ced on his desk. It was a digital forensics analysis of Ashely Berger's corporate c
of encrypted emails, routed throu