Email Record: Designing fraud? How Legacy Group's schemes work