Crime ❯ Cybercrime ❯ Hacking ❯ Data Theft
The case shows how a private inbox can leak years of material that then fuels false claims.