We could just sit and watch each user log in but the execs want to try and find this out quietly. I work in a center with 20 users that all have access to certain classified information, recently we found some screen shots floating around with very sensitive company info being spread and in all of them the users cursor is a very unique and specific pixel sword of sorts. This is going to be a really far out there question but my initial search has turned up nothing.