Discover what you can.emails.internal documents. Code. Phone logs.
Why all the obfuscation? You have the evidence or you don’t