Determined to solve the case, John began to dig deeper. He reviewed the system logs, checked for any suspicious network activity, and even interviewed the IT staff. However, every lead seemed to end in a dead-end.