way back in the early days where we were moving on from tty to other protocols we had a fellow in our office who said if there was a telephone in a room he could find a way to link to it and record conversations, or if it was hooked to a computer, to copy everything being sent to wherever.
one day we had these com security guys from the CIA's langley headquarters talk to him ~ because it was true and he tried it.
Security is much better now ~ and the gub'mnt at least has access to its own systems!
My point is they should be searching the NSA data or the email servers. A computer that’s turned off and w/o its HD’s is a fool’s errand to be sent to retrieve.