send Us a Message

CONTACT US