How long has craig tucker been using the coupons

Assignment Help Computer Engineering
Reference no: EM133675064

Homework: Investigation- Digital Forensics Report

Purpose

In this homework, you will examine a forensic disk image for evidence of coupon forgery creation. Read the scenario document carefully, as you may consider it interview notes with your client. This represents a more complex scenario than Investigation 2 and thus contains a greater degree of irrelevant data. Be sure to give yourself plenty of time to perform the examination and be sure to take advantage of Autopsy's features to assist your disambiguation.

Instructions

You'll need to use the following resources to complete the homework:

1. Investigation Sample Evidence*
2. Autopsy the open-source forensic suite* (or another suite, such as EnCase or FTK.)

Accessed via the Virtual Lab.

After reading the Investigation 3 Scenario, open your forensic tool and import the sample evidence into the case. Begin a forensic report to document your examination.

Scenario

This scenario takes place circa 2013.

As part of normal business practice, Walmart security receives Counterfeit Coupon Alerts from the Coupon Information Corporation. Within the past month, Walmart security has received specific information regarding fraudulent coupons being passed at their store. Using the received information, they conducted an internal investigation using video surveillance footage in an effort to identify the customers who are engaged in this activity.

One of the suspects was an unknown white, male adult, approximately 28 years old, brown hair, 5' 9", 200 pounds, no facial hair, and no visible tattoos. A photograph of this suspect was circulated to the employees in the store.

On December 22, 2013, Craig Tucker was detained by Walmart security as he matched the description, and he had just passed two fraudulent coupons for Monster energy drink and Arizona Iced Tea beverages while paying for other items. Walmart security contacted the Santa Monica Police Department to arrest and prosecute Tucker for theft. Santa Monica PD Officer Smith interviewed Tucker, and he denied knowing the coupons were fraudulent. He claimed to have received the coupons after completing an online survey for students at Santa Monica Community College.

Although Tucker gave consent to the search of his personal computer, a search warrant was obtained to search his computer for evidence as it may be an instrument to committing a crime. You have been given a forensic image of his hard drive. Based on your review of the search warrant, you are authorized to search for any information or communication associated with the creation, downloading, distribution, and possession of fraudulent consumer coupons.

Task

A. Can we find any digital artifacts indicating recent activity related to coupon fraud, such as temporary files, cache, or registry entries?

B. Are there indications on Tucker's computer of tools or files used for creating or altering coupons, and evidence in communications of Tucker distributing or discussing fraudulent coupons?

C. Was Craig Tucker communicating with anyone regarding these coupons?

D. How did Craig know these could be used at Walmart (as there is no indication of this on the coupons themselves)?

E. How long has Craig Tucker been using these coupons? When was the first instance?

F. Is there any evidence to suggest that Tucker visited any websites or other online platforms that are linked to the distribution of fake coupons?

G. Do the file creation or modification dates align with the time Tucker allegedly obtained the coupons?

Reference no: EM133675064

Questions Cloud

Facility standards regarding healthcare documentation : Identify facility standards regarding healthcare documentation (Data Structure, Content, and Information Governance) for a Skilled Nurse Care Facility.
Develop transition plan for student with multiple disability : Develop a Transition Plan for a student with multiple disabilities from a case study provided by the instructor.
What patient care delivery model you say most closely fits : Discuss: What patient care delivery model would you say most closely fits your current work situation or a former work environment (analysis)?
Compare hypoxia and ischemia : Compare and contrast hypoxia and ischemia. What condition is more dangerous to the brain? Knowing what you do about the effects of ischemia on the brain,
How long has craig tucker been using the coupons : How long has Craig Tucker been using these coupons? Do the file creation or modification dates align with the time Tucker allegedly obtained the coupons?
How will you recognize the clinical manifestations : What is the worse negative outcome that could happen to your patient? How will you recognize the clinical manifestations?
Updating data during the life of a project : Manage, since it has no predefined data model, is not always organised and may comprise multiple types. For example, data from thermostats, sensors
Management of national forests influenced by Wilderness Act : How is the management of national forests influenced by the Wilderness Act? The National Forest Management Act?
Write a problem statement for the master thesis topic : Write a problem statement for this Master Thesis Topic. What strategy should organizations use to protect their remote work environment from threats?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd