- safeguard a copy, suspecting someone will bury, delete, or mischaracterize its content
- creating time stamp in second location
- preserving sequential time line
- documenting failure to respond.
Also, it’s described as a cc, rather than bcc. So she wanted to warn the suspects that destroyed emails might exist in 2nd source.