you need to recover when searching a victim computer for a crime committed with specific e-mail message?
Will you be able to break the encryption so that you can verify that the employee was in possession of the proprietary information?