We have reason to believe that the suspect has stolen a sensitive piece of virtual technology from CyberX. This virtual technology belonged to a group of OSINT professionals who worked for CyberX and the suspect was a part of there team. From what we were told this virtual technology was used to replicate a mobile device but that was the extent of what they could share. Your job is to determine if the suspect stole this virtual technology and if so where were you able to find it and what was on the device.