A company suspects an employee is leaking sensitive corporate information using encrypted communications over its internal network. A forensic investigator is tasked with both recovering potential encrypted data *and* identifying any attempts to conceal information (e.g., steganography) on the suspect’s ...