force, combing through surveillance footage, tracing leads, and hacking into any network that could p
nto the study,