Pursuant to the request of officers of an international technology company suspecting the misappropriation of their Intellectual Property (“IP”) by employees, led the investigation to forensically evaluate the corporate servers, firewall logs and e-mail